ENCRYPTION ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR S FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD A BLACK PAPER
|
|
|
- Garey Garrison
- 10 years ago
- Views:
Transcription
1 EMIL REPORT FROM SOVEREIGNMN.COM PPER EMIL HOW TO SECURE YOUR EMILS FOR FREE WITH THE STRONGEST IN THE WORLD PPER 1
2 EMIL PPER Why You Should Encrypt Your s... 3 Encrypting Your s With PGP:... 4 How It Works... 4 The Software... 5 Step 1: Install Mozilla Thunderbird Download the installer Install Mozilla Thunderbird Set Up Your ccount... 6 Step 2: Install GnuPG On Windows On Mac OS X... 8 Step 3: Install Enigmail Download Enigmail Install Enigmail Uninstalling Enigmail...11 Step 4: How To Manage Encryption Keys How To Generate New Keypair How To Share Your Public Key With Your Contacts How To Find nd Import Other People s Encryption Keys...16 Step 5: Sending Your First Signed nd Encrypted The Bottom Line
3 EMIL PPER Why You Should Encrypt Your s Sending an unsecured is like shouting something across a crowded room if you expect the information to be kept private that is probably one of the worst methods available. You might as well rent a billboard so everyone can see. nd as the whole recent PRISM surveillance debacle has brought to light, if you suspected it was a bad idea to use Gmail or Hotmail(now Outlook), you ve been proven correct! So please don t use Gmail or any other common cloud based service provider if you want to keep your communication and location private. ll of these companies will bend over backwards to hand over your data as soon as a government agency knocks on their door. Even Hushmail, a company that prides itself with offering Free with Privacy, has been proven to be not so private, as in the cases where they have handed over cleartext copies of private messages at the request of law enforcement agencies. They also, just as the other big online services, record your IP address (and thus location) every time you log in to check your . You see, the problem with the internet is that there are so many touch points. traffic is routed across a hierarchy of networks, and between the sender, the receiver, the various hosts, internet service providers, etc., there are a number of nodes that have access to our data. Consequently, network transmissions are anything but private and secure. Governments figured this out a long time ago. In the United States, for example, the government set up a series of special encrypted networks that function just like the internet. The Department of State and Department of Defense (ok, offense) use a network called JWICS. JWICS, pronounced Jay Wicks, stands for Joint Worldwide Intelligence Communication System essentially, it is a secure version of the regular Internet. Special computers that sit in buildings with no windows communicate with each other through high level encryption algorithms. Functionally, JWICS looks similar to the Internet that everyone else uses there s , web pages, etc. From a technical perspective, though, JWICS is highly secure, and the government uses it to transmit classified information up to the Top Secret level. While you can t plug in to the government s classified networks, you can use free software to create your own secure environment, and this is exactly what you ll learn in this Black Paper. 3
4 EMIL PPER One precaution I d like to leave you with before we get started is that encryption is not some magic pill that will guarantee your privacy. You can have the strongest encryption in the world but if your password is weak, or someone steals your friend s laptop and gains access to his account, then encryption won t help you. No matter how strong encryption you use the bottom line is that the safest way to communicate with someone in private is still to leave your phone and laptop at home and take a walk together. Now let s get started. Encrypting Your s With PGP: The encryption standard bar none is PGP, or its free cousin Gnu Privacy Guard. PGP is so good that when it was first invented, the US government considered it a military-grade weapon and they spent years trying to pin criminal charges on its inventor Phil Zimmerman for violating the rms Export Control ct. PGP, which stands innocuously for Pretty Good Privacy, is the closest you could possibly get to NS level encryption. The algorithm uses a unique public key / private key model that has confounded government authorities around the world. HOW IT WORKS It works something like this: Everyone who uses PGP has two keys, a public key and a private key. For a physical example, imagine you literally have two physical keys and a lock box. The public key is appropriately named because you give it out to everyone you go down to the locksmith and make hundreds of keys to hand out to your friends and business associates. nyone who wants to send you a secure message can write it on a piece of paper and put it in the lock box. Using their public key, they can lock the box, but they cannot unlock it. The only person who can unlock the box to read the message is you, using your private key. Naturally, you keep your private key secret. In the world, it essentially works the same. The sender will encrypt a message using your public key. Once this happens, the message will look like a bunch of gibberish. This gibberish is what is sent across the network, so anyone who intercepts the message will only be able to see the gibberish, not the actual message. 4
5 EMIL PPER Once you receive the message, you decrypt the gibberish with your private key, and voila, the original message is displayed in plain text. So how secure is PGP? In a word, very. Nothing is unbreakable, but it would take teams of analysts and supercomputers quite a number of years to crack the code, if they could do it at all. Bottom line, governments will have to RELLY want your data to invest the time and money into cracking the code. I ll skip the math, but the PGP algorithm is based on matching together incredibly large prime numbers I m talking millions of digits. Huge. Mathematicians occasionally discover new prime numbers, and while most of the world laughs off these nerdy academics, each new prime number adds a whole new dimension to encryption technology. THE SOFTWRE PGP/GnuPG can be configured to work with most major clients, including Outlook, Mac Mail, and Mozilla Thunderbird. The simplest way to get started with encrypting your s with PGP is to download and install Mozilla Thunderbird along with installing GnuPGP and the Enigmail add-on, and this is what this Black Paper will show you how to do. 5
6 EMIL PPER Step 1: Install Mozilla Thunderbird 1.1. DOWNLOD THE INSTLLER You will find Mozilla Thunderbird at this page, and it should detect whether you use Windows or Mac OS X and present the correct file for download. Click the green button to download Thunderbird INSTLL MOZILL THUNDERBIRD Whether you use Windows or Mac OS X, click the installer and follow along with the instructions. Thunderbird has great installation instructions, so once you re done proceed to Step 2: Install GnuPG SET UP YOUR EMIL CCOUNT If this is your first time using Thunderbird, you will have to set up your account to send and receive with Thunderbird. Gladly setting up a new account with Thunderbird is easy with their automatic configuration(guide). ll you need to do is provide your user name and password for your provider and your address. However, if your provider is not listed in Thunderbird s automatic configuration database, or if you have a non-standard configuration you will need to manually configure your account following their manual account configuration guide. 6
7 EMIL PPER Once you ve got your account set up then proceed to Step 2: Install GnuPG. Step 2: Install GnuPG ON WINDOWS Download the installer GPG4WIN GPG4WIN (GNU Privacy Guard for Windows) is a sibling project to GnuPG and provides an installer for Windows, plus it has support for Enigmail, which is what we need Install GPG4WIN Download the newest version of GPG4WIN here (currently 2.2.0), and once you ve downloaded the installer, double-click it to begin the very straightforward installation process. Once the installation of GPG4WIN is done continue to Step 3: Install Enigmail. 7
8 EMIL PPER ON MC OS X Download the installer - GPGTools Head over to the GPGTools.org website and download the free GPG Suite, that include four components: GPG for Mail is an open source plugin for pple Mail. Encrypt, decrypt, sign and verify mails using OpenPGP with a few simple clicks. GPG Keychain is an open source application for Mac OS X. It allows you to manage your OpenPGP keys. Create and modify your keys and import the keys of your friends from a key server. GPG Services is a plugin that brings GPG power to almost any application. It allows you to encrypt/decrypt, sign/verify and import keys from text selections, files, folders and much more. MacGPG is the underlying power engine of our GPG Suite. If you re familiar with the command line use the raw power of it. Based on gnupg Install GPGTools Double-click the.dmg file which you ve now downloaded. This will open up an installation window as you can see below. Now double-click the Install.pkg icon and follow along with the instructions. Once the installation of GPGTools is done continue to Step 3: Install Enigmail. 8
9 EMIL PPER Step 3: Install Enigmail Enigmail is a plug-in for Thunderbird that lets it interface seamlessly with GnuPG and enables you to write and receive messages signed and/or encrypted with the OpenPGP standard DOWNLOD ENIGMIL Download the latest version of Enigmail for your operating system. You can always find the latest version at Enigmail s downloads page. s of this writing the latest version is Firefox Users: Thunderbird and Firefox both use the.xpi extension for their plug-ins. If you click on the download link, Firefox will think you re asking it to install Enigmail as a Firefox plug-in. This will not work. Instead, rightclick on the link and choose Save link as INSTLL ENIGMIL Start Thunderbird. In the menu bar of the main window you will see Tools. Select this, and then ddons. Image This will bring up a new window listing all of your Thunderbird plug-ins, or if you don t have any you will land on the dd-on homescreen. 9
10 EMIL PPER To install the Enigmail plugin click on the cog-wheel in the upper-right corner as shown in step 1 in image below, and then choose Install dd-on From File... and tell Thunderbird where you saved the Enigmail.XPI file. Image nother window will pop open(image ), warning that you re about to install a plug-in. This is just an extra precaution where Thunderbird makes you think twice about installing plugins from unknown sources. Don t worry too much about this now. Image Confirm your decision by clicking the Install button. Once installed, you will need to restart Thunderbird, and after that Enigmail will be ready to go. Now proceed to Step 4 How To Manage Encryption Keys. 10
11 EMIL PPER 3.3. UNINSTLLING ENIGMIL If for some reason you ever need to uninstall Enigmail, begin by starting Thunderbird. Select Tools, then dd-ons. new window will appear showing all of your Thunderbird plug-ins. Click on Enigmail Preferences (step 1 in Image 3.3.) and then click Uninstall Enigmail (step 2 in Image 3.3.). Image 3.3 Enigmail will be uninstalled once you close Thunderbird. Step 4: How To Manage Encryption Keys Before proceeding with this step you should have Thunderbird, GnuPG and Enigmail installed, and your account set up. s I mentioned earlier in the introduction everyone who uses PGP has two keys, a public key and a private key. But again, I ll skip the math. ll you need to understand is that you will be creating a public key and a private key. s Enigmail states: The public key can be shared with the whole world--friends, neighbors, relatives, enemies, even intelligence agencies. But you need to guard the private key very, very carefully. 11
12 EMIL PPER 4.1. HOW TO GENERTE NEW KEYPIR To generate your public and private key, click on the OpenPGP menu inside Thunderbird(Image ) Image new navigation menu will appear, in which you should click Generate and then New Key Pair.(Image ) Image You will now see the following window: 12
13 EMIL PPER Don t be alarmed if you don t understand everything. There are only four things you need to worry about. Tell Enigmail which account to use. t the very top of the window you will see a combobox showing all of your addresses. GnuPG will associate your new key with an address. Enigmail is just asking you which address you want to use for this key. Select whichever account will be receiving encrypted mail. (If you decide later that you want to use the same key for multiple accounts, that can be done, too, but it s beyond the scope of this Quick Start Document.) Choose a passphrase. Private keys are so important that GnuPG will not use them unless you know the secret phrase. You re being asked here what the secret phrase should be for your new keypair, and it should not be the same password that you use for your account. If at all possible, choose something that is easy to remember but very hard for someone to guess, or use a website such as strongpasswordgenerator.com to generate a strong password and keep it somewhere safe. Enter your passphrase in the Passphrase box. Then repeat it again in the Passphrase (repeat) box. By entering it twice, Enigmail is protecting you from accidentally mis-entering your passphrase. s a security feature, Enigmail will not display your passphrase as you type it. Warning! If you forget your passphrase, there is absolutely nothing anyone can do to help you. This is a security feature of GnuPG. There is no way around the passphrase. Click Generate Key. That s it! That s all you have to do. Everything else is handled for you automatically. Generate a revocation certificate. Hard drive failures happen to us all. So do house fires and theft and other things that might separate us from our keys. When this happens, it s a good idea to send out a revocation notice. You can think of this as a message from your key saying please don t use me any more. Using the magic of assurance, people who see your revocation certificate can be confident that your key really is no more. Having a revocation certificate tucked away in a safe place is a very good idea. When you finish creating your new key, Enigmail will give you the chance to create a revocation certificate. If you want one, click Yes. You will be asked to enter your passphrase. Enter it, and you ll be finished. 13
14 EMIL PPER 4.2. HOW TO SHRE YOUR PUBLIC KEY WITH YOUR CONTCTS For people to be able to read your encrypted s you need to exchange public keys with them. There are four ways to do this, and you will find all of them by going to the Key Management window under the OpenPGP menu in Thunderbird and right-clicking on the account that you want to share the public key for. You will then see the menu in Image Image The four ways are: Share your public key on your website. When you copy your public key to the clipboard you will be able to see something similar to what you see below on your website: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG/MacGPG2 v (Darwin) Comment: GPGTools - mqenbfecu7ubcckufbjzzy+jwxa6f7fmkshzipvmbw6m3cxs5b5s687siihj00mqc PrDaewrvdqVVQiWKVWuulQBEcUxg/u4E7+nyLVVrPRs5DPaFKIaex7zdRwgBa2t5M5PPoMPGBv/ -----END PGP PUBLIC KEY BLOCK----- This is your public key. By sharing it on your website people will be able to import it into GnuPG. Export your public key to a file. This option is good if you would like to carry your public key around on a USB-stick or your smartphone. However, make sure that when you export you only export your public key and NOT your secret key. See Image below. Image
15 EMIL PPER your public key as an attachment. When you choose this option, a new Compose window will pop up where your public key will already be attached to the . So just enter your friend s , a subject line, maybe a greeting to let them know this is your public PGP key, and click send! Upload your public key to the keyserver network. This is a global database of public keys and it s by far the easiest way to share your key. When you click this option you will be asked to select a keyserver. Enigmail recommends pool.sks-keyservers.net, so select that from the list or enter it as you can see below in Image Image Your public key is now published on the internet for anyone to find! If your friend wants to find your key then they need to know your Key ID, which is a sequence of letters and numbers eight characters long. You will find your Key ID to the right in the Key Management window next to your address, as you can see in the example in Image below. Image However, as you will see in the next chapter on finding keys they will need to prefix your key with 0x when searching for it, but more on that in the next chapter. word of precaution from Enigmail regarding spam Some people will tell you never to use a keyserver at all, because spammers search them for addresses. While this is true, this kind of misses the point. There is nothing you can do to prevent spam from littering your inbox. Trying to stop it is like King Canute marching into the sea, commanding the rising tide to turn back. It didn t work for King Canute and it won t work for you. 15
16 EMIL PPER There are excellent ways to stop spam. Blacklists, whitelists, Bayesian filtering, ISP-level solutions and more. Some of those options work better than others. ll of them work better than the naive if I don t publish my key on the keyservers, then I won t get spammed strategy HOW TO FIND ND IMPORT OTHER PEOPLE S KEYS Now that your friends have your public key, you will need their public key as well. For all four ways to share a public key above there are corresponding ways to import the key, and we review them below. Import a public key from the clipboard. When you have found a public key on someone s website and want to import it, select all the text from and including -----BEGIN PGP PUBLIC KEY BLOCK----- to -----END PGP PUBLIC KEY BLOCK----- and copy it to the clipboard with ctrl + C on Windows or command + c on Mac OS X. To import it, go to Key Management under the OpenPGP menu in Thunderbird, and under the Edit menu click on Import Keys from Clipboard as seen in Image You will then be asked to confirm by clicking Import, and then you re done! Image Import a key file. You might have received the keyfile as an attachment or through an USB-stick. Either way, you import the key by clicking on the File tab in the Key Management navigation menu, and then click on Import Keys from File as seen in Image and select the key file on your hard drive and click the open/import button. It will then be added to your list of public keys. Image Find and import a key from the keyserver network. To do this you will need to know your friend s Key Id, as mentioned in the previous chapter. 16
17 EMIL PPER Continuing with the example Key ID in Image , let s search for the Key ID C59E4474. To do this, when you are inside the Key Management window click on Keyserver in the navigation menu and then on Search for Keys. You will then see the window in Image below where you can enter a Key ID and a Keyserver. s I mentioned though, you will have to prefix the key with 0x if it isn t already, i.e. Instead of searching for C59E4474 you will search for 0xC59E4474, as illustrated in the image. s for the keyserver we are searching on pool.sks-keyservers.net, the same keyserver that we uploaded your key to in the previous chapter. Image If you are successful with finding the key, then you will see the message below (Image ) saying it has found 1 new signature, meaning it has successfully imported the key. Image However if you did NOT find a key, then contact your friend and make sure the key was uploaded correctly, and that you are searching on the right keyserver. Once your friend has your public key, and you ve got his, then you are both ready to send and receive encrypted s. Proceed to Step 5 to get started. 17
18 EMIL PPER Step 5: Sending Your First Signed nd Encrypted Congratulations! This is the final step where you will actually send an encrypted . I highly recommend that you send plain text s when you wish to encrypt them, because Enigmail does not work very well with HTML . While it can be made to work, it s pretty far beyond the scope of this Black Paper. If you normally compose your in plain text, then you re just fine. If you normally use HTML, then hold down the shift key as you click on Write in the Thunderbird window. Whether you choose to encrypt your message or not, it is always a good idea to sign your message. This means that you include something similar to a hand-written signature, except by signing it cryptographically: It can be used to validate that the message came from who it claims to come from. It can be used to prove that the message wasn t tampered with. For this validation to work your recipient needs to have imported your public key into Enigmail, as shown in Step 4. Now, to send a signed and/or encrypted , write an to your friend just as you normally would, but before sending, click on the OpenPGP button as shown in Image 5.1. and select Sign Message and/or Encrypt Message. Once that s done, click Send. Image
19 EMIL PPER Two things can happen here. If the address of your message matches an address on your keyring, then you re done; your message will be encrypted and sent to your recipient. If there s a problem with the matching, you will be asked to manually select a key from your keyring. If you see this menu, then simply select the proper keys and you re done. The Bottom Line If you ve followed all five steps in this Black Paper you will now have Thunderbird, GnuPG and Enigmail set up on your Windows or Mac OS X computer, and you will have the most powerful encryption in the world at your fingertips. The truth though is that PGP encryption is only as powerful as the number of people using it. You need to use it, and your friends need to use it. To that end, feel free to share this Black Paper with your closest circle of friends, family and business partners. To your freedom, Simon Black Sovereign Man 19
GPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
GPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows
GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Encrypting your Email Communications using PGP
Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following
The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer
Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................
How to use PGP Encryption with iscribe
How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
File and email encryption with GPG4win & Enigmail
Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the
LiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
Published : 2013-12-02 License : None
K9 1 2 Published : 2013-12-02 License : None INTRODUCTION K-9 Mail is an email application (app) for Android phones or tablets. K-9 supports multiple mailboxes, each independently configurable. T his ability
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to
4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
Pretty Good Privacy with GnuPG
Pretty Good Privacy with GnuPG Steve Revilak Cabot House Sep. 24, 2013 1 / 16 Encryption and Signing Encryption The purpose is to ensure that a message is readable only by someone possessing a specific
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
How to Create and Maintain an Anonymous Identity Online
How to Create and Maintain an Anonymous Identity Online By Anonymous33 Email: [email protected] Revision 1 Date: 23/03/2011 WARNING: The information contained in this guide is for educational and protection
GPG - GNU Privacy Guard
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22 What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Internet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
E-mail Encryption. How do I send my e-mail encryption key?
E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
THUNDERBIRD WORKBOOK
THUNDERBIRD WORKBOOK 1 2 Published : 2012-05-25 License : None INTRODUCTION 1. ABOUT THIS WORKBOOK 2. INTRODUCTION TO THUNDERBIRD 3 1. ABOUT THIS WORKBOOK T his workbook is designed to complete specific
The Social Accelerator Setup Guide
The Social Accelerator Setup Guide Welcome! Welcome to the Social Accelerator setup guide. This guide covers 2 ways to setup SA. Most likely, you will want to use the easy setup wizard. In that case, you
Encrypting Your Email Using the free COMODO Secure Email Certificate
Encrypting Your Email Using the free COMODO Secure Email Certificate These instructions will guide you through the process of getting a free Secure Email Certificate Issued by COMODO. This document will
How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
Secure Email Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.
openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
the barricademx end user interface documentation for barricademx users
the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX
AKO Email Shutdown Quick Reference Guide
AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
Outlook XP Email Only
Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
PDG Software. PDG Key Manager User Guide
PDG Key Manager User Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2000 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all
PDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
How To Manage Your Quarantine Email On A Blackberry.Com
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
WINDOWS LIVE MAIL FEATURES
WINDOWS LIVE MAIL Windows Live Mail brings a free, full-featured email program to Windows XP, Windows Vista and Windows 7 users. It combines in one package the best that both Outlook Express and Windows
Email Basics. For more information on the Library and programs, visit www.bcpls.org BCPLS 08/10/2010 PEMA
Email Basics Email, short for Electronic Mail, consists of messages which are sent and received using the Internet. There are many different email services available that allow you to create an email account
Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.
User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10
Microsoft Outlook Quick Reference Sheet
Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your email communication. Topic
Topic Name of the Trainer/Speaker Professional Position and Name of Organization Email TLS/SSL : Securing your website PGP : Secure your email communication Mohammad Fakrul Alam CTO bdhub Limited [email protected]
How to make the Emails you Send from Outlook 2010 appear to Originate from different Email Addresses
How to make the Emails you Send from Outlook 2010 appear to Originate from different Email Addresses If you only use a single email address to send out all your business and personal emails then you're
How to Configure Outlook 2003 to connect to Exchange 2010
How to Configure Outlook 2003 to connect to Exchange 2010 Outlook 2003 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup
Setting up your new Live Server Account
Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
Law School Computing Services User Memo
Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email
Dynamics CRM for Outlook Basics
Dynamics CRM for Outlook Basics Microsoft Dynamics CRM April, 2015 Contents Welcome to the CRM for Outlook Basics guide... 1 Meet CRM for Outlook.... 2 A new, but comfortably familiar face................................................................
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books
Email Marketing Do s and Don ts A Sprint Mail Whitepaper
Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations
Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:
Let's Begin: Log In and Set Up Security Questions To start, you can log in from the ProMailSource home page. Sending an Encrypted/Unencrypted Message Every message you send through ProMailSource is automatically
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
Mac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
User Guide for CDC s SAMS Partner Portal. Document Version 1.0
User Guide for CDC s SAMS Partner Portal Document Version 1.0 Introduction If you are reading this guide, it probably means that you have been (or will be) invited to register with the SAMS Partner Portal.
Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.
Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks
How to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.
Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks
1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
Email Client Configuration Guide
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important.
Securing Your Email Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing email requires the use of a certificate in order to work. Once you sign up for a certificate
How To Encrypt A Mail From Apa With A Keypress On Auntorom (For A Freebie) On A Pc Or Macbook Or Ipa (For Free) On An Ipa Or Ipam (For Cheap) On Your
Internetbrowser How to set up Everything There are no trustworthy browsers. Face it. Use Tor if possible. Install Tor Browser Simply defaults: Seite 1 Have fun. If you think you will need Firefox, you
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
I. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
Email Quick-Start Guide
For TradeMark Media s email system Thank you for choosing TradeMark Media for your email hosting. You ve made a wise choice. TradeMark Media offers comprehensive spam and virus protection, POP3 and WebMail
Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14
Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14 Follow the instructions in this guide to download, install, and get started with Kurzweil 3000 Web License (K3000).
How to import Email Data from Outlook 2010 in standalone mode to your Pushex Exchange mailbox
How to import Email Data from Outlook 2010 in standalone mode to your Pushex Exchange mailbox Moving to a Hosted Exchange mailbox from using Outlook in standalone mode has many advantages, here are 3:-
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information
A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
E-mail Encryption Guide version 1.2, by Thomas Reed
E-mail Encryption Guide version 1.2, by Thomas Reed In order for two people to send and receive encrypted e-mails to/from each other, both parties need: An e-mail reader that supports encryption (such
In order to use Elements Mail, you must have an active Elements CRM account.
Introduction Welcome to Elements Mail! This Setup Guide will assist you in getting your Elements Mail App configured and up and running. Once you ve setup the app, your job is complete. Elements Mail does
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
Outlook Web Access (OWA or WebMail) Frequently Asked Questions
Outlook Web Access (OWA or WebMail) Frequently Asked Questions If you are a part-time staff member, adjunct faculty member, or Villanova student, you will access your Villanova email using a program called
Adding the BU IMAP Inbox 1. Along the left side of the screen, there is a Mail column. Look for the All Mail Folders section.
Basic Guide to Setting up Outlook 2003 for E-Mail Some preliminary setup has already been done, so when you first open Outlook 2003 it will prompt you for your password. You can go ahead and log on at
Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
Email Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
PDG Software. Encryption Guide
Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2006 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
Using Barracuda Spam Firewall
Using Barracuda Spam Firewall Creating your Barracuda account Your Barracuda account has been created for you if you are a current Hartwick College student, staff or faculty member. Setting Your Password.
PGP Desktop Email Quick Start Guide Version 10.2
PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,
https://mail.wheelock.edu
The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
How To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
CBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
PKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
After you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages.
User Guide- i.mail enhancement Configure POP/IMAP access using Outlook and Windows Mail Firstly, you need to enable POP/IMAP on your i.mail account: 1. Log into your i.mail account via web 2. Click Mail
Don't have Outlook? Download and configure the Microsoft Office Suite (which includes Outlook)!
UVa Exchange Service Outlook 2013 Quickstart Guide Don't have Outlook? Download and configure the Microsoft Office Suite (which includes Outlook)! In this Quickstart Guide, you will learn to: Send and
Using Your New Webmail
Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...
