GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France
|
|
|
- Myron Mitchell
- 10 years ago
- Views:
Transcription
1 GostCrypt User Guide Laboratoire de Cryptologie et de Virologie Opérationnelles - France
2 Copyright c 2014 Laboratoire de Cryptologie et de Virologie Opératoinnelles - France GOSTCRYPT.ORG
3 Contents 1 Introduction Using GostCrypt Volumes File container encryption Encrypted Partition / Drive Hidden Volumes 13 3 Favorites Favorite Volumes System Favorite Volumes 15 4 Main Program Window Keyfiles Encryption Algorithms GOST Hash Algorithms GOST R GOST R Whirlpool 27
4 8 Command Line Usage GostCrypt.exe GostCrypt Format.exe 30 9 Encryption Scheme
5 1. Introduction The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project. Snowden s leaks have made clear more than ever that the massive use of encryption by citizens must become a reality. This is possible only if there is a vast, rich offer of trusted, open source products like Truecrypt, with the strong support of the hacker community. However, at that time we did not foresee the unprecedented upheaval of terrible shock with the recent Truecrypt disappearance. More than ever we all need more and more projects to replace it. Gostcrypt is one among (we hope) many others. The variety and richness of encryption solutions is THE solution.
6
7 File container encryption Encrypted Partition / Drive Hidden Volumes 2. Using GostCrypt Volumes 2.1 File container encryption Creating a encrypted file container is the easiest way to encrypt data in GostCrypt. In this process, you will create an encrypted file of a size you specify. Once this file has been created, you can open it as a storage device in which you can store your sensitive data. Creating the volume In order to encrypt data on your system, you will first need to create a new GostCrypt volume. To open the GostCrypt Volume Creation Wizard, click on the Create Volume button on the main screen of GostCrypt (as seen in figure 2.1). Figure 2.1: GostCrypt main window
8 8 Chapter 2. Using GostCrypt Volumes In the GostCrypt Volume Creation Wizard, select the Create an encrypted file container option and click next. Figure 2.2: Select encrypted file container In the next screen, you are asked to choose between the creation of a standard GostCrypt volume and a hidden GostCrypt volume. For this exercise, select Standard GostCrypt volume. For hidden volumes, see chapter 2.3. Figure 2.3: Select standard GostCrypt volume In the next dialog, provide GostCrypt with the location where you want the file container to be created.
9 2.1 File container encryption 9 Figure 2.4: Provide GostCrypt with a file location By clicking the Select File... button, you can specify where you want to save your file container in an easy manner. Figure 2.5: Use the Save file dialog for easy navigation In the next dialog, the encryption algorithm and hash algorithm used to encrypt the file container can be chosen. This dialog also allows you to navigate to the Test vector dialog and Benchmark dialog. If you are unsure of the differences in the available algorithms, you can leave them as is and proceed to the next dialog.
10 10 Chapter 2. Using GostCrypt Volumes Figure 2.6: Select the preferred algorithms You can now specify the size you want the file container to be. Specify a size in KB, MB or GB and click Next. Figure 2.7: Specify the file container size In the next dialog, you will be asked to enter the volume password. This is the password that will be used to calculate the volume header key. Make sure to follow the instructions this dialog provides on choosing a good password. You can also specify a keyfile here. For more information on keyfiles, see chapter 5.
11 2.1 File container encryption 11 Figure 2.8: Volume password The Volume Format dialog is the final step in creating an encrypted file container. Here, you can specify the filesystem you want to use, as well as the cluster size. If you saved the file container on an NTFS filesystem, you also have the option to make the file container dynamic. Using this mode, the file container will not take up much disk space at first. Instead, it will grow as you write more data to it. Note that this mode makes the resulting GostCrypt volume slower in operation. It also allows adversaries to see how much data is in your GostCrypt volume, as it grows when data is added. If you are unsure about which options to choose here, the default settings will suffice for most use cases. Figure 2.9: Volume format The encrypted file container has now been created and you can exit out of the GostCrypt Volume Creation Wizard.
12 12 Chapter 2. Using GostCrypt Volumes Figure 2.10: Volume created Volume mounting In order to start using the encrypted file container, go back to the starting window of GostCrypt. Here, you can select a free drive letter that GostCrypt will use for this file container. Next, click the Select File button and open the file container. Finally, click the Mount button. Figure 2.11: Mounting an encrypted file container A dialog pops up which asks for the user password associated with the volume. Enter your previously specified password here. You can click OK to mount the volume.
13 2.2 Encrypted Partition / Drive 13 Figure 2.12: Volume mounting password dialog The encrypted file container can now be accessed like a normal partition. Figure 2.13: Encrypted file container mounted 2.2 Encrypted Partition / Drive GostCrypt allows you to encrypt disk partitions and entire disk drives. The creation and mounting of partitions or drives follows the same rules associated with the creation of encrypted file containers. Follow the steps from the previous sections, but select the second or third option at the beginning of the GostCrypt Volume Creation Wizard and follow the instructions in the wizard. GostCrypt also allows you to encrypt the partition on which Windows is installed, or even the entire drive from which Windows boots. Without encrypting the Windows partition, sensitive data about encrypted volumes might still be leaked by the Windows operating system (such as information about recently used files or even entire plaintext files that reside on an encrypted volume). Therefore, encrypting the Windows partition or entire Windows boot drive provides the highest level of security GostCrypt has to offer. 2.3 Hidden Volumes Hidden volumes allows for plausible deniability in GostCrypt volumes. When you are forced to disclose your GostCrypt volume password, you can give the password to the overarching outer volume. Within this outer volume, a hidden volume is stored that is indestinguishable from the rest of the encrypted data in the outer volume. Only when you try to mount the volume with the password of the hidden volume, will GostCrypt recognize the presence of the hidden volume and mount it. Creating a hidden volume in GostCrypt can be done using your preferred method of encryption using the GostCrypt Volume Creation Wizard. During this wizard, GostCrypt will ask if you want to create a hidden volume. Note that after the hidden volume has been created, writing data
14 14 Chapter 2. Using GostCrypt Volumes to the outer volume might corrupt the underlying hidden volume. If you want to write data to the outer volume, make sure to mount it with the mount option Protect hidden volume against damage caused by writing to outer volume enabled and by providing the correct password for the hidden volume. This causes GostCrypt to mount the outer volume while also monitoring the area where the hidden volume resides, blocking any data being written to the hidden volume area.
15 Favorite Volumes System Favorite Volumes 3. Favorites Favorite (system) volumes provides a mechanism of storing the location and mounting options of volumes, making it easier to mount them in the future. GostCrypt has two types of favorite volumes: regular favorite volumes and system regular volumes. 3.1 Favorite Volumes Favorite volumes are GostCrypt volumes that you want GostCrypt to remember. Favorite volumes can be mounted by pressing the Mount Favorite Volumes menu item or the menu item of your favorite volume in the Favorites menu of the main GostCrypt window. Adding a GostCrypt volume to the list of favorite volumes can be done by selecting the volume from the list of mounted volume in the main GostCrypt window, right-clicking it and selecting the Add to Favorites menu item. In the Favorite Volumes menu, you can select mount options for the favorite volumes and give the volume a label. Note that this label is only used within GostCrypt to identify the favorite for the user. 3.2 System Favorite Volumes System favorite volumes work in a similar fashion to regular favorite volumes, but they are mounted before the applications and services of the operating system load. This can be useful in scenarios where applications or services rely on a certain volume being available at launch. System favorite volumes can only be selected when system encryption is currently active and if the volume share a password with the pre-boot authentication password. Adding a GostCrypt volume to the list of system favorite volumes can be done by selecting the volume from the list of mounted volumes in the main GostCrypt window, right-clicking it and selecting the Add to System Favorites menu item. In the resulting menu, you can select mount options and even forbid non-administrator users from dismounting or modifying the volume.
16
17 4. Main Program Window Volumes Select File Allows the user to select a GostCrypt encrypted file container. Select Device Allows the user to select a GostCrypt encrypted partition or drive. Create New Volume Opens the GostCrypt Volume Creation Wizard that allows the creation of new GostCrypt volumes. Resume Interrupted Process Opens a previously interrupted process. For example, when in the process of performing full disk encryption, you can interrupt this process and resume it on a later date. Mount Volume Attempt to mount the selected partition, device or file container by asking for the user s password. Mount Volume with Options Attempt to mount the selected partition, device or file container by displaying mount options and asking for the user s password. Auto-Mount All Device-Hosted Volumes GostCrypt scans all available drives and partitions and attempts to mount them using the user supplied password or keyfile. As GostCrypt has to attempt all possible mounting configurations for each partition and drive, this process can take a long time on slow computers. Dismount Volume Dismounts the currently selected GostCrypt volume. Dismount All Mounted Volumes Dismounts all currently mounted GostCrypt volumes.
18 18 Chapter 4. Main Program Window Change Volume Password Enables the user to change the password used to derive the selected volume s header key and change the pseudo-random function used in the key derivation process. Note that for this process, the selected volume must be dismounted. Add/Remove Keyfiles to/from Volume Allows the addition or removal of keyfiles to the key used to decrypt the volume header of the GostCrypt volume. Remove All Keyfiles from Volume Allows the removal of all keyfiles currently used to decrypt the volume header of the GostCrypt volume. Volume Properties Shows the properties of the currently selected mounted GostCrypt volume. This view includes information about the size and location of the volume, as well as information about the used cryptographic algorithms. System Encrypt System Partition/Drive Starts the volume creation wizard for the encryption of the partition or drive on which Windows is currently running. Permanently Decrypt System Partition/Drive Decrypts the entire encrypted partition or drive on which Windows is currently running. Resume Interrupted Process Resumes a previously interrupted system encryption or decryption process. Create Hidden Operating System Starts the process of creating a hidden operating system within the encrypted area of another GostCrypt protected operating system. This feature provides plausible deniability. In situations in which the user is forced to disclose his or her GostCrypt volume password, the password of the non-hidden operating system can be given. Create Rescue Disk Starts the process of creating a new GostCrypt Rescue Disk for the currently encrypted Windows partition or drive. Verify Rescue Disk Verifies an already created GostCrypt Rescue Disk. Mount Without Pre-Boot Authentication Mounts the selected device that is part of the system encryption scheme of another operating system. The selected device is mounted as a regular GostCrypt volume. Change Password Changes the password of the current system encryption GostCrypt Volume Header. Set Header Key Derivation Algorithm Changes the header key derivation algorithm used for the currently mounted system encryption device.
19 Properties Displays the GostCrypt volume properties of the current system encryption scope. The window includes information about the size of the device, as well as information about the used cryptographic algorithms. Settings Allows the user to change settings related to system encryption, such as enabling the caching of the pre-boot password or changing the message displayed during pre-boot authentication. 19 Favorites Add Mounted Volume to Favorites Adds the currently selected mounted GostCrypt volume to the list of favorite volumes. Favorite volumes can be mounted all at once, they remember their assigned drive letter and have remember several mount options. Add Mounted Volume to System Favorites Adds the currently selected mounted GostCrypt volume to the list of system favorite volumes. System favorite volumes are auto-mounted before Windows applications and services are starting during the boot process. The password for system favorite volumes must be the same as the pre-boot authentication password used for system encryption. Organize Favorite Volumes Displays the list of all favorite volumes and allows the modification of favorite volume related settings. Organize System Favorite Volumes Displays the list of all system favorite volumes and allows the modification of favorite volume related settings. Mount Favorite Volumes Mounts all favorite volumes by asking the user for the volume passwords or keyfiles. Tools Benchmark Test the speed of the available encryption algorithms using a buffer of variable size to be encrypted. Test Vectors Manually test the output of the available block ciphers by providing all input paramters and validating the output. Traveler Disk Setup Copies the files necessary to run GostCrypt in portable mode to the destination (usually an USB key or CD / DVD). Volume Creation Wizard Opens the GostCrypt Volume Creation Wizard, which allows the creation of new GostCrypt volumes.
20 20 Chapter 4. Main Program Window Keyfile Generator Opens a wizard used to generate cryptographically strong pseudo-random keyfiles that can be used to protect GostCrypt volumes. Manage Security Token Keyfiles Manage the collection of available security token keyfiles. A security token keyfile can be supplied by a smart card or similar devices, using a PKCS#11 library from the device s vendor. Close All Security Token Sessions All currently used security token sessions are terminated. Backup Volume Header Creates a backup of the currently selected GostCrypt volume. Keep in mind that this backup will still work with the password used at the time the backup is created, even if you change the password of the GostCrypt volume at a later date. Restore Volume Header Allows the recovery of a GostCrypt volume using a backup header file that was created on an earlier date. Refresh Drive Letters Obtains an up-to-date list of the currently available drive letters on the system. Clear Volume History If GostCrypt was configured to remember previously used volumes, this option clears the volume history. Wipe Cached Passwords If GostCrypt was configured to cache used passwords, this option clears the password cache. Settings Language Brings up the language selection screen. If language packs are installed (by copying language packs into the GostCrypt install directory), other languages can be selected from this menu. Hot Keys Allows the user to designate key combinations to trigger certain actions within GostCrypt. System Encryption Allows the user to change settings related to system encryption. System Favorite Volumes Allows settings related to favorite volumes to be changed. Performance Allows for the modification of the amount of CPU cores to be used by GostCrypt for encryption and decryption. Default Keyfiles Shows the list with currently remembered keyfiles used for mounting GostCrypt volumes.
21 Security Tokens Shows the settings related to security tokens, such as the location of the security token library to use. Preferences General preferences of GostCrypt. The user can select GostCrypt-wide mount options, windows behavior and cache management. 21
22
23 5. Keyfiles Keyfiles are additions or replacements for the regular passwords used to mount GostCrypt volumes. Keyfiles are often a lot larger than regular passwords and contain a higher level of randomness. Keyfiles can be stored on an external device, like a USB key or smart card. It is strongly advised not to store keyfiles on the same medium as the GostCrypt volume, as this will allow potential attackers to trivially decrypt the GostCrypt volume. Generating keyfiles can be done using GostCrypt, by going to the Tools menu in the main GostCrypt window and selecting the Keyfile generator menu item. After moving your mouse in order to increase the cryptographic strength of the resulting keyfile, press the Generate and Save Keyfile button and store the resulting keyfile to a safe location. When creating a new GostCrypt volume or changing the password on an existing one, check the Use keyfiles checkbox and click the Keyfiles button in order to add one or more keyfiles to the password.
24
25 GOST Encryption Algorithms 6.1 GOST Encryption Algorithm Key size (bits) Block size (bits) GOST Table 6.1: Encryption Algorithms in GostCrypt The GOST block cipher is part of the Russian cryptographic standard algorithms. The block cipher was standardized as a Gosudarstvennyi Standart (GOST) in 1989 and was declassified and made public in It was developed to be a alternative to the U.S. Data Encryption Standard (DES) and shares properties with this algorithm. GOST is, like DES, a symmetric key block cipher based on a balanced Feistel network. The block size of the algorithm is 64 bits and it uses a 256 bit key, which is split into eight 32 bit subkeys.
26
27 GOST R GOST R Whirlpool 7. Hash Algorithms 7.1 GOST R Hash Algorithm Digest size (bits) Block size (bits) GOST R GOST R Whirlpool Table 7.1: Hash Algorithms in GostCrypt The GOST R hash function is part of the Russian cryptographic standard algorithms. It is the official successor of the GOST R algorithm and was implemented on 1 January The standard uses the Stribog hash function, developed by the Federal Security Service (FSB) and InfoTeKS. While the structure of Stribog is very similar to the GOST R hash function, its compression function is very different. The compression function in a hash algorithm is the function that mixes potentially large amounts of data into a single, small digest (hash output). Stribog uses an algorithm that is similar to Rijndael in its compression function, which is the block cipher used in AES. The GOST R hash function uses GOST as its block cipher for its compression function. 7.2 GOST R The GOST R hash function is part of the Russian cryptographic standard algorithms. It was standardized as a Gosudarstvennyi Standart (GOST) in The GOST R hash function makes extensive use of the GOST block cipher as part of its compression function. 7.3 Whirlpool Whirlpool is a hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto in It was identified as a recommended hash function by the NESSIE, a research project funded by the European Union between 2000 and It has since been standardized by ISO and IEC as the ISO/IEC international standard.
28 28 Chapter 7. Hash Algorithms The Whirlpool hash function is a Merkle-Damgård construction based on AES. It uses an internal block size of 512 bits and produces a 512 bit digest.
29 GostCrypt.exe GostCrypt Format.exe 8. Command Line Usage This section covers the available command line flags that can be used with the Windows application GostCrypt.exe and GostCrypt Format.exe. 8.1 GostCrypt.exe /help or /? Display command line help. /volume or /v File and path name of a GostCrypt volume to mount (do not use when dismounting). To mount a partition/device-hosted volume, use, for example, /v \Device \Harddisk1\Partition3 (to determine the path to a partition/devicec, run GostCrypt and click Select Device). You can also mount a partition or dynamic volume using its volume name (for example, /v \\?\Volume{5cceb196-48bf-46ab-ad a}\). To determine the volume name use e.g. mountvol.exe. Also note that device paths are case-sensitive. /letter or /l Drive letter to mount the volume as. When /l is omitted and when /a is used, the first free drive letter is used. /explore or /e Open an Explorer window after a volume has been mounted. /beep or /b Beep after a volume has been successfully mounted or dismounted. /auto or /a If no parameter is specified, automatically mount the volume. If devicesc is specified as the parameter (e.g., /a devices), auto-mount all currently accessible device/partition-hosted GostCrypt volumes. If favorites is specified as the parameter, auto-mount favorite volumes. Note that /auto is implicit if /quit and /volume are specified. If you need to prevent the application window from appearing, use /quit. /dismount or /d Dismount volume specified by drive letter (e.g., /d x). When no drive letter is specified, dismounts all currently mounted GostCrypt volumes. /force or /f Forces dismount (if the volume to be dismounted contains files being used by the system or an application) and forces mounting in shared mode (i.e., without exclusive access). /keyfile or /k Specifies a keyfile or a keyfile search path. For multiple keyfiles, specify e.g.: /k c:\keyfile1.dat /k d:\keyfilefolder /k c:\kf2. To specify a keyfile stored on a security token or smart card, use the following syntax: token://slot/slot_number/ file/file_name. /tokenlib Use the specified PKCS #11 library for security tokens and smart cards.
30 30 Chapter 8. Command Line Usage /cache or /c y or no parameter: enable password cache; n: disable password cache (e.g., /c n). Note that turning the password cache off will not clear it (use /w to clear the password cache). /history or /h y or no parameter: enable saving history of mounted volumes; n: disables saving history of mounted volumes (e.g., /h n). /wipecache or /w Wipes any passwords cached in the driver memory. /password or /p The volume password. If the password contains spaces, it must be enclosed in quotation marks (e.g., /p My Password ). Use /p to specify an empty password. Warning: This method of entering a volume password may be insecure, for example, when an unencrypted command prompt history log is being saved to unencrypted disk. /quit or /q Automatically perform requested actions and exit (main GostCrypt window will not be displayed). If preferences is specified as the parameter (e.g., /q preferences), then program settings are loaded/saved and they override settings specified on the command line. /q background launches the GostCrypt Background Task (tray icon) unless it is disabled in the Preferences. /silent or /s If /q is specified, suppresses interaction with the user (prompts, error messages, warnings, etc.). If /q is not specified, this option has no effect. /mountoption or /m ro or readonly: Mount volume as read-only. rm or removable: Mount volume as removable medium. ts or timestamp: Do not preserve container modification timestamp. sm or system: Without pre-boot authentication, mount a partition that is within the key scope of system encryption (for example, a partition located on the encrypted system drive of another operating system that is not running). Useful e.g. for backup or repair operations. Note: If you supply a password as parameter of /p, make sure that the password has been typed using the standard US keyboard layout (in contrast, the GUI ensures this automatically). This is required due to the fact that the password needs to be typed in the pre-boot environment (before Windows starts) where non-us Windows keyboard layouts are not available. bk or headerbak: Mount volume using embedded backup header. Note: All volumes created by GostCrypt contain an embedded backup header (located near the end of the volume). recovery: Do not verify any checksums stored in the volume header. This option should be used only when the volume header is damaged and the volume cannot be mounted even with the mount option headerbak. Example: /m ro. To specify multiple mount options, use e.g.: /m rm /m ts. 8.2 GostCrypt Format.exe /noisocheck or /n Do not verify that GostCrypt Rescue Disks are correctly burned. WARNING: Never attempt to use this option to facilitate the reuse of a previously created GostCrypt Rescue Disk. Note that every time you encrypt a system partition/drive, you must create a new GostCrypt Rescue Disk even if you use the same password. A previously created GostCrypt Rescue Disk cannot be used as it was created for a different master key.
31 9. Encryption Scheme When GostCrypt tries to mount a volume using the user supplied password, the following steps are performed: 1. The GostCrypt Volume Header (the first 512 bytes of the volume) are read into RAM. For system encryption, the last 512 bytes of the first logical drive track are read into RAM instead, as this area contains the GostCrypt Volume Header when using system encryption. 2. From byte for regular volumes or for system encryption, 512 bytes are read into RAM. This is the location where the GostCrypt Volume Header resides if the volume contains a hidden volume. 3. GostCrypt cannot derive which encryption algorithm, mode of operation or pseudo-random function (PRF, used in the header derivation function) was used to encrypt the volume. Therefore, all possible combinations are attempted until a combination of encryption algorithm, mode of operation and PRF results in a decrypted GostCrypt Volume Header. This process is first attempted on the data read in step (1). 4. If step (3) fails, it is repeated, but using the volume header area obtained in step (2) instead. 5. Given that one of the two GostCrypt Volume Headers was decrypted, the primary master key (and secondary master key, in the case of the XTS mode of operation) is extracted from the header. These keys are used for encryption and decryption of the data that is protected by the GostCrypt Volume. The cryptographic data used to decrypt the GostCrypt volume header is removed from RAM, the primary master key (and secondary master key) are kept in kernel memory and the volume is mounted.
32
WARNING!!: Before installing Truecrypt encryption software on your
Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer
How to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
Encrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
SecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)
1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: [email protected] Laplink Software, Inc. 600 108th Ave.
Using TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
PGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
BorderGuard Client. Version 4.4. November 2013
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Ocster Backup Pro 8. Copyright 2013 Ocster GmbH & Co. KG. All rights reserved.
Ocster Backup Pro 8 Copyright 2013 Ocster GmbH & Co. KG All rights reserved. Table of Contents Introduction... iv 1. Features... 1 2. Creating New Backup Plans... 3 Overview... 3 Creating Image-Based Backup
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE ABOUT THIS GUIDE This guide provides you with the required steps and instructions to transfer your data to your desired virtual server(s).
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Crystal Practice Management Encrypting the Database
Crystal Practice Management Encrypting the Database www.crystalpm.com 2013 Contents Overview... 1 Level of Encryption... 1 Why encrypt your Crystal Practice Management data?... 1 How to encrypt the database...
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012
Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
FAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
Features - Microsoft Data Protection Manager
Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP
Hyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0
UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
TPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
Full Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
Altaro Hyper-V Backup V4 - User Guide
Altaro Hyper-V Backup V4 - User Guide 1 / 161 Table of contents Introducing Altaro Hyper-V Backup... 5 Roles... 6 Sample Scenario... 7 Different Editions... 9 Getting Started... 11 System requirements...
Backup and Disaster Recovery Restoration Guide
Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting
SonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610
LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Acer erecovery Management
1 Acer erecovery Management Developed by Acer's software team, Acer erecovery Management is a tool that provides you with an easy, reliable and safe means of restoring your computer to its factory default
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management
Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
Image Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Team Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
User s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Altaro Hyper-V Backup - Getting Started
Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008
16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
Hi-Speed USB Flash Disk User s Manual Guide
Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
NovaBACKUP. User Manual. NovaStor / May 2014
NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Microsoft Exchange 2003 Disaster Recovery Operations Guide
Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
The 2013 Experimental Warning Program (EWP) Virtual Weather Event Simulator (WES) Windows & Linux Installation Documentation
The 2013 Experimental Warning Program (EWP) Virtual Weather Event Simulator (WES) Windows & Linux Installation Documentation National Severe Storms Laboratory (NSSL) Norman, OK Contents I WINDOWS CONFIGURATION
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Image Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
Ocster Backup - Rescue System
Overview Ocster Backup - Rescue System The software allows you to create a rescue CD, DVD or USB-Stick. This rescue system is intended for two kinds of situations: 1. To restore a backup to your main hard
Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net
Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 Copyright SharePoint Backup and Restore Guide 7.22 Revision: This manual has been created for Version 7.22 (June 2013). Software
NTI CORPORATION. NTI Backup Now EZ v3. User's Guide
NTI CORPORATION NTI Backup Now EZ v3 NTI Backup Now EZ v3 User's Guide Backup Now EZ v3 User's Guide 2013 NTI Corporation i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ... 5 OVERVIEW
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008
AxCrypt File Encryption Software for Windows Quick Installation Guide Version 1.6.3 January 2008 Copyright 2005-2008 Svante Seleborg, Axantum Software AB 2(19) This guide describes how to install and quickly
Guide to Securing Microsoft Windows 2000 Encrypting File System
Report Number: C4-006R-01 Guide to Securing Microsoft Windows 2000 Encrypting File System Systems and Network Attack Center (SNAC) Authors: Graham Bucholz Harley Parkes Updated: January 2001 Version 1.0
Intel NUC. Installing Microsoft Windows* 7 from USB Flash Drives onto USB 3.0 Computers
Intel NUC Installing Microsoft Windows* 7 from USB Flash Drives onto USB 3.0 Computers July 2015 1 Introduction 1.1 Document Scope The following document details the installation of a non-xhci operating
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
