PGP. Installation Guide
|
|
|
- Kristian Atkins
- 10 years ago
- Views:
Transcription
1 PGP Installation Guide
2 Copyright Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version for Windows 95, 98, and NT, and Macintosh Printed in the United States of America. PGP, Pretty Good, and Pretty Good Privacy are registered trademarks of Network Associates, Inc. and/or its Affiliated Companies in the US and other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. Portions of this software may use public key algorithms described in U.S. Patent numbers 4,200,770, 4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the IDEA(tm) cryptographic cipher described in U.S. patent number 5,214,703, licensed from Ascom Tech AG; and the Northern Telecom Ltd., CAST Encryption Algorithm, licensed from Northern Telecom, Ltd. IDEA is a trademark of Ascom Tech AG. Network Associates Inc. may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or documentation does not give you any license to these patents. The compression code in PGP is by Mark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. LDAP software provided courtesy University of Michigan at Ann Arbor, Copyright Regents of the University of Michigan. All rights reserved. This product includes software developed by the Apache Group for use in the Apache HTTP server project ( Copyright The Apache Group. All rights reserved. See text files included with the software or the PGP web site for further information. This software is based in part on the work of the Independent JPEG Group. Soft TEMPEST font courtesy of Ross Anderson and Marcus Kuhn. The software provided with this documentation is licensed to you for your individual use under the terms of the End User License Agreement and Limited Warranty provided with the software. The information in this document is subject to change without notice. Network Associates Inc. does not warrant that the information meets your requirements or that the information is free of errors. The information may include technical inaccuracies or typographical errors. Changes may be made to the information and incorporated in new editions of this document, if and when made available by Network Associates Inc. Export of this software and documentation may be subject to compliance with the rules and regulations promulgated from time to time by the Bureau of Export Administration, United States Department of Commerce, which restrict the export and re-export of certain products and technical data. Network Associates, Inc. (408) main 3965 Freedom Circle (408) fax Santa Clara, CA [email protected] * is sometimes used instead of the for registered trademarks to protect marks registered outside of the U.S.
3 LIMITED WARRANTY Limited Warranty. Network Associates warrants that for sixty (60) days from the date of original purchase the media (for example diskettes) on which the Software is contained will be free from defects in materials and workmanship. Customer Remedies. Network Associates' and its suppliers' entire liability and your exclusive remedy shall be, at Network Associates' option, either (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained with a copy on nondefective media. You must return the defective media to Network Associates at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent Network Associates is subject to restrictions under United States export control laws and regulations. Warranty Disclaimer. To the maximum extentpermittedby applicable law,and exceptforthe limited warranty set forth herein, THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. WITHOUT LIMITING THE FOREGOING PROVISIONS, YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, NETWORK ASSOCIATES MAKES NO WARRANTY THATTHESOFTWAREWILLBEERROR-FREEORFREEFROMINTERRUPTIONSOR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NETWORK ASSOCIATES DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
4
5 Table of Contents Chapter1. Introduction...7 HowtoContactNetworkAssociates,Inc....7 Customerservice...7 Technicalsupport...7 NetworkAssociatestraining...8 Yourfeedbackiswelcome...8 Relatedreading...9 Chapter2. InstallingPGP...11 Systemrequirements...11 Compatibilitywithotherversions...12 Upgradingfromapreviousversion...12 InstallingPGPVersion6.0forWindows95,98,andNT...14 InstallingPGPVersion6.0forMacintosh...17 Index...19 Installation Guide v
6 Table of Contents vi PGP
7 1Introduction 1 Welcome to PGP software! This Quick Start guide provides general information about PGP and describes the system requirements and installation instructions necessary to successfully run it. How to Contact Network Associates, Inc. Customer service To order products or obtain product information, contact the Network Associates Customer Care department. You can contact Customer Care at one of the following numbers Monday through Friday between 6:00 A.M. and 6:00 P.M. Pacific time. Or write to: Network Associates, Inc Freedom Circle Santa Clara, CA U.S.A. Technical support Phone (408) Network Associates is famous for its dedication to customer satisfaction. We have continued this tradition by making our site on the World Wide Web a valuable resource for answers to technical support issues. We encourage you to make this your first stop for answers to frequently asked questions, for updates to Network Associates software, and for access to Network Associates news and encryption information. World Wide Web Technical Support for your PGP product is also available through these channels: Phone (408) [email protected] Installation Guide 7
8 Introduction To provide the answers you need quickly and efficiently, the Network Associates technical support staff needs some information about your computer and your software. Please have this information ready before you call: PGP product name PGP product version Computer platform and CPU type Amount of available memory (RAM) Operating system and version and type of network Content of any status or error message displayed on screen or appearing in a log file (not all products produce log files) application and version (if the problem involves using PGP with an product, for example, the Eudora plug-in) Network Associates training For information about scheduling on-site training for any Network Associates product, call (800) Your feedback is welcome We continually enhance PGP products and welcome customer feedback as we design new versions. We appreciate your interest in PGP products and your thoughts on product content and functionality. Feedback like yours helps us to develop richer and easier-to-use software and services. While we cannot incorporate all suggestions, we will give your input serious consideration as we develop future products. 8 PGP
9 Related reading Here are some documents that you may find helpful in understanding cryptography: Non-Technical and beginning technical books Introduction Cryptography for the Internet, by Philip R. Zimmermann. Scientific American, October This article, written by PGP s creator, is a tutorial on various cryptographic protocols and algorithms, many of which happen to be used by PGP. Privacy on the Line, by Whitfield Diffie and Susan Eva Landau. MIT Press; ISBN: This book is a discussion of the history and policy surrounding cryptography and communications security. It is an excellent read, even for beginners and non-technical people, and contains information that even a lot of experts don't know. The Codebreakers, by David Kahn. Scribner; ISBN: This book is a history of codes and code breakers from the time of the Egyptians to the end of WWII. Kahn first wrote it in the sixties, and published a revised edition in This book won't teach you anything about how cryptography is accomplished, but it has been the inspiration of the whole modern generation of cryptographers. Network Security: Private Communication in a Public World, by Charlie Kaufman, Radia Perlman, and Mike Spencer. Prentice Hall; ISBN: This is a good description of network security systems and protocols, including descriptions of what works, what doesn't work, and why. Published in 1995, it doesn't have many of the latest technological advances, but is still a good book. It also contains one of the most clear descriptions of how DES works of any book written. Intermediate books Applied Cryptography: Protocols, Algorithms, and Source Code in C, bybruce Schneier. John Wiley & Sons; ISBN: This is a good beginning technical book on how a lot of cryptography works. If you want to become an expert, this is the place to start. Handbook of Applied Cryptography, byalfredj.menezes,paulc.van Oorschot, and Scott Vanstone. CRC Press; ISBN: This is the technical book you should read after Schneier s book. There is a lot of heavy-duty math in this book, but it is nonetheless usable for those who do not understand the math. Installation Guide 9
10 Introduction Internet Cryptography, by Richard E. Smith. Addison-Wesley Pub Co; ISBN: This book describes how many Internet security protocols work. Most importantly, it describes how systems that are designed well nonetheless end up with flaws through careless operation. This book is light on math, and heavy on practical information. Firewalls and Internet Security: Repelling the Wily Hacker, by William R. Cheswick and Steven M. Bellovin. Addison-Wesley Pub Co; ISBN: This book is written by two senior researchers at AT&T Bell Labs and is about their experiences maintaining and redesigning AT&T's Internet connection. Very readable. Advanced books A Course in Number Theory and Cryptography, by Neal Koblitz. Springer-Verlag; ISBN: An excellent graduate-level mathematics textbook on number theory and cryptography. Differential Cryptanalysis of the Data Encryption Standard, by Eli Biham and Adi Shamir. Springer-Verlag; ISBN: This book describes the technique of differential cryptanalysis as applied to DES. It is an excellent book for learning about this technique. 10 PGP
11 2Installing PGP 2 This chapter describes how to install PGP for Windows and PGP for Macintosh software. Before you begin installing PGP, however, be sure to review the system requirements outlined below. System requirements To install PGP on a Windows 95, 98, or NT system, you must have: Windows 95, 98, or NT 16 MB RAM 15MBharddiskspace To install PGP on a Macintosh system, you must have: Macintosh IIci or later model with or higher System software or later 8 MB RAM 10MBharddiskspace 68K Macs must be running Apple s CFM 68K 4.0 or higher. The PGP installer installs this if necessary. Installation Guide 11
12 Installing PGP Compatibility with other versions PGP has gone through many revisions since it was released by Phil Zimmermann as a freeware product in Although this version of PGP represents a significant rewrite of the original program and incorporates a completely new user interface, it has been designed to be compatible with earlier versions of PGP. This means that you can exchange secure with people who are still using these older versions of the product: PGP 2.6 (Distributed by MIT) PGP for the Macintosh (Released by ViaCrypt) PGP 4.0 (Released by ViaCrypt) PGP 4.5 (Released by PGP, Inc.) PGP for Personal Privacy, Version PGP for Business Security or PGP for and Files Version 5.5 NOTE: PGP products Version 5.0 and later may require the RSA add-on for backward compatibility. Upgrading from a previous version If you are upgrading from a previous version of PGP (from PGP, Inc., Network Associates, Inc. or ViaCrypt), you may want to remove the old program files before installing PGP to free up some disk space. However, you should be careful not to delete the private and public keyring files used to store any keys you have created or collected while using the previous version. When you install PGP, you are given the option of retaining your existing privateandpublickeyrings,soyoudon thavetogotothetroubleof importing all of your old keys. To upgrade from a previous version, follow the appropriate steps listed next. To upgrade from PGP Version or Exit all programs or open applications. 2. Make backups of your old PGP keyrings on another volume. In PGP for Windows versions and 2.7.1, your public keys are stored in the file titled pubring.pgp and your private keys are stored in the file titled secring.pgp. In versions 5.x - 6.0, your public keys are stored in the file titled pubring.pkr and your private keys are stored in the file titled secring.skr. 12 PGP
13 Installing PGP TIP: Maketwoseparatebackupsofyourkeyringsontotwo different floppy disks just to be safe. Be especially careful not to lose your private keyring; otherwise you will never be able to decrypt any messages or file attachments encrypted with the lost keys. Store the keyrings in a secure place where only you have access to them. 3. When you have successfully backed up your old keyrings, remove or archive the (old) PGP software. You have two options here: Manually delete the entire old PGP folder and all of its contents; or Manually delete the old PGP program and archive the remaining files, especially the configuration and keyring files. NOTE: If you obtain a copy of the patched PGP version, your old software will be able to read the RSA keys on the new 6.0 keyrings and will not fail when it encounters the new Diffie-Hellman/DSS format keys. You can download this patch from the Network Associates Website. 4. Install PGP Version 6.0 using the provided Installer. 5. Restart your computer. To upgrade from PGP Version 4.x or 5.x If you are upgrading from PGP Version 4.x or 5.x, follow the installation instructions outlined in To install PGP for Windows on page 14 or To install PGP for Macintosh on page 17. Installation Guide 13
14 Installing PGP Installing PGP Version 6.0 for Windows 95, 98, and NT You can install the PGP software from a CD-ROM or from your company file server. The self-extracting file, SETUP.EXE, automatically extracts and steps you through the installation. After you install the software, you can create your private and public key pair and begin using PGP. Refer to the PGPWinUsersGuide.pdf file included with the program for instructions on PGP. To install PGP for Windows, start your computer and carefully follow the steps outlined below. To install PGP for Windows 1. Exit all programs currently running on your computer. 2. To install from a CD-ROM, insert it into the CD-ROM drive. The Setup program automatically starts. If, however, the Setup program does not initiate, double-click SETUP.EXE in the PGP product folder on the CD-ROM. To install from your company file server, contact your security officer for information about the server from which to download PGP. Log on to the server. Double-click SETUP.EXE in the PGP product folder to start the Setup program. The PGP Installation screen appears. 3. Review the instructions in the PGP Welcome dialog box, then click Next. The Network Associates license agreement appears. 14 PGP
15 Installing PGP 4. Review the license agreement information, then click Yes to accept the licensing terms. The Setup program searches for open programs and prompts you to close them. If you have PGP version 4.x or 5.x currently installed, the PGP setup program prompts you to uninstall the old PGP files. Click Yes to automatically uninstall the old version. 5. Register your product by entering your name and company name in the User Information dialog box. 6. Click Next. 7. Click Browse to navigate to a destination directory for your PGP files, then click Next. The Select Components dialog box appears, as shown in Figure 2-1. Figure 2-1. PGP for Windows Select Components dialog box Installation Guide 15
16 Installing PGP 8. Clear the components that you do not want to install. By default, each option is selected. Your installation options are: PGP 6.0 Program Files (required). To install the PGP program, this option must be selected. PGP 6.0 Eudora Plugin. Select this option if you want to integrate PGP functionality with your Qualcomm Eudora program. PGP 6.0 supports Eudora versions 3.05 and later. PGP 6.0 Microsoft Exchange/Outlook Plugin. Select this option if you want to integrate PGP functionality with your Microsoft Exchange/Outlook program. PGP 6.0 supports Outlook 97 and 98. PGP 6.0 Microsoft Outlook Express Plugin. Select this option if you want to integrate PGP functionality with your Microsoft Outlook Express program. PGP 6.0 supports the version that is included with Internet Explorer versions 4.01 and later. PGP 6.0 User s Manual (Adobe Acrobat format). Select this option to install the PGP User s Guide. PGPdisk for Windows 95 and NT. Select this option to install the PGPdisk program. PGPdisk is an easy-to-use encryption application that enables you to set aside an area of disk space for storing your sensitive data. 9. Click Next. The Check Setup Information dialog box appears. 10. Review the installation settings, then click Next. The PGP files are copied to the computer. 11. If you have keyrings on your computer from a previous version of PGP, click Yes to use your existing keyrings. A browse dialog box appears. Browse to locate your public keyring, Pubring.pkr, and your private keyring, Secring.skr. 12. Select Yes, I want to view the Readme file, then click Finish to complete the installation. 13. To launch PGPkeys immediately after the installation, select Yes, I want to run PGPkeys. 14. Click Finish to complete the PGP installation. 16 PGP
17 Installing PGP Version 6.0 for Macintosh Installing PGP You can install the PGP software from a CD-ROM or from your company file server. The Installer program ( ) automatically extracts and steps you through the installation. After you install the software, you can create your private and public key pair and begin using PGP. Refer to the PGPMacUsersGuide.pdf file included with the program for instructions on using PGP. To install PGP for Macintosh, carefully follow the steps outlined below. To install PGP for Macintosh 1. Quit all applications running on your computer. 2. To install from a CD-ROM, insert it into the CD-ROM drive. To install from your company file server, contact your security officer for information about the server from which to download PGP. Log on to the server. 3. Double-click the installation icon ( ) to start the Installer program. The PGP Installation screen appears. 4. Click Continue. The Network Associates license agreement appears. 5. Review the license agreement information, then click Accept to continue the installation. The PGP Release Notes appear. 6. Review the release notes for known issues and export restrictions, then click Continue. Installation Guide 17
18 Installing PGP The installation screen appears, as shown in Figure 2-2. Figure 2-2. PGP for Macintosh Installation screen 7. Select a type of installation: Easy Install.Choose Easy Install to perform a full installation of PGP. Custom Install. Choose Custom Install to install PGP with user-definable options. You are prompted to choose the components that you want to install. Uninstall. Choose Uninstall to remove all PGP program components from the system. 8. Select a location for your PGP files, then click Install. A warning screen appears advising you to close all open applications. 9. Close open applications, then click Continue. The PGP files are copied to the computer. 10. Click Restart to reboot the computer. The computer restarts. PGP is now installed on the computer. 18 PGP
19 Index C compatibility versions of PGP 12 Customer Care contacting 7 F feedback to Network Associates 8 I installing PGP 11 PGPdisk for windows 16 M Macintosh system requirements 11 N Network Associates contacting Customer Care 7 training 8 Network Associates feedback 8 P PGP compatibility 12 installing 11 Macintosh 17 platforms supported 11 system requirements 11 upgrading from a previous version 12 upgrading from Network Associates 12 upgrading from ViaCrypt 12 versions of, compatible 12 Windows 95, 98 & NT 14 PGPdisk for Windows 16 R related reading 9 S setup.exe installing PGP 14 system requirements for PGP 11 T Technical 7 technical support address 7 information needed from user 8 online 7 training for Network Associates products 8 scheduling 8 U upgrading from ViaCrypt 12 V ViaCrypt upgrading from 12 Installation Guide 19
Pretty Good Privacy PGP for Personal Privacy, Version 5.0. User s Guide. PGP, Inc. For the Mac OS
Pretty Good Privacy PGP for Personal Privacy, Version 5.0 For the Mac OS User s Guide PGP, Inc. 1997 by Pretty Good Privacy, Inc. All rights reserved. 5-97. Printed in the United States of America. PGP
QuarkCopyDesk 8.12 ReadMe
QuarkCopyDesk 8.12 ReadMe CONTENTS Contents QuarkCopyDesk 8.12 ReadMe...4 System requirements...5 Mac OS...5 Windows...5 Installing: Mac OS...7 Performing a silent installation...7 Preparing for silent
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
RDC-7 Windows XP Installation Guide
RDC-7 Windows XP Installation Guide CONTENTS 1. End User License Agreement...3 2. Important notes...4 3. Customer support...4 4. Installing the USB driver...4 I. Prior to installation...4 II. Installation
NTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
How to install Artologik HelpDesk 3
How to install Artologik HelpDesk 3 --------------------------------------------------------------------------- WARNING: This program is protected by copyright law and international treaties. Unauthorized
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS
IBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
TOOLS for CC121 Installation Guide
TOOLS for CC121 Installation Guide ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Symantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
Installation Guide Installing / Licensing / Unlocking Kepware Products
Installation Guide Installing / Licensing / Unlocking Kepware Products License Registration & Unlock online at https://my.kepware.com/mykepware Kepware Technologies is a private software development company
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
IBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide
Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Document Number: P0874391 Document Release: Standard 1.00 Date: November 1997 Year Publish FCC TM 1997 All rights reserved Printed in
Quick Start Guide 82099700
82099700 Quick Start Guide MultiVOIPManager MultiVOIPManager Quick Start Guide P/N 82099700 Revision A Copyright 2001 by Multi-Tech Systems, Inc. All rights reserved. This publication may not be reproduced,
User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0
Administration Guide SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Copyright 2004 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced,
NetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Backup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
Dell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
SOFTWARE INSTALLATION AND USB CONNECTION GUIDE
SOFTWARE INSTALLATION AND USB CONNECTION GUIDE ENGLISH LYT1086-001A COPYRIGHT 2003 VICTOR COMPANY OF JAPAN, LTD. M3D3/D1 DSC Printed in Japan 1202-HO-ID-VP JVC SOFTWARE LICENSE AGREEMENT IMPORTANT TO CUSTOMERS:
Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers
Integration Note October 2000 Prepared by OS Integration Engineering Compaq Computer Corporation Contents Introduction...3 Requirements...3 Minimum Requirements...4 Required Information...5 Additional
Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS
The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone
Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited
Installation Guide Lepide Event Log Manager , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the copyright laws. This
Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
FILE TRANSFER PROTOCOL (FTP) SITE
FILE TRANSFER PROTOCOL (FTP) SITE Section 1 - SPIN System Overview As part of the digital plan submission process that Registries is currently implementing a File Transfer Protocol (FTP) site has been
Sage 100 ERP. Installation and System Administrator s Guide
Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the
Symantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer
Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
Installation Assistance... 3. Windows/Microsoft Updates... 3. Updating from Spectra 7.0.1 or 7.1... 4. Upgrading from Spectra 6.x...
Spectra 7.1.1/Access 2010 Windows Upgrade Installation Instructions Installation Assistance... 3 Windows/Microsoft Updates... 3 Updating from Spectra 7.0.1 or 7.1... 4 Important Notices... 4 Downloading
An Introduction to Cryptography
An Introduction to Cryptography Copyright 1990-1999 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 6.5.1 6-99. Printed in the United States of America. PGP, Pretty
FileMover 1.2. Copyright Notice. Trademarks. Patents
FileMover 1.2 Copyright Notice No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language, in any form or by
Enterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
NCD ThinPATH Load Balancing Startup Guide
NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing
/ WMS / LITE INDUSTRIAL)
Acknowledgements Trademark Information COREflex Software Microsoft, Windows, Windows NT/ 2000/ XP, and Access are registered trademarks of Microsoft Corporation. Quickbooks is a registered trademark of
DME-N Network Driver Installation Guide for LS9
DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED
Oracle WebCenter Content Service for Microsoft Exchange
Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade
Windows 95, Windows 98, Windows NT 4.0, Windows 2000, or Windows XP. Pentium PC Minimum RAM: 16 MB RAM Windows 95, Windows 98;32 MB RAM Windows NT 4.
Principia Network Installation Instructions Network Installation Requirements Windows 95, Windows 98, Windows NT 4.0, Windows 2000, or Windows XP Pentium PC Minimum RAM: 16 MB RAM Windows 95, Windows 98;32
TIBCO Fulfillment Provisioning Session Layer for FTP Installation
TIBCO Fulfillment Provisioning Session Layer for FTP Installation Software Release 3.8.1 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP
Dell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Symantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
QuickBack. User s Guide
QuickBack Data backup, volume cloning and file / folder archiving utility. Features automated scheduling, compression, encryption, CD/DVD burning and can preserve volume backup bootability. Part of the
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...
Secure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
Oracle Application Server
Oracle Application Server Quick Installation Guide 10g Release 3 (10.1.3) for Microsoft Windows (64-Bit) on Intel Itanium B28114-01 February 2006 Oracle Application Server Quick Installation Guide 10g
Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part
Installation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
QuarkXPress 8.01 ReadMe
QuarkXPress 8.01 ReadMe CONTENTS Contents QuarkXPress 8.01 ReadMe...4 System requirements...5 Mac OS...5 Windows...5 Installing: Mac OS...6 Performing a silent installation...6 Preparing for silent installation...6
Client Program Installation Guide
Siku Quanshu (Wenyuange Edition) Online Subscription Services Client Program Installation Guide 1. System Requirements The minimum requirements of the Siku Quanshu (Wenyuange Edition) Online Subscription
SAS 9.1.3 Installation Instructions Windows 2003, XP, 2000, NT. SAS 9.1.3 Client Server Installation. Introduction:
UCit Instructional and Research Computing, Software Distribution Office, 303B Zimmer Hall, Cincinnati, OH 45221-0088. Phone: (513) 556 9068 Email: [email protected] SAS 9.1.3 Installation Instructions Windows
Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide
Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is
Symantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D
DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY
Preparing Your Network for an MDsuite Installation
Preparing Your Network for an MDsuite Installation Professional Data Services 1632 East 23 rd Avenue Hutchinson, KS 67502 Toll-free: 800.875.0480 Fax: 858.486.5493 www.mdsuite.com Introduction This document
Crystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
MyShortcut. Administrator's Guide
MyShortcut Administrator's Guide January 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.
Installation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
SMALL BUSINESS ACCOUNTING. Installation and Setup Guide
SMALL BUSINESS ACCOUNTING Installation and Setup Guide 1634_502138_f1.indd 1 6/27/11 4:17 PM Copyright Copyright 2011 Intuit Inc. All rights reserved. First printing, September 2008 STATEMENTS IN THIS
InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers
InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices
Newton Backup Utility User s Guide. for the Windows Operating System
Newton Backup Utility User s Guide for the Windows Operating System K Apple Computer, Inc. 1995 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole
VERITAS NetBackup 6.0
VERITAS NetBackup 6.0 Backup, Archive, and Restore Getting Started Guide for UNIX, Windows, and Linux N15278C September 2005 Disclaimer The information contained in this publication is subject to change
Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management
Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...
Free GMATPrep Test-Preparation Software Download and Installation Instructions
Welcome! Welcome to the GMATPrep application. The GMATPrep test-preparation software was designed by the people who created the GMAT exam, to help you get ready to take the test. It includes practice questions
isnmp Installation Guide installing / licensing / unlocking
isnmp Installation Guide installing / licensing / unlocking New!! License Registration & Unlock (online) get yours at...www.kepware.com/mykepware Kepware is the world leader in communication software for
IBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption for Windows User's Guide 2.1.1 Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.1. Released
etrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
SysInfoTools MS SQL Database Recovery
SysInfoTools MS SQL Database Recovery Table Of Contents 1. SysInfoTools MS SQL Database Recovery... 2 2. Overview... 2 3. Getting Started... 3 3.1 Installation procedure... 4 4. Order and Activation...
Automation License Manager
s Contents Product Overview 1 Installation 2 Working with the Automation License Manager 3 Glossary Manual Index 12/2008 A5E02389428-01 Legal information Warning notice system This manual contains notices
FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1
FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1 2011 Sage Software, Inc. All rights reserved. Published by Sage 2325 Dulles Corner
TIBCO Hawk SNMP Adapter Installation
TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR
Details Network Essentials
Details Network Essentials Documentation written by Rebecca Glassman Version 3.0 Microsoft, the Microsoft logo, Windows, Windows NT, Windows 95, Windows 98 and Windows 2000 are either registered trademarks
Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
NTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
Symantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
Avigilon Control Center Gateway User Guide. Version 5.4
Avigilon Control Center Gateway User Guide Version 5.4 2006-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright, industrial
Microsoft Dynamics GP. Electronic Signatures
Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without
File Management Utility. T u t o r i a l
File Management Utility T u t o r i a l Contents System Requirements... 2 Preparing Files for Transfer to GlobalMark... 2 Application Launch... 2 Printer Setup... 2 Communication Status... 4 Communication
Title Page. Installation Guide. PowerChute plus Version 5.0.1. for Windows 95
Title Page PowerChute plus Version 5.0.1 for Windows 95 Notice Page : PowerChute plus for Windows 95 version 5.0.1 PowerChute plus License Statement This software is protected by both United States copyright
Migrating MSDE to Microsoft SQL 2008 R2 Express
How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,
