PDG Software. Encryption Guide
|
|
|
- Tracy Wilson
- 10 years ago
- Views:
Transcription
1 Encryption Guide
2
3 , Inc Montreal Circle, Suite B Tucker, Georgia Copyright PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership rights to the software programs (referred to herein as "Software") offered by PDG Software and related documentation. Use of the Software and related documentation is governed by the license agreement accompanying the Software and applicable copyright law. THIS DOCUMENTATION IS PROVIDED "AS-IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL PDG SOFTWARE BE LIABLE FOR ANY LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS, OR FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND, ARISING FROM ANY ERROR IN THIS DOCUMENTATION. PDG Software, Inc. June, 2006
4
5 Chapter 1 Encryption and PDG Software Using encryption with PDG Software T his guide assumes you have installed and have a basic familiarity with PDG Shopping Cart or PDG Commerce. This manual also assumes that you have a basic understanding of zip/unzip utilities and file transfer protocol (FTP) programs. If not, you may want to enlist additional help or familiarize yourself with these programs before proceeding. Introduction You can protect the privacy of your customer order messages and your order log files by encrypting them so that only you can read them. To do so, you will need to download and configure two software programs. You will use the PGP Keys tool to create your security keys and GNU Privacy Guard to encrypt your customer order and order logs. You will import the key to your PDG Shopping Cart or PDG Commerce program through the PDG Merchant Administrator. 1. GNU Privacy Guard (GNUPG) - This encryption software is available free from: 2. PGP Keys tool - This tool is contained inside the PGP free 30 day trial package available from: The PGP Desktop Security software may be purchased from: PDG Software does not provide technical support for these products. This guide is provided as a courtesy to our software users who wish to use encryption to protect their order and order log files. Note: PGP is not a free program. At the end of the 30 day trial, it must be purchased. The version explained in this guide is PDG Desktop Security. PDG Software Encryption Guide 5
6 Quick Overview These are the basic steps necessary to use encryption with PDG software. 1. Download two encryption software programs to your local computer and place them in different folders. 2. Uncompress the archived (compressed) programs and install them as appropriate. 3. Create your security keys using PGP Keys and export your key. 4. Copy or FTP the GNUPG file to your host server in the correct file format. 5. Use the Encryption section of the PDG Merchant Administrator to import your security key into GNUPG. 6. Configure PDG software to use GNUPG to encrypt vendor s sent to you. 7. Configure PDG software to use GNUPG to encrypt your order log files. 8. Configure your program (e.g., Microsoft Outlook) to decrypt order s you receive. 9. Test your configuration. Note: We strongly recommend you follow these steps in the order shown. Detailed explanations of each step in the process are shown below. Download/Uncompress You must download two encryption software programs to your local computer. First, create two folders on your local computer and name them gnupg and pgp. Second, connect to the Internet and go to Download the appropriate GNU Privacy Guard version for your host server s operating system, e.g. Windows, UNIX, etc. This is a compressed archive containing all the program s files. Place it in the gnupg folder you created. Uncompress this archive. Note: If you are using Windows and your shopping cart is running on a UNIX machine, you will have to uncompress the -.tar.gz archive appropriately. If you need assistance obtaining the gnupg program, please contact PDG technical staff. Next, go to and download the appropriate PGP version for your local computer s operating system, e.g. Windows, UNIX, etc. and place it in the pgp folder you created. Uncompress this archive, then run 'Setup' to install PGP onto your local computer. Follow the on screen instructions for installation. We recommend you accept the default settings. 6 PDG Software Encryption Guide
7 Create Security Keys Now you can create your security keys using PGP Keys. When you install PGP, the installation program should have placed shortcuts in your Start - Programs menus and an icon on your system tray. You can start PGP Keys by clicking on the entry in the Start - Programs menu or click on the lock icon in the system tray and click on PGP Keys. Note: The first time you run PGP Keys, a wizard screen will appear to assist you in creating your keys. Follow the on screen instructions in the wizard to create your keys. Be sure to remember your passphrase. When you finish creating your keys, a screen similar to the following should appear. Scroll down to the new keyring you created to view it. It should show up in bold face type to indicate it is the default. Close PGP Keys. PDG Software Encryption Guide 7
8 Export Key Now you must export your security key FROM PGP Keys. First, Open PGP Keys and Highlight the key you created. Select Keys - Export from the menu. A screen similar to the following will appear. Enter a filename (e.g. JohnSmith) and make sure the file type is ASCII (this will add a.asc file extension). Click the Save button. Close PGP Keys. Copy/FTP Now you must copy or FTP the following file to your host server. If you are NOT using Windows on your server there will be no.exe extension to the file name for executable files (the file will be named gpg). gpg.exe--> \cgi-bin\pdg_cart\ or \cgi-bin\pdg_commerce\ You must set the permissions for this file as 755 (Read, Write, Execute). 8 PDG Software Encryption Guide
9 Import Key After you have exported the key, you must then import the key into PDG Software. Open a web browser and log into your PDG Merchant Administrator. Click the Encryption link on the Main Menu to access the encryption settings in your Cart or Commerce Administrator. The following screen will appear: Remember in our example, we saved the exported key file with the name, JohnSmith.asc. Open the exported file in Notepad or other text editor, NOT a word processing program. Select ALL of the text shown in the file and press Control + c to copy it into the clipboard. Place the cursor in the Key Box and press Control + v to paste the info in the GPG Add Encryption key box. Click on the Add Key button. The page will then refresh, and the key should now be listed in the GPG keys portion of the page. PDG Software Encryption Guide 9
10 Configure PDG Software You can configure two items in PDG software for encryption. 1. Vendor s - These are the customer order s sent to you, the vendor. 2. Order logs - the order logs are the files in which your customer orders are stored on the server. To configure these two items for encryption, go to the Merchant Administrator and click the link on the Main Menu. In the Vendor Notifications To: field, enter your address, e.g. [email protected] followed by the '<' symbol, then enter your address again, followed by the '>' symbol. The text contained within the < and > symbols must be the name of the key you imported. The entry should appear similar to the following with NO SPACES. [email protected]<[email protected]> Click the Submit Changes button. Click the Return to Main Menu link. Click the Make Changes Live link. To encrypt your order log, click the Order link on the Main Menu. In the Order Log text File field, add the '<' symbol after the name of the log, then enter your address, followed by the '>' symbol with NO SPACES. The text contained within the < and > symbols must be the name of the key you imported. 10 PDG Software Encryption Guide
11 The entry should appear similar to the following: You may also encrypt the Order Log CSV File and Order Log XML File fields in the same manner. Note: If you have an existing order log files, ONLY orders received AFTER configuring PDG for encryption will be encrypted. These new orders will be appended to the end of the existing order log files. Configure your Program Next you may configure your program to decrypt the customer order s you receive. For assistance with this configuration, you should contact PGP technical support or consult their online documentation (accessible at Test your settings The simplest way to test your settings is to send yourself a test order. Go to your web site and enter a test order to buy a product. Be sure to enter all the proper order information in the order fields. You should receive two s: 1. One plain text confirmation , just like a customer buying a product would receive 2. One encrypted of the order, just as you would receive as the vendor Getting Help Note: PDG Software does not provide technical support for PGP programs. This guide is provided as a courtesy to our software users who wish to use encryption to protect their order and order log files. However, PDG technical support staff is available for support of PDG products via our web site at and through at [email protected]. Also you may reach us directly by phone at (770) extension 3. PDG Software Encryption Guide 11
12 12 PDG Software Encryption Guide
PDG Software. PDG Key Manager User Guide
PDG Key Manager User Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2000 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all
PDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
PDG Shopping Cart 4.0. Quick Start Guide
PDG Shopping Cart 4.0 Quick Start Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software")
How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
PDG Software. VeriSign Payflow Pro Recurring Billing Guide
VeriSign Payflow Pro Recurring Billing Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software")
PDG Software. QuickBooks Financial Guide
QuickBooks Financial Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2008 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all
PDG Software. QuickBooks Point of Sale Guide
QuickBooks Point of Sale Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2007 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains
User guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
Please note that a username and password will be made available upon request. These are necessary to transfer files.
Transferring Data Using Secure File Transfer Process ASU Center for Health Information and Research (CHiR) data partners can now securely electronically send their data submissions by means of Secure File
Banyon Data Systems BDS BACKUP VAULT
Banyon Data Systems BDS BACKUP VAULT 2 BDS BACKUP VAULT INSTALLATION / SETUP Thank you for your purchase of the BDS Backup Vault program. This program is designed to protect each of your entities installed
LiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
PDG Software. Site Design Guide
PDG Software Site Design Guide PDG Software, Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2007 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software")
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Microsoft Dynamics GP. Business Analyzer
Microsoft Dynamics GP Business Analyzer April 5, 2013 Copyright Copyright 2013 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in
4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë
14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected
How to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
KEPServerEX Client Connectivity Guide
KEPServerEX Client Connectivity Guide For Clear Controls ClearView KTSM-00023 v. 1.04 KEPWARE END USER LICENSE AGREEMENT AND LIMITED WARRANTY The software accompanying this license agreement (the Software)
AXIS 70U - Using Scan-to-File
AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.
Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4
Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4 Dwebs Ltd http://www.dwebs.ltd.uk January 2009 Doc: Helm 4.1.0.0 Mod Ver: 1.0.0.0 The names of actual companies and products mentioned
Secure File Transfer Protocol Updated Procedures. June 20, 2011
Secure File Transfer Protocol Updated Procedures June 20, 2011 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Preparing the Files for Transfer 4 Connecting
Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
NetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer
Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................
Encrypting Your Email Using the free COMODO Secure Email Certificate
Encrypting Your Email Using the free COMODO Secure Email Certificate These instructions will guide you through the process of getting a free Secure Email Certificate Issued by COMODO. This document will
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Resource Online User Guide JUNE 2013
Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
How to use PGP Encryption with iscribe
How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted
HP Application Lifecycle Management
HP Application Lifecycle Management Software Version: 11.00 Microsoft Word Add-in Guide Document Release Date: November 2010 Software Release Date: October 2010 Legal Notices Warranty The only warranties
GPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
Shopping Cart Software
Shopping Cart Software QuickStart Guide 1 Please note: The Quick Start guide covers only the minimum requirements to get your cart up and running; there are many more features for you to take advantage
Install and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
HP Quality Center. Software Version: 10.00. Microsoft Word Add-in Guide
HP Quality Center Software Version: 10.00 Microsoft Word Add-in Guide Document Release Date: February 2012 Software Release Date: January 2009 Legal Notices Warranty The only warranties for HP products
MY WORLD GIS. Installation Instructions
MY WORLD GIS Version 4.1 Installation Instructions Copyright 2007 by Northwestern University. All rights reserved. Created August 15, 2002 Last Revised April 14, 2008 2. Launching the Installer On the
NCD ThinPATH Load Balancing Startup Guide versions 2.0.7 and 2.8.1
NCD ThinPATH Load Balancing Startup Guide versions 2.0.7 and 2.8.1 Copyright Copyright 2003 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without
ARGUS SUPPORT: (03) 9037 1000 ARGUS V4.3.X TO ARG US V5.0.X
ARGUS SUPPORT: (03) 9037 1000 UPGRADE GUIDE ARGUS V4.3.X TO ARG US V5.0.X FOR MAC ALL LOGOS AND TRADEMARKS ARE COPYRIGHT OF THE RESPECTIVE OWNERS COPYRIGHT ARGUS CONNECTING CARE, 2011 Argus Connecting
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager
Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager The following instructions work for the District provided Blackberrys from Sprint, but I think it should
ACS EPF Download Manager Technical Guide. Table of Contents
Table of Contents Introduction... 3 Administration... 3 Disclaimer... 3 System Requirements... 3 Software Download... 3 Software Installation... 4 Preparing for the Installation... 4 Unzip the Software
gpg4o Manual Version 3.0
gpg4o Manual Version 3.0 Table of Contents 1 GENERAL... 3 2 SYSTEM REQUIREMENTS... 4 3 INSTALLATION... 5 3.1 Required Software... 5 3.2 Installing GnuPG... 5 3.3 Installing gpg4o... 10 3.4 Setting gpg4o...
ecstudent-ts Terminal Server How to Use
ecstudent-ts Terminal Server How to Use Connect to Cisco Any Connect Connect to Terminal Server, Set Options to Use Home Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
Xopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
LogMeIn Backup. Getting Started Guide
LogMeIn Backup Getting Started Guide Contents Getting Started with LogMeIn Backup...3 About LogMeIn Backup...3 How does LogMeIn Backup Work, at-a-glance?...3 About Security in LogMeIn Backup...3 LogMeIn
Quick Guide to Using your Nokia Phone with Windows 95 Fax - Exchange for Windows 95 or Windows Messaging for Windows 95
Nokia 88xx series and 8210 03.02.00 This Quick Guide is a generic guide for all Nokia 88xx series and 8210 phones. When you are asked to select the modem you will see Nokia ****, please select one of the
NCD ThinPATH Load Balancing Startup Guide
NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing
DOMAIN CENTRAL HOSTING EMAIL
Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help
Cisco UCS Director Payment Gateway Integration Guide, Release 4.1
First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
Microsoft Small Business Financials. Small Business Center Integration
Microsoft Small Business Financials Small Business Center Integration Copyright Copyright 2005 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Access your directories (home directory and shared directories) outside Tilburg University
Access your directories (home directory and shared directories) outside Tilburg University FileZilla offers you the possibility to access your personal M-drive or other network locations through a secure
Personal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
MiSync Personal for Beams
Using MiSync Personal for Beams V4.3.1.0 by Metisc Copyright Printed: 16 January 2015 2014 by Metisc. All rights reserved. Notice This user guide and the software it describes are furbished under a license
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited
Installation Guide Lepide Event Log Manager , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the copyright laws. This
SiteBuilder E-Shop User Guide
SiteBuilder E-Shop User Guide Contents What is eshop?... 3 Setting up eshop for the first time... 4 Setting up your ordering information... 4 Deciding how to process orders... 5 Setting your general configuration
Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.
Reference : USER184 Issue date : December 2002 Revision date : September 2007 Classification : Software Originator : Hugh Burt REVISED DOCUMENT Installing Microsoft Outlook on a Macintosh This document
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
RealShot Manager Compression Server software
RealShot Manager Compression Server software User Guide Software Version 1.0 RealShot Manager 2004 Sony Corporation Copyright Notice 2004 Sony Corporation. All rights reserved. This manual may not be reproduced,
FOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process
USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,
Fax User Guide 07/31/2014 USER GUIDE
Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section
Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide
Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is
HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE
You can read the recommendations in the user guide, the technical guide or the installation guide for HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE. You'll find the answers to all your questions on the HP EMAIL
Activelock Customer Management 1.0
Activelock Customer Management 1.0 Mark Bastian January 19, 2009 Contents Overview... 3 Activelock EULA... 3 Activelock Customer Management Forms... 4 Main Menu... 4 Customer Management... 5 New Software
NETGATE Data Backup. User Manual. Document version 1. 1 EN ( 17. 10. 2010 ) Copyright (c) 2010 NETGATE Technologies s.r.o. All rights reserved.
NETGATE Data Backup User Manual Document version 1. 1 EN ( 17. 10. 2010 ) Copyright (c) 2010 NETGATE Technologies s.r.o. All rights reserved. Content 1. Introduction... 3 1.1. Basic Concepts... 3 1.1.1.
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
Outlook E-Mail. Step 1: Open and Configure Outlook
Outlook E-Mail Step 1: Open and Configure Outlook 1. Click the Microsoft Button in the lower left task bar 2. Select All Programs 3. Select Microsoft Office 4. Select Microsoft Outlook 5. Follow the Start
DigiDelivery Client Quick Start
DigiDelivery Client Quick Start Installing the DigiDelivery Client To download and install the DigiDelivery client software: 1 Launch your Web browser and navigate to www.digidesign.com/digidelivery/clients.
The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department.
The Reprographics E-Copy Process The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department. FTP Site Submission For Print Job Files FTP Print Job Submissions
Stellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
Configuring Microsoft Internet Information Service (IIS6 & IIS7)
Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Guide Last revised: June 25, 2012 Copyright 2012 Nexent Innovations Inc.
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
HMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
Avaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
Credit Card Encryption 9.0
N O D U S T E C H N O L O G I E S, I N C. Credit Card Encryption 9.0 User s Guide Nodus Technologies, Inc. 250 West First Street Suite 302 Claremont, CA 91711 Phone 909.482.4701 Fax 909.482.4705 i Copyright
Figure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
Transferring Your Hosting Account
Transferring Your Hosting Account Setting up your Web site on our secure hosting servers So you want to host your Web site on our secure servers, but you want to avoid costly mistakes and excessive site
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
Overview of edx Analytics
Overview of edx Analytics I. Data Available from edx EdX provides researchers with data about your institution's classes running on edx.org and edge.edx.org. This includes: Course data Student information
Price list update. What this exercise is about... 2. What you should be able to do... 2. Introduction... 2. Requirements... 2
Copyright IBM Corporation 2011 All rights reserved IBM WebSphere Commerce V7 Feature Pack 2 Lab exercise Price list update What this exercise is about... 2 What you should be able to do... 2 Introduction...
Creating Reports with Microsoft Dynamics AX SQL Reporting Services
Creating Reports with Microsoft Dynamics AX SQL Reporting Services. Table of Contents Lab 1: Building a Report... 1 Lab Objective... 1 Pre-Lab Setup... 1 Exercise 1: Familiarize Yourself with the Setup...
STEP 01 Nortel Contivity VPN Client Installation
STEP 01 Nortel Contivity VPN Client Installation The screen shots below may not be exactly what you see while installing the Contivity VPN Client on your PC. Different browsers and operating systems may
PayFlex FTP - Wired Commute
PayFlex FTP - Wired Commute What is FTP? FTP stands for File Transfer Protocol. PayFlex uses FTP to send and receive files from our clients. We do so through a secure website that uses PGP encryption to
Kaspersky Password Manager USER GUIDE
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
Installing SQL Express. For CribMaster 9.2 and Later
Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
DEP S REMOTE ACCESS USER GUIDE
DEP S REMOTE ACCESS USER GUIDE Office of Technology and Information Services June 2015 Table of Contents DEP s Remote Desktop Access User Guide... 2 How do I obtain access?... 2 List of software available
Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents
Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe
Skipjack ezpay Secure Online Order Form User Guide
Skipjack ezpay Secure Online Order Form User Guide About this Document...3 Copyright Notice... 3 Publication History... 3 Documentation Conventions... 4 Assumptions Used in this Guide... 4 Obtaining Additional
RemotePC Lite User Manual. Table of Contents
RemotePC Lite User Manual Table of Contents Introduction... 3 System Requirements... 3 Features... 4 Installing the RemotePC Lite application... 5 Login to RemotePC Lite... 7 Working with RemotePC Lite...
Microsoft Business Contact Manager Version 2.0 New to Product. Module 4: Importing and Exporting Data
Microsoft Business Contact Manager Version 2.0 New to Product Module 4: Importing and Exporting Data Terms of Use 2005 Microsoft Corporation. All rights reserved. No part of this content may be reproduced
FileCruiser. Desktop Agent Guide
FileCruiser Desktop Agent Guide FileCruiser Desktop Agent Guide Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using
