PGP Desktop Encrypting Removable Media. May Version 1.3
|
|
|
- Berniece Thomas
- 10 years ago
- Views:
Transcription
1 PGP Desktop Encrypting Removable Media May Version 1.3
2 Table of Contents Introduction... 3 Installation Notes... 3 Encrypting Removable Media... 5 Adding and Deleting Users Changing a Passphrase Deleting a User... 13
3 Introduction Protecting Data on External Drives All Xerox computer drives must be encrypted to protect company and client data. The following procedures show you how to encrypt external drives such as peripheral hard drives and USB flash drives (sometimes called thumb drives) using PGP Desktop. The PGP Desktop disk encryption software allows employees to encrypt the drive and also add a user that can access the decrypted data if it has to be shared. You must have PGP Desktop disk encryption software installed on your computer to complete these procedures. Note: Company security policies prohibit any employee from storing company or client data on their personal data storage devices. Use only company owned and provided to store data. Installation Notes Print this document for reference before beginning the procedure. ATTENTION LAPTOP USERS: Do not disconnect the AC power from your computer during this process. Doing so could cause a loss of data. Process Note: After the encryption is complete, you will not be able to access this newly encrypted drive or media on a PC that does not have PGP installed. You must also enter the correct passphrase to be able to access the data on the disk. 1. Connect the drive needing encryption, to your PC Note: If you are encrypting a USB flash drive (thumb drive), skip ahead to Step 3. If you are encrypting an external (peripheral) hard drive, proceed to the next step. 2. Run Windows Check Disk (chkdsk.exe) on the hard drive and repair any disk errors found otherwise, the encryption process could be interrupted.
4 a. Double click on your My Computer icon on the Desktop b. Right click on the disk to be encrypted and select Properties c. Click on the Tools tab and then click on the Check Now button under Error-Checking d. Select Automatically fix file system errors and click on Start. Once complete, close the window and continue to the next step below. Note: Power Failure Safety While you can pause the encryption process at any time by properly shutting down or restarting your computer, it is exceptionally important to avoid unexpected shutdowns (power failures, power cord gets pulled out, and so on). If this is a possibility for you or; if you do not have an uninterruptible power supply for your computer; consider choosing the Power Failure Safety option. When Power Failure Safety is selected, encrypting is logged. If the power fails, the encryption process can safely and accurately resume where it was interrupted. However, this option can cause initial encryption to take several times longer to complete. This is also useful when encrypting USB devices. Interrupting encryption by removing a USB device during encryption can corrupt the device causing loss of data and require that it be reformatted. Encrypting with Power Failure Safety mode permits you to remove the USB device during encryption and resume encryption once it is reinserted.
5 Encrypting Removable Media 1. Open your PGP Desktop program by clicking on the Start menu. Select Programs > PGP > PGP Desktop 2. Click on Encrypt Whole Disk or Partition on the right side of your screen
6 3. Select the external drive that you wish to encrypt and check the box for Maximum CPU Usage. 4. At the bottom of the screen, click on New Passphrase User
7 5. At the PGP Disk New User window enter your WIN ID in the username field. Create and confirm a unique passphrase and then click OK. 6. After completing the step above, you will have a new user listed in the User Access section of your PGP Desktop window similar to what you see below.
8 7. Click on Encrypt at the top right-hand corner. 8. A PGP Alert window will pop-up notifying you of the encryption process. Click on Yes to begin the process. Note: Encryption times will vary depending on the size of the drive. The disk encryption progress and estimated completion time will be displayed
9 9. You may now close PGP Desktop and the encryption will continue in the background while you work 10. Once the encryption is complete, another dialog box will appear stating that the encryption has stopped Note: After the encryption is complete, you will not be able to access this newly encrypted drive on a PC that does not have PGP installed. You must also enter the correct passphrase to be able to access the data on the disk.
10 Adding and Deleting Users If you have an encrypted drive that you need to share with another authorized person, you can add another user for access using a passphrase you set up for them. Note: The employee responsible for the drive is responsible for securing passphrases for the drive ensuring only authorized employees have access. It is also the employee s responsibility to delete any user as needed in the event that a user s access status changes, i.e., as in some changing jobs. 1. From the PGP Desktop screen, select the drive that you wish to add a user. You then see the specific Disk Properties and User Access info..
11 2. In the User Access section, click on the New Passphrase User... button. 3. As a security precaution, the system prompts you to enter passphrase to unlock disk. Enter the passphrase you set up for yourself to access the disk (drive) and click on OK. 4. At the Create New User window), enter the username or address of the new user. Then, enter the passphrase (using at least eight characters) you choose for the new user and confirm it below. There is not a minimum passphrase quality standard. Click on OK. 5. You will now see the new user added to the list of all users with access.
12 Changing a Passphrase You may change a user s passphrase anytime by selecting the user s name from the list and clicking on the Change Passphrase... button to the right. Fill out the onscreen information as you did in the procedure above.
13 Deleting a User You may delete a user (and their access) anytime by selecting the user s name from the list and clicking on the Delete User... button to the right. You will be prompted to reaffirm the deletion. Click on Yes.
Yale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
MiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
WARNING!!: Before installing Truecrypt encryption software on your
Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer
Database Program Instructions
Database Program Instructions 1) Start your Comparative Rating software by double-clicking the icon on your desktop. 2) Click on the button on the Comparative Rating Software Main Menu. 3) A message Loading
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4
MBC WiFi wireless logon: Windows 7 (laptop)
Connecting to the MBC Guest wireless network requires: FAQ s at end of document A. A connection to the wireless network SSID (identifier for a wireless LAN) from your laptop. B. Authentication to the MBC
Cleaning your Windows 7, Windows XP and Macintosh OSX Computers
Cleaning your Windows 7, Windows XP and Macintosh OSX Computers A cleaning of your computer can help your computer run faster and make you more efficient. We have listed some tools and how to use these
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
BounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
Using BitLocker to encrypt a Windows 8 device
Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10,
Symantec Endpoint Encryption Full Disk for Mac OS X
Symantec Endpoint Encryption Full Disk for Mac OS X User's Guide 8.2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
As your financial institution completes its system conversion, you
QuickBooks Business Accounting Software 2007 2009 for Windows Account Conversion Instructions Converting from Direct Connect to Web Connect As your financial institution completes its system conversion,
Laptop Backup - User Guide (Windows)
Laptop Backup - User Guide (Windows) Page 1 of 14 Page 2 of 14 Laptop Backup - User Guide - (Windows) TABLE OF CONTENTS INSTALLATION MONITOR RESTORE ADVANCED OPTIONS Adding Backup Content Filtering Contents
Sending Files to a Social Security Laptop
Sending Files to a Social Security Laptop Introduction There are multiple options to send files to your Social Security laptop. A couple of options are to encrypt files and then send them by email or transfer
CBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
UPS Monitoring and Management Software
UPS Monitoring and Management Software LEN.MAN.SOF.141 Rev.1.00/2008 User s Guide: Easy-Mon X 1. Configuration Before Easy-Mon X software can display the electrical data of LEONICS UPS, user has to configure
DISTRICT SCHOOL BOARD OF COLLIER COUNTY. Internet Technology. Setting up VPN Access Windows 7. Revised 9-4-09
DISTRICT SCHOOL BOARD OF COLLIER COUNTY Internet Technology Setting up VPN Access Windows 7 I N T E R N E T T E C H N O L O G Y Setting up VPN Access Windows 7 District School Board of Collier County Dr.
Three Rivers Community College Wireless Network
Three Rivers Community College Wireless Network TRCC s Information Technology Division offers free wireless network connectivity for students. The network grants students high-speed access to the Internet
System update procedure for Kurio 7 (For build number above 110)
System update procedure for Kurio 7 (For build number above 110) IMPORTANT NOTE: Before starting the procedure, please check your current Android build number, that can be found as follows: exit the Kurio
How to Use JCWHosting Reseller Cloud Storage Solution
How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your
Windows Symantec Encryption Desktop (PGP) Install Guide. Symantec Encryption Desktop (PGP) Windows system requirements
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > Windows Symantec Encryption Desktop (PGP) Install Guide
HDD Password Tool. User s Manual. English
HDD Password Tool User s Manual English 1 Table of Contents Chapter 1: Introduction... 3 Trademarks... 3 Chapter 2: Required Operating System... 5 - HDD Password Tool for Windows... 5 - HDD Password Tool
How to install bentley software with license
How to install bentley software with license Follow the instruction for license key given below (screen shot step by step) : Step 1 : Visit to this link www.bentley.com/studentserver and register. Step
Cyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
Understanding offline files
Understanding offline files Introduction If you've ever needed to access important files stored in a shared folder on your network but couldn't because the network connection was unavailable, then you
Using Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
Joining an XP workstation to a domain Version 1.00
Joining an XP workstation to a domain Version 1.00 All Windows XP Professional workstations need to be joined to a domain to function as part of the domain security environment. Need to Know TM 1. To join
Serial ATA RAID PCI. User's Manual
Serial ATA RAID PCI User's Manual Chapter 1 Introduction Table of Contents 1-1 Features and Benefits. 1 1-2 System Requirements. 1 Chapter 2 RAID Arrays 2-1 RAID Overview.. 2 2-1.1 RAID 0 (striping)...
First Time On-Campus VLab Setup Windows XP Edition
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
Setting up and using an external USB Flash Drive (Thumb Drive) on your Mac
Setting up and using an external USB Flash Drive (Thumb Drive) on your Mac IMPORTANT! Backup your flash drive data! 1. Plug in the external flash drive into a USB port with enough power. This is usually
McAfee Endpoint Encryption (SafeBoot) User Documentation
TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current
PGP Whole Disk Encryption Quick Start Guide Version 9.8
PGP Whole Disk Encryption Quick Start Guide Version 9.8 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data
CANON FAX L360 SOFTWARE MANUAL
CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation
User Guide HUAWEI UML397. Welcome to HUAWEI
User Guide HUAWEI UML397 Welcome to HUAWEI 1 Huawei UML397 4G LTE Wireless Modem User Manual CHAPTER 1 BEFORE USING YOUR UML397 WIRELESS MODEM ABOUT THIS USER MANUAL...4 WHAT S INSIDE THE PRODUCT PACKAGE...4
Orthopaedic In-Training Examination User Manual Step-by-Step for PC
Orthopaedic In-Training Examination User Manual Step-by-Step for PC AAOS Evaluation Committee AAOS Evaluation Programs Howard Mevis, Director, Laura Hruska, Manager, Examinations Marcie Lampert, Senior
GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71
GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71 Copyright 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Introduction This
For Mac User Directions, see page 5
Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network
Chapter 6 Window Operations
Chapter 6 Window Operations... 2 6.1 Window Types... 2 6.1.1 Base Window... 2 6.1.2 Fast Selection Window... 2 6.1.3 Common Window... 3 6.1.4 System Message Window... 3 6.2 Create, Set, and Delete a Window...
Administrator User Instructions- Master PIN Usage
Administrator User Instructions- Master PIN Usage LOK-IT USB Drives are supplied by the University as a method to safely transport data. They are not intended to be used for primary data storage. The LOK-IT
B&SC Office 365 Email
B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.
Instructions for connecting to the FDIBA Wireless Network. (Windows XP)
Instructions for connecting to the FDIBA Wireless Network (Windows XP) In order to connect, you need your username and password, as well as the FDIBA Root Certificate which you need to install on your
How To Install Ru-Vpn On A Pc Or Macbook Or Ipad (For Macbook) With A Microsoft Macbook (For Pc) With An Ipad Or Ipa (For A Macbook). Pc (For An
RU-VPN Installation Instructions (Windows Vista and Windows 7) An RU-VPN id allows authorized users to access Ryerson s Administrative Systems via the internet. RU-VPN utilizes a digital certificate that
Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
USER MANUAL DataLocker Enterprise
USER MANUAL DataLocker Enterprise ------------------------ March 2014 ------------------------ 1 Contents At a Glance Advanced 3 Introduction 17 Special features 5 About the Enterprise 19 Master admin
You can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC
MaxMobile 10.5 for Windows Mobile Pocket PC Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Pocket PC provides you with a way to take your customer information on the road. You can
Windows 7 Hard Disk Recovery
In order to restore your hard drive back to the original factory settings you will need to do the following: 1) Press the start button and in the search area type Recovery 2) From the search results, launch
Quick Start Guide NVR DS-7104NI-SL/W NVR. www.hikvision.com. First Choice For Security Professionals
Quick Start Guide NVR DS-7104NI-SL/W NVR NOTE: For more detailed information, refer to the User s Manual on the CD-ROM. You must use your PC or MAC to access the files. www.hikvision.com Quick Start 1.
Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
Windows 7 Upgrade information
Windows 7 Upgrade information Notes on Upgrading to Windows 7 About Restrictions on your computer About Restrictions on the Sony software products About Restrictions on the third-party software products
Connecting to Wireless in Windows Vista
Connecting to Wireless in Windows Vista Reference: http://www.microsoft.com/technet/community/columns/cableguy/cg0406.mspx http://www.microsoft.com/technet/network/evaluate/hiddennet.mspx http://www.csd.toshiba.com/cgibin/tais/su/su_sc_dtlview.jsp?soid=1524510&moid=null&bv_sessionid=@@@@0175
How do I Install and Use the Cisco VPN Any Connect Client for the Berkeley Campus?
Haas How do I Install and Use the Cisco VPN Any Connect Client for the Berkeley Campus? The Cisco virtual private network (VPN) client allows a computer to make secure network connections via specific
For paid computer support call 604-518-6695 http://www.netdigix.com [email protected]
Setting up your vpn connection on windows 2000 or XP in continuation from installing x.509 certificate on windows (please do not continue if you have not installed your x.509 certificate): Instructions
Connecting to eduroam using Windows 8
Connecting to eduroam using Windows 8 GUIDE User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission.
Samsung Drive Manager User Manual
Samsung Drive Manager User Manual The contents of this manual are subject to change without notice. Companies, names and data used in examples are not actual companies, names or data unless otherwise noted.
Wireless Printing Setup Guide
Temple University Beasley School of Law Wireless Printing Setup Guide Updated August, 2012 Temple Law Computer Services 8/27/2012 Table of Contents Computer Operating System Page Windows 7 2 Windows Vista
DPMS2 McAfee Endpoint Encryption New Installation
DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important
Weston Public Schools Virtual Desktop Access Instructions
Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which
Using SSH Secure File Transfer to Upload Files to Banner
Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system
2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1.
2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1. The suggested interface for your computer is USB2.0 to have better
2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
Setting up RDP on your ipad
This document will show you how to set up RDP (Remote Desktop Protocol) on your ipad. It will cover the following: Step 1: Creating an itunes account (if necessary) Step 2: Using the App Store Step 3:
Using TViX Network. NFS mode : You must install the TViX NetShare utility in to your PC, but you can play the TP or DVD jukebox without stutter.
Using TViX Network There are two network mode. One is SAMBA mode another is NFS mode. SAMBA mode : You can play the file via network without special program, but the speed is lower than NFS mode. ( Currently,
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
Data Recovery Cable Quick Start Guide
Data Recovery Cable Quick Start Guide DISCLAIMER: any repair or computer recovery should be done by a professional, trained computer technician. Do any of the below steps at your own risk. We are not responsible
NTI CORPORATION. NTI Backup Now EZ v3. User's Guide
NTI CORPORATION NTI Backup Now EZ v3 NTI Backup Now EZ v3 User's Guide Backup Now EZ v3 User's Guide 2013 NTI Corporation i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ... 5 OVERVIEW
Colorfly Tablet Upgrade Guide
Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be
MiVoice Integration for Salesforce
MiVoice Integration for Salesforce USER GUIDE MiVoice Integration for Salesforce User Guide, Version 1, April 2014. Part number 58014124 Mitel is a registered trademark of Mitel Networks Corporation. Salesforce
Installing Novell Client Software (Windows 95/98)
Installing Novell Client Software (Windows 95/98) Platform: Windows 95/98 Level of Difficulty: Intermediate The following procedure describes how to install the Novell Client software. This software allows
TAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
LogMeIn Backup. User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
Welcome to MaxMobile. Introduction. System Requirements
MaxMobile 10.5 for Windows Mobile Smartphone Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Smartphone provides you with a way to take your customer information on the road. You can
1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
Adding Digital Signature and Encryption in Outlook
Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be
Steps for using MagicConnect
Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,
Maintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device
Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device Prerequisites An activated MyID account is required to use ResNet s wireless network. If you have not activated your MyID account,
Encrypt USB Drive to Protect Data
Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external
An Informational User Guide for: Web Conferencing
Allows You to: Manage your audio conference online using easy point and click conference commands Show slide presentations and graphics to meeting participants Show your desktop to meeting participants
Quick Start Guide: Mac vpad September 2007
Quick Start Guide: Mac vpad September 2007 Toll-Free: 866-746-3015 Page 1 of 23 www.turningtechnologies.com Installing vpad 1. Request the vpad download from the Downloads section of www.turningtechnologies.com.
Schools CPD Online General User Guide Contents
Schools CPD Online General User Guide Contents New user?...2 Access the Site...6 Managing your account in My CPD...8 Searching for events...14 Making a Booking on an Event...20 Tracking events you are
SecureLock Tool Functions:
The SecureLock utility allows users to manage the Axiom EHP Flash disk by setting passwords to the secure partition and adjust the partition size. This guide will illustrate the steps required in order
Yale Software Library
e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or [email protected] Installation PGP Desktop for Windows Operating Systems Preparing your computer:
How do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
USB Flash Memory Security Software Installation Manual. USB Flash Memory. TransMemory. Security Software Installation Manual
USB Flash Memory TransMemory Security Software Installation Manual TNP-A004G TNU-A064G TNU-A032G TNU-A016G TNU-A008G TNU-A004G TNU-W016G Toshiba Semiconductor & Storage Product Company Memory Application
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
Bulk Downloader. Call Recording: Bulk Downloader
Call Recording: Bulk Downloader Contents Introduction... 3 Getting Started... 3 Configuration... 4 Create New Job... 6 Running Jobs... 7 Job Log... 7 Scheduled Jobs... 8 Recent Runs... 9 Storage Device
Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1
Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008
Shearwater Research Dive Computer Software Manual
Shearwater Research Dive Computer Software Manual Revision 1.3 Table of Contents 1. Basic overview of components 2. O/S IrDA driver installation 2.1 USB IrDA installation for Windows XP Home/Pro editions
HOW TO USE OIT EMAIL VIA THE WEB
HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the
Citrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
Vonage V-Phone welcome to vonage
Vonage V-Phone Welcome to the New Way to Phone! SM welcome to vonage Getting Started is Easy! SM WK060524 Welcome Start Saving Now! IT S AS EASY AS Questions? Please visit us at: www.vonage.com/help Note:
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD
Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD Version 1.3 This tutorial will walk you through how to create a bootable USB drive and how to apply the newest firmware S5FAM030 to
Operating Instructions - Recovery, Backup and Troubleshooting Guide
Personal Computer Operating Instructions - Recovery, Backup and Troubleshooting Guide Please create your recovery discs immediately after setup. Please read this manual carefully before using your product.
