Acer edatasecurity Management



Similar documents
Acer edatasecurity Management

Acer erecovery Management

Acer erecovery Management

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2

Acer erecovery Management

You may have been given a download link on your trial software . Use this link to download the software.

USER MANUAL. v Windows Client January

Backing up Microsoft Outlook For the PC Using MS Outlook 2000 Keith Roberts

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

Encrypting Files Using AxCrypt

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

MICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD

The FTP Monitor application performs the following main functions:

Using Entrust certificates with Microsoft Office and Windows

Encryption. Introduction to using 7-Zip

User Guide. Version 3.0 April 2006

4. Click Next and then fill in your Name and address. Click Next again.

Built-In Backup. For best results: Set up Backup after hours. Carefully apply the recommended settings

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...

HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl

Built-In Backup. For best results: Set up Backup after hours. Carefully apply the recommended settings

Driver Updater Manual

SQL EXPRESS INSTALLATION...

Aspera Connect User Guide

Passport Installation. Windows XP + Internet Explorer 8

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

BitLocker To Go USB Flash Drive encryption User Guide

Online Backup and Recovery Manager Setup for Microsoft Windows.

Yale Software Library

Identity Finder: Managing Your Results

Archiving your mail with Outlook 2003

Known Issues and Work Around

MAC/OSX - How to Encrypt Data using TrueCrypt. v

UC Express Quick Start Guide

PKZIP 6.0. Command Line for Windows Getting Started Manual

Only smart people read the manual.

BillQuick Installation Guide for Microsoft SQL Server 2005 Express Edition

eshuttle Dictate Manual Software Version 1.0

TrustKey Tool User Manual

Personal Vault. User Guide

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p

BounceBack User Guide

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

Bates Gmail Labels, Filters, and Signatures

How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data

Guide: Using Citrix for Home/ Office

Using MioNet Senvid Inc. User Manual Version 1.07

Internet Address: cloud.ndcl.org

Interact for Microsoft Office

How to setup Backup Anywhere on your local PC

Fairfield University Using Xythos for File Sharing

Lenovo Online Data Backup User Guide Version

Table of Contents. Page 3

TPM. (Trusted Platform Module) Installation Guide V2.1

Detecting and Removing Spyware From Your Home Computer

Common SofTest Troubleshooting Techniques

NetBak Replicator 4.0 User Manual Version 1.0

DigitalPersona Privacy Manager Pro

MessageGuard 3.0 User Guide

FreeFlow Accxes Print Server V15.0 August P Xerox FreeFlow Accxes Print Server Drivers and Client Tools Software Installation Guide

Bulk Downloader. Call Recording: Bulk Downloader

Capture Pro Software FTP Server Output Format

How To Send An Encrypted In Outlook 2000 (For A Password Protected ) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Saf ) On An Iphone Or

To successfully initialize Microsoft Outlook (Outlook) the first time, settings need to be verified.

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Quick Start Guide. Laplink Software, Inc. Quick Start Guide MN-LLTLBR-EN-05 (REV. 02/2010) h t t p : / / w w w. l a p l i n k.

How to Password Protect Files & Folders in Mac OS X with Disk Images

The online environment

How To Install Ru-Vpn On A Pc Or Macbook Or Ipad (For Macbook) With A Microsoft Macbook (For Pc) With An Ipad Or Ipa (For A Macbook). Pc (For An

How to install and use the File Sharing Outlook Plugin

HP ProtectTools for Small Business Security Software, Version User Guide

User Guide. Active Online Backup - Secure, automatic protection

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY

Time Stamp. Instruction Booklet

KeepVault Online Backup Quick Start Guide & User Manual

Guide to Installing BBL Crystal MIND on Windows 7

Symantec Enterprise Vault

HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL)

Installing VPN for PC v1.3

SOS Suite Installation Guide

Encrypting a USB Drive Using TrueCrypt

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

Stellar Phoenix Exchange Server Backup

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

HDD Password Tool. User s Manual. English

Passport installation Windows 8 + Firefox

Guide how to protect your private data with Rohos Disk Encryption

Capture Pro Software FTP Server System Output

Olathe District Schools 1 of 11 GroupWise 7

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

Step by step guide how to password protect your USB flash drive

Scheduling WebEx Meetings

1. Scope of Service. 1.1 About Boxcryptor Classic

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Transcription:

1 Acer edatasecurity Management By applying the most advanced cryptographic technologies, Acer edatasecurity Management offers Acer PC users greater personal data security and encryption for files and data transmitted via instant messaging or email. Warning: Files that you should not encrypt: To ensure optimum system stability, you should not attempt to encrypt any of the following folders, or files in them: * C:\WINDOWS * C:\Program Files * Acer edatasecurity Management program folder Encrypting any of these folders or files contained within them may cause serious system instability that could require you to reinstall your operating system, which will delete all your personal data. Using Acer edatasecurity Management You can launch Acer edatasecurity Management in a number of ways: From the Start menu, go to Start > (All) Programs > Empowering Technology > Acer edatasecurity Management. By clicking on the Empowering Technology icon from your desktop, or pressing the < > key to launch the Empowering Technology user interface. Select the Acer edatasecurity Management icon.

2 This will open the Acer edatasecurity Management main page. Password The passwords you set up are the keys to encrypting and decrypting files. Make sure you keep your passwords in a secure place, and try to choose passwords that are not easy to guess. Setting up passwords Before you can use Acer edatasecurity Management, you will need to set up your default encryption password and your supervisor password. When you're installing Acer edatasecurity Management, or when you use it for the first time, you will be prompted to set up these passwords. If you forget these passwords, you will not be able to decrypt or recover your data, so it is important to keep your passwords in a safe place.

3 Password rules The passwords you select must be between four and 12 characters in length. They can consist only of letters, numbers and the following special characters: = Equal sign - Minus sign [ Left bracket ] Right bracket. Period, Comma ; Semi-colon / Forward slash \ Backslash Supervisor password Your supervisor password can be used to decrypt any file that you have encrypted. This is a last resort in the event that you've forgotten the password you used to encrypt the file. You should not let other people know what your supervisor password is. The supervisor password will only work on the computer that you originally used to encrypt the file. Important: The supervisor password can also be used to override the default password for changing any settings in Acer edatasecurity Management. You can change your supervisor password at any time you wish, from the system setup window; however, this is a time-consuming process, and involves some degree of risk.

4 Changing the supervisor password Step1: From the system settings window, choose Change Supervisor Password. Step 2: Click on Change Supervisor Password. Step 3: You will need to enter the existing supervisor password, and then enter the new password twice.

5 Step 4: Once you've done this, Acer edatasecurity Management will scan your system for any encrypted files, and implement the change. You should not abort this process, or allow Windows to shut down before the process is complete. If the process is interrupted, it will continue next time you start up your computer. If the program is unable to process all the encrypted files, you will be informed of which files were unable to be processed and the likely reasons why. You will need to close any programs that might be using the encrypted files, and reboot your system. Then click Retry File Update to complete the process. Step 5: File update completed

6 Default encryption password Your default encryption password will be used for all encryption requirements, unless you specify a unique password. Any files encrypted after you change this password will require the new password to open them. Any files encrypted before you change the password will require the original password to open them. Changing the default password Step1: Click on Change Default Password for File Encryption Step 2: Enter the original password and enter the new password twice.

7 Encryption strength Acer edatasecurity Management offers you three levels of encryption: Low (128 bits) Medium (192 bits) High (256 bits) Note: The default setting is Medium. All three levels offer a high degree of security, but there is a trade-off in terms of the amount of time it takes to encrypt and decrypt the files: the higher the level of encryption chosen, the longer the processing time.

8 File and Folder Encryption Acer edatasecurity Management offers you the added security of passwordprotecting personal files and folders, or files sent via instant messenger or email. The file encryption tool is integrated into the right-click function of Microsoft Windows, making it easy for you to encrypt or decrypt a file at any time. When you select a file to encrypt, you're asked if you want to use your default encryption password, or if you want to specify a different password for encryption.

9 A file that has been encrypted will be displayed with a different icon, and file extension. File and Folder Decryption Right-click on an encrypted file, and select the decrypt function. You will be required to enter the correct password, and select whether you want the file opened once it's been decrypted. Once the password has been entered, Acer edatasecurity will decrypt the file, and if selected, open the file. Sending Other People Encrypted Files You can choose to encrypt any file that you send to someone using MSN Messenger or Microsoft Outlook. By default, Acer edatasecurity Management activates encryption of files sent via MSN Messenger. To disable this feature, open MSN Messenger, click Tools and uncheck Enable File Transfer Encryption. You can select to encrypt files that you send by email. Acer edatasecurity Management is integrated into the Microsoft Outlook toolbar, offering you one-click attachment encryption. The encrypted file will be sent as a self-extracting '.exc' file, so there is no need for the receiver to have Acer edatasecurity Management installed on their computer. The receiver will need to save the file to their hard disk, and change the file extension to '.exe' before they are able to decrypt the file.