( ://.. / ) ( ://. / )



Similar documents
1 of 8 3/7/2014 8:38 AM

Outlook 2010 Setup Guide (POP3)

Set Up Setup with Microsoft Outlook 2007 using POP3

For Windows Microsoft Corporation. All rights reserved.

Booth Gmail Configuration

Using TrueCrypt to protect data

Lync 2013 Quick Reference Lync Meetings. Join a Lync Meeting. Schedule a Lync Meeting. Do I need a PIN, work number or extension? Set meeting options

Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: Copyright 2014 Smarsh, Inc. All right reserved

Encrypting a USB Drive Using TrueCrypt

How to use Office 365 with your OneDrive File Storage Facility

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Jumble for Microsoft Outlook

IMAP and SMTP Setup in Clients

SENDING S & MESSAGES TO GROUPS

HEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team

Google Apps Migration

SECURE USER GUIDE OUTLOOK 2000

Personal Secure Certificate

dobe Acrobat XI Pro Digital Signatures

HOSTED DESKTOP MANUAL

How to set up your Secure in Outlook 2010*

Installing the Virtual Desktop Application (MAC)

Basics. For more information on the Library and programs, visit BCPLS 08/10/2010 PEMA

B&SC Office 365

DigiDelivery Client Quick Start

Lync Guide for Faculty and Staff

etoken Enterprise For: SSL SSL with etoken

PaperClip. em4 Cloud Client. Setup Guide

Using Entrust certificates with Microsoft Office and Windows

Rev. 06 JAN Document Control User Guide: Using Outlook within Skandocs

You can find the installer for the +Cloud Application on your SanDisk flash drive.

3. On the Accounts wizard window, select Add a new account, and then click Next.

Appendix A: Encrypting a File and / or Message

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

educ Office Remove & create new Outlook profile

Life after Microsoft Outlook Google Apps

Instruction Manual for BicDroid QDocument

Getting started with IMAP for Aggi What is IMAP?

Using etoken for Securing s Using Outlook and Outlook Express

4. Click Next and then fill in your Name and address. Click Next again.

User guide. Business

Encryption. Introduction to using 7-Zip

Team Foundation Server 2012 Installation Guide

Lync Online Meeting & Conference Call Guide

IM, Presence, and Contacts

Zimbra to Gmail Migration

Adobe Digital Signatures in Adobe Acrobat X Pro

Configuring Outlook 2016 for Windows

Online Registrations for Summer Programming Josh Muse & Hannah Peacock (hpeacock@colchestervt.gov)

Microsoft Office for Mobile Devices (iphone, Windows Phone, Android Phone or ipad)

INTRODUCTION TO & BASICS

Chapter 14: Links. Types of Links. 1 Chapter 14: Links

IT Quick Reference Guides Installing Office 365 from Kivuto Solutions

Set up Outlook for your new student e mail with IMAP/POP3 settings

User Manual - Secure Lock Ware

Fax User Guide 07/31/2014 USER GUIDE

Using FileMaker Pro with Microsoft Office

Getting a Free Comodo Certificate

OET Cloud Services Getting Started Guide

Transitioning Your School Account

DPMS2 McAfee Endpoint Encryption New Installation

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

6. If you want to enter specific formats, click the Format Tab to auto format the information that is entered into the field.

How to use FTP Commander

Mastering Lync Meetings

Using Zimbra Briefcase

Shentel (Shentel.net)

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Configure Outlook 2013 to connect to Hosted Exchange

TAMUS Terminal Server Setup BPP SQL/Alva

How to make the s you Send from Outlook 2010 appear to Originate from different Addresses

TPM. (Trusted Platform Module) Installation Guide V2.1

1 Login to your CSUF student account and click on the Settings icon ( ) at the far right.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Outlook XP Only

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

How to Password Protect Files & Folders in Mac OS X with Disk Images

MICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES

Web Conferencing Guide for Session Hosts using Microsoft Lync

How to Set Up Your. Account

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

SMS for Outlook. Installation, Configuration and Usage Guide

Lync 2013 User Instructions

Introducing OneDrive for Business

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

Internet and Help. Table of Contents:

Batch Eligibility Long Term Care claims

Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7

How to Setup an IMAP account in Outlook Express to Connect to Your Arrowmail Mailbox

Setting up in Outlook Express

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)

How to use Certificate in Microsoft Outlook

Remote Access: Internet Explorer

Zoho CRM and Google Apps Synchronization

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365

FORM SIMPLICITY QUICK REFERENCE GUIDE PROFESSIONAL/ULTIMATE EDITION

Using Microsoft Lync for Web Conferencing, Training & Support

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

Using Microsoft Office to Manage Projects

Transcription:

How to encrypt (almost) anything PCWorld 1 of 5 ( ://.. / ) ( ://. / ) @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes them a prime candidate for encryption. If you use Outlook, keeping your correspondence secure is easy. Outlook encryption is not password-based. Instead, everyone who wishes to use cryptographic security features in Outlook receives a digital certificate, which serves to automatically encrypt and decrypt messages. Before two users can send each other encrypted messages, they must share their certificates by sending each other digitally signed messages. It sounds sort of complicated, but the process is actually straightforward, and takes only a few moments. To set up Outlook for encrypted messaging, follow the steps in the official Microsoft guide (http://office.microsoft.com /en-us/outlook-help/get-a-digital-id-hp010355070.aspx?ctt=5&origin=hp010355563). Once you ve received and exchanged digital IDs, you can send an encrypted message by opening the new message window, clicking Options > More Options > Security Settings, and checking the box for Encrypt message contents and attachments.

ow to encrypt (almost) anything PCWorld of 5 Email security is a little different when you're using Gmail, as the messages are stored on Google s servers rather than on your local machine. When you compose or view email messages, they transfer over an encrypted HTTPS connection, so you don t have to worry about their being intercepted. Really, your primary security risk with Gmail is that somebody else will gain access to your account a risk you can minimize with good password practices and two-step authentication (http://support.google.com/accounts /bin/answer.py?hl=en&answer=180744). If you want to send a text email that absolutely nobody but its intended recipient can read, you can always use a browser-based encryption application (http://www.everpassword.com/aes-encryptor) to encrypt your message manually. Email the cyphertext (encrypted text) to the recipient, and then use some other channel to send the recipient the password they can then use the same Web app to decipher the message. In Office 2010 and 2013, you can encrypt any Word, Excel, or PowerPoint document the same way: Click File, make sure that the Info tab is selected, and then click the Protect Document button. Finally, click Encrypt with Password, and choose a strong password for your file. Anyone who wants to access this file will need the password. As always, it s not safe to send the password through the same channel that you use to send the file. Like the Microsoft Office products, Adobe Acrobat X Pro makes encrypting a file easy. The option is in the Tools tab at the upper right, in the Protection section. Click the Encrypt button, and then click the option labeled Encrypt With Password.

How to encrypt (almost) anything PCWorld 3 of 5 The cloud note-taking app Evernote (http://www.pcworld.com/article/2018409/evernoteceo-phil-libin-talks-evernote-business.html) is a great way to remember and organize important information, including account details, medical and financial records, and other sensitive data. If you feel uncomfortable leaving all that personal info out in the open, you should be relieved to know that Evernote has a built-in encryption feature. Simply open a note, highlight the text you want to hide, and right-click it. In the menu that pops up, select Encrypt Selected Text, and then create a password. Evernote hides the selected text, replacing it with a small lock icon. Whenever you want to view the text again, just double-click the icon and enter your password. Finally, I'm going to talk about a way to encrypt pretty much anything at all on your PC:

of 5 ow to encrypt (almost) anything PCWorld TrueCrypt (http://www.pcworld.com/article/231577/truecrypt.html). A free, open-source application, TrueCrypt lets you encrypt any file or collection of files on your PC. If your personal or business PC has a variety of sensitive documents that you want to protect, this is probably the best option for you. To use TrueCrypt, first download the program (http://www.truecrypt.org/), and then run the installer. The default installation options are fine, so just click through to the end. Next, run TrueCrypt and click the Create Volume button. A window will pop up to walk you through the volume-creation process. On the first two screens, leave the default options checked and click Next. On the third screen, you ll be asked to specify a volume location. This is where the encrypted data is going to be stored on your hard disk, so choose a location and a name that will be easy for you to remember. To specify the location, click Select File, which will open a file-browser window. Unlike with most file-browser windows, however, here you type a name into the Name field, and then a file of that name will be created for TrueCrypt to use. The next screen asks for encryption settings; the defaults are acceptable, so click Next. After that, you ll be asked to specify a volume size. All the files that you want to encrypt will have to fit into the volume, so make sure to allocate enough space. If you re storing just text documents, 500MB might be enough, but if you re storing lots of media, you ll want several gigabytes at least. Now you ll be asked for a password so pick a good one! Finally, after selecting a password, you will be able to finish the process. Follow the instructions on the final screen, and click Format. Now that your volume is created, you can use it to store files. In TrueCrypt, click Select File, and choose the volume file you just created. Then, click a drive letter and click Mount. After you enter your password, TrueCrypt creates a virtual drive, and the rest of your computer treats it as if you had just plugged in a real hard drive. You can access it as you do any other drive: by opening the file explorer and clicking its drive letter at the

of 5 ow to encrypt (almost) anything PCWorld left. Drag whatever files you want to encrypt onto the virtual hard drive; when you re done, click Dismount in TrueCrypt. The files you stored in the virtual hard drive are encrypted and stored inside your volume file. When you want to access them again, simply run TrueCrypt and mount the volume file just as you did earlier. 11 Uses for an Old PC (http://www.pcworld.com/article/209079/11_uses_for_an_old_pc.html) (http://www.pcworld.com/article/208113 /Best_Password_Managers_Top_4_Reviewed.html) (http://www.techpageone.com /technology/software/top-ten-tips-forusing-windows-8-with-a-keyboardand-mouse/) Best Password Managers: Top 4 Reviewed Sponsored Top 10 Tips for Using Windows 8 what's this?