Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.



Similar documents
Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Set Up Setup with Microsoft Outlook 2007 using POP3

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Outlook 2010 Setup Guide (POP3)

Distributing SMS v2.0

How To Install Database Oasis On A Computer Or Computer (For Free)

Getting started with IMAP for Aggi What is IMAP?

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

How To Send An Encrypted In Outlook 2000 (For A Password Protected ) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Saf ) On An Iphone Or

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Using TLS Encryption with Microsoft Outlook 2007

IMAP and SMTP Setup in Clients

Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: Copyright 2014 Smarsh, Inc. All right reserved

3. On the Accounts wizard window, select Add a new account, and then click Next.

Jumble for Microsoft Outlook

Using etoken for Securing s Using Outlook and Outlook Express

To configure Outlook Express for your InfoMetrics address:

SCOoffice Mail Connector For Microsoft Outlook. Installation Guide Outlook 2002

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

SECURE USER GUIDE OUTLOOK 2000

Configuring Outlook 2010 for Windows

Configuration for Professional Client Access

This information is provided for informational purposes only.

Transitioning Your School Account


Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

Configure Outlook 2007 for Brandeis Gmail

Set up Outlook for your new student e mail with IMAP/POP3 settings

NICCA User Guide for digitally signing Using Digital Signature Certificate (DSC) in Outlook Express

700 Fox Glen Barrington, Illinois ph: [847] fx: [847]

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

How to Reinstall SQL Server 2005

Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

How to use Certificate in Microsoft Outlook

NeoMail Guide. Neotel (Pty) Ltd

BSDI Advanced Fitness & Wellness Software

MICROSOFT OUTLOOK 2003

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

How to install and use the File Sharing Outlook Plugin

Exostar LDAP Proxy / Secure Setup Guide. This document provides information on the following topics:

BUSINESS CLASS POP3 END USER GUIDE TIME WARNER CABLE BUSINESS SERVICES VERSION 1.0, RELEASE 1.2

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Windows Live Mail Setup Guide

Using Entrust certificates with Microsoft Office and Windows

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Configuring Outlook 2013 For IMAP Connections

Managing Contacts in Outlook

Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager

Client configuration and migration Guide Setting up Thunderbird 3.1

Vodafone Text Centre User Guide for Microsoft Outlook

HGC SUPERHUB HOSTED EXCHANGE

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Migration Manual (For Outlook 2010)

Outlook Start Outlook, and click on mserver.wlu.ca. 2. From the Tools menu, choose Options

Webmail. Setting up your account

Migration Manual (For Outlook Express 6)

Lab: Data Backup and Recovery in Windows XP

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

USING SSL/TLS WITH TERMINAL EMULATION

New Mexico State University

Instructions for Microsoft Outlook 2003

Instructions. Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

UNI - WINDOWS. How to... Access your University on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer

PaperClip. em4 Cloud Client. Manual Setup Guide

All existing accounts will be listed. 2. Click Add and select Mail to add a new account (see Figure 2). Figure 1. Figure 2

BOTTOM UP THINKING SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

4cast Client Specification and Installation

NODE4 SERVICE DESK SYSTEM

Setting Up . on Your Touch by HTC

Installing LearningBay Enterprise Part 2

If you are not using a network environment (i.e. USB connection only) If you are using the printer in a network environment

How to configure your Windows PC post migrating to Microsoft Office 365

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Smart TPM. User's Manual. Rev MD-STPM-1001R

Configuring your client to connect to your Exchange mailbox

Installation Manual (MSI Version)

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

MessageGuard 3.0 User Guide

Configuring Your Suffolk on Outlook Express 6.x

Migrating helpdesk to a new server

Getting Started with your Hosted Microsoft Exchange 2010 Administrators Quick Start Guide to Hosted Exchange 2010

Xythos on Demand Quick Start Guide For Xythos Drive

Update Instructions

RoboMail Mass Mail Software

Configuring Outlook Express

Create Mail Profiles for Gmail, Yahoo or Hotmail Accounts for Outlook Windows

How To Upgrade Your Microsoft SQL Server for Accounting CS Version

Outlook Hosted Exchange Account Configuration

Lab - Data Backup and Recovery in Windows XP

NTI Backup Now EZ v2 User s Guide

DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2

QUANTIFY INSTALLATION GUIDE

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Getting Started with University Gmail

Transcription:

User Manual Follow these simple steps to install, configure, and use.

Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10 01

1 Installation is a free program. You can download the.zip file from http://www.gold-lock.com. Then unzip all the files to a folder called Gold Lock Desktop. Open that folder, and click on setup.exe to install the program. In order to install the program, you must be running Windows XP or Vista. You must also have the.net Framework installed. If you do not have.net installed, the installer will install.net automatically. During setup, the program may prompt you to allow installation to continue. Click Allow. You may also be asked whether you want to install for All Users or Just Me. Select Just Me. will now start automatically when you start your computer. If you need to start the program manually for any reason, click the Start button, then All Programs, and locate in your list of programs. When appear on your Taskbar. is running, an icon will 02

2 Configuration If you are using Microsoft Outlook, follow these steps. If you are using a different email client, the steps you take will be different, but the process is essentially the same. Click on the Tools menu, and then select Account Settings. Choose the email account you will use to send and receive encrypted emails. The account must be a POP3/SMTP type account. To verify that this email account is configured and working properly, click the Test Account Settings button in the dialog box that appears. You will also see two fields labeled Incoming mail server and Outgoing mail server (SMTP). The values in these fields may or may not be the same. 03

2 Configuration Then click Change. Now right-click the Choose Settings. icon on your Taskbar. When the Settings window opens, choose the E-Mail Accounts tab. In the box labeled POP3 host, enter the name of your incoming mail server from your email client. In the box labeled SMTP host, enter the name of your outgoing mail server. * If you are using Gmail as your POP3 provider, the following servers should to be used: POP3 - SSL:// pop.gmail.com SMTP - SSL:// smtp.gmail.com 04

2 Configuration Click OK to close the Settings window. Type 127.0.0.1 into your email client in place of both your incoming and outgoing mail servers. 05

2 Configuration Click Next, then click Finish. is now configured. 06

3 Use To send encrypted emails using, both you and the recipient must be using, and you must have the public key of the recipient. When you open an email from another person containing a public key, the sender's email address will be automatically entered in your Secure Recipients list. You will thereafter be able to send that person encrypted messages. When you send an email to anyone in your Secure Recipients list, will automatically encrypt your email message. There is no way for an attacker to read your encrypted email. If the recipient is not in your Secure Recipients list, the email will be sent normally, without encryption. In order for another person to send you encrypted messages, you must first send them your public key. To send someone your public key, simply send him or her an email message with GOLDLOCK in the subject line. You will be prompted to verify that you want to send your public key. If you do not see the verification prompt on your screen, look at your taskbar. The prompt will be one of the active program buttons; click it to open the prompt. Sending encrypted emails is as easy as 1-2-3 with! 07

4 Verification & Security Verification You can verify that an email sent to you has been encrypted by going to a webmail program such as www.mail2web.com. Log into your email account and try to open an encrypted email. You will be unable to do so. You would be unable to do so even with the assistance of modern supercomputers. The RSA-2048 security algorithm used by is completely secure against attackers. No one has ever been able to crack RSA-2048 encryption. Preventing Man In The Middle Attack To make sure that your key set is valid and secure, it is considered good practice to verbally verify it with your secure contacts once in a while. The best way to do so is to initiate a phone call, and read out the Public Key Hash next to each secure contact, and ask them to make sure the same number appear for them as My Public Key Hash. The public key hash is not the actual public key, but only a highly shortened representation of it, the hash cannot be used for decryption. 08

5 Backup & Restore Backup & Restore To backup your encryption keys and the public keys of your secure contacts, or to copy them to additional computers, go to the Backup/Restore tab on the Settings window of. Click the Browse button, and select the default path and file, or change the path and/or filename. Do not change the file extension (.xml). If you change the path and/or filename, make sure you enter the same path and filename in the Restore box. To back up your configuration and secure recipients list, click the Back up Your Settings button. To restore previously backed up settings, click the Restore Your Settings button. It is a good idea to do this periodically. If you upgrade to a newer version of, you must uninstall the old version first. Back up your settings before uninstalling. Then, after you have installed the new version, make sure the proper path 09

6 File Encryption File Encryption You can also use computer. to encrypt files securely on your Insert a USB flash drive into your computer. Create an empty folder on the flash drive with the name GOLDLOCK. Then right-click on a file you would like to encrypt, and choose Encrypt/Decrypt File. The first time you do this, will create a key in the GOLDLOCK folder on your flash drive. Now you can encrypt or decrypt any file on your computer, as long as you have plugged in the flash drive with the key. If the flash drive is not plugged in, you will be unable to open an encrypted file. The U.S. Government has approved the AES-256 file encryption algorithm used by for encryption of Top Secret materials. If you want to encrypt certain files using a different key, simply use a different flash drive and repeat the above process. will create a new key on the new drive. You will only be able to open files encrypted with any particular key using the drive containing that key, however. We highly recommend that you create a backup of the key, either by copying the GOLDLOCK folder on your USB flash drive to another flash drive, or by copying the key file inside the GOLDLOCK folder to a secure location. 10

URL: www.gold-lock.com Email: info@gold-lock.com