1 Start Ubuntu Privacy Remix

Size: px
Start display at page:

Download "1 Start Ubuntu Privacy Remix"

Transcription

1 Table of Contents 1 Start Ubuntu Privacy Remix Working with USB flash drives and diskettes Open extended TrueCrypt volume Open normal TrueCrypt Volume Open and store data in the container, or where are my files? Encrypt and decrypt files Compress and unzip files Searching files with Beagle Tasks and Schedules with Evolution Project planning with Planner Timekeeping with the Hamster Panel-Applet Secure saving of passwords with password manager FPM Overwriting of free space Close extended TrueCrypt volumes and create automatic backups Close normal TrueCrypt-Container Restoring data from backup Check Truecrypt Container for defects Rename and check storage media with the Disk Utility Quit Ubuntu Privacy Remix Start Ubuntu Privacy Remix Please refer to the instructions Set up Ubuntu Privacy Remix before the first use. Start the computer by inserting the Ubuntu-Privacy-Remix-DVD resp. USB drive. The computer is booting you see the Ubuntu-Privacy-Remix boot screen. By pressing Esc, a boot menu with various options can be accessed, otherwise the default selection starts automatically. After some time, the operating system will start and you see the following desktop:

2 2 Working with USB flash drives and diskettes An USB flash drive is simply inserted, automatically recognised and the content displayed in the window of the file manager: The file manager window can also be opened by double clicking the icon of the USB flash drive. Diskettes (floppy disks) are not recognised automatically. After having inserted a diskette, it needs to be mounted. To do this, select Applications System Tools Mount Floppy. Afterwards, the symbol of the diskette is visible on the desktop and a file manager window is being opened as well. Important: Before removing diskettes they have to be unmounted like USB flash drives, in order to avoid loss of data. To do this, in both cases click the icon on the desktop with the right mouse button (right-click) and select Unmount Volume. The USB flash drive or diskette can be removed as soon as the icon on the desktop has disappeared.

3 3 Open extended TrueCrypt volume Right-click the container file in the file manager and select Scripts extended TC volumes - open : A window to enter the password appears:

4 After entering the correct password and confirmation with OK the following message appears: The Extended TrueCrypt volume will now be displayed with an own icon and the file name of the container file on the desktop and the file manager. 4 Open normal TrueCrypt Volume If the container has the filename extension.tc, you can just double-click it and enter the passphrase (to close it, you still need to open TrueCrypt). TrueCrypt opens via Applications Security TrueCrypt. Select the container file by clicking on Select File. The device name of the drive in the left column of the pull-down menu is identical with the name of the icon of the drive on the desktop.

5 Now you can select any slot in the upper part of the window. After clicking on Mount and entering the password the volume is mounted. A new icon for the opened container appears on the desktop. When mounting the container the name will be formed with TrueCrypt and the respective slot number. (TrueCrypt1, TrueCrypt2 etc.). When mounting containers which were generated with older Truecrypt - versions, the advice shown below appears. It is reasonable, but not necessary, to replace those containers by newly generated.

6 Attention with ext3-formatted containers (and also with Extended containers, that are to be opened as normal containers, because an Extended container is already opened, e.g. to recover files from the Backup-Container): The extended mount options are to be opened by clicking Options in the window for entering the password. Delete the option utf8 under Mount options. Afterwards, enter the password and press OK.

7 5 Open and store data in the container, or where are my files? In order to open user data from applications like e.g. OpenOffice from within the encrypted volume or to store them within the volume you select them in the Open or Save dialogue as follows: All files in the container can be found in the left column Places under the respective entry "Truecrypt<n> (<n> represents the slot number) or the name of the Extended Volume (here test ). In the Save dialogue, this view may need to be opened by clicking on Directory- Browser. Of course, files can usually also be opened by double clicking in the file manager.

8 6 Encrypt and decrypt files To encrypt files in the file manager, right-click on one or more selected files or a folder which contains the files to encrypt and select encrypt. A window to select the keys pops up:

9 The keys for encrypting are chosen by marking the boxes on the left; hit OK to encrypt file (you may be asked for the passphrase for the signing key) and it will be saved at the same place as the original file with the new extension pgp. If several files are selected to encrypt, a question appears whether the files should be encrypted separately or as a package: When selecting Pack files into ZIP archive to encrypt them together, the files are first compressed in a ZIP-file and then encrypted. The default name of the Zip-file is the current date, though it can be changed userdefined. Similarly, to decrypt files, doubleclick the file or right-click it in the file manager and select open with Decrypt". A window to enter the pass phrase pops up, the file is opened afterwards. If the decrypted file is a ZIP archive, you will be asked if you want to unpack it. If answered with yes, the archive will be unpacked to the current folder. Instead of asking every time, the automatic packing/unpacking can be permanently activated or deactivated via Applications Security GnuPG Configuration. You can also group several keys into key groups, which can then be selected when encrypting in the upper half of the window. To create and edit such groups, use Applications Security GnuPG Group Editor. If you want to see with which keys a file was encrypted, right-click it and select Open with GPG-Properties. In the following window, all recipient keys are shown as long as you have them on your keyring. The file can then be decrypted if you choose to do so. 7 Compress and unzip files After right-clicking one or several selected files or directories in the file manager, select Compress. The following window pops up: The archive format (e.g. zip ) can be selected from a list. Generally, the well-known archive programs (like e.g. Filzip or Winzip) can handle all formats: The directory in which the original file is stored is the default destination, however, any

10 other can be selected as well. With Create, the file will be compressed ( zipped ) and saved. To unzip files, right-click the Zip-file and select Extract here, or open the archive manager by double-clicking the Zip-file to take a look at the content of the archive first, and select options to unzip. 8 Searching files with Beagle The indexing service starts automatically by opening the Extended volume and quits when closing. With Beagle, files can be searched by means of it s name, date or contained terms; only pre- defined paths are searched (see Install UPR ). By clicking the magnifier-symbol in the panel on the upper right or pressing F12, the search-window opens: Terms contained in the searched documents can now be entered in the search field. Parts of the words can be replaced by a star; e.g. entering *bunt* delivers all files containing the words ubuntu, bunt, bunted...if more terms are entered in the search field, all files containing all searched terms, but in varying positions, are displayed.

11 An expression made of several words has to be enclosed in quotation marks. If you want to find files containing only one of the entered search terms, they have to be combined with or Found files can be opened with a double-click. 9 Tasks and Schedules with Evolution Evolution is started via "Applications - Office - Evolution mail and calendar". You find a comprehensive manual in the "online help" of the program. Settings, appointments, notes etc. are saved automatically in the "extended TrueCrypt volume when program is closed. To avoid loss of data, we recommend saving your Evolution data at regular intervals via File Backup settings. They can then later be restored with Restore settings Project planning with Planner Planner is started via Applications - Office - Project management" or by double-clicking a Planner file in the file manager. Opening and saving of files is equivalent with other application programs like e.g. OpenOffice. The application is mainly self-explanatory if you have experience with project planning programs; the program also contains a manual (menu item "help").

12 11 Timekeeping with the Hamster Panel-Applet The timekeeping-tool Hamster starts automatically if an "Extended Volume" is opened (visible by the indication "No activity" in the upper right of the panel) and ends with the closing. A window is opened where further entries can be made by clicking the currently shown activity: You can get more help on this program by clicking Tell me more. By clicking the first entry box, a list opens where you can select a term from, or you can enter a new activity in the box. Every new activity can be allocated to a category; the category is attached with when entering a new activity. After entering or selecting the activity, the timekeeping starts by pressing the Enter-key or clicking Start Tracking. The ongoing time is shown in the panel, and Hamster reminds in intervals to check if the ongoing activity is still valid. An overview of the recorded activities of the day appears via Today ; by clicking the symbol on the right of every line, all aspects of activities can be changed manually, as well as an additional description. By right-clicking the current activity in the panel and choosing Preferences, you can change several settings of the program like the pre-defined activity list. 12 Secure saving of passwords with password manager FPM The password manager is started via Applications Security Figaro s Password Manager 2 The password defined during installation is to be entered in the registration window. Then, in the next window, the container to be opened is selected and the password copied into the clipboard by clicking on Pass. (The pushbutton Pass possibly needs to be made visible by enlarging the window move the right edge with the mouse).

13 The password can be entered in the Truecrypt window for entering the password by pressing Ctrl.+V Attention: The feature File export passwords writes the passwords in plain text to the export-file and is not recommended. The password manager has to be quit before closing the Extended volume. 13 Overwriting of free space To avoid unwatend remains of file on a storage media, free space can be overwritten after deleting files. Therefore, right-click the icon of the storage media or container on the desktop and select Scripts wipe free space The following advice appears: When handling diskettes, mark the option Multiple passes. Overwriting is started with OK.

14 14 Close extended TrueCrypt volumes and create automatic backups To use the automatic backup feature, the USB flash drive with the backup container has to be plugged-in before closing the Extended volume. The Extended TrueCrypt Volume can be closed by right-clicking the icon on the desktop and selecting "Scripts - extended TC-Volumes close : Attention: The Extended volume cannot be closed as long as contained files are opened. In this case, an alarm appears asking to close the files. Afterwards, the script to close the volume has to be re-run. If a drive with a Backup-Container exists, the following message appears: After clicking "OK", the passphrase for the Backup Container has to be entered in the following window.

15 The opening window of GTKrsync shows the progress of saving and which data is copied. When the process ends, the window has to be closed by clicking "close". The backup has been done now, but it is imperative to wait until both containers are closed before removing the storage media: If there are other containers open, you will then be asked if you want to back them up as well. If you choose to do so, when backing up a container for the first time you will have to enter a name under which the backup will be saved. Please be careful not to choose the same name twice. If you do not want to back up a particular open container among several open ones, close it before choosing Yes. For each container, the backup progress is shown like above. When you see this message indicating successful backup, please do not remove the storage media yet. Only After the following message and when both container-icons on the desktop have disappeared, the USB flash drives may be unmounted via the context menu.

16 15 Close normal TrueCrypt-Container When using the automatic backup feature, all containers are closed automatically after backup. Select the container which is to be closed in the TrueCrypt-window: The selected TrueCrypt-Container is closed by clicking dismount. Attention: The TrueCrypt window possibly shows a concurrent opened "extended container". That cannot be closed here. This has to be done via the context menu. 16 Restoring data from backup From the backup container, you can restore individual files, e.g. if they were accidentally deleted; or even a whole containers' contents. To do this, you need to open the backup container as a normal container (see #4 of this guide and pay attention to the special advice on opening ext3 formatted containers). In a subdirectory named like the container, you will find up to 5 Versions of backup with date

17 and time in the directory name. If you want to recover individual file or folders, you can just copy them over to their destination using the file manager as usual. If you want to recover configuration data like GnuPG-Keyrings, you will need to make them visible first by choosing View Show hidden files. To recover a whole container, you should create a new Extended Volume. But this time, open it as a normal container, just like the backup container. Then, open the directory with the most recent backup. Make all files visible with View Show hidden files. Then select all files, copy and paste them to the new container (by right-clicking on its desktop icon and choosing Paste into folder ). If you have opened this new container as an Extended volume before, the configuration files which were created automatically during this step now need to be replaced, so if you are asked if you want to overwrite existing files, choose Yes. After copying, close both containers ( dismount in TrueCrypt). Then you can open your new extended Volume as usual with the context menu. 17 Check Truecrypt Container for defects A TrueCrypt Container can be checked for errors in the file system with the script check, e.g. when it wasn t closed properly, or the files aren t shown properly. If possible, detected errors are automatically repaired. In every case, you should perform a backup of the container before (either by automatic backup or by copying the container). Right-click on the container and select Scripts check while container is closed and enter the password for the container afterwards. If everything is OK, the message No errors were found during this check appears. 18 Rename and check storage media with the Disk Utility The disk utility is located in menu system, then Administration.

18 It mainly serves the partitioning of hard drives. It can also be used to rename storage media like flash drives and perform error checking. This is for normal media in both cases, not for Truecrypt Volumes. Truecrypt Volumes can be renamed inside Truecrypt, for error checking use the script Check (see above). All opened files on the respective media have to be closed to work with the partition editor. Afterwards, the respective drive is to be selected on the left side and unmounted by clicking Unmount Volume, but not unplugged. After unmounting, a button Edit filesystem label appears. Clicking it will open a new window, where you can enter the new name. Enter the new name and confirm with OK.

19 Before checking a drive, backup all data on it first. Then, with the drive unmounted like above, click Check filesystem. The check starts immediately, and if everything is OK the following should appear: 19 Quit Ubuntu Privacy Remix After closing all containers and unmounting the storage media (see # 2), Ubuntu can be terminated by clicking the "switch button" in the upper right corner and choosing "shutdown". Confirm Shutdown in the following window. When the computer was booted from DVD, it will be ejected at the end, and you will have to press Enter to completely shutdown the computer.

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

JetFlash User s Manual

JetFlash User s Manual JetFlash User s Manual ( Version 1.0 ) Table of Contents INTRODUCTION...1 PACKAGE CONTENTS...1 FEATURES...1 SYSTEM REQUIREMENTS...1 DRIVER INSTALLATION...2 DRIVER INSTALLATION FOR WINDOWS 98SE...2 DRIVER

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Beginner's Tutorial. How to Create and Use a TrueCrypt Container

Beginner's Tutorial. How to Create and Use a TrueCrypt Container Beginner's Tutorial How to Create and Use a TrueCrypt Container This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you also

More information

Flash USB Drive. HwaZu Disk User Manual. Product Image File

Flash USB Drive. HwaZu Disk User Manual. Product Image File Flash USB Drive HwaZu Disk User Manual Product Image File Version 1.33 Table of Contents Introduction System Requirements Functions I. Install II. Formatting II-1 When Formatting II-2 Do Formatting III.

More information

Encrypting external USB drive on Linux

Encrypting external USB drive on Linux Encrypting external USB drive on Linux To prevent your important or personal information from falling into the wrong hands, you can easily encrypt the files on your USB-drive with a password. Windows,

More information

Install and setup TrueCrypt

Install and setup TrueCrypt Install and setup TrueCrypt Install and setup TrueCrypt This guide is for organisations and individuals who wish to use TrueCrypt to secure their computer(s) and/or portable USB drives. It explains how

More information

GV Director Restoring USB Image / Frame and Panel Installation

GV Director Restoring USB Image / Frame and Panel Installation IMPORTANT NOTE: If you have already been provided this update package via USB by a Grass Valley service representative, please skip ahead and begin on page 4. Requirements: 16 GB USB FLASH OR LARGER Mouse

More information

FarStone RestoreIT Users Guide

FarStone RestoreIT Users Guide FarStone RestoreIT 2014 Users Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Created by Simon Monk Last updated on 2016-12-03 03:20:15 AM UTC Guide Contents Guide Contents Overview You Will Need Downloading

More information

Version: 4.1 Date: 02/09/2017

Version: 4.1 Date: 02/09/2017 User manual Version: 4.1 Date: 02/09/2017 Microsoft, Windows, Windows Vista, Outlook and Microsoft.NET are either registered trademarks or trademarks of the Microsoft Corporation in the USA and / or other

More information

Lab 03. Windows Operating Systems (Cont.)

Lab 03. Windows Operating Systems (Cont.) Lab 03 s (Cont.) Objectives Develop a good understanding of 1. The role of an operating system in a computer system 2. Services provided by an operating system and have some hands on experience in 1. Understanding

More information

SafeGuard Enterprise. user help. Product Version: 8.1

SafeGuard Enterprise. user help. Product Version: 8.1 SafeGuard Enterprise user help Product Version: 8.1 Contents About SafeGuard Enterprise...1 Modules... 2 Full disk encryption with BitLocker...2 Full disk encryption with SafeGuard Power-on Authentication...

More information

Unit III: Working with Windows and Applications. Chapters 5, 7, & 8

Unit III: Working with Windows and Applications. Chapters 5, 7, & 8 Unit III: Working with Windows and Applications Chapters 5, 7, & 8 Learning Objectives In this unit, you will: Launch programs and navigate the Windows task bar. Perform common windows functions. Customize

More information

New installation local

New installation local New installation local General information ELBA/Telebanking provides the possibility to administrate your important and personal financial data. Therefore please make sure that you always have a up-to-date

More information

Sun VirtualBox Installation Tutorial

Sun VirtualBox Installation Tutorial Sun VirtualBox Installation Tutorial Installing Linux Mint 5 LTS Guest OS By Dennis Berry Welcome to the world of virtualization and Linux. This tutorial is intended to help users who are new to the world

More information

PGP NetShare Quick Start Guide version 9.6

PGP NetShare Quick Start Guide version 9.6 PGP NetShare Quick Start Guide version 9. What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. You can use PGP NetShare to: Let

More information

Image rescue Quick Start Guide

Image rescue Quick Start Guide Image rescue Quick Start Guide Image Recovery - Recovers lost or deleted image files (JPEG, TIFF and RAW), from your memory card, even if you have erased them, reformatted the card, or your card has become

More information

TeamDrive Personal Server

TeamDrive Personal Server securely TeamDrive Personal Server Manual Last modified: February 20, 2013 Version 1.0.044 Table of Contents TeamDrive Personal Server for Windows...7 TeamDrive Personal Server for Mac...16 TeamDrive Personal

More information

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52 Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6

More information

File Protection. Whitepaper

File Protection. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore

More information

Instructions for Installing FlashUpdate and Downloading Updates for NPRT 2200 Noise Power Ratio Test Set

Instructions for Installing FlashUpdate and Downloading Updates for NPRT 2200 Noise Power Ratio Test Set Instructions for Installing FlashUpdate and Downloading Updates for NPRT 2200 Noise Power Ratio Test Set Updates to the instrument firmware are available from the Applied Instruments website. Requirements

More information

Backup Tab User Guide

Backup Tab User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

User Manual. Backup Utility for MiniStation MiniStation. v 2.0

User Manual. Backup Utility for MiniStation MiniStation.   v 2.0 User Manual Backup Utility for MiniStation MiniStation www.buffalotech.com v 2.0 MiniStation Utility Installation Install the Backup Utility by running the EasySetup Wizard from the MiniStation CD (This

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

myportablepim Manual v.1.0.0

myportablepim Manual v.1.0.0 myportablepim Manual v.1.0.0 1.Introduction...3 2.Installation of the product...3 3.Launch the application...3 3.1 Protecting the version with a password... 3 4.Settings...4 4.1 General... 4 4.2 Short

More information

Accessioning Born-Digital Content with BitCurator

Accessioning Born-Digital Content with BitCurator Electronic Records Modules Electronic Records Committee Congressional Papers Section Society of American Archivists Accessioning Born-Digital Content with BitCurator John Caldwell University of Delaware

More information

User s s Manual. Transcend Elite Software

User s s Manual. Transcend Elite Software User s s Manual Transcend Elite Software (Version 1.0) Congratulations on purchasing one of Transcend s world-renowned storage products. Your Transcend storage device comes with Transcend Elite a very

More information

Using LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs.

Using LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs. Section 1-7 Using LaunchPad This section: Describes how to use LaunchPad to run your access control programs. Describes how to change your login name and password Describes how to add new operators. Describes

More information

User s Manual. Rev July 29,

User s Manual. Rev July 29, User s Manual Rev. 3.3.0.75 July 29, 2009 www.comsol.com.au Contents 1. Introduction...2 1.1 System Requirements... 2 1.2 Multilingual Support... 2 1.3 Disk Partitioning... 2 1.4 Note... 3 2. Icon Descriptions...4

More information

Tax-Aide TrueCrypt Utility For Tax Year 2010

Tax-Aide TrueCrypt Utility For Tax Year 2010 Tax-Aide TrueCrypt Utility Quick Start Guide Welcome to the Tax-Aide TrueCrypt Utility for Tax Year 2010. This Quick Start Guide contains what you need to know to obtain and use the Utility when your target

More information

Lab - Data Migration in Windows

Lab - Data Migration in Windows Lab - Data Migration in Windows Introduction When a new computer is purchased or a new operating system is installed, it is often desirable to migrate a user s data to the new computer or OS. Windows has

More information

Introduction to Windows XP

Introduction to Windows XP 1 Introduction to Windows XP 1.1 INTRODUCTION The windows operating system started with the introduction of Windows OS and Windows for work group for networking. Since then it has come a long way and Windows

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide 1 Seagate Manager User Guide Revision 2 2009 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology,

More information

Saving and Restoring the System on the Fast Internet Computers CFS-249 December 15, 2004

Saving and Restoring the System on the Fast Internet Computers CFS-249 December 15, 2004 Saving and Restoring the System on the Fast Internet Computers CFS-249 December 15, 2004 David Dunthorn www.c-f-systems.com Comment This is a long document to describe what really turns out to be a simple

More information

PGP Portable Quick Start Guide Version 10.3

PGP Portable Quick Start Guide Version 10.3 Quick Start Guide Version 10.3 Introduction to Use to distribute encrypted files to users who do not have software. Use to transport files securely to other systems that do not or cannot have PGP software

More information

LAB :: PGP (Pretty Good Privacy)

LAB :: PGP (Pretty Good Privacy) LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

The following documents are included with your Sony VAIO computer.

The following documents are included with your Sony VAIO computer. Documentation The following documents are included with your Sony VAIO computer. Printed Documentation Quick Start Guide Describes the process from unpacking to starting up your VAIO. Troubleshooting and

More information

Exchange Protection Whitepaper

Exchange Protection Whitepaper Whitepaper Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Introduction... 2 Documentation... 2 Licensing... 2 Exchange Server Protection overview... 3 Supported platforms... 3 Requirements by platform... 3 Remote

More information

ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017

ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017 ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

File Protection Whitepaper

File Protection Whitepaper File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3

More information

Intelligent Systems Upgrade Guide SQL 2014

Intelligent Systems Upgrade Guide SQL 2014 Intelligent Systems Upgrade Guide SQL 2014 Intelligent Time Upgrade Guide isys Group Limited 38.1502.0.1008 140415 isys Group Limited Page 1 of 31 Intelligent Time Installation Guide Scope This document

More information

Lionstracs Groove X-R

Lionstracs Groove X-R Lionstracs Groove X-R Groove OS version 5.3 Installation & Upgrade Guide 31 October 2011 English Language documentation prepared by Corcyra Global in consultation with Lionstracs Table of Contents Warning

More information

User Manual v

User Manual v DUSK-USB Encryption User Manual v. 16.9.5.0 Introduction... 3 What s New... 3 Operating Systems (OS)... 3 OS Change... 3 DeltaCrypt Upgrades... 3 Upward Compatibility... 3 Installation & Registration (if

More information

INSTALLING THE PS3 XBOX READY SOFTWARE:

INSTALLING THE PS3 XBOX READY SOFTWARE: INSTALLING THE PS3 XBOX READY SOFTWARE: 1. Insert the Installation CD to CD-ROM drive and execute Ready_Setup.exe NOTE: If it is the first time for the target USB disk using under this software, the software

More information

Finding information on your computer

Finding information on your computer Important Be sure to create recovery discs immediately after your computer is ready for use because there are no recovery discs provided with the computer. For instructions on how to create the recovery

More information

ASSAN ESC PC Interface Software User s Guide

ASSAN ESC PC Interface Software User s Guide ASSAN ESC PC Interface Software User s Guide Dear customer, Welcome to use ASSAN ESC PC Connector and Interface Software. It allows of the Electronic Speed Controller programming in the desktop PC and

More information

Chapter 4 Using the Entry-Master Disk Utilities

Chapter 4 Using the Entry-Master Disk Utilities Chapter 4 Using the Entry-Master Disk Utilities Now that you have learned how to setup and maintain the Entry-Master System, you need to learn how to backup and restore your important database files. Making

More information

Windows 2000 Disk Management

Windows 2000 Disk Management LAB PROCEDURE 25 Windows 2000 Disk Management OBJECTIVES 1. Use Disk Cleanup. 2. Backup a file. 3. Restore a backup. 4. Compress a file. 5. Encrypt a file. Troubleshooting RESOURCES 1. Marcraft 8000 Trainer

More information

Encrypting a non-hrh laptop

Encrypting a non-hrh laptop Encrypting a non-hrh laptop The purpose for data encryption is to provide data security. We have chosen to deploy the encryption technology of TrueCrypt. After encrypting your system drive your data will

More information

Online Backup Client User Manual

Online Backup Client User Manual Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or

More information

Due: October 8, 2013: 7.30 PM

Due: October 8, 2013: 7.30 PM Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)

More information

IMPORT AND EXPORT YOUR JOBS DATA BACKUP DATABASES SHARING FILES WITH OTHER USERS DATABASE MAINTENANCE

IMPORT AND EXPORT YOUR JOBS DATA BACKUP DATABASES SHARING FILES WITH OTHER USERS DATABASE MAINTENANCE BACKING UP YOUR DATA IMPORT AND EXPORT YOUR JOBS DATA BACKUP DATABASES SHARING FILES WITH OTHER USERS DATABASE MAINTENANCE Please note on the personal edition your data is held in two folder called Jobs

More information

GUARD1 PLUS Documentation. Version TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks

GUARD1 PLUS Documentation. Version TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks GUARD1 PLUS Documentation Version 3.02 2000-2005 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks i of TimeKeeping Systems, Inc. Table of Contents Welcome to Guard1 Plus...

More information

Nextiva Drive The Setup Process Mobility & Storage Option

Nextiva Drive The Setup Process Mobility & Storage Option Nextiva Drive The Setup Process The Setup Process Adding Users 1. Login to your account and click on the Account icon at the top of the page (this is only visible to the administrator). 2. Click Create

More information

Tax-Aide TrueCrypt - Version 6.2. Quick Start Guide

Tax-Aide TrueCrypt - Version 6.2. Quick Start Guide Tax-Aide TrueCrypt - Version 6.2 Quick Start Guide Welcome to the Version 6.2 Tax-Aide TrueCrypt Installer. This Quick Start Guide contains what you need to know to obtain and use the Installer when your

More information

Restoring Exchange Server 2003 with Arcserve Version 1.01

Restoring Exchange Server 2003 with Arcserve Version 1.01 Restoring Exchange Server 2003 with Arcserve Version 1.01 Need to Know TM Exchange server holds all the email messages for network users. Arcserve software can backup the Exchange data for recovery. There

More information

Documentation on File Management for website

Documentation on File Management for website Documentation on File Management for website File Manager The cpanel FILE MANAGER allows you to modify the files and contents of files that are part of your website. The FILE MANAGER allows point and click

More information

WINDOWS 8.1 RESTORE PROCEDURE

WINDOWS 8.1 RESTORE PROCEDURE Support website: MyDigitalTech Support email: hello@mydigitaltech.com Support phone number: 0845 450 6323 WINDOWS 8.1 RESTORE PROCEDURE This document describes how Windows system recovery works, in the

More information

Creating Pages with the CivicPlus System

Creating Pages with the CivicPlus System Creating Pages with the CivicPlus System Getting Started...2 Logging into the Administration Side...2 Icon Glossary...3 Mouse Over Menus...4 Description of Menu Options...4 Creating a Page...5 Menu Item

More information

OS Installer. Installation Instructions

OS Installer. Installation Instructions OS Installer These instructions are only relative to Digital X Bus X.200 owners needing to completely clean out their internal hard drive and re-install the entire operating system and the latest Digital

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

CityVault Client Manual

CityVault Client Manual CityVault Client Manual Contents Preface: Preface...4 Chapter 1: Overview...5 Chapter 2: Installing CityVault...6 Downloading the CityVault Client...6 Installing the CityVault Client...6 Configuring CityVault...8

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions October 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Team Project Management

Team Project Management TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator

More information

Winzip utilities free

Winzip utilities free Winzip utilities free WinZip 10.0 continues to add improved compression technology that creates even smaller Zip files. It also offers users a new Explorer-style view, multi-folder Zip files. Winzip is

More information

Installing USB-to-Serial Adapter Drivers for Use with A-Track

Installing USB-to-Serial Adapter Drivers for Use with A-Track Installing USB-to-Serial Adapter Drivers for Use with A-Track Version 4.3 A-Track can be connected to an NCE Power Cab or Smart Booster system by using the NCE USB Interface unit, or can be connected to

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

Content: Step-by-Step instructions to duplicate MS Outlook files to a file. Purpose: To move content from one computer to another.

Content: Step-by-Step instructions to duplicate MS Outlook  files to a file. Purpose: To move  content from one computer to another. Content: Step-by-Step instructions to duplicate MS Outlook e-mail files to a file. Purpose: To move e-mail content from one computer to another. Definitions: Old Computer == the computer you want to copy

More information

Scanning CoverPage Creator Setup Guide

Scanning CoverPage Creator Setup Guide Scanning CoverPage Creator Setup Guide Chickasaw Nation Division of Commerce For Support or Feature Requests Please Contact: coverpage@summitokc.com www.summitokc.com/coverpage (405) 946-6510 Reference

More information

Creating a distribution group

Creating a distribution group Creating a distribution group You can group a number of selected contacts together, for example all of your team. This is known as a distribution group or list. Using a distribution group, you can email

More information

Windows XP. A Quick Tour of Windows XP Features

Windows XP. A Quick Tour of Windows XP Features Windows XP A Quick Tour of Windows XP Features Windows XP Windows XP is an operating system, which comes in several versions: Home, Media, Professional. The Windows XP computer uses a graphics-based operating

More information

testo Comfort Software Basic 5 Instruction manual

testo Comfort Software Basic 5 Instruction manual testo Comfort Software Basic 5 Instruction manual 2 1 Contents 1 Contents 1 Contents... 3 2 About this document... 4 3 Specifications... 5 3.1. Use... 5 3.2. System requirements... 5 4 First steps... 6

More information

IMPORTANT NOTE for. Choose the zip file v and unzip it in USB. Do not rename the UPG folder. Follow

IMPORTANT NOTE for. Choose the zip file v and unzip it in USB. Do not rename the UPG folder. Follow IMPORTANT NOTE for (HTB3280G/12 HTB3520/40/55/94/98 HTB3520G/12/51 HTB3550/40/98 HTB3550G/12 HTB3580/40/79/98 HTB3580G/12/51 HTB4520G/51 HTB4580G/51 HTB5260G/12 HTB5520/55/94/98 HTB5520G/12 HTB5550/98

More information

Reinstalling Windows 95/98/ME/2000 Professional

Reinstalling Windows 95/98/ME/2000 Professional Reinstalling Windows 95/98/ME/2000 Professional Who needs this handout? If you have been instructed to reinstall Windows on your computer as a result of a recommendation from a computer consulting professional,

More information

1. Contents. b. Windows ME

1. Contents. b. Windows ME 1. Contents You should have the following items included in your Pocki-Drive order, pictured right: i - Pocki-Drive ii - Lid (attached to the Pocki-Drive) iii - Extension cable iv - Installation CD v -

More information

A QUICK GUIDE TO THE NEW AND UPDATED FUNCTIONS AVAILABLE

A QUICK GUIDE TO THE NEW AND UPDATED FUNCTIONS AVAILABLE NS AVAILABLE e@syfile EMPLOYER A QUICK 2012 GUID A QUICK GUIDE TO THE NEW AND UPDATED FUNCTIONS AVAILABLE e@syfile EMPLOYER 2 APRIL 2012 I NS AVAILABLE e@syfile EMPLOYER A QUICK GUID 2012 A QUICK GUIDE

More information

User Guide. Rebit Backup. https://rebitbackup.rebitgo.com

User Guide. Rebit Backup. https://rebitbackup.rebitgo.com User Guide Information in this document is subject to change without notice. 2017 Rebit Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the written permission of

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Instructions for Installing FlashUpdate and Downloading Updates for Super Buddy Satellite Meter

Instructions for Installing FlashUpdate and Downloading Updates for Super Buddy Satellite Meter Instructions for Installing FlashUpdate and Downloading Updates for Super Buddy Satellite Meter Updates to the Field Guide and to the instrument firmware are available from the Applied Instruments website.

More information

How To Delete And Reinstall Mac Os X Mountain Lion Without Losing Data

How To Delete And Reinstall Mac Os X Mountain Lion Without Losing Data How To Delete And Reinstall Mac Os X Mountain Lion Without Losing Data Upgrading from Mac OS X 10.7 (Lion), Reinstalling Mountain Lion If you would like to securely erase your data, click Security Options..,

More information

Caja File Manager. Desktop User Guide

Caja File Manager. Desktop User Guide Caja File Manager Desktop User Guide Desktop User Guide» Working with Files This chapter describes how to use the Caja file manager. Introduction Spatial Mode Browser Mode Opening Files Searching For Files

More information

Accessing the CAES Office of Communication File Sharing Services

Accessing the CAES Office of Communication File Sharing Services Accessing the CAES Office of Communication File Sharing Services OIT Using CrashPlan Backup Version: 7/16/2010 8:35 AM Page 0 Using Crashplan 1 About CrashPlan 1. CrashPlan is a local backup program and

More information

Backup App v7. Quick Start Guide for Windows

Backup App v7. Quick Start Guide for Windows Backup App v7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restore Data; Combined Technical

More information

Basic Software Maintenance. Ham Station Ultra Software Package

Basic Software Maintenance. Ham Station Ultra Software Package 1 Carl Skip Glover, Jr. K1SPG Custom Software & Hardware Solutions 4 Valley of Industry Boscawen, NH 03303 (603) 369-7015 Email: pctech.skip@gmail.com Email: k1spg@arrl.net Basic Software Maintenance Ham

More information

PGP Whole Disk Encryption Quick Start Guide Version 9.7

PGP Whole Disk Encryption Quick Start Guide Version 9.7 PGP Whole Disk Encryption Quick Start Guide Version 9.7 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data

More information

BVA LLP Web Portal User Guide

BVA LLP Web Portal User Guide BVA LLP Web Portal User Guide Opening the Web Portal Website The Web Portal is accessed from the link found on the BVA website homepage: http://www.bvateam.com Web Portal Users Each portal user requires

More information

File Archiving. Whitepaper

File Archiving. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 requirements... 2 2. product overview... 3 features... 3 Advantages of BackupAssist... 4 limitations... 4 3. Backup considerations...

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

STEP 1: PREPARE FOR DATA MIGRATION 1. Right-click the desktop and choose New > Folder. a. Type For Transferring and press Enter to name the folder.

STEP 1: PREPARE FOR DATA MIGRATION 1. Right-click the desktop and choose New > Folder. a. Type For Transferring and press Enter to name the folder. PC Support and Repair Chapter 5 Data Migration Lab 5144 When a new computer is purchased or a new operating system is installed, it is often desirable to migrate a user s data to the new computer or OS.

More information

PROSIM and Its Installation Guide

PROSIM and Its Installation Guide PROSIM and Its Installation Guide What is PROSIM? PROSIM, an acronym of Production Simulation, is a business game structured around the management of a production or operations environment. This is a Windows

More information

TRADEMARKS All brand and product names are trademarks or registered trademarks of their respective companies. NOTE The information in this manual is

TRADEMARKS All brand and product names are trademarks or registered trademarks of their respective companies. NOTE The information in this manual is TRADEMARKS All brand and product names are trademarks or registered trademarks of their respective companies. NOTE The information in this manual is subject to change without notice. Safety Information

More information

CompTIA Linux+ Guide to Linux Certification Fourth Edition. Chapter 2 Linux Installation and Usage

CompTIA Linux+ Guide to Linux Certification Fourth Edition. Chapter 2 Linux Installation and Usage CompTIA Linux+ Guide to Linux Certification Fourth Edition Chapter 2 Linux Installation and Usage Objectives Prepare for and install Fedora Linux using good practices Outline the structure of the Linux

More information

Let s work together. Instructions pcvisit ProfiSupport version from

Let s work together. Instructions pcvisit ProfiSupport version from Instructions pcvisit ProfiSupport version from 24.07.2009 pcvisit ProfiSupport is a streamlined solution specifically suited to the task of facilitating IT support. The software allows support worldwide,

More information

GUARD1 PLUS Manual Version 2.8

GUARD1 PLUS Manual Version 2.8 GUARD1 PLUS Manual Version 2.8 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Table of Contents GUARD1 PLUS... 1 Introduction How to get

More information

User's Manual. Intego Personal Backup X User's Manual Page 1

User's Manual. Intego Personal Backup X User's Manual Page 1 User's Manual Intego Personal Backup X User's Manual Page 1 Intego Personal Backup X for Macintosh 2002-2004 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written for use

More information

Labtainer Student Guide

Labtainer Student Guide Labtainer Student Guide January 18, 2018 1 Introduction This manual is intended for use by students performing labs with Labtainers. Labtainers assume you have a Linux system, e.g., a virtual machine.

More information