Protecting and Archiving usernames & passwords

Size: px
Start display at page:

Download "Protecting and Archiving usernames & passwords"

Transcription

1 Protecting and Archiving usernames & passwords Let s face it we all have too many passwords to remember. However, passwords are our first line of defense against keeping the bad guys out and appropriately restricting access to important resources. The old fashion system of post-it notes under the keyboard no longer works in a world of , ERP systems and online banking. Can you name one useful resource you use that doesn t require a password?!? Protecting these passwords is paramount to protecting your systems and data. Keeping an encrypted password vault is one method to keep track of your passwords without compromising their security. This document will describe how to use KeePass Password Safe to securely store and manage your passwords. 1. Download and install KeePass on a computer. It can be freely downloaded from KeePass Classic doesn t have any perquisites and is highly portable. KeePass Professional is the new and improved but it requires either MS.NET framework 2.0 or higher on windows systems and mono 2.2 or higher on linux or Mac systems. Same encryption protection in both suites, improved bells and whistles in the professional edition. Either one is fine for basic password vaulting. This document will show the Portable KeePass Professional 2.08 edition. Portable means that you don t have to install it you can just copy it to your PC. I recommend keeping it on a USB flash drive so that you can carry your passwords with you. 2. Once installed (of if you re using the portable edition), start the KeePass.exe program, as shown in Figure #1. Figure #1: KeePass Password Safe

2 3. Before you can start securely storing your passwords you must create a new KeePass database. To create a new database, choose New from the File menu. This will open the Create New Password Database dialog window; KeePass will ask you where you want to store your password database file. If you re using a USB flash drive, store the kdbx file on the drive. Provide a name and press Save, as shown in Figure #2. If you are not using a USB flash drive place the database file where you can easily locate it. Figure #2: Create new password database window 4. The next step is to create a master password. This password will be used to encrypt the database and also to authenticate you as the owner. Until you are more comfortable with password vaulting I would recommend that you only use a master password and leave Key file and Windows user options unselected, as shown in Figure #3. The master password will be the skeleton key, gaining you access to all other stored passwords. It is wise to make this password a phrase, commonly referred to as a passphrase. Rule of thumb for passphrases is longer the better (e.g., The cow jumped over the moon). If KeePass becomes your only place to store passwords you will want to store your master password in a locked file cabinet or some other location, in the event you forget it.

3 Figure #3: Creating a KeePass master password. 5. Your KeePass database is almost ready to use. The next step in creating a new KeePass database after creating a password allows you to configure the database settings. Until you become more familiar with password vaulting I suggesting going with the predefined defaults. You may give your database a name and description or leave them blank. Press OK to continue as shown in Figure #4.

4 Figure #4: KeePass database settings 6. Now your KeePass setup is complete and you may start storing passwords (or anything else for that matter). Figure #5. KeePass is like a electronic filing cabinet so you can so securely store documents, images and other items in the database. Figure #5: KeePass Application

5 7. KeePass by default will have some password categories already created (e.g., General, Windows, Network, and Internet). You can add entries for your passwords in these categories or create your own categories; finally, you can delete all the categories and use a default category. To add a new password entry, right click in the right hand pane of the KeePass application window and select Add Entry. The dialog box in Figure #6 will appear. For basic password vaulting you only need to provide a title (e.g., Comcast Web Mail), a username and the respective password. By default KeePass will randomly generate a password for all new entries; you can delete the created password and enter the password you are currently using for this entry. When completed click OK, this will exit the window and take you back to the main KeePass application window. You may add another password or simply exit KeePass. If you haven t manually saved your changes KeePass will prompt you when you exit the program. Figure #6: Add Password dialog box

Encrypting external USB drive on Linux

Encrypting external USB drive on Linux Encrypting external USB drive on Linux To prevent your important or personal information from falling into the wrong hands, you can easily encrypt the files on your USB-drive with a password. Windows,

More information

Outlook 2010 Setup Guide (POP3 Transmailaccess)

Outlook 2010 Setup Guide (POP3 Transmailaccess) Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 7 /22/2013 Copyright 2012 Smarsh, Inc. All rights reserved. Purpose: This document will assist the end user in configuring Outlook 2010

More information

Keep Track of Your Passwords Easily

Keep Track of Your Passwords Easily Keep Track of Your Passwords Easily K 100 / 1 The Useful Free Program that Means You ll Never Forget a Password Again These days, everything you do seems to involve a username, a password or a reference

More information

Information Technology

Information Technology Information Technology Operations Team Instructional Sharing Protected Data Contents Introduction... 3 Procedure... 3 How to Password Protect a MS Word Document... 3 MS Word 2010/2013/2016... 3 Word 2007...

More information

Configuring Microsoft Outlook to Connect to Hosted Exchange Service

Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring

More information

File Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb

File Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb File Encryption Steven M. Bellovin https://www.cs.columbia.edu/~smb Why Encrypt Files? Theft of files Theft of media Theft of computer Cloud storage? I.e. Someone else s computer 1 Issues with File Encryption

More information

Download Keepass from select Professional Edition

Download Keepass from  select Professional Edition Download Keepass from http://keepass.info/download.html select Professional Edition READ CAREFULLY: If you only need access to your password database when on this machine, continue with step 1A. If you

More information

Wireless Setup Instructions

Wireless Setup Instructions Wireless Setup Instructions THESE INSTRUCTIONS ARE VERY IMPORTANT TO SECURE YOUR WIRELESS NETWORK The purpose of this procedure is to "lock" your router so other users can not access your network without

More information

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device.

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

KeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele

KeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele KeePass Keep your passwords SAFE John Steele August 2015 Copyright John Steele 2015 1 What we will cover What is the problem with passwords How complex do they need to be How can they be stored safely

More information

KeePass - to improve your process

KeePass - to improve your process KeePass - to improve your process Before proceeding with the article, please take this quick password safety test. Password Safety Test Score one point for every YES answer.: Scoring: 1. Do you write your

More information

AP Computer Science Principles: Problem Set 1

AP Computer Science Principles: Problem Set 1 AP Computer Science Principles: Problem Set 1 Due date: Friday, September 8, 2017 Instructor: Mr. Alwin Tareen Task Overview Setting up the KeePass password manager for Windows and Mac OS. Linux users

More information

CESecure Quick Start Guide

CESecure Quick Start Guide CESecure Quick Start Guide Using CESecure Software CESecure software is pre-installed on CMS Products Flash or Hard Drives and does not require installation. The CESecure software moves with the encryption

More information

SafeGuard Enterprise. user help. Product Version: 8.1

SafeGuard Enterprise. user help. Product Version: 8.1 SafeGuard Enterprise user help Product Version: 8.1 Contents About SafeGuard Enterprise...1 Modules... 2 Full disk encryption with BitLocker...2 Full disk encryption with SafeGuard Power-on Authentication...

More information

KeePass Password Safe: Password Manager

KeePass Password Safe: Password Manager KeePass Password Safe: Password Manager The recommended from Information Services at the University of Regina password manager is KeePass Password Safe. This documents is designed to assist with the creation

More information

Improving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL

Improving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL Improving Password Management Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL Password Management How many passwords do you have? Are they all

More information

Quick Guide to Installing and Setting Up MySQL Workbench

Quick Guide to Installing and Setting Up MySQL Workbench Quick Guide to Installing and Setting Up MySQL Workbench If you want to install MySQL Workbench on your own computer: Go to: http://www.mysql.com/downloads/workbench/ Windows Users: 1) You will need to

More information

Super USB. User Manual. 2007, March

Super USB. User Manual. 2007, March Super USB User Manual 2007, March Windows98 Driver Install/Uninstall Driver Install: 1. Execute Win 98 UFD driver, then restart PC. 2. Plug Super USB into an available USB port. A new Removable Disk drive

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

Eanes ios5 Upgrade Guide

Eanes ios5 Upgrade Guide Eanes ios5 Upgrade Guide These instructions are intended for people to follow on their home machine. District machines have deep freeze and older versions of itunes which could complicate the process.

More information

FTP Frequently Asked Questions

FTP Frequently Asked Questions Guide to FTP Introduction This manual will guide you through understanding the basics of FTP and file management. Within this manual are step-by-step instructions detailing how to connect to your server,

More information

Computer Basics. Logging onto Windows

Computer Basics. Logging onto Windows Computer Basics DRN uses Windows PCs for all of its day-to-day operations. You will need to master the details of this section in order to perform your daily tasks. Fortunately, these basics are very simple

More information

First-Time Login Procedure on XWin32

First-Time Login Procedure on XWin32 First-Time Login Procedure on XWin32 Configuring XWin32 The first time you log into X-Win32, you ll need to do a bit of profile setup; this is a one-time thing, and once done you shouldn t ever need to

More information

Install & Configure Thunderbird E- mail

Install & Configure Thunderbird E- mail Install & Configure Thunderbird E- mail Thunderbird is a free, open source mail client that runs on Windows, Mac, and Linux. This document will cover specific information about setting up Thunderbird 2

More information

Copyright 2016 ForensicSoft Inc. SAFE Block Win10 To Go User s Guide

Copyright 2016 ForensicSoft Inc. SAFE Block Win10 To Go User s Guide Copyright 2016 ForensicSoft Inc. SAFE Block Win10 To Go User s Guide Table of Contents What is SAFE Block Win10 To Go?... 3 Installation... 4 License File... 4 I need to get a license file... 4 I already

More information

PASSWORD SHIELD. User Manual

PASSWORD SHIELD. User Manual PASSWORD SHIELD User Manual Table of Contents Welcome...3 Compa bility...3 Installa on Guide and Database Crea on...4 Registra on...7 Workspace...8 Control Bu ons...9 File...12 Edit...13 View...14 Tools...15

More information

Identity Finder: Managing Your Results

Identity Finder: Managing Your Results Updated 1/30/2012 Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully

More information

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39 Contents Before you begin... vii Topic 1: Start a computer and use system information and features... 1 1A Make your workspace safe... 3 1B Work safely... 14 1C Start up the computer... 17 1D Know about

More information

Templates and Forms A Complete Overview for Connect Users

Templates and Forms A Complete Overview for Connect Users Templates and Forms A Complete Overview for Connect Users Chapter 1: Introduction... 3 Chapter 2: Microsoft Online Templates... 3 Word Templates... 3 Template Details... 4 Create a Template... 4 Update

More information

LP Manual in PTP and MTP Mode.

LP Manual in PTP and MTP Mode. LP-348 123 Manual in PTP and MTP Mode. Wireless - Equipment LP348_M123_ENF01W LP-348 123 Manual in PTP and MTP Mode. The following Instruction Manual will guide you on how to configure the LP-348 in PTP

More information

I made a 5 minute introductory video screencast. Go ahead and watch it. Copyright(c) 2011 by Steven Shank

I made a 5 minute introductory video screencast. Go ahead and watch it.  Copyright(c) 2011 by Steven Shank Introduction to KeePass What is KeePass? KeePass is a safe place for all your usernames, passwords, software licenses, confirmations from vendors and even credit card information. Why Use a Password Safe?

More information

Part 1: Understanding Windows XP Basics

Part 1: Understanding Windows XP Basics 542362 Ch01.qxd 9/18/03 9:54 PM Page 1 Part 1: Understanding Windows XP Basics 1: Starting Up and Logging In 2: Logging Off and Shutting Down 3: Activating Windows 4: Enabling Fast Switching between Users

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

BitLocker to Go: Encryption for personal USB

BitLocker to Go: Encryption for personal USB BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes

More information

True Potential Client Site

True Potential Client Site True Potential Client Site New Login Process Including the iphone & ipad app process 1 P a g e Account Activation & New Login Process We re changing the way you log into your account on the True Potential

More information

Windows Key e: Press and hold down the Windows (Start) Key and tap the letter e one time. Release these keys and Windows File Explorer will open.

Windows Key e: Press and hold down the Windows (Start) Key and tap the letter e one time. Release these keys and Windows File Explorer will open. Copyright 2009 BOSMA Enterprises Chapter 14 Windows File Explorer Key Terms Windows Key e: Press and hold down the Windows (Start) Key and tap the letter e one time. Release these keys and Windows File

More information

SAP GUI 7.30 for Windows Computer

SAP GUI 7.30 for Windows Computer SAP GUI 7.30 for Windows Computer Student and Faculty Installation Instructions Table of Contents Caution:... 2 System Requirements:... 2 System Memory (RAM) requirements:... 2 Disk Space requirements:...

More information

Pulse Secure VPN Guide

Pulse Secure VPN Guide Pulse Secure VPN Guide Pulse Secure is a dynamic, integrated and easy-to-use network client that delivers anytime/anywhere secure connectivity. 1 CONTENTS Mac OSX System & Hardware Requirements 3 Installing

More information

USER GUIDE WWPass Security for (Thunderbird)

USER GUIDE WWPass Security for  (Thunderbird) USER GUIDE WWPass Security for Email (Thunderbird) TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Email (Thunderbird)... 4 Connecting Your PassKey to Your Computer... 4 Need Assistance?...

More information

Encrypting Removable Media

Encrypting Removable Media For security reasons all removable media must be encrypted with BitLocker to Go on Windows 7 workstations. The following will show you how to use a flash drive with BitLocker to Go. Please note that data

More information

Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003

Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003 Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003 This article refers to Microsoft Exchange Server 2003. As of April 8, 2014, Microsoft no longer issues security updates for

More information

Secure+ Password Manager ver 1.1.1

Secure+ Password Manager ver 1.1.1 Secure+ Password Manager ver 1.1.1 Table of Contents 1. First setup & Auto lock functionality 1. Setup 2. Auto Lock 2. Add new item & edit 1. Icons 2. Edit Fields (Title, Category, ID, Password, URL) 3.

More information

What is OneNote? The first time you start OneNote, it asks you to sign in. Sign in with your personal Microsoft account.

What is OneNote? The first time you start OneNote, it asks you to sign in. Sign in with your personal Microsoft account. OneNote What is OneNote? OneNote is a digital notebook. In OneNote, you can: Type notes or record audio at your laptop. Sketch or write ideas on your tablet. Add picture from your phone. Find notes instantly.

More information

Installing Python 3 on Your Personal Computer

Installing Python 3 on Your Personal Computer Installing Python 3 on Your Personal Computer Comp 112 Wesleyan University Fall 2017 Introduction In this course we will be writing computer programs using the programming language Python. Although you

More information

Mobile Computing and Storage Devices Security Workshop. Mobile Computing and Storage Device Security. Today s Plan. Why Bother?

Mobile Computing and Storage Devices Security Workshop. Mobile Computing and Storage Device Security. Today s Plan. Why Bother? Today s Plan Mobile Computing and Storage Device Security October 19, 2011 1. New policy and standard 2. Mobile phones 3. Portable storage devices 4. USB Trade-in events 5. Laptop encryption / PGP New

More information

Installing and Using Dev-C++

Installing and Using Dev-C++ Installing and Using Dev-C++ 1. Installing Dev-C++ Orwell Dev-C++ is a professional C++ IDE, but not as big and complex as Visual Studio. It runs only on Windows; both Windows 7 and Windows 8 are supported.

More information

Install and setup TrueCrypt

Install and setup TrueCrypt Install and setup TrueCrypt Install and setup TrueCrypt This guide is for organisations and individuals who wish to use TrueCrypt to secure their computer(s) and/or portable USB drives. It explains how

More information

1Password for Mac. by Marcia Bolsinga for AshMUG 1/12/2019

1Password for Mac. by Marcia Bolsinga for AshMUG 1/12/2019 Why do we need passwords? First of all - why passwords? Passwords are one of the Primary Pain Points in our modern digital existence. Despite all the advances of our modern technology, we haven t managed

More information

Home Computer and Internet User Security

Home Computer and Internet User Security Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,

More information

JetFlash User s Manual

JetFlash User s Manual JetFlash User s Manual ( Version 1.0 ) Table of Contents INTRODUCTION...1 PACKAGE CONTENTS...1 FEATURES...1 SYSTEM REQUIREMENTS...1 DRIVER INSTALLATION...2 DRIVER INSTALLATION FOR WINDOWS 98SE...2 DRIVER

More information

PGP NetShare Quick Start Guide version 9.6

PGP NetShare Quick Start Guide version 9.6 PGP NetShare Quick Start Guide version 9. What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. You can use PGP NetShare to: Let

More information

If your Mac keeps asking for the login keychain password

If your Mac keeps asking for the login keychain password If your Mac keeps asking for the login keychain password The password of your macos user account might not match the password of your login keychain. Either create a new login keychain or update it with

More information

SETUP FOR OUTLOOK (Updated October, 2018)

SETUP FOR OUTLOOK (Updated October, 2018) EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version

More information

DOCUMENT SECURITY IN WORD 2010

DOCUMENT SECURITY IN WORD 2010 DOCUMENT SECURITY IN WORD 2010 http://www.tutorialspoint.com/word/word_document_security.htm Copyright tutorialspoint.com Microsoft Word provides a high level of security for your word generated documents.

More information

HOTPin Software Instructions. Mac Client

HOTPin Software Instructions. Mac Client HOTPin Software Instructions Mac Client The information contained in this document represents the current view of Celestix Networks on the issues discussed as of the date of publication. Because Celestix

More information

Steps to enable Push notification for your app:

Steps to enable Push notification for your app: User Guide Steps to enable Push notification for your app: Push notification allows an app to notify you of new messages or events without the need to actually open the application, similar to how a text

More information

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

Certificate-based authentication for data security

Certificate-based authentication for data security Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important

More information

Before using Fetch the first time, you need to enter the default information for VM1.

Before using Fetch the first time, you need to enter the default information for VM1. Using Fetch Fetch is a Macintosh implementation of FTP (File Transfer Protocol). FTP is used to transfer files between two computers over the Internet. Both binary and text files can be transferred with

More information

SP LOCKER USER MANUAL. v1.0

SP LOCKER USER MANUAL. v1.0 SP LOCKER USER MANUAL v1.0 Table of Contents 1 Introduction to the SP Locker Security Software... 2 2 Before You Get Started... 2 3 Features... 2 4 Public and Secured Partition... 3 5 How to use SP Locker...

More information

Getting View Client File

Getting View Client File Getting View Client File 1. Launch Internet Explorer 2. At address bar enter this URL https://viewvdi.tp.edu.sg/ and press [Enter]. 3. Please click on More information and click on Go on to the webpage

More information

Mozilla Thunderbird application with TUNI Office 365

Mozilla Thunderbird  application with TUNI Office 365 Mozilla Thunderbird email application with TUNI Office 365 Mozilla Thunderbird is a free email client. IT Services doesn't officially support using Thunderbird on other computers than centrally managed

More information

Virtual Desktop Infrastructure Setup for MacOS

Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile

More information

Virtual Desktop Infrastructure Setup for MacOS

Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile

More information

Get Started with Kindle (2nd Generation)

Get Started with Kindle (2nd Generation) Get Started with Kindle (2nd Generation) Get Started with Kindle 2nd (Generation) Charge and Power Up Your Kindle Register Your Kindle Set a Password on Kindle Use the Home Screen Charge and Power Up Your

More information

Securewireless Windows 7 Setup Guide

Securewireless Windows 7 Setup Guide Securewireless Windows 7 Setup Guide 1. Click on the wireless icon in the lower right-hand corner of the taskbar and then click on Open Network and Sharing Center. 2. From the Network and Sharing Center

More information

FileMaker. Client User Manual. McLean County Unit District No. 5. Updated 7/7/2017

FileMaker. Client User Manual. McLean County Unit District No. 5. Updated 7/7/2017 FileMaker Client User Manual McLean County Unit District No. 5 1 CONTENTS Page FileMaker Client User Access..3 Main Menu 5 IEP Menu.6 IEP Input 7 Saving and Preview...8 Goals and Objectives. 9 State Standards

More information

KeePass Password Safe

KeePass Password Safe WMLUG February 2016 KeePass Password Safe Patrick TenHoopen KeePass Password Safe KeePass Password Safe is a free, open source, cross platform password manager - http://keepass.info/ runs on Mono/.Net

More information

HyperPKI Manager User Guide For the HYP2003 PKI Token (Windows Version)

HyperPKI Manager User Guide For the HYP2003 PKI Token (Windows Version) HyperPKI Manager User Guide For the HYP2003 PKI Token (Windows Version) 4/19/2017 HSTE-NB0031-RV 1.0 HYPERSECU INFORMATION SYSTEMS INC #200-6191 Westminster Hwy, Richmond, BC V7C 4V4 Canada 1 (604) 297-2000

More information

Where Did My Files Go? How to find your files using Windows 10

Where Did My Files Go? How to find your files using Windows 10 Where Did My Files Go? How to find your files using Windows 10 Have you just upgraded to Windows 10? Are you finding it difficult to find your files? Are you asking yourself Where did My Computer or My

More information

How to set up your wireless network

How to set up your wireless network How to set up your wireless network There are several steps involved in securing your wireless network. I recommend that you take these steps in order and only change one item at a time. While this may

More information

808 N 5 th Street Alpine, TX Enabling Wireless on the Comtrend Modem

808 N 5 th Street Alpine, TX Enabling Wireless on the Comtrend Modem 808 N 5 th Street Alpine, TX 79830 800-592-478 www.bigbend.net Enabling Wireless on the Comtrend Modem Enabling Wireless on the Comtrend Modem Please follow the instructions for How to Install the Comtrend

More information

OmniPass 2.0 User's Guide. Version 1.2

OmniPass 2.0 User's Guide. Version 1.2 OmniPass 2.0 User's Guide Version 1.2 i Copyright Copyright 2002 Softex Incorporated. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

Contents. Last updated: 18 th August 2017

Contents. Last updated: 18 th August 2017 DRM Lite in Firefox DRM Lite is the new way for British Library to deliver electronic documents securely. When a document is requested via this service the document is locked so that only one user can

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

SafeGuard Enterprise user help. Product version: 8.0

SafeGuard Enterprise user help. Product version: 8.0 SafeGuard Enterprise user help Product version: 8.0 Contents 1 About SafeGuard Enterprise...4 2 SafeGuard Enterprise modules...5 3 Security recommendations...7 4 Full disk encryption...9 4.1 Encryption

More information

DocumentDirect for the Internet. User s Guide

DocumentDirect for the Internet. User s Guide DocumentDirect for the Internet User s Guide Copyright 2008-2015 UMB Financial Corporation. (External) Version 3.0 07012015 FINAL July 2015 UMB Reg. U.S. Pat. & Tm. Off. Table of Contents iii Contents

More information

Area Access Manager User Guide

Area Access Manager User Guide Area Access Manager User Guide Area Access Manager User Guide Table of Contents Chapter 1: Introduction...9 Conventions Used in this Documentation... 9 Getting Started... 10 Licensing Requirements...

More information

Using Ruby and irb in CSE 341 Winter 2015

Using Ruby and irb in CSE 341 Winter 2015 Using Ruby and irb in CSE 341 Winter 2015 Overview This is a long version of the directions for installing Ruby. The last two homeworks will be using the Ruby language. We recommend editing your files

More information

Moving HRtrack to a new computer

Moving HRtrack to a new computer First Reference Moving HRtrack to a new computer Process at a Glance Confirm the location of your HRtrack data Install HRtrack on the new computer Copy the HRtrack data folder from the old computer to

More information

Your . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU

Your  . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU fuzzylime WE KNOW DESIGN WEB DESIGN AND CONTENT MANAGEMENT 19 Kingsford Avenue, Glasgow G44 3EU 0141 416 1040 hello@fuzzylime.co.uk www.fuzzylime.co.uk Your email A setup guide Last updated March 7, 2017

More information

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your . Your inbox contains all the s that have

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your  . Your inbox contains all the  s that have Email Basics Welcome to Email Basics. Today we will be covering how to send an email, how to add attachments, how to reply or forward an email, and how to use the different folders in your email account.

More information

Easy Data Access Easy Data Access, LLC. All Rights Reserved.

Easy Data Access Easy Data Access, LLC. All Rights Reserved. Copyright @ 2006 Easy Data Access, LLC. All Rights Reserved. No part of this manual, including the software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

Client VPN OS Configuration. Android

Client VPN OS Configuration. Android Client VPN OS Configuration This article outlines instructions to configure a client VPN connection on commonly-used operating systems. For more information about client VPN, please refer to our documentation.

More information

Managing Remote Presence

Managing Remote Presence This chapter includes the following sections: Configuring Serial Over LAN, page 1 Configuring Virtual Media, page 2 KVM Console, page 9 Launching KVM Console, page 10 Virtual KVM Console (HTML Based),

More information

emeasures 2.0 USERS MANUAL

emeasures 2.0 USERS MANUAL TABLE OF CONTENTS I Installation 1 A How to Install emeasures 2.0 1 B How to Open emeasures 2.0 1 II Going Online / Offline 2 A How to Login emeasures 2.0 2 B Password Guidelines 3 C How to Logoff emeasures

More information

FW- 525B Quick Start Guide

FW- 525B Quick Start Guide FW- 525B Quick Start Guide 2013 Rubicon Communications, LP Contents Introduction... 3 Plugging everything in... 3 Description of Port Indicators... 3 Initial Configuration... 4 Logging into the web interface...

More information

UPDATING SOCRATES Version Build May 2018

UPDATING SOCRATES Version Build May 2018 UPDATING SOCRATES Version 3.5.8.7 Build 10124 May 2018 10124 Update ALL USERS... 1 MAC USERS... 1 When to run the update... 1 XP USERS... 1 How often to update... 1 Registering to access the client section

More information

Computer Essentials Session 1 Lesson Plan

Computer Essentials Session 1 Lesson Plan Note: Completing the Mouse Tutorial and Mousercise exercise which are available on the Class Resources webpage constitutes the first part of this lesson. ABOUT PROGRAMS AND OPERATING SYSTEMS Any time a

More information

SureClose Product Line

SureClose Product Line SureClose Product Line Release Notes 3.7 June 21, 2013 SureClose 3.7 Release Notes June 2013 1 Table of Contents Overview... 4 Post-Installation Considerations... 4 Features and Functionality... 6 New

More information

Cigati Outlook Recovery. (Version 18.0)

Cigati Outlook  Recovery. (Version 18.0) Cigati Outlook Email Recovery (Version 18.0) Overview Cigati Outlook Email Recovery Tool lets you repair deleted as well as corrupt Outlook emails with ease. The software is an advanced recovery tool which

More information

Xplornet using Mozilla Thunderbird 52

Xplornet  using Mozilla Thunderbird 52 Xplornet Email using Mozilla Thunderbird 52 Adding a new email account 1. Click File, New, Existing Mail Account a. If you don t see the menu bar across the top in the Windows version, click on the Application

More information

Calendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request...

Calendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request... remitview User Guide 1 TABLE OF CONTENTS INTRODUCTION... 3 Calendar & Buttons... 3 GETTING STARTED.... 5 Dashboard.... 7 Menu Features... 8 PROFILE.... 10 My Profile... 10 My Favorites... 12 Watch List...

More information

Specops Password Policy

Specops Password Policy Specops Software. All right reserved. For more information about Specops Password Policy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Policy is a trademark

More information

Programming Principles 1 (CSC131) & 2 (CSC132) Software usage guide

Programming Principles 1 (CSC131) & 2 (CSC132) Software usage guide School of Sciences Department of Computer Science and Engineering Programming Principles 1 (CSC131) & 2 (CSC132) Software usage guide WHAT SOFTWARE AM I GOING TO NEED/USE?... 3 WHERE DO I FIND THE SOFTWARE?...

More information

Cmpt 101 Lab 1 - Outline

Cmpt 101 Lab 1 - Outline Cmpt 101 Lab 1 - Outline Instructions: Work through this outline completely once directed to by your Lab Instructor and fill in the Lab 1 Worksheet as indicated. Contents PART 1: GETTING STARTED... 2 PART

More information

ANNUAL SECURITY AWARENESS TRAINING 2012

ANNUAL SECURITY AWARENESS TRAINING 2012 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff ANNUAL SECURITY AWARENESS TRAINING 2012 NETWORK AND COMPUTER USE POLICY Users of information technology

More information

STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class

STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class Production Passwords Page 1 - Cyber Security Class Copyright 2016 Does It Matter? Is your email password the same as your Facebook password? Is that Good? Bad? Why? Page 2 - Cyber Security Class Copyright

More information