Steganos Safe Professional th June 2007

Size: px
Start display at page:

Download "Steganos Safe Professional th June 2007"

Transcription

1 Steganos Safe Professional th June 2007

2 Contents Page Introduction 4 Installation and Deployment 5 Managing and Policies 6 Recovery Using EDK 8 Setting Up Network Shares 8 Creating A Key Pair 8 System Requirements 9 Summary 10

3 Introduction Steganos is the German market leader in the area of data encryption. Safe Professional 2007 is our enterprise equivalent of the award winning Steganos Safe. This was designed to address problems that any large company will have concerns about How do you access data if the user forgets his password or - still worse has an accident? Or the contrary, how do you get a user to use secure passwords, which are really hard to remember? How can you specify who can access sensitive data and who can t? Steganos Safe Professional can contain an unlimited amount of confidential data - you can create any number of secure drives with a capacity of up to 256 GB each. In Steganos Safe Professional, AES, the world's most progressive encryption algorithm works with 256 bit long codes. Like all other Steganos encryptions this has never been cracked. Apart from the manual password entry, data can also be encrypted via USB stick or mobile phone, for example. Thus, employees do not have to remember their passwords: They only have to connect their USB stick to make the safe open automatically. If someone forgets about his password or loses a key device, the administrator can use the Emergency Decryption Key (EDK) to access the data. The password chosen originally still remains secret. The use of these features can be configured and controlled via group policies. Steganos Portable Safe turns a memory stick into a mobile safe: it can simply be decrypted on every PC*. This enables external employees to add new data very easily as soon as the USB device is removed, all information is encrypted. Alternatively, encrypted archives can be written to CD, DVD, or DVD-DL and therefore be securely transported. Naturally, this feature can be enabled and disabled for certain users via group policies. Steganos Shredder permanently destroys unwanted documents or whole folders. The Free Space Shredder removes all junk data which had been deleted just using the recycle bin from every hard drive including removable devices like USB sticks. This can be done by simply overwriting it if you want it to disappear quickly. Or, if you wish, you can use the technology employed by the US Department of Defence (DoD M/NISPOM 8-306). You should use the extremely thorough Gutmann method for your most sensitive data as it overwrites 35 times. *You need administrative privileges for installing the Steganos Live Encryption Engine to decrypt the data stored in the portable Safe.

4 1 Installation and Deployment Steganos Safe Professional consists of 2 parts. The client that sits on every PC that has access to safes, and the Admin console which provides the administration interface with which you manage the encryption keys. The Admin console should be installed on the server managing the domain. Additionally, you can install the application on the administrator s PC for managing the EDK (Emergency Decryption Keys) of the users. The client software needs to be installed on any machine that will have access to a safe. This can be set up to install in any folder you want, using the custom setup. Both the Administration component and the client are MSI packages and can be deployed via Radia using an Installshield setup. A full removal of Steganos can also be carried out if needed. Via group policies the administrator can specify by whom and how certain Safe functions can be used. The minimum password requirements can be predefined: this ensures that all users use passwords of a certain security level. The usage of key devices for storing passwords can be specified as well as the usage of the Steganos Shredder or Steganos Portable Safe. In addition, the Emergency Decryption Key functionality can be enabled during installation: Thus, an authorized person can access encrypted data at any time if the key gets lost without having to reveal the password of the safe concerned. Secure drives can be created not only on individual clients but also on the network. This means that several users can access data in a shared safe simultaneously*. *The first user connecting to the secure drive has read/write access. All other users have read access.

5 2 Managing and Policies Using the Group Policy Editor of Windows Server and Active Directory, you can specify various policies for creating, using and maintaining a secure drive on the user's computer as well as define the options of the File and Free Space Shredder. Here is a sample of some of the polices that can be configured for the user. Password policies This policy specifies the properties of passwords that may be specified by the users. Use key devices You have the option to store the passwords of secure drives on an ActiveSync-enabled device (e.g. USB stick, mobile phone, etc) and to use this device for opening the safe. Using this option, you can force users to implement this feature or prevent them from using it - or you can leave this decision up to them. Minimum password length Using this option, you specify the minimum password length for secure drives. Passwords must contain numbers Enable this option if you want to enforce the usage of numbers in passwords for secure drives. Passwords must contain capital letters Enable this option if you want to enforce the usage of capital letters in passwords for secure drives. Passwords must contain lower case letters Enable this option if you want to enforce the usage of lower case letters in passwords for secure drives. Passwords must contain special characters Enable this option if you want to enforce the usage of special characters in passwords for secure drives. Emergency Decryption Key

6 Enable this policy to use the EDK Manager. This policy controls the settings for the Emergency Decryption Key. Use EDK functionality With this policy you can enforce the usage of the EDK functionality or leave this decision up to the user. Location for EDK user key Enter the path to the share containing the EDK user key. T:\ if you connected the share as a drive. \\Servername\userkeys in order to access the server directly. Predefine secure drive This policy can be used to predefine a secure drive. The secure drive will then be displayed in the user's list of secure drives. Display name of secure drive Using this option you can specify the name of the secure drive to be displayed in the client software. Size of secure drive in MB This setting determines the size of the secure drive in MB. Drive letter of open secure drive Use this option to specify the drive letter to be used by the secure drive after it is opened. Disable the 'Store Portable Safe on a CD or DVD' option This setting controls whether the user may start Steganos Portable Safe to create secure drives on CD/DVD. While this policy is enabled, the user cannot use this feature. Disable the 'Store Portable Safe on a CD or DVD' option This setting controls whether the user may start Steganos Portable Safe to create secure drives on rewriteable disks. While this policy is enabled, the user cannot use this feature. Disable the 'File shredder' option

7 This policy controls whether the user can start the Steganos Shredder to destroy files. While this policy is enabled, Steganos Shredder cannot be used by the user. Disable the 'File shredder' option This policy controls whether the user can start the deep cleaning feature to clean unused sections of the hard disk. While this policy is enabled, the user cannot use this feature. Data destruction settings Here you can choose the method of data shredding. Data destruction settings 1. Gutmann method (overwrite file 35 times) 2. Multiple overwriting (overwrite file 3 times) 3. Complete overwriting (overwrite file 1 time)

8 3 Recovery using EDK An Emergency Decryption Key (EDK) is a second key with which you can open a secure drive even without knowing the password that has been chosen originally. If a user creates a secure drive or changes the password of an existing secure drive, the application generates an Emergency Decryption Key which can only be decrypted by the administrator. This key is then stored in a shared folder on the network. Using the Steganos EDK Manager, it is imported from this share into an encrypted password list only accessible to the administrator. Now the secure drive can be opened not only with the original password but also using the Emergency Decryption Key. 3.1 Setting up network shares Two shares have to be created on the network in order to ensure the security of key transactions. The first shared folder contains the public key for encrypting the EDK keys. The EDK keys themselves are stored in the second shared folder. You can choose the names of the shares freely. Share the folder for the public key using the following rights: Read-only Although the public key cannot be used to decrypt encrypted data, it must not be possible to overwrite or replace it. Share the folder for the EDK keys using the following rights: Don't overwrite existing data/folders In this way it is impossible to deliberately manipulate created keys of other users. In a domain it is recommended to create a new user group in order to facilitate share management. This ensures a more exact control of access rights and gives you the possibility of adding individual users to this group, thus minimizing future administration efforts. 3.2 Creating a key pair For encrypting the EDK key, a key pair consisting of a private and a public key must be created.

9 The public key can be used to encrypt information. This information can only be decrypted using the private key. It is not possible to use the public key for decryption. The private key remains with the administrator and is stored in the key pair list of EDK Manager. The public key is stored in the network share created in the previous section.

10 4 System Requirements For computers with Windows 2000, Windows XP Home Edition, Windows XP Professional, Windows Vista 32-Bit, Windows Server MB of space on your hard drive for installation Screen resolution of at least 800x600 pixels High colour (16 Bit) At least 32 MB of free memory 64 MB of free memory are recommended At least Pentium or comparable CPU A mouse or another Windows-compatible pointing device For Steganos Safe: Additional hard-disk space is needed for the secure drives. In order to use 256 GB per drive, you need the NTFS file system. The FAT32 file system enables a maximum capacity of 4 GB per secure drive. For Portable Safe: CD or DVD burner with corresponding software. Optional and temporary up to 8.5 GB hard-drive space for the Portable Safe package files. In order to use a Portable Safe on another computer administrator privileges are required for the installation of the decryption program. Secure drives cannot be decrypted when stored on compressed NTFS drives. Supported key devices: ActiveSync-compatible devices (e.g. SmartPhones, PDAs), all devices that are recognized by Windows as rewriteable removable media (e.g., USB sticks, memory cards, digital cameras). No key devices are included in the delivery.

11 5 Summary Steganos Safe Professional 2007 is designed to create a space (Safe), that is encrypted and holds all your sensitive data securely. This data would be stored in a cached folder, locally on a laptop and synchronised to a remote server when a network connection is present. On a desktop, there would be a permanent mapped drive to the server where the safe is stored. This product comes with Automatic Crash Protection (ACP) which will keep all your data encrypted even in the case of a power cut or system failure. This will also stop any files from becoming corrupt in these events. Some of the key features EDK (Emergency Decryption Key). If a user has forgotten his password, the administrator can still access the data using EDK. The original password remains a secret. Active directory. Easy installation, configuration and administration centrally using AD and Policies. Security guidelines. Administrative templates for the group policy editor enable the implementation of your security guidelines. You can determine password guidelines, if and how data is to be permanently destroyed, if key devices such as USB sticks can be used etc. Encrypt your Outlook Mailbox with the implemented Mailbox Encryption. Shared use of secure drives. Several authorized users receive read access to a common secure drive on the network. Any number of safes. You can create any number of secure drives, each up to 256 GB. Steganos Portable Safe. Simply take encrypted data with you on CD, DVD or USB devices. These are usable everywhere without additional software*.

12 *The Encryption Engine hast to be installed once on the computer you want to access the encrypted data.

Steganos Security Suite 2006 released to increase privacy protection for UK PC users

Steganos Security Suite 2006 released to increase privacy protection for UK PC users 1 Steganos Security Suite 2006 released to increase privacy protection for UK PC users The latest version of the leading encryption software offers stronger encryption and more user-friendly decryption,

More information

Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out!

Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out! PRESS RELEASE APPROVED FOR RELEASE Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out! Steganos, the Frankfurt based expert on encryption and anonymization

More information

PGP NetShare Quick Start Guide version 9.6

PGP NetShare Quick Start Guide version 9.6 PGP NetShare Quick Start Guide version 9. What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. You can use PGP NetShare to: Let

More information

ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE

ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE ACRONIS TRUE IMAGE 11 HOME REVIEWER S GUIDE Acronis True Image 11.0 Home provides the maximum flexibility to ensure you are adequately protected and can recover from unforeseen events such as viruses,

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

Help & User Manual. Table of Contents. 1 Introduction of Safe-All. 2 Safe-All Installation. 3 Safe-All Login. 4 Safe-All Functions & Features

Help & User Manual. Table of Contents. 1 Introduction of Safe-All. 2 Safe-All Installation. 3 Safe-All Login. 4 Safe-All Functions & Features Help & User Manual Table of Contents No. Chapter 1 Introduction of Safe-All 2 Safe-All Installation 3 Safe-All Login 4 Safe-All Functions & Features 4.1 Virtual Drive 4.2 Shredder 4.3 Disk-Wipe 5 Tools

More information

Install and setup TrueCrypt

Install and setup TrueCrypt Install and setup TrueCrypt Install and setup TrueCrypt This guide is for organisations and individuals who wish to use TrueCrypt to secure their computer(s) and/or portable USB drives. It explains how

More information

Lockngo Professional

Lockngo Professional Lockngo Professional User Manual Rev. 26-04.15 Updated for Version 7 Page 1 Table of contents 1. System Requirements...3 2. Using Lockngo...3 2.1. The Lockngo user interface...3 2.2. Locking your portable

More information

Travel Lite ( 旅 ) USER MANUAL. 2.5 SATA to USB EXTERNAL ENCLOSURE

Travel Lite ( 旅 ) USER MANUAL. 2.5 SATA to USB EXTERNAL ENCLOSURE Travel Lite ( 旅 ) USER MANUAL 2.5 SATA to USB EXTERNAL ENCLOSURE Hardware Installation Guide HDD Formatting Guide Please NOTE: In order to enable HOT-SWAP function, please check to make sure the motherboard

More information

Product Highlights Introduction... 3 Key Features Key Features & Benefits... 4

Product Highlights Introduction... 3 Key Features Key Features & Benefits... 4 Content Product Highlights... 3 Introduction... 3 Key Features... 3 Key Features & Benefits... 4 Complete Burning Tool... 4 Burn All Media to Any Disc... 4 Desktop Burning Gadget... 4 Virtual Drives...

More information

Exclaimer Mail Archiver Release Notes

Exclaimer Mail Archiver Release Notes Exclaimer Mail Archiver 3.9.0 Release Notes Release Number The current Release Number for this product is: 3.9.0. System Requirements: Mail Archiver Console and Web Server Hardware Minimum Requirements

More information

PcZealous [Professional] User Manual

PcZealous [Professional] User Manual STEPS TO INSTALL PcZEALOUS [Professional]: Double Click on the PcZealous [Professional] Setup.exe file. In the welcome screen as shown below, Click the Next button Read the Software License Agreement,

More information

PGP Whole Disk Encryption Quick Start Guide Version 9.7

PGP Whole Disk Encryption Quick Start Guide Version 9.7 PGP Whole Disk Encryption Quick Start Guide Version 9.7 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data

More information

PGP Whole Disk Encryption for Windows Quick Start Guide Version 9.10

PGP Whole Disk Encryption for Windows Quick Start Guide Version 9.10 PGP Whole Disk Encryption for Windows Quick Start Guide Version 9.10 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect

More information

Manually Wipe Hard Drive Windows 7 Command Prompt Format

Manually Wipe Hard Drive Windows 7 Command Prompt Format Manually Wipe Hard Drive Windows 7 Command Prompt Format Pro tip: Use Windows 8's Format command to perform a secure disk wipe He asked me what program I would recommend for securely wiping a disk. Microsoft

More information

Windows Xp Manual Software Setup File Recovery

Windows Xp Manual Software Setup File Recovery Windows Xp Manual Software Setup File Recovery This manual method requires only 3 steps: STEP 1: Format USB drive This method doesn't work for Windows XP bootable USB drive. So without any further Setup

More information

InfoWatch CryptoStorage. User Guide

InfoWatch CryptoStorage. User Guide InfoWatch CryptoStorage User Guide I N F O W A T C H C R Y P T O S T O R A G E User Guide ZAO InfoWatch Phone/fax: +7(495)22-900-22 http://www.infowatch.com Last edited: December 2008 Table of Contents

More information

How To Fix Regedit Windows Xp Install Cd With Sp3 On Usb

How To Fix Regedit Windows Xp Install Cd With Sp3 On Usb How To Fix Regedit Windows Xp Install Cd With Sp3 On Usb stability problems after installing software, drivers, or messing with Registry entries. To put Windows XP installation media onto a bootable USB

More information

Acronis Disk Director 11 Home. Quick Start Guide

Acronis Disk Director 11 Home. Quick Start Guide Acronis Disk Director 11 Home Quick Start Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone",

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52 Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Chapter 1: Please follow these steps below.

Chapter 1: Please follow these steps below. User Manual Chapter 1: Please follow these steps below. For the first time you use it, Windows will install the drivers automatically. The utoplay window displays when inserting ikey. When the

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions.

VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions. User's Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone", Acronis Try&Decide, and the Acronis

More information

New in this Release...3 New in Pointsec Media Encryption New in this Release of Pointsec Media Encryption - MI Client...4

New in this Release...3 New in Pointsec Media Encryption New in this Release of Pointsec Media Encryption - MI Client...4 Release Notes Pointsec Media Encryption - MI Client 2.6 Version B Copyright Pointsec Mobile Technologies AB, 2007, a Check Point Software Techonologies Ltd. company. For full documentation, please see

More information

Egress Switch Desktop Client

Egress Switch Desktop Client 1 COMMERCIAL IN CONFIDENCE Egress Switch Desktop Client User guide Copyright 2017 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality Statement This document

More information

KON-BOOT For Windows Guide

KON-BOOT For Windows Guide KON-BOOT For Windows Guide http://thelead82.com http://www.kon-boot.com General notes PLEASE KEEP YOUR ANTIVIRUS DISABLED WHILE EXTRACTING / BURNING / INSTALLING KON-BOOT Table of contents General notes...

More information

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders 13 August 2002 File System Section Seven NTFS, EFS, Partitioning, and Navigating Folders NTFS DEFINITION New Technologies File System or NTFS was first applied in Windows NT 3.0 back in 1992. This technology

More information

Acronis Backup & Recovery 11 Beta Advanced Editions

Acronis Backup & Recovery 11 Beta Advanced Editions Acronis Backup & Recovery 11 Beta Advanced Editions Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems... 3 3 Where do I install the components?... 3 4 What you need

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

3M Molecular Detection System Software Upgrade/Installation Instructions

3M Molecular Detection System Software Upgrade/Installation Instructions User Manual Supplement Number: TB.342837.03 Effective Date: March 2018 Supersedes: TB.342837.02 Technology Platform: 3M Molecular Detection System Originating Location: St. Paul, MN 3M Molecular Detection

More information

Authentication is not limited to the workstation logon but it supports also Remote Desktop, Shares, Hyper-V Sessions, etc.

Authentication is not limited to the workstation logon but it supports also Remote Desktop, Shares, Hyper-V Sessions, etc. Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token, USB Memory Stick or just a plain Memory Card such as I2c or Mifare. Authentication is

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

Sophos Central Device Encryption. Administrator Guide

Sophos Central Device Encryption. Administrator Guide Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption

More information

CleanMyPC User Guide

CleanMyPC User Guide CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset

More information

File Archiving Whitepaper

File Archiving Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 requirements... 2 2. product overview... 3 features... 3 Advantages of BackupAssist... 4 limitations... 4 3. Backup considerations...

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

EaseUS Partition Master

EaseUS Partition Master EaseUS Partition Master User Guide Table of content Table of content... - 2 - Overview... - 1 - Welcome... - 1 - Edition comparison... - 1 - Getting started... - 2 - Hardware requirements... - 2 - Supported

More information

DriveClone 7 Pro. Main Features: Simplify & automat backup and disaster recovery for laptops & workstations. DriveClone 7. System Requirements

DriveClone 7 Pro. Main Features: Simplify & automat backup and disaster recovery for laptops & workstations. DriveClone 7. System Requirements TM Pro Simplify & automat backup and disaster recovery for laptops & workstations Pro is all you need to totally protect your computers from a disaster. assures that photos, music, documents and everything

More information

H A N D O U T : I D E N T I F Y I N G A N D M I T I G A T I N G H A R D D R I V E I S S U E S

H A N D O U T : I D E N T I F Y I N G A N D M I T I G A T I N G H A R D D R I V E I S S U E S Revision Date: 5/31/2013 Time 1.0 Hour KEY POINT S A hard drive making a clicking sound is caused by the unloading and loading its heads. However, clicking, grinding or squealing means the hard drive may

More information

Backup challenge for Home Users

Backup challenge for Home Users PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com

More information

PGP Desktop for Windows Quick Start Guide Version 10.0

PGP Desktop for Windows Quick Start Guide Version 10.0 PGP Desktop for Windows Quick Start Guide Version 10.0 What is PGP Desktop? PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals

More information

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx: Applications for Encryption and Digital Signature CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server

More information

BitLocker to Go: Encryption for personal USB

BitLocker to Go: Encryption for personal USB BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes

More information

Guidelines for Use of IT Devices On Government Network

Guidelines for Use of IT Devices On Government Network Guidelines for Use of IT Devices On Government Network October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0 BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1 Version 5.0 March 2009 2.1 Operating System 2.2 File Management 2.1.1 First Steps 2.1.1.1 Start the computer

More information

Symantec Drive Encryption for Mac OS X Quick Start Guide Version 10.3

Symantec Drive Encryption for Mac OS X Quick Start Guide Version 10.3 Symantec Drive Encryption for Mac OS X Quick Start Guide Version 10.3 What is Symantec Drive Encryption? Symantec Drive Encryption is used to lock down the entire contents of your system or an external

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

3 INSTALLING WINDOWS XP PROFESSIONAL

3 INSTALLING WINDOWS XP PROFESSIONAL INSTALLING WINDOWS XP PROFESSIONAL.1 Preparing for installation Objectives.1.1 Windows XP Professional Hardware Requirements.1.2 Hardware Compatibility List (HCL) check.1. Hard Disk Partition.1.4 Required

More information

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social

More information

Freshman - USB. Storage Enclosure for 2.5 IDE or SATA Hard Drives. User Manual

Freshman - USB. Storage Enclosure for 2.5 IDE or SATA Hard Drives. User Manual Storage Enclosure for 2.5 IDE or SATA Hard Drives User Manual v1.0 June 29, 2007 EN Table of Contents CHAPTER 1 - INTRODUCTION 1 ICON KEY 1 THE FRESHMAN USB 1 OTHER AVAILABLE INTERFACES 1 SYSTEM REQUIREMENTS

More information

Windows Data Recovery 7

Windows Data Recovery 7 Stellar Phoenix Windows Data Recovery 7 Stellar Phoenix Windows Data Recovery helps you recover lost files, folders, documents, photos, music & other important files, after all instances of data loss including

More information

System Requirements: -Desktop or laptop computers with USB 1.1 or USB 2.0 port

System Requirements: -Desktop or laptop computers with USB 1.1 or USB 2.0 port Introduction: Thank you for purchasing Axiom's Ultra High Speed E.S.P. Drive (Encryption Software Protection) with 448-Bit Blowfish Encryption Technology making it the best solution for data security on

More information

Users Policies. PRAN-RFL Group. [Owner: MIS Department, PRAN-RFL Group] Approved by: MIS Department Version: 1.0

Users Policies. PRAN-RFL Group. [Owner: MIS Department, PRAN-RFL Group] Approved by: MIS Department Version: 1.0 2012 Users Policies PRAN-RFL Group [Owner: MIS Department, PRAN-RFL Group] Approved by: MIS Department Version: 1.0 e Governing Policy The employee must read the PRAN-RFL Group MIS Policies and Procedures

More information

Windows Key e: Press and hold down the Windows (Start) Key and tap the letter e one time. Release these keys and Windows File Explorer will open.

Windows Key e: Press and hold down the Windows (Start) Key and tap the letter e one time. Release these keys and Windows File Explorer will open. Copyright 2009 BOSMA Enterprises Chapter 14 Windows File Explorer Key Terms Windows Key e: Press and hold down the Windows (Start) Key and tap the letter e one time. Release these keys and Windows File

More information

TotalShredder USB. User s Guide

TotalShredder USB. User s Guide TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

Manual Format Windows 7 Using Usb Drive Fat32

Manual Format Windows 7 Using Usb Drive Fat32 Manual Format Windows 7 Using Usb Drive Fat32 How To Format A Hard Drive FAT32 In Windows 7 (1TB Toshiba) USB Drive The. A flash drive is a small and portable electronic device that saves data using flash

More information

Team Project Management

Team Project Management TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

For this class we are going to create a file in Microsoft Word. Open Word on the desktop.

For this class we are going to create a file in Microsoft Word. Open Word on the desktop. File Management Windows 10 What is File Management? As you use your computer and create files you may need some help in storing and retrieving those files. File management shows you how to create, move,

More information

10.User Password and Object Security

10.User Password and Object Security 10-1 10.User Password and Object Security This chapter discusses the protection for operations provided by setting up user passwords and security classes. 10.1. Overview... 10-2 10.2. User Password and

More information

How Do I Install Vista Drivers On Windows 7. Without Admin Rights >>>CLICK HERE<<<

How Do I Install Vista Drivers On Windows 7. Without Admin Rights >>>CLICK HERE<<< How Do I Install Vista Drivers On Windows 7 Without Admin Rights Within the WDK installation directory, the package's source files are located in the to Cmd.exe, right-click the Cmd.exe shortcut, and select

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

PGP Desktop for Windows Quick Start Guide Version 10.1

PGP Desktop for Windows Quick Start Guide Version 10.1 PGP Desktop for Windows Quick Start Guide Version 10.1 What is PGP Desktop? PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

Jetico Central Manager Administrator Guide

Jetico Central Manager Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Virtual CD TS 1 Introduction... 3

Virtual CD TS 1 Introduction... 3 Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39 Contents Before you begin... vii Topic 1: Start a computer and use system information and features... 1 1A Make your workspace safe... 3 1B Work safely... 14 1C Start up the computer... 17 1D Know about

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

1 Attended Installation of Windows 2000 Server

1 Attended Installation of Windows 2000 Server 770c01.qxd 10/5/00 5:45 PM Page 1 1 Attended Installation of Windows 2000 Server TEST YOURSELF OBJECTIVES 1.01 Preparing for Installation 1.02 Four-Step Process from CD-ROM 1.03 Installing Over the Network

More information

CityVault Client Manual

CityVault Client Manual CityVault Client Manual Contents Preface: Preface...4 Chapter 1: Overview...5 Chapter 2: Installing CityVault...6 Downloading the CityVault Client...6 Installing the CityVault Client...6 Configuring CityVault...8

More information

A Foxit Software Company White Paper

A Foxit Software Company White Paper A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...

More information

tibase Intelligent data management for titration

tibase Intelligent data management for titration tibase Intelligent data management for titration Modern data management with tibase 02 Both in terms of quality assurance and traceability, the archiving of determination data is absolutely essential.

More information

SafeGuard Enterprise user help. Product version: 8.0

SafeGuard Enterprise user help. Product version: 8.0 SafeGuard Enterprise user help Product version: 8.0 Contents 1 About SafeGuard Enterprise...4 2 SafeGuard Enterprise modules...5 3 Security recommendations...7 4 Full disk encryption...9 4.1 Encryption

More information

Endpoint Protection with DigitalPersona Pro

Endpoint Protection with DigitalPersona Pro DigitalPersona Product Brief Endpoint Protection with DigitalPersona Pro An introductory technical overview to DigitalPersona s suite for Access Management, Data Protection and Secure Communication. April

More information

Kernel for Exchange Server. Installation and Configuration Guide

Kernel for Exchange Server. Installation and Configuration Guide Kernel for Exchange Server Installation and Configuration Guide Table of Contents Table of Contents... 2 1. Introduction... 3 2. Requirements and Prerequisites... 3 2.1 Basic System Requirements... 3 2.2

More information

Basic Computer Operations

Basic Computer Operations Basic Computer Operations Goals By learning terms associated with computers and some basic operations, you'll be ready to make best use of a computer. Contents Computer terms Starting up and shutting down

More information

Remove Office 2000 Without Cd Windows Xp

Remove Office 2000 Without Cd Windows Xp Remove Office 2000 Without Cd Windows Xp I have a used copy of Office 2013, but it arrived without the CD key. Is there any way of finding it? Otherwise, I will have to return the CDs. password on macbook

More information

Easy Data Access Easy Data Access, LLC. All Rights Reserved.

Easy Data Access Easy Data Access, LLC. All Rights Reserved. Copyright @ 2006 Easy Data Access, LLC. All Rights Reserved. No part of this manual, including the software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

F-Secure Client Security. Quick Installation Guide

F-Secure Client Security. Quick Installation Guide F-Secure Client Security Quick Installation Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...5 Chapter 2: Installing Client Security...7 System requirements...8 Stand-alone installation...9

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

KeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele

KeePass Keep your passwords SAFE. John Steele. August 2015 Copyright John Steele KeePass Keep your passwords SAFE John Steele August 2015 Copyright John Steele 2015 1 What we will cover What is the problem with passwords How complex do they need to be How can they be stored safely

More information

How To Install Windows Updates 8 From Usb

How To Install Windows Updates 8 From Usb How To Install Windows Updates 8 From Usb Drive Xp Iso This method doesn't work for Windows XP bootable USB drive. But, if you want to make a bootable drive of Windows 8, Windows 8.1 or Windows 10, you'll

More information

TEXET SIM USB. (Instruction Manual)

TEXET SIM USB. (Instruction Manual) TEXET SIM USB (Instruction Manual) Thank you for purchasing this SIM card reader. Please read this manual carefully to ensure you understand the operation and keep it for future reference. The information

More information

Manually Unlock User Account Windows 7 Standard

Manually Unlock User Account Windows 7 Standard Manually Unlock User Account Windows 7 Standard This is an available way to unlock Windows 7 ultimate password by using USB and user. Here's how to create a User Account in Windows 8 and Windows 7: how

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Applied ICT Skills MS Windows

Applied ICT Skills MS Windows Applied ICT Skills MS Windows Lesson 1 - How to install an operating system into computer? Windows 7 is perhaps the best Microsoft operating system and is very easy to install compared to other windows.

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions October 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

MAXTOR ONETOUCH III MINI EDITION. User s Guide

MAXTOR ONETOUCH III MINI EDITION. User s Guide MAXTOR ONETOUCH III MINI EDITION User s Guide MAXTOR ONETOUCH III MINI EDITION USER S GUIDE Contents Windows Installation Introduction.................................................... 1 About this Guide...............................................

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Laplink DiskImage : Server Edition

Laplink DiskImage : Server Edition 1 Laplink DiskImage : Server Edition Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. Bellevue Corporate

More information

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010 EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide 1 Seagate Manager User Guide Revision 2 2009 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology,

More information

UNDELETE User Guide

UNDELETE User Guide Active@ UNDELETE User Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE overview... 6 Getting started with Active@ UNDELETE... 7 Active@ UNDELETE views and windows... 8 Recovery Explorer view...

More information

Shred hard drives and other storage media safely and efficiently. HSM Powerline HDS 230 hard drive shredder

Shred hard drives and other storage media safely and efficiently. HSM Powerline HDS 230 hard drive shredder Shred hard drives and other storage media safely and efficiently HSM Powerline HDS 230 hard drive shredder Exercise caution when disposing of digital storage media: Data can be stolen! Countless amounts

More information