IMPORTANT! Files saved to this USB are NOT automatically encrypted. You must use the SecureLock II software interface to secure your files.

Similar documents
Kanguru Defender Secure USB Flash Drive

Super USB. User Manual. 2007, March

Lockngo Professional

INSTALLING THE PS3 XBOX READY SOFTWARE:

Thank you for purchasing itwin. itwin provides simple and secure file sharing between two online computers.

HDD Password Tool. User s Manual. English

Version March 7, 2012

SafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4

Installing VPN client by Jupiter Networks:

ModeChanger

IP Installer User's Manual

Kanguru Defender V2 Rev.2 User Manual

User Guide. SimpleSafe. Flash Drive Security Software. For SimpleTech flash drives: Bonzai Xpress (STI-UFDBXA/XXX) SimpleTech USB 2.

NETWORK PRINT MONITOR User Guide

User Manual for Imation Flash Login Software

DATALOCKER H100 ENCRYPTED HARD DRIVE. User Guide

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

SecureTraveler User s Manual

KMnet Viewer. User Guide

Stealth HD Bio Quick Start Guide

IRONKEY H80 USER GUIDE

System Requirements: -Desktop or laptop computers with USB 1.1 or USB 2.0 port

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide 1

Qbox User Manual. Version 7.1

Aegis Padlock DT. User s Manual

For this class we are going to create a file in Microsoft Word. Open Word on the desktop.

To complete this project, you will need the following folder:

Data Safe III. USB2.0 External HDD. User Manual

SIMATIC. SIMATIC Logon V User management and electronic signatures 1. Hardware and Software Requirements 2. Scope of delivery 3.

DeskApp User Manual. Release 1.0 final. Kopano

LiveViewer Application

i-disk Shield 2.0 Secure AES Manager User s Manual

Table of Contents. A. Introduction...2. B. General Description...2. C. Features...3. D. Before Using the Security Application Program LOCK...

Dedicated Security Software for USB Flash Drive

InfoWatch CryptoStorage. User Guide

Back to My Mac User Guide

Aegis Padlock SSD. User Guide. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

Copyright istorage, Inc All rights reserved.

Operating Instructions

KEYPAD MODEL USER MANUAL

Discovering Computers & Microsoft Office Office 2010 and Windows 7: Essential Concepts and Skills

MAXTOR ONETOUCH III MINI EDITION. User s Guide

Firmware Update Instruction Manual

Symantec Enterprise Vault

User Guide. Rebit Backup.

ZENworks 11 Support Pack 4 Endpoint Security Utilities Reference. October 2016

CESecure Quick Start Guide

Content: Step-by-Step instructions to duplicate MS Outlook files to a file. Purpose: To move content from one computer to another.

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 3 Introducing Windows Operating Systems

California Institute of Technology

12.0 Setting up the PC ready for BESA 11

KYOCERA Net Viewer 5.3 User Guide

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

DEFENDER F100 & DEFENDER F150 USER GUIDE

Paraben s Voice Logger. v User Manual

Deployment User Guide

User Manual v

W-E

Password Memory 7 User s Guide

Instructions for Installing FlashUpdate and Downloading Updates for NPRT 2200 Noise Power Ratio Test Set

Pocket Drive II. USB2.0 External HDD. User s Manual

R8000 Upgrade to

System Requirements for Mac OS X Clients. Download View Client Package. **Take note: This guide is not a detailed step by step guide.

PM1703MO-1BT/PM1401GNB USER SOFTWARE GUIDE

USB OVER ETHERNET ANYPLACEUSB-H3 USER S MANUAL

Planer Incubator Management Software. User Guide Planer plc Planer plc

PGP Whole Disk Encryption for Windows Quick Start Guide Version 9.10

JetFlash User s Manual

Oracle Project Time and Expense User s Guide. RELEASE 11 October 1998

Anti-Executable Standard User Guide

Storage Security Software (Version )

Eaget Fingerprint Flash Drive

Microcat Daihatsu. Parts Quick Start Guide

To complete this activity, you will need the following files:

MyDataZone User s Manual

POD HD Edit Installer Guide

USER MANUAL TOUGH DRIVE EXTERNAL MOBILE HARD DRIVE / 2.5" / USB 2.0. Rev. 848

KYOCERA Net Viewer User Guide Supplement

Avaya CallPilot Mini/150 Desktop Messaging Quick Reference Guide

PROXIMITY Encoding System

How to Use Internet Explorer 9

Parallels Remote Application Server

User Manual. Virtual and Hardware Appliance User Manual - Version

HDD external enclosure for data-storage mobility with LAN sharing LAN MAC. USER Manual

Quick Start Guide Getting started with NSN Connect

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 7

USB 2.0 All-in-One Cable

Manual Download. Please visit SUNIX website by searching keyword isafe or KEY-256UN1 for detail.

Lesson 4 - Creating a Text Document Using WordPad

How to Use imageprograf Firmware Update Tool (Version or later) (Mac OS) Canon Inc.

CitiDirect Basics: Comprehensive Guide

XC USB 2.0 Smart Transfer Cable

PGP Whole Disk Encryption Quick Start Guide Version 9.7

Day : Date : Objects : Open MS Excel program. Subject : * Open Excel application. Select : start. Choose: programs. Choose : Microsoft Office

SP HDD Lock Utility User Manual rev.01. SP HDD Lock Utility. User Manual

Computer Essentials Session 1 Lesson Plan

User Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE

DriveWare. User s Guide DriveBrowser

SIMATIC HMI. Software RemoteOperate V2. Preface. Overview 1. Range of functions of the RemoteOperate software. Hardware and software requirements

Transcription:

IMPORTANT! Files saved to this USB are NOT automatically encrypted. You must use the SecureLock II software interface to secure your files. SecureLock II User Manual Encryption Application for USB Flash Drives User Manual Version 1.0.0.3 2004-2012 Integral Memory plc

Table of Contents Table of Contents... 2 1. Introduction... 3 2. System Requirements... 4 3. Working with SecureLock II... 5 3.1. Setting up SecureLock II... 5 3.2. Setting up a Password... 6 3.3. Password retries... 8 3.4. Display Settings... 8 3.5. Using Drag & Drop to copy files... 9 3.6. Opening and modifying files within SecureLock II... 11 3.7. Security settings... 12 4. Safely Remove Hardware... 13 5. Support... 14 6. Important Notice / Disclaimer... 15

1. Introduction Protecting data in transit is essential to ensure no third party has access to data in case a USB Flash Drive is lost, misplaced or stolen. SecureLock II protects data on the USB with Government-approved 256-bit AES CBC-mode encryption. With the intuitive Drag & Drop interface, files can be quickly copied to and from the USB for fast, secure and efficient workflow. SecureLock II is a portable application that does not require any installation process on the host computer. Wherever the USB Flash Drive goes, SecureLock II is saved on the USB and can be used with any compatible Windows PC or Mac.

2. System Requirements Operating Systems: Windows XP (Service Pack 2 is recommended) Windows Vista (all Versions) Windows 7 (all Versions) Windows 8 Mac OS X (10.4+) Available USB port SecureLock II does not require Administrative rights.

3. Working with SecureLock II 3.1. Setting up SecureLock II To start SecureLock II: On Windows OS: simply double-click the SecureLock.exe file from the root folder of the USB Flash Drive. On Mac OS: simply double-click the SecureLock.dmg file from the root folder of the USB Flash Drive.

3.2. Setting up a Password In order to secure (encrypt) your data, you will need to set up a password. The password must be at least 6 (six) characters long. For security reasons, it is recommended that you incorporate letters, numbers and symbols into your password. Enter your password, and then confirm it. It is recommended that you also set up a password reminder that will help you in case you forget your password. For security reasons, the password reminder cannot be the same as the password itself. Click Next to proceed.

Click Finish to complete the password settings and start using the application.

3.3. Password retries Each time the application starts, you will be asked, for security reasons, to type in your password. If your USB is lost or stolen, for your protection the number of password retries is limited to 10. After the password has been entered incorrectly 10 times in a row, SecureLock II will safely erase all encrypted files stored on the USB. The data on the USB cannot be recovered or recreated. It is permanently erased. 3.4. Display Settings In the toolbar area of SecureLock II there are several options available for customizing the SecureLock II display window. Swap Panels to interchange the display of the USB Flash Drive and My Computer panels Show or Hide My Computer Panel to display the My Computer Panel Show Tree View to display a tree-like structure Show Detailed View to show additional information about the files Show List View to display the items as a list The available options can be selected also directly from the main menu, under the View section.

A new option, Preferences, allows you to select whether you want to have a confirmation message displayed before deleting, copying or moving files. 3.5. Using Drag & Drop to copy files A key feature of SecureLock II is the Drag & Drop functionality which allows you to simply drag the file(s) and/or folder(s) that you want to copy on the computer and drop them onto the window of SecureLock II. These files will be automatically encrypted, ensuring that your data stay safe and private.

The file encryption and transfer status can be seen with the help of the progress bar. When the bar reaches the end, your files have been copied and encrypted. You can navigate through your encrypted files if you are using Windows Explorer. Clicking on an item with the right mouse button will give you access to options such as Refresh, Copy and Delete.

We recommend using either the Drag & Drop feature or the shortcut keys for copying and pasting, Ctrl+C and Ctrl+V to transfer data to your USB through the SecureLock II interface. In the toolbar area of SecureLock II you can find additional icons that you can also use to copy and encrypt your files. Note that the files on your USB are not visible after encryption, unless SecureLock II is running. To exit SecureLock II, select the File menu and choose Exit, or simply click the X button in the upper-right corner of the application window. 3.6. Opening and modifying files within SecureLock II Copied data on the USB can be viewed and edited directly from within SecureLock II. This function is accessible with the Open command or double clicking the desired file. The user has to open documents from the USB with the associated application. SecureLock II will try closing these documents once it has exited if a document is modified (saved with the same name or even to the same folder) it will be encrypted and stored on the USB. If a document is modified and saved but fails to be encrypted, for example when the USB is unexpectedly removed, it will be encrypted the next time SecureLock II is started.

3.7. Security settings The security settings can be modified from within SecureLock II. After logging in, you can modify you password. To do this you need to access the security settings menu. This can be done by either selecting Options->Security Settings from the toolbar area or by pressing the hotkey Ctrl + O.

4. Safely Remove Hardware Before you unplug your USB from the USB port of your computer, you have to use the Safely Remove Hardware option from the system tray, otherwise you risk corrupting the data on your USB Flash Drive. To Safely Remove Hardware, double-click on the system tray icon, then select the USB you want to remove from the list and click on the Stop button. A message will appear indicating that the USB can now be securely removed. If a message saying The device cannot be stopped right now appears, you have to close your Windows Explorer, SecureLock II or any other application that is still accessing the data on the USB Flash Drive.

5. Support If you require additional help, please visit http://www.integralmemory.com and read the FAQs or email our support team.

6. Important Notice / Disclaimer Security safeguards, by their nature, are capable of circumvention. Integral Memory cannot, and does not, guarantee that data or devices will not be accessed by unauthorized persons, and Integral Memory disclaims any warranties to that effect to the fullest extent permitted by law. 2004-2012 Copyright Integral Memory plc. All rights reserved. Windows and.net Framework are registered trademarks of Microsoft Corporation. All other names and trademarks are property of their respective owners.