guide for protecting files from theft on...
TRANSCRIPT
![Page 1: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/1.jpg)
File Protection
Guide for Protecting Files from
Theft on Windows
![Page 2: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/2.jpg)
2
Contact
Developed and Marketed By
Innovative Matrix Softech Pvt. Ltd.
Email: [email protected]
Web: www.SoftwareFileProtection.com
Add: 7013, 7th Floor, Emerald House,
Sarojini Devi Road, Next to Parklane Hotel, Near State bank of Maysore, Paradise Circle,
Hyderabad / Secunderabad- 500 003 India
![Page 3: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/3.jpg)
3
Contents
Contact ....................................................................................................................................................................... 2
Contents ..................................................................................................................................................................... 3
License Agreement..................................................................................................................................................... 4
GoSafe Encryption Service ......................................................................................................................................... 7
GoSafe Windows Login ............................................................................................................................................ 12
Hide default login Credentials ................................................................................................................................. 15
GoSafe Secured Web Login ...................................................................................................................................... 32
![Page 4: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/4.jpg)
4
License Agreement
Note: You cannot share the product referred herein. You cannot sale or resale the product referred herein.
IMPORTANT - READ CAREFULLY BEFORE DOWNLOADING, INSTALLING OR COPYING TO YOUR
COMPUTER ANY FILE(S) CONTAINED HEREWITH.
THE FILE(S) AND OTHER INFORMATION PROVIDED HEREWITH ARE COPYRIGHTED. BY DOWNLOADING
ANY FILE PROVIDED HEREWITH TO YOUR COMPUTER, YOU ARE ACCEPTING AND AGREEING TO THE
TERMS OF THIS LICENSE AGREEMENT. IF YOU ARE NOT WILLING TO BE BOUND BY THE TERMS OF THIS
LICENSE AGREEMENT, PRIOR TO DOWNLOADING OR COPYING ANY FILE(S) TO YOUR COMPUTER, YOU
MUST DECLINE ACCESS TO SUCH MATERIALS.
1. GRANT OF LICENSE: Subject to the provisions contained herein and to the payment of all applicable fees, the
Innovative Matrix Softech Private Limited grants you a non-exclusive, non-transferable license to the materials
contained herewith (the "Product"). Your licensed rights to the Product are limited to the following:
(a) This License Agreement does not convey to you an interest in or to the Product, but only a limited right of use
revocable in accordance with the terms of this License Agreement.
(b) You may install one copy of the Product on, and permit access to it by, a single computer owned, leased or
otherwise controlled by you. In the event that computer becomes dysfunctional, such that you are unable to access
the Product, you may transfer the Product to another computer, provided that the Product is removed from the
computer from which it is transferred and the use of the Product on the replacement computer otherwise complies
with the terms of this Agreement. Neither concurrent use on two or more computers nor use in a local area network or
other network is permitted. You shall not print, merge, adapt, translate, modify, rent, lease, sell, sublicense, assign or
otherwise transfer any of the Product, or remove any proprietary notice or label appearing on any of the Product. You
may copy the Product only for backup purposes.
(c) You acknowledge and agree that the Product is proprietary to the Copyright holder, INNOVATIVE MATRIX
SOFTECH PRIVATE LIMITED, and is protected under Indian copyright law and international copyright treaties. You
further acknowledge and agree that all rights, title and interest in and to the Product, including all intellectual property
rights, are and shall remain with Innovative Matrix Softech Private Limited.
(d) You shall provide INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED or any designee of INNOVATIVE
MATRIX SOFTECH PRIVATE LIMITED with all information necessary to assure compliance with the terms of this
Agreement. In the event you are not in compliance with the terms of this Agreement through the actions of unrelated
third parties, you shall use your best efforts to cooperate with INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED
and any of its designees to assure compliance.
![Page 5: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/5.jpg)
5
2. LIMITED WARRANTY:
(a) INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED warrants for your benefit alone that, unless disclosed in the
Product to the contrary, INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED can license the Product and all
copyright and trademarks related thereto or therein.
(b) THE EXPRESS WARRANTIES SET FORTH IN THIS SECTION 2 CONSTITUTE THE ONLY WARRANTIES
WITH RESPECT TO THE PRODUCT AND INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED MAKES NO
OTHER REPRESENTATION OR WARRANTY OR CONDITION OF ANY KIND, WHETHER EXPRESS OR IMPLIED
(EITHER IN FACT OR BY OPERATION OF LAW) WITH RESPECT TO ANY OF THE PRODUCT, INCLUDING,
WITHOUT LIMITATION, WITH RESPECT TO THE SUFFICIENCY, ACCURACY OR UTILIZATION OF, OR ANY
INFORMATION OR OPINION CONTAINED OR REFLECTED IN, ANY OF THE PRODUCT. INNOVATIVE MATRIX
SOFTECH PRIVATE LIMITED EXPRESSLY DISCLAIMS ALL WARRANTIES OR CONDITIONS OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NO OFFICER, DIRECTOR, EMPLOYEE,
MEMBER, AGENT, REPRESENTATIVE OR PUBLISHER OF THE COPYRIGHT HOLDER IS AUTHORIZED TO
MAKE ANY MODIFICATION, EXTENSION, OR ADDITION TO THIS LIMITED WARRANTY.
3. INDEMNIFICATION: INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED, any agent, representative, publisher
or distributor of the Product, or any of their respective directors, officers, employees, agents, representatives or
members (the "INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED Indemnified Parties") shall have no liability for,
and you shall defend, indemnify and hold each of the INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED
Indemnified Parties harmless from and against, any claim, loss, demand, liability, obligation and expenses (including
reasonable attorneys' fees) based upon or arising out of any injury or damage, or any product liability claim, including
but not limited to, any personal or bodily injury or property damage, arising out of, pertaining to, or resulting in any
way from, the use or possession of any of the Product by you and/or any of your directors, officers, employees,
representatives, agents or contractors.
4. LIMITATION OF LIABILITY:
(a) You acknowledge that each of INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED's obligations and liabilities
with respect to the Product are exhaustively defined in this Agreement. You are responsible for the consequences of
any use of any of the Product (whether or not such use was consistent with the license granted hereunder) created
therefrom. Whether or not INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED has been advised of their
possibility, neither INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED nor any of its representatives or agents,
directors, officers, employees, or members, shall be liable, whether under contract, tort (including negligence) or
otherwise, for any indirect, special, punitive, incidental or consequential loss, damage, cost or expense of any kind
whatsoever and howsoever caused, that may be suffered by you or any of your directors, officers, employees,
agents, representatives or contractors or any third party.
(b) If at any time an allegation of infringement of any rights of any third party is made, or in INNOVATIVE MATRIX
SOFTECH PRIVATE LIMITED's opinion is likely to be made, with respect to any of the Product, INNOVATIVE
MATRIX SOFTECH PRIVATE LIMITED may, at its option and at its own expense (i) obtain for you the right to
continue using the Product, (ii) modify or replace the Product or any portion thereof so as to avoid any such claim of
infringements, or (iii) refund to you the License Fee. INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED shall have
no liability to you if any claim of infringement would have been avoided except for your refusal to use any modified or
replacement Product supplied or offered to be supplied pursuant to this Section 4(b) or to otherwise cease using the
Product. Notwithstanding anything contained in this Agreement, and except as set forth in Section 4(b) hereof,
INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED's liability to you for damages pursuant to this Section 4(b), if
any, shall not exceed the amounts of the License Fee paid by you for the Product subject to any such claim.
(c) Section 4(b) state the entire liability of INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED with respect to the
infringement or alleged infringement of any third party rights of any kind whatsoever by any of the Product.
![Page 6: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/6.jpg)
6
5. TERMINATION: This Agreement may be terminated immediately by INNOVATIVE MATRIX SOFTECH PRIVATE
LIMITED upon breach of any provision of this Agreement by you. Upon any termination of this Agreement, you shall
immediately discontinue the use of the Product and shall within ten (10) days either return file(s) on diskette(s), if any,
to INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED or certify in writing to INNOVATIVE MATRIX SOFTECH
PRIVATE LIMITED that the Product has been deleted from your computer and is eliminated from your premises.
6. GOVERNING LAW; ATTORNEY'S FEES: This Agreement shall be governed by the laws of the Republic of India
without reference to its conflict of laws and provisions and you further consent to jurisdiction by the state and federal
courts sitting in the state of Andhra Pradesh, India.
7. MISCELLANEOUS: This Agreement constitutes the complete and exclusive agreement between INNOVATIVE
MATRIX SOFTECH PRIVATE LIMITED and you with respect to the subject matter hereof, and supersedes all prior
oral or written understandings, communications or agreements not specifically incorporated herein. This Agreement
may not be modified except in writing duly signed by an authorized representative of INNOVATIVE MATRIX
SOFTECH PRIVATE LIMITED and you. If any provision of this Agreement is held to be unenforceable for any
reason, such provision shall be reformed only to the extent necessary to make it enforceable, and such decision shall
not affect the enforceability (i) of such provision under other circumstances, or (ii) of the remaining provisions hereof
under all circumstances. Headings shall not be considered in interpreting the Agreement.
8. EXPORT: You cannot load or export or re-export any of the Product or any underlying information or technology
without prior consent from the Innovative Matrix Softech Private Limited. You may not load or export or re-export any
of the Product or any underlying information or technology except in full compliance with all applicable laws of
republic of India and other applicable laws and regulations.
9. By agreeing to this license agreement, you also agree to general terms and conditions given on our
website www.isohelpline.com (either on home page or product related pages)
BY ACCESSING THE PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ THE TERMS OF THIS
LICENSE AGREEMENT AND AGREE TO BE BOUND BY ITS TERMS.
![Page 7: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/7.jpg)
7
GoSafe is designed for safety of digital content on personal as well as corporate
systems. GoSafe uses very strong AES 128 Encryption.
Here is a brief guide on how to use GoSafe.
Gosafe includes three applications.
1. GoSafe Encryption Service (Safety of digital contents)
2. Secured Windows Login (Securing hardware access)
3. Secured Web Login (Safety of online passwords)
1. GoSafe Encryption Service
In this application you can encrypt files of the mentioned programs in such a way
that they will open only when GoSafe Dongle is connected.
GoSafe Encryption Service can be used to control application specific permissions
for the users for applications such as MS Word, Excel, PowerPoint, Outlook, VLC
Audio Video, AutoCad, Cadian, Solid Works, Quark Xpress, Adobe Reader.
2. Secured Windows Login
To protect computer hardware from unauthorized login, GoSafe comes with
Dongle Protected Windows Credential Provider or Login Control.
Dongle login is safer than password which can be recorded in a CCTV camera (if
mounted nearby strategically). Dongle login is safer than Finger Print which can
be extracted from your coffee cups or water bottles.
![Page 8: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/8.jpg)
8
3. Secured Web login
GoSafe comes with “GoSafe Web Browser” which provides secured login
to facebook, twitter, gmail, linkedIn and live accounts.
Specially designed for students who work on collage systems monitored
by CCTV giving vulnerability as passwords can be seen from CCTV
recordings and misused.
![Page 9: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/9.jpg)
9
Flow chart for using GoSafe:
Set Admin Password
Set Windows Login
Credentials and User
password
Set Encryption Keys Set Web Login
Credentials
Set User Permissions Hide default Login
Credentials (Not
Recommended)
![Page 10: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/10.jpg)
10
Every dongle has two passwords, Admin password and User password. Admin
password by default are given as “123456”. User password is set by admin during
step 2.
Set Admin password:
Creating/Changing Admin password
Insert GoSafe dongle.
Open “GoSafe Login Credentials”.
Click on “Change Password” enter “Old Password” or the default password
123456 (if you are changing for the first time). Enter the new password and
click on “OK”.
Admin password should be kept in a safe place and should not be disclosed
to anyone, if not so, then anyone who gets hold of admin password can
change permissions of the dongles and your data will be in danger.
You can reset your admin password, in case you forget it, by using
Encryption keys of the dongle.
Most people use 123456….. name123456……. qwerty…. etc while
typing manual password. Use strong passwords and keep backup of
the password for future use.
![Page 11: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/11.jpg)
11
To reset your dongle password click on Reset Password >> Load keys From
File(load the encryption key) >> Enter new keys >>ok .
Load the encryption
keys
Crete new password
and click on OK
Click here Reset
password.
![Page 12: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/12.jpg)
12
Set Windows Login Credentials and User password
By setting Windows Login credentials, you restrict access to your
computer, i.e., it can be opened only when dongle is connected and user
password is entered.
Open “GoSafe Login Credentials”, select “Windows” in “Select
Settings”.
Enter the dongle
password and click GO
Select windows in the
drop down list
![Page 13: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/13.jpg)
13
Enter your Windows username and password, enter user password for
the dongle.
Click on “Save Login Credentials”. Next time when you login to your
windows, connect the dongle and enter the user password, or else you
will not be able to login.
Enter the username of
windows
Enter the password of
your windows
Enter the Dongle password for
user, which you need to enter
while login and to start
“GoSafe Encryption Service”.
Click on “Save Login
Credentials”
![Page 14: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/14.jpg)
14
When you logon to your windows next time, you will see a screen similar as
below.
If you don’t see similar screen as below, then the screen is your default
screen click on “Switch User”.
Default Windows Credential Provider
you can also remove it, but it is not recommended, as it
may create problem, if you lost the dongle. You will see
your login name as well as all other users in your
system.
GoSafe Credential Provider
This is added by our installation.Click this
to login with GoSafe Dongle just made.
Enter the Dongle password for
user, given by you, while
setting “Windows Login” and
click on enter, make sure your
GoSafe Dongle is connected,
which you used while setting
“Windows Login”.
![Page 15: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/15.jpg)
15
How to hide default credential providers from the Windows
Logon User Interface (Not Recommended).
After installation of GoSafe Login Credentials, several credential providers
are available to logon from the Windows logon user interface.
There are some steps to hide certain credential providers from the
Windows logon user interface. This way, you can ensure that only the
GoSafe Login Credentials is available for logon.
Step 1: Go to Start Menu and Run (gpedit.msc).
![Page 16: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/16.jpg)
16
You will see the above window.
![Page 17: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/17.jpg)
17
Step 2: Go to the Computer Configuration -> Administrative Templates -> System
-> Logon.
![Page 18: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/18.jpg)
18
Step 3: Right Click on Exclude credential providers and Edit.
![Page 19: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/19.jpg)
19
Step 4: Click on Enabled and Enters the comma-separated CLSID to exclude
multiple credential providers.
Type CLSIDs here separated by comma
![Page 20: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/20.jpg)
20
List of default Windows 7 credential providers CLSIDs
Generic Provider
{25CBB996-92ED-457e-B28C-
4774084BD562}
NPProvider
{3dd6bec0-8193-4ffe-ae25-e08e39ea4063}
VaultCredProvider
{503739d0-4c5e-4cfd-b3ba-d881334f0df2}
Password Provider
{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}
Password Provider\LogonPasswordReset
{8841d728-1a76-4682-bb6f-a9ea53b4b3ba}
Smartcard Credential Provider
{8bf9a910-a8ff-457f-999f-a5ca10b4a885}
Smartcard Pin Provider
{94596c7e-3744-41ce-893e-bbf09122f76a}
WinBio Credential Provider
{AC3AC249-E820-4343-A65B-
377AC634DC09}
CertCredProvider
{e74e57b0-6c6d-44d5-9cda-fb2df5ed7435}
![Page 21: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/21.jpg)
21
This table shows the Windows 7 and Windows 8 GUIDs for these in-box providers:
Password Credential Provider Windows 7 GUID
6f45dc1e-5384-457a-bc13-2cd81b0d28ed
Windows 8 GUID
60b78e88-ead8-445c-9cfd-0b87f74ea6cd
Smart Card Credential Provider Windows 7 GUID
8bf9a910-a8ff-457f-999f-a5ca10b4a885
Windows 8 GUID
8fd7e19c-3bf7-489b-a72c-846ab3678c96
Biometric Credential Provider Windows 7 GUID
8fd7e19c-3bf7-489b-a72c-846ab3678c96
Windows 8 GUID
bec09223-b018-416d-a0ac-523971b639f5
![Page 22: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/22.jpg)
22
Step 5: Click on Apply and OK.
After applying the setting, only the GoSafe Login Credentials is shown during the
authentication process.
![Page 23: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/23.jpg)
23
Note:
1. Hiding credential providers via group policy only work in windows 7
Professional and Ultimate and Windows 8 Professional and Ultimate. This is not
work in Windows Home Basic and Premium version.
2. Hiding credential providers via group policy also applies to UAC and Run As
authentication dialog boxes.
3. Hiding the Generic Provider {25CBB996-92ED-457e-B28C-4774084BD562}
and the NPProvider {3dd6bec0-8193-4ffe-ae25-e08e39ea4063} may result in a
state, where authentication against websites or applications that require "Basic
Authentication (HTTP 401 Challenge)" or "Digest Authentication (HTTP 401
Challenge)" may fail.
4. Make sure you unhide the hidden credential providers again if you plan to
remove GoSafe Login Credentials from your system. If you leave them hidden,
following removal of GoSafe Login Credentials, the Windows Logon User
Interface does not provide you with a credential provider to authenticate, and the
Windows credential providers remain hidden.
![Page 24: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/24.jpg)
24
Set Encryption Keys
You need to set Encryption Keys for the dongles before using it for the first
time.
You generate two keys each of 100 character length.
These keys are used for encrypting your files.
Open “GoSafe Login Credentials” enter the dongle password, Select
“Software Permissions” in “Select Settings”, now “Set Encryption Keys ”
button is activated.
Click here to set
encryption keys and to
change/reset admin
password of dongle
![Page 25: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/25.jpg)
25
Enter the dongle password, generate two keys key 1 and key 2 and save
them in a safe place.
1. Enter the dongle password
and click “GO”
2. Generate
encryption keys of 100
characters each, or
type it manually
3. Save these keys in a
safe place so that no
one can get hold of it
![Page 26: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/26.jpg)
26
Set User Permissions
After creating Admin and user password for each dongle you need to give
permissions to the dongles i.e., which software files to be encrypted and which
are not be.
To give software permissions,
Insert GoSafe Dongle.
Open GoSafe Login Credentials.
Enter “Admin” password of the dongle and click “GO”.
Select “Software Permissions” from the dropdown box in “Select Settings”.
Select Software
permissions
Enter the dongle
password and click GO
By default permission
is set to Not Allowed
for all the softwares.
![Page 27: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/27.jpg)
27
Now you can see 10 types of software programs, MS Word, Excel,
PowerPoint, Outlook, VLC Audio Video, AutoCad, Cadian, Solid Works,
Quark Xpress, Adobe Reader.
Once GoSafe is installed on the machine none of the above mentioned
software/programs will open until the dongle is connected and permissions
are set.
For each Software program you can set four types of permission
1. Not Allowed
In case permission is given as “Not Allowed” to a program/software
then the user cannot even open the program/software once Gosafe is
installed on the computer.
2. Normal
In case permission is given as “Normal” to a program/software then the
user can use the program/software like a normal program though
Gosafe is installed on the computer.
3. Encrypted
In case permission is given as “Encrypted” to a software then user can
encrypt previous files of the program/software, once Gosafe is installed
then every file created in the software will be encrypted automatically.
4. Encrypted++
if permission is given as “Encrypted++” to a software then user can
perform both operation encryption and Decryption. In addition user can
also send unencrypted files by email or copy to external media. Hence
Admin should make sure that this permission is given to authorized
persons only.
![Page 28: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/28.jpg)
28
Select the required permission
for every software; keep it as
normal if you don’t want to
encrypt files of that particular
software.
Read the dongle to
see its current
permissions.
![Page 29: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/29.jpg)
29
After setting permissions to Dongle, select “Dongle setting” from the
dropdown box, you can give three types of dongle setting.
1. Only to Set Encryption
If you select “Only to set Encryption” then once GoSafe is installed and
encryption is set you can remove the dongle.
2. No Dongle : Screen Lock
If this setting is set to a dongle and anyone tries to remove the dongle,
computer screen will be completely locked.
3. No Dongle : Close Programs
If this setting is set to a dongle then the software/programs will
automatically close once the dongle is removed. This means dongle
should remain connected all the time.
Select the
dongle setting
and click on
“Save
Permissions”
![Page 30: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/30.jpg)
30
You can also see the previously set permissions to a dongle, by clicking on
“Read Dongle”.
After setting permissions to the dongle click on “Save Permissions”.
Similarly, insert other dongles and give respective permissions.
Once GoSafe is installed on a computer only Admin can stop/uninstall it.
Encrypt Files
After installation of GoSafe , right click on the “GoSafe icon” in the taskbar
you can see an option “Encrypt Files”, which will allow you to encrypt the
formats of the programs to which Encrypted or Encrypted++ permission is
given.
Now select the file you want to encrypt and click on “Open”.
You will be able to select only files of the program to which you have given
the permission as “Encrypted” or “Encrypted++”.
The file will be copied to a folder in My Documents named
“GosafeFileEncryption” which will be encrypted file.
Right click on GoSafe
icon, if you have given
permission as
“Encrypted” or
“Encypted++” to any
of the software then
you can see the option
“Encrypt Files”.
![Page 31: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/31.jpg)
31
Decrypt Files
Decryption can be performed by the users on the file formats of programs
to whom “Encrypted++” permission is given by the Admin.
Right click on GoSafe Icon in the taskbar, “Decrypt Files” option will be
visible if permission is given as “Encrypted++” to any of the programs, if
not, no such option will be visible.
You can select your file to be Decrypted from “GoSafeEncryptedFiles”
folder in “My Documents” only.
Select the file and click on “Open”.
Now your file is decrypted and stored in “GoSafeDecrytpedFiles” folder in
“My Documents” which is automatically created.
Right click on GoSafe
icon, if you have given
permission as
“Encypted++” to any
of the software then
you can see the option
“Encrypt Files” and
“Decrypt Files”
![Page 32: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech](https://reader035.vdocuments.net/reader035/viewer/2022071019/5fd2d737685ba0729041abf1/html5/thumbnails/32.jpg)
32
Set Web Login Credentials
Open “GoSafe Login Credentials”, enter the dongle Admin
password.
Select the website
Google/Microsoft/LinkedIn/Facebook/Twitter.
Enter the username and password of the website.
Click on save credentials.
Now you open use “GoSafe Web Broser” and login to these
sites with GoSafe Dongle. This can be done when you feel the
area in which you are working is not safe. On click on the icon
of the website you will be asked for user password and you will
be logged in.
Select the website
from the dropdown
list
Enter the username of
the website
Enter the password of
the website
Save login credentials