guide for protecting files from theft on...

32
File Protection Guide for Protecting Files from Theft on Windows

Upload: others

Post on 23-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

File Protection

Guide for Protecting Files from

Theft on Windows

Page 2: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

2

Contact

Developed and Marketed By

Innovative Matrix Softech Pvt. Ltd.

Email: [email protected]

Web: www.SoftwareFileProtection.com

Add: 7013, 7th Floor, Emerald House,

Sarojini Devi Road, Next to Parklane Hotel, Near State bank of Maysore, Paradise Circle,

Hyderabad / Secunderabad- 500 003 India

Page 3: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

3

Contents

Contact ....................................................................................................................................................................... 2

Contents ..................................................................................................................................................................... 3

License Agreement..................................................................................................................................................... 4

GoSafe Encryption Service ......................................................................................................................................... 7

GoSafe Windows Login ............................................................................................................................................ 12

Hide default login Credentials ................................................................................................................................. 15

GoSafe Secured Web Login ...................................................................................................................................... 32

Page 4: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

4

License Agreement

Note: You cannot share the product referred herein. You cannot sale or resale the product referred herein.

IMPORTANT - READ CAREFULLY BEFORE DOWNLOADING, INSTALLING OR COPYING TO YOUR

COMPUTER ANY FILE(S) CONTAINED HEREWITH.

THE FILE(S) AND OTHER INFORMATION PROVIDED HEREWITH ARE COPYRIGHTED. BY DOWNLOADING

ANY FILE PROVIDED HEREWITH TO YOUR COMPUTER, YOU ARE ACCEPTING AND AGREEING TO THE

TERMS OF THIS LICENSE AGREEMENT. IF YOU ARE NOT WILLING TO BE BOUND BY THE TERMS OF THIS

LICENSE AGREEMENT, PRIOR TO DOWNLOADING OR COPYING ANY FILE(S) TO YOUR COMPUTER, YOU

MUST DECLINE ACCESS TO SUCH MATERIALS.

1. GRANT OF LICENSE: Subject to the provisions contained herein and to the payment of all applicable fees, the

Innovative Matrix Softech Private Limited grants you a non-exclusive, non-transferable license to the materials

contained herewith (the "Product"). Your licensed rights to the Product are limited to the following:

(a) This License Agreement does not convey to you an interest in or to the Product, but only a limited right of use

revocable in accordance with the terms of this License Agreement.

(b) You may install one copy of the Product on, and permit access to it by, a single computer owned, leased or

otherwise controlled by you. In the event that computer becomes dysfunctional, such that you are unable to access

the Product, you may transfer the Product to another computer, provided that the Product is removed from the

computer from which it is transferred and the use of the Product on the replacement computer otherwise complies

with the terms of this Agreement. Neither concurrent use on two or more computers nor use in a local area network or

other network is permitted. You shall not print, merge, adapt, translate, modify, rent, lease, sell, sublicense, assign or

otherwise transfer any of the Product, or remove any proprietary notice or label appearing on any of the Product. You

may copy the Product only for backup purposes.

(c) You acknowledge and agree that the Product is proprietary to the Copyright holder, INNOVATIVE MATRIX

SOFTECH PRIVATE LIMITED, and is protected under Indian copyright law and international copyright treaties. You

further acknowledge and agree that all rights, title and interest in and to the Product, including all intellectual property

rights, are and shall remain with Innovative Matrix Softech Private Limited.

(d) You shall provide INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED or any designee of INNOVATIVE

MATRIX SOFTECH PRIVATE LIMITED with all information necessary to assure compliance with the terms of this

Agreement. In the event you are not in compliance with the terms of this Agreement through the actions of unrelated

third parties, you shall use your best efforts to cooperate with INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED

and any of its designees to assure compliance.

Page 5: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

5

2. LIMITED WARRANTY:

(a) INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED warrants for your benefit alone that, unless disclosed in the

Product to the contrary, INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED can license the Product and all

copyright and trademarks related thereto or therein.

(b) THE EXPRESS WARRANTIES SET FORTH IN THIS SECTION 2 CONSTITUTE THE ONLY WARRANTIES

WITH RESPECT TO THE PRODUCT AND INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED MAKES NO

OTHER REPRESENTATION OR WARRANTY OR CONDITION OF ANY KIND, WHETHER EXPRESS OR IMPLIED

(EITHER IN FACT OR BY OPERATION OF LAW) WITH RESPECT TO ANY OF THE PRODUCT, INCLUDING,

WITHOUT LIMITATION, WITH RESPECT TO THE SUFFICIENCY, ACCURACY OR UTILIZATION OF, OR ANY

INFORMATION OR OPINION CONTAINED OR REFLECTED IN, ANY OF THE PRODUCT. INNOVATIVE MATRIX

SOFTECH PRIVATE LIMITED EXPRESSLY DISCLAIMS ALL WARRANTIES OR CONDITIONS OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NO OFFICER, DIRECTOR, EMPLOYEE,

MEMBER, AGENT, REPRESENTATIVE OR PUBLISHER OF THE COPYRIGHT HOLDER IS AUTHORIZED TO

MAKE ANY MODIFICATION, EXTENSION, OR ADDITION TO THIS LIMITED WARRANTY.

3. INDEMNIFICATION: INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED, any agent, representative, publisher

or distributor of the Product, or any of their respective directors, officers, employees, agents, representatives or

members (the "INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED Indemnified Parties") shall have no liability for,

and you shall defend, indemnify and hold each of the INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED

Indemnified Parties harmless from and against, any claim, loss, demand, liability, obligation and expenses (including

reasonable attorneys' fees) based upon or arising out of any injury or damage, or any product liability claim, including

but not limited to, any personal or bodily injury or property damage, arising out of, pertaining to, or resulting in any

way from, the use or possession of any of the Product by you and/or any of your directors, officers, employees,

representatives, agents or contractors.

4. LIMITATION OF LIABILITY:

(a) You acknowledge that each of INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED's obligations and liabilities

with respect to the Product are exhaustively defined in this Agreement. You are responsible for the consequences of

any use of any of the Product (whether or not such use was consistent with the license granted hereunder) created

therefrom. Whether or not INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED has been advised of their

possibility, neither INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED nor any of its representatives or agents,

directors, officers, employees, or members, shall be liable, whether under contract, tort (including negligence) or

otherwise, for any indirect, special, punitive, incidental or consequential loss, damage, cost or expense of any kind

whatsoever and howsoever caused, that may be suffered by you or any of your directors, officers, employees,

agents, representatives or contractors or any third party.

(b) If at any time an allegation of infringement of any rights of any third party is made, or in INNOVATIVE MATRIX

SOFTECH PRIVATE LIMITED's opinion is likely to be made, with respect to any of the Product, INNOVATIVE

MATRIX SOFTECH PRIVATE LIMITED may, at its option and at its own expense (i) obtain for you the right to

continue using the Product, (ii) modify or replace the Product or any portion thereof so as to avoid any such claim of

infringements, or (iii) refund to you the License Fee. INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED shall have

no liability to you if any claim of infringement would have been avoided except for your refusal to use any modified or

replacement Product supplied or offered to be supplied pursuant to this Section 4(b) or to otherwise cease using the

Product. Notwithstanding anything contained in this Agreement, and except as set forth in Section 4(b) hereof,

INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED's liability to you for damages pursuant to this Section 4(b), if

any, shall not exceed the amounts of the License Fee paid by you for the Product subject to any such claim.

(c) Section 4(b) state the entire liability of INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED with respect to the

infringement or alleged infringement of any third party rights of any kind whatsoever by any of the Product.

Page 6: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

6

5. TERMINATION: This Agreement may be terminated immediately by INNOVATIVE MATRIX SOFTECH PRIVATE

LIMITED upon breach of any provision of this Agreement by you. Upon any termination of this Agreement, you shall

immediately discontinue the use of the Product and shall within ten (10) days either return file(s) on diskette(s), if any,

to INNOVATIVE MATRIX SOFTECH PRIVATE LIMITED or certify in writing to INNOVATIVE MATRIX SOFTECH

PRIVATE LIMITED that the Product has been deleted from your computer and is eliminated from your premises.

6. GOVERNING LAW; ATTORNEY'S FEES: This Agreement shall be governed by the laws of the Republic of India

without reference to its conflict of laws and provisions and you further consent to jurisdiction by the state and federal

courts sitting in the state of Andhra Pradesh, India.

7. MISCELLANEOUS: This Agreement constitutes the complete and exclusive agreement between INNOVATIVE

MATRIX SOFTECH PRIVATE LIMITED and you with respect to the subject matter hereof, and supersedes all prior

oral or written understandings, communications or agreements not specifically incorporated herein. This Agreement

may not be modified except in writing duly signed by an authorized representative of INNOVATIVE MATRIX

SOFTECH PRIVATE LIMITED and you. If any provision of this Agreement is held to be unenforceable for any

reason, such provision shall be reformed only to the extent necessary to make it enforceable, and such decision shall

not affect the enforceability (i) of such provision under other circumstances, or (ii) of the remaining provisions hereof

under all circumstances. Headings shall not be considered in interpreting the Agreement.

8. EXPORT: You cannot load or export or re-export any of the Product or any underlying information or technology

without prior consent from the Innovative Matrix Softech Private Limited. You may not load or export or re-export any

of the Product or any underlying information or technology except in full compliance with all applicable laws of

republic of India and other applicable laws and regulations.

9. By agreeing to this license agreement, you also agree to general terms and conditions given on our

website www.isohelpline.com (either on home page or product related pages)

BY ACCESSING THE PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ THE TERMS OF THIS

LICENSE AGREEMENT AND AGREE TO BE BOUND BY ITS TERMS.

Page 7: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

7

GoSafe is designed for safety of digital content on personal as well as corporate

systems. GoSafe uses very strong AES 128 Encryption.

Here is a brief guide on how to use GoSafe.

Gosafe includes three applications.

1. GoSafe Encryption Service (Safety of digital contents)

2. Secured Windows Login (Securing hardware access)

3. Secured Web Login (Safety of online passwords)

1. GoSafe Encryption Service

In this application you can encrypt files of the mentioned programs in such a way

that they will open only when GoSafe Dongle is connected.

GoSafe Encryption Service can be used to control application specific permissions

for the users for applications such as MS Word, Excel, PowerPoint, Outlook, VLC

Audio Video, AutoCad, Cadian, Solid Works, Quark Xpress, Adobe Reader.

2. Secured Windows Login

To protect computer hardware from unauthorized login, GoSafe comes with

Dongle Protected Windows Credential Provider or Login Control.

Dongle login is safer than password which can be recorded in a CCTV camera (if

mounted nearby strategically). Dongle login is safer than Finger Print which can

be extracted from your coffee cups or water bottles.

Page 8: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

8

3. Secured Web login

GoSafe comes with “GoSafe Web Browser” which provides secured login

to facebook, twitter, gmail, linkedIn and live accounts.

Specially designed for students who work on collage systems monitored

by CCTV giving vulnerability as passwords can be seen from CCTV

recordings and misused.

Page 9: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

9

Flow chart for using GoSafe:

Set Admin Password

Set Windows Login

Credentials and User

password

Set Encryption Keys Set Web Login

Credentials

Set User Permissions Hide default Login

Credentials (Not

Recommended)

Page 10: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

10

Every dongle has two passwords, Admin password and User password. Admin

password by default are given as “123456”. User password is set by admin during

step 2.

Set Admin password:

Creating/Changing Admin password

Insert GoSafe dongle.

Open “GoSafe Login Credentials”.

Click on “Change Password” enter “Old Password” or the default password

123456 (if you are changing for the first time). Enter the new password and

click on “OK”.

Admin password should be kept in a safe place and should not be disclosed

to anyone, if not so, then anyone who gets hold of admin password can

change permissions of the dongles and your data will be in danger.

You can reset your admin password, in case you forget it, by using

Encryption keys of the dongle.

Most people use 123456….. name123456……. qwerty…. etc while

typing manual password. Use strong passwords and keep backup of

the password for future use.

Page 11: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

11

To reset your dongle password click on Reset Password >> Load keys From

File(load the encryption key) >> Enter new keys >>ok .

Load the encryption

keys

Crete new password

and click on OK

Click here Reset

password.

Page 12: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

12

Set Windows Login Credentials and User password

By setting Windows Login credentials, you restrict access to your

computer, i.e., it can be opened only when dongle is connected and user

password is entered.

Open “GoSafe Login Credentials”, select “Windows” in “Select

Settings”.

Enter the dongle

password and click GO

Select windows in the

drop down list

Page 13: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

13

Enter your Windows username and password, enter user password for

the dongle.

Click on “Save Login Credentials”. Next time when you login to your

windows, connect the dongle and enter the user password, or else you

will not be able to login.

Enter the username of

windows

Enter the password of

your windows

Enter the Dongle password for

user, which you need to enter

while login and to start

“GoSafe Encryption Service”.

Click on “Save Login

Credentials”

Page 14: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

14

When you logon to your windows next time, you will see a screen similar as

below.

If you don’t see similar screen as below, then the screen is your default

screen click on “Switch User”.

Default Windows Credential Provider

you can also remove it, but it is not recommended, as it

may create problem, if you lost the dongle. You will see

your login name as well as all other users in your

system.

GoSafe Credential Provider

This is added by our installation.Click this

to login with GoSafe Dongle just made.

Enter the Dongle password for

user, given by you, while

setting “Windows Login” and

click on enter, make sure your

GoSafe Dongle is connected,

which you used while setting

“Windows Login”.

Page 15: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

15

How to hide default credential providers from the Windows

Logon User Interface (Not Recommended).

After installation of GoSafe Login Credentials, several credential providers

are available to logon from the Windows logon user interface.

There are some steps to hide certain credential providers from the

Windows logon user interface. This way, you can ensure that only the

GoSafe Login Credentials is available for logon.

Step 1: Go to Start Menu and Run (gpedit.msc).

Page 16: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

16

You will see the above window.

Page 17: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

17

Step 2: Go to the Computer Configuration -> Administrative Templates -> System

-> Logon.

Page 18: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

18

Step 3: Right Click on Exclude credential providers and Edit.

Page 19: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

19

Step 4: Click on Enabled and Enters the comma-separated CLSID to exclude

multiple credential providers.

Type CLSIDs here separated by comma

Page 20: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

20

List of default Windows 7 credential providers CLSIDs

Generic Provider

{25CBB996-92ED-457e-B28C-

4774084BD562}

NPProvider

{3dd6bec0-8193-4ffe-ae25-e08e39ea4063}

VaultCredProvider

{503739d0-4c5e-4cfd-b3ba-d881334f0df2}

Password Provider

{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}

Password Provider\LogonPasswordReset

{8841d728-1a76-4682-bb6f-a9ea53b4b3ba}

Smartcard Credential Provider

{8bf9a910-a8ff-457f-999f-a5ca10b4a885}

Smartcard Pin Provider

{94596c7e-3744-41ce-893e-bbf09122f76a}

WinBio Credential Provider

{AC3AC249-E820-4343-A65B-

377AC634DC09}

CertCredProvider

{e74e57b0-6c6d-44d5-9cda-fb2df5ed7435}

Page 21: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

21

This table shows the Windows 7 and Windows 8 GUIDs for these in-box providers:

Password Credential Provider Windows 7 GUID

6f45dc1e-5384-457a-bc13-2cd81b0d28ed

Windows 8 GUID

60b78e88-ead8-445c-9cfd-0b87f74ea6cd

Smart Card Credential Provider Windows 7 GUID

8bf9a910-a8ff-457f-999f-a5ca10b4a885

Windows 8 GUID

8fd7e19c-3bf7-489b-a72c-846ab3678c96

Biometric Credential Provider Windows 7 GUID

8fd7e19c-3bf7-489b-a72c-846ab3678c96

Windows 8 GUID

bec09223-b018-416d-a0ac-523971b639f5

Page 22: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

22

Step 5: Click on Apply and OK.

After applying the setting, only the GoSafe Login Credentials is shown during the

authentication process.

Page 23: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

23

Note:

1. Hiding credential providers via group policy only work in windows 7

Professional and Ultimate and Windows 8 Professional and Ultimate. This is not

work in Windows Home Basic and Premium version.

2. Hiding credential providers via group policy also applies to UAC and Run As

authentication dialog boxes.

3. Hiding the Generic Provider {25CBB996-92ED-457e-B28C-4774084BD562}

and the NPProvider {3dd6bec0-8193-4ffe-ae25-e08e39ea4063} may result in a

state, where authentication against websites or applications that require "Basic

Authentication (HTTP 401 Challenge)" or "Digest Authentication (HTTP 401

Challenge)" may fail.

4. Make sure you unhide the hidden credential providers again if you plan to

remove GoSafe Login Credentials from your system. If you leave them hidden,

following removal of GoSafe Login Credentials, the Windows Logon User

Interface does not provide you with a credential provider to authenticate, and the

Windows credential providers remain hidden.

Page 24: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

24

Set Encryption Keys

You need to set Encryption Keys for the dongles before using it for the first

time.

You generate two keys each of 100 character length.

These keys are used for encrypting your files.

Open “GoSafe Login Credentials” enter the dongle password, Select

“Software Permissions” in “Select Settings”, now “Set Encryption Keys ”

button is activated.

Click here to set

encryption keys and to

change/reset admin

password of dongle

Page 25: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

25

Enter the dongle password, generate two keys key 1 and key 2 and save

them in a safe place.

1. Enter the dongle password

and click “GO”

2. Generate

encryption keys of 100

characters each, or

type it manually

3. Save these keys in a

safe place so that no

one can get hold of it

Page 26: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

26

Set User Permissions

After creating Admin and user password for each dongle you need to give

permissions to the dongles i.e., which software files to be encrypted and which

are not be.

To give software permissions,

Insert GoSafe Dongle.

Open GoSafe Login Credentials.

Enter “Admin” password of the dongle and click “GO”.

Select “Software Permissions” from the dropdown box in “Select Settings”.

Select Software

permissions

Enter the dongle

password and click GO

By default permission

is set to Not Allowed

for all the softwares.

Page 27: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

27

Now you can see 10 types of software programs, MS Word, Excel,

PowerPoint, Outlook, VLC Audio Video, AutoCad, Cadian, Solid Works,

Quark Xpress, Adobe Reader.

Once GoSafe is installed on the machine none of the above mentioned

software/programs will open until the dongle is connected and permissions

are set.

For each Software program you can set four types of permission

1. Not Allowed

In case permission is given as “Not Allowed” to a program/software

then the user cannot even open the program/software once Gosafe is

installed on the computer.

2. Normal

In case permission is given as “Normal” to a program/software then the

user can use the program/software like a normal program though

Gosafe is installed on the computer.

3. Encrypted

In case permission is given as “Encrypted” to a software then user can

encrypt previous files of the program/software, once Gosafe is installed

then every file created in the software will be encrypted automatically.

4. Encrypted++

if permission is given as “Encrypted++” to a software then user can

perform both operation encryption and Decryption. In addition user can

also send unencrypted files by email or copy to external media. Hence

Admin should make sure that this permission is given to authorized

persons only.

Page 28: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

28

Select the required permission

for every software; keep it as

normal if you don’t want to

encrypt files of that particular

software.

Read the dongle to

see its current

permissions.

Page 29: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

29

After setting permissions to Dongle, select “Dongle setting” from the

dropdown box, you can give three types of dongle setting.

1. Only to Set Encryption

If you select “Only to set Encryption” then once GoSafe is installed and

encryption is set you can remove the dongle.

2. No Dongle : Screen Lock

If this setting is set to a dongle and anyone tries to remove the dongle,

computer screen will be completely locked.

3. No Dongle : Close Programs

If this setting is set to a dongle then the software/programs will

automatically close once the dongle is removed. This means dongle

should remain connected all the time.

Select the

dongle setting

and click on

“Save

Permissions”

Page 30: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

30

You can also see the previously set permissions to a dongle, by clicking on

“Read Dongle”.

After setting permissions to the dongle click on “Save Permissions”.

Similarly, insert other dongles and give respective permissions.

Once GoSafe is installed on a computer only Admin can stop/uninstall it.

Encrypt Files

After installation of GoSafe , right click on the “GoSafe icon” in the taskbar

you can see an option “Encrypt Files”, which will allow you to encrypt the

formats of the programs to which Encrypted or Encrypted++ permission is

given.

Now select the file you want to encrypt and click on “Open”.

You will be able to select only files of the program to which you have given

the permission as “Encrypted” or “Encrypted++”.

The file will be copied to a folder in My Documents named

“GosafeFileEncryption” which will be encrypted file.

Right click on GoSafe

icon, if you have given

permission as

“Encrypted” or

“Encypted++” to any

of the software then

you can see the option

“Encrypt Files”.

Page 31: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

31

Decrypt Files

Decryption can be performed by the users on the file formats of programs

to whom “Encrypted++” permission is given by the Admin.

Right click on GoSafe Icon in the taskbar, “Decrypt Files” option will be

visible if permission is given as “Encrypted++” to any of the programs, if

not, no such option will be visible.

You can select your file to be Decrypted from “GoSafeEncryptedFiles”

folder in “My Documents” only.

Select the file and click on “Open”.

Now your file is decrypted and stored in “GoSafeDecrytpedFiles” folder in

“My Documents” which is automatically created.

Right click on GoSafe

icon, if you have given

permission as

“Encypted++” to any

of the software then

you can see the option

“Encrypt Files” and

“Decrypt Files”

Page 32: Guide for Protecting Files from Theft on Windowssoftwarefileprotection.com/wp-content/uploads/GoSafe... · 2015. 9. 3. · 2 Contact Developed and Marketed By Innovative Matrix Softech

32

Set Web Login Credentials

Open “GoSafe Login Credentials”, enter the dongle Admin

password.

Select the website

Google/Microsoft/LinkedIn/Facebook/Twitter.

Enter the username and password of the website.

Click on save credentials.

Now you open use “GoSafe Web Broser” and login to these

sites with GoSafe Dongle. This can be done when you feel the

area in which you are working is not safe. On click on the icon

of the website you will be asked for user password and you will

be logged in.

Select the website

from the dropdown

list

Enter the username of

the website

Enter the password of

the website

Save login credentials