Unit 8 & 29 – IVA                                                Task 7 – Presentation




                        LJ Encr...
Unit 8 & 29 – IVA                                        Task 7 – Presentation


                              Introductio...
Unit 8 & 29 – IVA                                       Task 7 – Presentation


                    LJ Encryption – Overvi...
Unit 8 & 29 – IVA                                      Task 7 – Presentation


                    LJ Encryption – Encrypt...
Unit 8 & 29 – IVA                                       Task 7 – Presentation


                Config – Creating a New En...
Unit 8 & 29 – IVA                                      Task 7 – Presentation


            Config – Deleting an Existing E...
Unit 8 & 29 – IVA                                    Task 7 – Presentation




                        Troubleshooting


P...
Unit 8 & 29 – IVA   Task 7 – Presentation
Upcoming SlideShare
Loading in...5
×

LJ Encryption v1.0

161

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
161
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

LJ Encryption v1.0

  1. 1. Unit 8 & 29 – IVA Task 7 – Presentation LJ Encryption v1.0 User Manual LJ Software - Copyright © 2003 – All Rights Reserved
  2. 2. Unit 8 & 29 – IVA Task 7 – Presentation Introduction Thank you for purchasing ‘LJ Encryption v1.0’ and endorsing our state-of-the-art encryption methods. We promise the best in security and privacy and value our customer’s needs. LJ Encryption offers the piece of mind to companies and users alike wishing to protect sensitive and classified information from unauthorized used by scrambling the text using our complex algorithm. If you are not completely satisfied with this product then please contact mcass2003@hotmail.com with your comments and complaints. Getting Started If this is your first time running LJ Encryption then you will be required to run through ‘Setup’. This is a simple process which involves the user entering some minor details along with the Registration Key which came with the package. Follow these guidelines for assistance: 1. Terms & Agreements: You must click ‘I Agree’ to continue 2. Enter Details: You must enter your name and the name of your company, along with the Registration Key before you can progress. If you have lost or misplaced your Registration Key, please contact mcass2003@hotmail.com 3. Create Key: This will allow you to create your first “Low” security Encryption Key. Just click “Create Key” to create the key then “Proceed” to continue 4. Finished: The ‘Setup’ process has now completed. You may click the “Finish” button to load the program
  3. 3. Unit 8 & 29 – IVA Task 7 – Presentation LJ Encryption – Overview Once you have finished the “Setup” process and the program has loaded you should see a screen similar to the one to the left. This screen is the first you will see when the program loads. It will contain a welcome message as follows: “Welcome to LJ Encryption v1.0. Please use the menu on the left to access areas of the program” Below that are some ‘System Details’. The ‘Number of Encryption Keys’ field informs you exactly how many Encryption Keys you currently have in the database. The ‘Registered To’ and ‘Company’ fields state who the program is registered to and the company they work for (This is the information which you entered during the ‘Setup’ process and CANNOT be changed). There are also two buttons on the ‘Main’ screen entitled “Help” and “Exit”. The “Help” button will load the Help File (See ‘Help File’) and the “Exit” button will end the program. The other details of the form include the Date and Time situated at the bottom of the form. This will synchronise with your system clock. You may also access other areas of the program, including the Encryption, via the menu to the right.
  4. 4. Unit 8 & 29 – IVA Task 7 – Presentation LJ Encryption – Encryption/Decryption LJ Encryption has been designed to take away the complexity that most encryption programs present. Here you are presented with two main options (and a ‘Help’ button), “Open File” and “Encrypt”. “Open File” – Files stored on your hard drive, or on a removable disk that have been encrypted using LJ Encryption must be opened using this method. When you click the button you will be presented with an explorer window where you may select the file you wish to open. If the file has been encrypted using a ‘High’ security key then you will be required to enter a password “Encrypt” – Before creating a new file you must ensure you have entered some text into the space provided. Once you are ready to encrypt, click the button and select the key which you wish to use. The menu will display the list of Key Names (which have been designated by the user) along with their security level. Once you have selected a key you will be required to give you file a name and select a location to store it.
  5. 5. Unit 8 & 29 – IVA Task 7 – Presentation Config – Creating a New Encryption Key The key created during Setup is only meant as a demonstration key. It is recommended that all files be encrypted using a ‘High’ security key. These can be created by accessing the “Config” section of the program and clicking “Create New Encryption Key”. The form, shown to the left, allows you to enter the main details of the key you wish to create: Key Name – This is the name that you wish to give to the key, for instance: “My Key” or “Diary Key”. This allows you to locate your key easily when selecting a key to encrypt text Key Security – There are two settings for this; High and Low. A Low security key contains no password and anyone with access to LJ Encryption can gain access to your files encrypted using one of these keys. A High security key contains a password which must be entered during the decryption process of a relevant file. Key Password – As mentioned above, a High security key allows you to set a password to the key. This password will remain the same for all files encrypted using this key. This field will only be enabled if Key Security is set to High Once you are satisfied with your entries, click the ‘OK’ button to create the key. This process is automatic, however there will be a delay of approximately one second before control is returned to you whilst the program constructs and saves the key.
  6. 6. Unit 8 & 29 – IVA Task 7 – Presentation Config – Deleting an Existing Encryption Key PLEASE NOTE: ONCE A KEY HAS BEEN DELETED THERE IS NO RETRIEVAL. ALL FILES ENCRYPTED BY THAT KEY BECOME WORTHLESS AND UNOPENABLE From time to time it may be necessary to delete any existing keys for whatever reason (such as the “Key Vals have been compromised” or “Password is no longer secret”). LJ Encryption allows you to connect directly to the database and view the list of Keys you currently have. From the ‘Config’ section, click “Delete Existing Encryption Keys”. You should see a form load similar to the one to the left. Select the key you wish to delete by clicking on the name in the list. Once your selected key is highlighted click ‘Delete’. You will be asked if you wish to continue with your request, this is to ensure that you have not clicked the ‘Delete’ button by mistake. Please take this opportunity to ensure you are deleting a key that you no longer have use for (See warning at the top of this page).
  7. 7. Unit 8 & 29 – IVA Task 7 – Presentation Troubleshooting Problem: The program will not load Solution: You may not have the correct runtime files installed. LJ Encryption requires VB6 Runtime files which can be downloaded from http://www.microsoft.com Problem: The program will not accept my registration key Solution: The database may have become corrupted. Please re- install LJ Encryption Problem: I have forgotten the password to one of my High Security keys Solution: Unfortunately, passwords cannot be retrieved. Therefore it is vital that when creating High Security keys, you choose passwords that you will remember. Although keeping records of your passwords is not recommended, if this helps you remember, please keep all passwords written on paper and not on the computer where they may be retrieved by unauthorised users Problem: The program cannot find the encryption key needed to decrypt a file Solution: This may occur after you have deleted a key. Files which have been encrypted by a key that has been removed from the database can no longer be opened. The KeyID and KeyVals are permanently removed. (Please see “Deleting an Existing Encryption Key” for more details) Problem: My problem does not appear in this troubleshooting list Solution: Any user experiencing unforeseen errors is encouraged to report them to mcass2003@hotmail.com so that we may rectify them in later released.
  8. 8. Unit 8 & 29 – IVA Task 7 – Presentation

×