SlideShare a Scribd company logo
QI USER MANUAL
TABLE OF CONTENTS
Introduction to QI              ..................................................Slide 3
Overview                        ..................................................Slide 4
Initial log-in                  ..................................................Slide 5
Navigating QI                   ..................................................Slide 6
Change default password         ..................................................Slide 7
How to encrypt a file            ...........................................Slide 8 & 9
How to decrypt a file            .......................................Slide 10 & 11
How to share a file              ....................................... Slide 12 - 19
     Previously encrypted        ........................................Slide 12 - 13
             Sharing with contact          .....................................Slide 14
             Sharing with non-contact .....................................Slide 15
     Unencrypted file            ........................................Slide 16 - 17
             Sharing with contact          .....................................Slide 18
             Sharing with non-contact .....................................Slide 19
Introduction to Qloud           ................................................Slide 20
Navigating Qloud                ................................................Slide 21
How to upload a file to Qloud ........................................Slide 22 & 23
How to download a file ................................................Slide 24 & 25
Questions or concerns           ................................................Slide 26
State of the art cryptography
US DoD approved AES-256

Easy to use
3 clicks

Plug and play
Nothing to install

Works on any computer
Windows, Mac, Linux

Can be deployed across your
company with no tech support
Right now!
OVERVIEW
INITIAL LOG-IN

1) Plug QI into a USB port
     No installation is required
     If Autorun is disabled, open ‘QIClient’ on drive

2) Type in your password
     QI packaging will contain information regarding
     your initial log-in password


Note that for all further instructions we refer to
a ‘file’ to explain different steps. A ‘file’ can also be
a folder or any drive.
Information
Settings     Language




                        Exit




                        Your
                        QI ID
CHANGE DEFAULT PASSWORD




1) Go to ‘Settings’

2) Type in your new password
   8 character min password

3) Click ‘Change’
ENCRYPTING A FILE
                                                        1/2




1) Click ‘Go’ or ‘Encryption’

2) Select your file:
   Click ‘Add File’ or
   Drag and drop the file into the box
ENCRYPTING A FILE
                                                 2/2




3) Click ‘Encrypt’

4) Your file has been encrypted
DECRYPTING A FILE
                                                        1/2




1) Click ‘Go’ or ‘Decryption’

2) Select your file
   Click ‘Add File’ or
   Drag and drop the file into the box
DECRYPTING A FILE
                                                 2/2




3) Click ‘Decrypt’

4) Your file has been decrypted
SHARING A FILE
       PREVIOUSLY ENCRYPTED
                         1/2


1) Click ‘Go’
To share a file that has already been
encrypted



You are ONLY able to share a file that has been
encrypted. The following steps take you through
how to share a previously encrypted and stored
file. The steps to share a file that has yet to be
encrypted begin on slide 16.
SHARING A FILE
                                           PREVIOUSLY ENCRYPTED
                                                             2/2




2) Click ‘Browse’ OR drag and drop
   the encrypted file you wish to share

3) Click ‘Next’

4) Add Contacts/Groups
   see next slide for ‘how to’
SHARING A FILE
                                  SHARING WITH A CONTACT




1) Click ‘Add’ beside a contact
   to add a single contact

2) Click ‘Group’ to add a group
   Click ‘Add’ beside the group

3) Click ‘Share’
   see next slide for ‘how to’
SHARING A FILE
                                      SHARING WITH A NON-CONTACT


1) Retrieve the QI ID
   You would have to know what this
   prior to entering it

2) Click ‘Add’




                                                        Your QI ID
SHARING A FILE
                                              UNENCRYPTED
                                                       1/2




1) Click ‘Go’ or ‘Encryption’

2) Select your file:
   Click ‘Add File’ or
   Drag and drop the file into the box
SHARING A FILE
                                         UNENCRYPTED
                                                  2/2




3) Click ‘Encrypt’

4) Your file has been encrypted

5) Click ‘Share’ next to the file
SHARING A FILE
                                  SHARING WITH A CONTACT




1) Click ‘Add’ beside a contact
   to add a single contact

2) Click ‘Group’ to add a group
   Click ‘Add’ beside the group

3) Click ‘Share’
SHARING A FILE
                                        SHARING WITH A NON-CONTACT


1) Retrieve the QI number
   would have to know what this prior
   to entering it

2) Click ‘Add’




                                                         Your QI ID
State of the art security
Client, transition and server

Leverage QI benefits
Easy to use, Plug and Play, Audit trail

Secure document storage
Splitting techniques
Anonymization techniques
Complex shuffling

Real time secure exchange
Anywhere, anytime

Chose where your data is stored
US, Canada, Ecuador etc…
Navigate
your files
and folders
   List of files
   shared with
   you




              Upload your document   Storage space available   Download your document
UPLOADING TO QLOUD
                                                                 1/2




1) Click ‘Go’

2) Click ‘Upload’
   Or Drag and drop a file onto the right side
   of the screen
UPLOADING TO QLOUD
                                                                      2/2




3) ‘Browse and select file
   it is not necessary to encrypt the file before
   you upload it. Qloud will encrypt it for you!

4) Status of upload
   if successful, the file will show up in the main
   interface

5) Share, Download and Delete
DOWNLOADING FROM QLOUD
                                                     1/2




1) Select the file(s)

2) Click the ‘Download’ icon
   Choose a destination folder

3) Choose a destination folder
DOWNLOADING FROM QLOUD
                                                        2/2




4) Click Open

5) Do you want to decrypt the file now?
   ‘Yes’- decrypt the file on the fly or
   ‘No’- you can download the encrypted file
Questions or Concerns?
Email us: info@ithinksecurity.com

More Related Content

Similar to QI User Manual - English

Cloud Storage Presentationlb
Cloud Storage PresentationlbCloud Storage Presentationlb
Cloud Storage PresentationlbAnku Vesra
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxJoseph Panga
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxRifat Titu
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxBunda Ra
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxRifat Titu
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxCris Bendaña
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxshikha akter
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
Rajkumar Kirtania
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxshikha akter
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxgenjiro01
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxReygoldauh
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxRonny Onadio
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxAarav Sinha
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxNur Yunani Yuna
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxjyoti kumari
 

Similar to QI User Manual - English (20)

Cloud Storage Presentationlb
Cloud Storage PresentationlbCloud Storage Presentationlb
Cloud Storage Presentationlb
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
micro
micromicro
micro
 
Get started with dropboxPCSK9
Get started with dropboxPCSK9Get started with dropboxPCSK9
Get started with dropboxPCSK9
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

QI User Manual - English

  • 2. TABLE OF CONTENTS Introduction to QI ..................................................Slide 3 Overview ..................................................Slide 4 Initial log-in ..................................................Slide 5 Navigating QI ..................................................Slide 6 Change default password ..................................................Slide 7 How to encrypt a file ...........................................Slide 8 & 9 How to decrypt a file .......................................Slide 10 & 11 How to share a file ....................................... Slide 12 - 19 Previously encrypted ........................................Slide 12 - 13 Sharing with contact .....................................Slide 14 Sharing with non-contact .....................................Slide 15 Unencrypted file ........................................Slide 16 - 17 Sharing with contact .....................................Slide 18 Sharing with non-contact .....................................Slide 19 Introduction to Qloud ................................................Slide 20 Navigating Qloud ................................................Slide 21 How to upload a file to Qloud ........................................Slide 22 & 23 How to download a file ................................................Slide 24 & 25 Questions or concerns ................................................Slide 26
  • 3. State of the art cryptography US DoD approved AES-256 Easy to use 3 clicks Plug and play Nothing to install Works on any computer Windows, Mac, Linux Can be deployed across your company with no tech support Right now!
  • 5. INITIAL LOG-IN 1) Plug QI into a USB port No installation is required If Autorun is disabled, open ‘QIClient’ on drive 2) Type in your password QI packaging will contain information regarding your initial log-in password Note that for all further instructions we refer to a ‘file’ to explain different steps. A ‘file’ can also be a folder or any drive.
  • 6. Information Settings Language Exit Your QI ID
  • 7. CHANGE DEFAULT PASSWORD 1) Go to ‘Settings’ 2) Type in your new password 8 character min password 3) Click ‘Change’
  • 8. ENCRYPTING A FILE 1/2 1) Click ‘Go’ or ‘Encryption’ 2) Select your file: Click ‘Add File’ or Drag and drop the file into the box
  • 9. ENCRYPTING A FILE 2/2 3) Click ‘Encrypt’ 4) Your file has been encrypted
  • 10. DECRYPTING A FILE 1/2 1) Click ‘Go’ or ‘Decryption’ 2) Select your file Click ‘Add File’ or Drag and drop the file into the box
  • 11. DECRYPTING A FILE 2/2 3) Click ‘Decrypt’ 4) Your file has been decrypted
  • 12. SHARING A FILE PREVIOUSLY ENCRYPTED 1/2 1) Click ‘Go’ To share a file that has already been encrypted You are ONLY able to share a file that has been encrypted. The following steps take you through how to share a previously encrypted and stored file. The steps to share a file that has yet to be encrypted begin on slide 16.
  • 13. SHARING A FILE PREVIOUSLY ENCRYPTED 2/2 2) Click ‘Browse’ OR drag and drop the encrypted file you wish to share 3) Click ‘Next’ 4) Add Contacts/Groups see next slide for ‘how to’
  • 14. SHARING A FILE SHARING WITH A CONTACT 1) Click ‘Add’ beside a contact to add a single contact 2) Click ‘Group’ to add a group Click ‘Add’ beside the group 3) Click ‘Share’ see next slide for ‘how to’
  • 15. SHARING A FILE SHARING WITH A NON-CONTACT 1) Retrieve the QI ID You would have to know what this prior to entering it 2) Click ‘Add’ Your QI ID
  • 16. SHARING A FILE UNENCRYPTED 1/2 1) Click ‘Go’ or ‘Encryption’ 2) Select your file: Click ‘Add File’ or Drag and drop the file into the box
  • 17. SHARING A FILE UNENCRYPTED 2/2 3) Click ‘Encrypt’ 4) Your file has been encrypted 5) Click ‘Share’ next to the file
  • 18. SHARING A FILE SHARING WITH A CONTACT 1) Click ‘Add’ beside a contact to add a single contact 2) Click ‘Group’ to add a group Click ‘Add’ beside the group 3) Click ‘Share’
  • 19. SHARING A FILE SHARING WITH A NON-CONTACT 1) Retrieve the QI number would have to know what this prior to entering it 2) Click ‘Add’ Your QI ID
  • 20. State of the art security Client, transition and server Leverage QI benefits Easy to use, Plug and Play, Audit trail Secure document storage Splitting techniques Anonymization techniques Complex shuffling Real time secure exchange Anywhere, anytime Chose where your data is stored US, Canada, Ecuador etc…
  • 21. Navigate your files and folders List of files shared with you Upload your document Storage space available Download your document
  • 22. UPLOADING TO QLOUD 1/2 1) Click ‘Go’ 2) Click ‘Upload’ Or Drag and drop a file onto the right side of the screen
  • 23. UPLOADING TO QLOUD 2/2 3) ‘Browse and select file it is not necessary to encrypt the file before you upload it. Qloud will encrypt it for you! 4) Status of upload if successful, the file will show up in the main interface 5) Share, Download and Delete
  • 24. DOWNLOADING FROM QLOUD 1/2 1) Select the file(s) 2) Click the ‘Download’ icon Choose a destination folder 3) Choose a destination folder
  • 25. DOWNLOADING FROM QLOUD 2/2 4) Click Open 5) Do you want to decrypt the file now? ‘Yes’- decrypt the file on the fly or ‘No’- you can download the encrypted file
  • 26. Questions or Concerns? Email us: info@ithinksecurity.com