All guides for Windows operating system.
Time: 10 min
To use Cryptoucan to its full extent, it is more than advisable to install the latest software suite that supports it. Gpg4win is a software bundle which is essential since it takes care of encryption and signing your emails. Here you will learn how to install this software. Remember, you also need to install Enigmail.
Time: 5 min
To use Cryptoucan to its full extent, it is more than advisable to install the latest software suite that supports it. Gpg4win is a software bundle which is essential since it takes care of encryption and signing your emails. Here you will learn how to install this software. Remember, you also need to install Enigmail.
Time: 10 min
Enigmail provides support for GPG for Thunderbird so you can use it in the email client. Without it, you would not be able to use everything Gpg4win offers. Remember, you also need to instal Gpg4win.
Time: 5 min
To use Cryptoucan with the web mail you firstly need to install Mailvelope extension to your browser. This extension allows you to encrypt, decrypt and sign emails. In this instructions you will learn how to install Mailvelope and set it up in Google Chrome browser.
Time: 10 min
This guide will tell you how to set Enigmail up to ensure it works flawlessly with Cryptoucan. Follow this tutorial to set up Enigmail in such a way it behaves the way you want it to - showing correct menu options, unlocking sign and encrypt functions or choosing correct keys manually.
Time: 5 min
All our devices come with the same PIN codes - this is something you want to change as soon as you receive your own device. There are two PINs supported by Cryptoucan, you'll also learn here the difference between User PIN1 and Administrative PIN3.
Time: 5 min
Sending encrypted emails using the other person's public key ensures that only they can read the message - using their private key. Mailvelope allows you to send encrypted emails right from your browser. Learn how to encrypt your messages in a web email of your choice.
Time: 10 min
Before sending encrypted or signed emails with your name on it, you need to generate new set of cryptographic keys - and optionally get a revocation certificate. You cannot use your previous ones as generating the new keys right to your Cryptoucan ensures they will be safe. This tutorial will guide you through the process of generating new keys and configuring their properties.
Time: 5 min
Learn how to decrypt and read emails that someone encrypted for you using your private key.There are two different ways to decrypt emails that you've received depending on PGP encoding - PGP/inline and PGP/MIME. We will show you both in this step-by-step guide.
Time: 5 min
There are few attributes in Cryptoucan that you can use to identify the device. In case you'd lose your device it can be identified through this information. Learn how to change the owner's name and other information stored inside your Cryptoucan.
Time: 5 min
Sending encrypted emails using the other person's public key ensures that only they can read the message - using their private key. Learn how to encrypt the emails you send and also how to decrypt and read emails that someone encrypted for you using your private key.
Time: 5 min
Signing emails using your private signature key will ensure the receiver knows for sure it was you who sent him the messsage. In this day and age of mass impersonation, this is the best way of securing the authenticity of the conversation. Here you will learn how to sign emails and read other people's signatures.
Time: 3 min
You don't always need to encrypt a whole email. Sometimes you need to encrypt a file itself. Learn how to encrypt files right from their context/explorer menu only for yourself or other users.
Time: 2 min
You may receive an encrypted file and may be wondering how to decrypt it. It's an extremely easy process which we will show you in this post.
Time: 3 min
You don't always need to sign a whole email. Sometimes you need to sign a file itself. Learn how to sign files right from their context/explorer menu.
Time: 3 min
You don't always need to encrypt a whole email. Sometimes you need to encrypt a file itself. Learn how to encrypt LibreOffice files - doesn't matter if it's Calc, Writer or Impress, it applies to all of them.
Time: 2 min
You may receive an encrypted LibreOffice file and may be wondering how to decrypt it. It's an extremely easy process which we will show you in this post.
Time: 5 min
You don't always need to sign a whole email - just a file itself. You can sign LibreOffice files right from the program itself - doesn't matter what type of document it is. Here you will learn how to sign the file.
Time: 1 min
You may recieve a signed LibreOffice file meaning the file came from a trusted source. Here you will learn where to find the signature and how to read it.
Time: 10 min
SSH is a widely used remote access protocol. It allows you to log into your remote machine's console and work there as if it was your local work station. In this guide we will setup GnuPG and PuTTY for use with Cryptoucan.