[. . . ] Distribution kit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Information in the book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] o All files ­ this value allows you to display all the confidential file types located in the folder selected above. · List area (see Figure 54) that is located below the screen toolbar and arranged as a table. This list contains the files that correspond to the settings defined in the screen toolbar. The table contains the following columns: · · · Name ­ the file name. The file open screen: The file list If you select a file from the list, the program will verify its format. If the file was created by Kaspersky Security for Windows CE, the file mount screen will be Kaspersky Security for Windows CE 69 displayed (see subchapter 4. 4. 3 on page 66). Otherwise, the appropriate message will be displayed on your screen and the file will not be mounted. 4. 4. 5. The file-access password redefine screen By using options in the password redefine screen (see Figure 55) you may change the access password to an existing confidential file data. However, it is impossible to change the file access password, if you do not know it. This way the program protects your confidential file from the unauthorized access. Figure 55. The access-password redefine screen for the selected confidential file The password redefine screen may be displayed by using: · · a command from the main screen Volume menu (Volume !Change password); a command from the confidential file management contextual menu (Change password). While working with the embedded confidential files you will observe a slow down of your PDA's performance; therefore it is not advisable to create these. · Select the folder to which the new confidential file must be added from the Folder drop-down list. You can change the lo- Kaspersky Security for Windows CE 73 cation of your confidential file. The default value is the My Documents folder in the main memory of your PDA or the root folder of the selected expansion card. The contents of the Folder drop-down list depends on the value selected for the Location option!The list includes subdirectories of all the My documents folders in the main memory of your PDA or on the selected expansion card. · Use the Size option to define the confidential file size ­ the maximum amount of data that can be saved to this confidential file. To change it, enter the required value in the corresponding numeric field by using the keyboard numeric or arrow ( ) keys and select the required unit (Kb or Mb) from the corresponding drop-down list. It is not advisable to create confidential files smaller than 256 Kb. Switch to the Encryption tab (see Figure 59) and follow these steps: Figure 59. The Encryption page 74 Kaspersky Security for PDA · Define the password allowing/prohibiting from accessing the file in the Password text field. The password may include letters (including the italic), digits and other characters. Select the required algorithm to be used when encrypting the file data from the Encryption algorythm drop-down list. [. . . ] 51 location. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64, 72 mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 mounting imported file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 opening imported file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]