[. . . ] Distribution kit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Information in the book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] · Use the Size option to define the confidential file size ­ the maximum amount of data that can be saved to this confidential file. To change it, enter the required value in the corresponding numeric field by using the keyboard numeric or arrow ( ) keys and select the required unit (Kb or Mb) from the corresponding drop-down list. It is not advisable to create confidential files smaller than 256 Kb. Switch to the Encryption tab (see Figure 55) and follow these steps: Figure 55. The Encryption page 64 Kaspersky Security for PDA · Define the password allowing/prohibiting from accessing the file in the Password text field. The password may include letters (including the italic), digits and other characters. Select the required algorithm to be used when encrypting the file data from the Encryption algorythm drop-down list. You may specify the more reliable algorithm RC6; this, however, makes data encryption proceed much slower. There is an option that allows you to unmount a confidential file if nobody has accessed it within the defined time period . To enable the timeout setting check the TimeOut check box, enter the required value in the corresponding numeric field and select the required unit (seconds, minutes or hours) from the corresponding drop-down list. · · · 4. To save the changes you made on the Folder and Encryption pages press the taskbar. button in the Kaspersky Security for Windows As a result, the defined confidential file with the . ksf extension and the be added to the confidential file list. icon will Now, you can redefine the file-access password (see subchapter 4. 3. 7 on page 72), create a confidential folder on the file basis and mount it as an expansion card of your pocket PC (for details see subchapter 4. 3. 2 on page 64). 4. 3. 2. Mounting a file as a confidential folder The confidential file mounting procedure allows you to create a confidential folder on the file basis. unmount the file-based confidential folder (see subchapter 4. 3. 4 on page 69). You can mount a confidential file located within any of the folders on your PDA by starting it from File Explorer. To open and mount a confidential file created on the other PDA, follow these steps, 1. Select the Open command from the File menu in the main screen menubar. 68 Kaspersky Security for PDA To perform this action you can also use the Open command from the list management contextual menu. On the file-open screen (see Figure 59), select the file location from the Folder drop-down list. The list includes all the subfolders of the My document folders on your PDA. Figure 59. The confidential file opening screen 3. Select the required file type from the Type drop-down list. By default, the conventional confidential file type is selected (Kaspersky Security file ­ the . dat extension file). However, you may define the setting allowing listing of all the file types (All files), since a secured file may have any extension. The files corresponding to the settings selected in the screen toolbar will appear in the file list on the file-open screen. If a file was created by the Kaspersky Security for Windows CE program the file mounting screen will be displayed (see subchapter 4. 2. 4 on page 56), further actions are the same as those described for mounting a file as a confidential folder (see subchapter 4. 3. 2 on page 64). 4. 5. Kaspersky Security for Windows CE 69 As a result the selected confidential file will be mounted and added to the list of confidential files on the Kaspersky Security for Windows CE screen and marked icon. [. . . ] 54, 62 mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 mounting imported file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 opening imported file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]