Your browser is unable to display the menu. It has been converted to a table at the bottom of this page.

About GPRMC
The GPRMC sentence is part of the NMEA 0183 standard. It specifies "Recommended minimum specific GPS data" for GPS receivers.
About GPS
Satellite network in geostationary orbit around the earth allowing receivers on earth to obtain positioning information through triangulation as well as time information.
About GPS
Satellite network in geostationary orbit around the earth allowing receivers on earth to obtain positioning information through triangulation as well as time information.
About NMEA
The NMEA standard defines an electrical interface and data protocol for communication between marine instruments, also used by GPS systems. NMEA is an acronym for National Marine Electronics Association.
About NMEA
The NMEA standard defines an electrical interface and data protocol for communication between marine instruments, also used by GPS systems. NMEA is an acronym for National Marine Electronics Association.
AboutGPRMC
The GPRMC sentence is part of the NMEA 0183 standard. It specifies "Recommended minimum specific GPS data" for GPS receivers.
Bytefusion CryptoWizard
What do you want to encrypt? Files Email Web Contact Form (Secure email from your web site) >">  
Bytefusion Livehelp
Bytefusion Livehelp
When available you can chat online with a Bytefusion representative one-on-one. If live help is not available, you can lodge a trouble ticket and a representative will get back to you as soon as possible. Live help is currently: Click on the image above to continue! If Live Help is unavailable, ...
Bytefusion Product Prices
Purchasing Bytefusion Products by Credit Card Find the product you want to purchase in the list below and choose your method of delivery. Enter the number of licenses you need and press the "Add to Cart" button. Enter your details and credit card information into the secure encrypted page and follow the instructions from there.. Download your product and start using it immediately - no delays! ...
Bytefusion Product Prices
Bytefusion Product Prices Electronic Delivery - E-mail or downloaded from the secure credit card server. Including CD - Product delivered on a CD via airmail or courier. Courier freight not included. Please note that all products can purchased using our Secure Credit Card Server and you will receive the software immediately. We also accept PayPal for certain products but the product will be emailed ...
Bytefusion Products: Version Information
Bytefusion Products: Version Information.
Bytefusion Product Version Numbers Product Code Product Name Latest Version Build Number ens-smp-01 SecEx Mail Personal Edition 1.51 2101 ens-sms-01 SecEx Mail SOHO Edition Single License 1.51 2094 ens-sms-02 SecEx Mail SOHO Edition 5 Seat License 1.51 2096 ens-sms-03 SecEx Mail SOHO Edition 50 ...
Bytefusion Software
Email encryption made easy Whatever your privacy needs, we have an email encryption solution to suit. Whether you are a home user, small company or large corporation needing to secure your communications, we can help. Our SecEx Mail range of products can be client or server based and really take ...
Bytefusion Software
Here are some quick links to major products NTP Windows Time Server for Windows NT, Windows 2000 and Windows XP - PresenTense Time Server NTP Windows Time Client for Windows - PresenTense Time Client Email Encryption solutions. Secure email for private persons thru to corporations - SecExMail Portable ...
Bytefusion: Email and Network Security
Secure Email encryption for web sites.
Choose A Product To View More Information: Need some help choosing which encryption product suits you best? Ask the CryptoWizard . SIC Secure Information Courier brings strong email encryption to your organization's web site. Visitors to your web site can send secure email to your organization ...
Bytefusion: Email Encryption for Linux
Secure Email encryption for Linux.
SecExMail Versions - Secure Email Utility Protecting Your Right to Privacy. Which version of SecExMail you choose depends on what purposes you will use it for. Whichever versions you choose, you can always send and receive email from a friend, business associate or customer who has any other version.
Bytefusion: Free Software
Free Software from Bytefusion.
FREE SOFTWARE! Please feel free to dowload any of our products listed below: Looking for SecExMail? Click Here Click on the logo or link to the right for a detailed description. NTP Server Scanner helps you easily locate NTP and SNTP servers on your network or the internet. NTP Server Scanner NMEA ...
Bytefusion: How To Buy
Secure Email encryption for web sites.
Choose A Method To Order Bytefusion Products: There are two ways of ordering our products. Via: 1. Secure Credit Card Server 2. Purchase Order Ordering via Secure Credit Card Server enables you to download the software immediately, whereas a Purchase Order takes longer due to the delivery time.
Bytefusion: Network Time Management
Secure Email encryption for web sites.
Choose A Product To View More Information: PresenTense Server For Windows NT PresenTense Server is an RFC standard multi protocol time server supporting even the latest NTP4 standard. You can use PresenTense Server to synchronize your PC to a primary time source such as an atomic clock on the internet ...
Bytefusion: Other Products
Secure Email encryption for web sites.
Choose A Product To View More Information: Domain Miner Domain Miner is a data mining tool for internet domain names. It automates the process of finding a domain name by presenting you with a list of choices from an ever shrinking pool of available names. If you are seeking to register a domain ...
Bytefusion: Personal, Corporate Small Business Email Encryption Solutons
Personal, Corporate Small Business Email Encryption Solutons.
SecExMail Versions - Secure Email Utility Protecting Your Right to Privacy. Which version of SecExMail you choose depends on what purposes you will use it for. Whichever versions you choose, you can always send and receive email from a friend, business associate or customer who has any other version.
Bytefusion: Send Encrypted Email Form
Bytefusion: Send Encrypted Email Form
Send secure email... Click here to download and run Secure Information Courier When Secure Information Courier has loaded, click on the button above to send secure email to Bytefusion. Your message will be encrypted and can only be read by Bytefusion staff. You do not need any special software ...
Bytefusion: Server Based Encryption
Server Based Corporate Email Encryption.
SecExMail Corporate Edition Overview Benefits Requires no client software on workstations Supports domain keys, group keys, and individual keys Cost effective pricing makes email encryption affordable Low cost of ownership as support is included in most versions SecExMail Corporate edition ships ...
Bytefusion: Telnet Products
Secure Email encryption for web sites.
BFTelnet BFTelnet Telnet Server for Windows NT/2000/XP BFTelnet is a telnet server for Microsoft Windows NT/2000/XP. It facilitates remote administration of your Windows NT server from any computer via a standard TCP/IPnetwork connection. Click on the logo or link to the right for a detailed description.
Demo Download page - Linux
Bytefusion Download Products
Linux Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail Home Edition FREE - E-mail encryption for the home. Not for commercial use. Network Time Management Products ...
Demo Download page - Windows 2000
Bytefusion Download Products
Windows 2000 Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail Corporate Edition - SecExMail Gate Server based email encryption. If all your email clients are on ...
Demo Download page - Windows 9x
Bytefusion Download Products
Windows 9x Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail SOHO Edition E-mail encryption for small office/home office. - Read More - CryptoAnywhere FREE - Secure ...
Demo Download page - Windows ME
Bytefusion Download Products
Windows ME Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail SOHO Edition E-mail encryption for small office/home office. - Read More - CryptoAnywhere FREE - Secure ...
Demo Download page - Windows NT
Bytefusion Download Products
Windows 2003 Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail Corporate Edition - SecExMail Gate Server based email encryption. If all your email clients are on ...
Demo Download page - Windows NT
Bytefusion Download Products
Windows NT Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail Corporate Edition - SecExMail Gate Server based email encryption. If all your email clients are on a ...
Demo Download page - Windows XP
Bytefusion Download Products
Windows XP Click on a product category to the right. Email and Network Security Network Time Management All Other Products Email and Network Security Products Product Description SecEx Mail Corporate Edition - SecExMail Gate Server based email encryption. If all your email clients are on a ...
Email Export: About Bytefusion Ltd.
LanTimeAnalyzer - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Email Export: About E-Mail Export Shield
LanTimeAnalyzer - Keeping Your Network Time Accurate
About Previous Top Next E-Mail Export Shield Version 1.2 Copyright (C) 1998-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell ...
Email Export: Automatic Filename Generation
LanTimeAnalyzer - Keeping Your Network Time Accurate
Automatic Filename Generation Previous Top Next Enter the filename prefix you wish to use for exported files or accept the default. To name files "MyTopic.1", "MyTopic.2", etc., enter the prefix as shown below. Step 5. Selecting a Target Folder Bytefusion Software Prices ...
Email Export: Eudora
LanTimeAnalyzer - Keeping Your Network Time Accurate
Eudora Mail Previous Top Next E-Mail Export Shield supports the Eudora mail format. E-Mail Export Shield allows exporting of individual Eudora mail folders. Trademarks : Eudora is a registered trademark or trademark of QUALCOMM Incorporated. No associations are implied. Bytefusion Software Prices ...
Email Export: Exporting your E-Mail Messages
LanTimeAnalyzer - Keeping Your Network Time Accurate
Exporting your E-Mail Messages Previous Top Next To complete the process, click the "Export" Button. E-Mail Export Shield will display names of exported files as it extracts them from the archive. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure ...
Email Export: Locating the E-Mail Client Database
LanTimeAnalyzer - Keeping Your Network Time Accurate
Locating the E-Mail Client Database Previous Top Next Select the location of e-mail files as shown below. If you do not know where you e-mail is stored, try drive C: Now click the "Find" button. E-Mail Export Shield will search the selected drive or directory for e-mail files that ...
Email Export: Microsoft Internet Mail and News
LanTimeAnalyzer - Keeping Your Network Time Accurate
Microsoft Internet Mail Previous Top Next E-Mail Export Shield supports the Internet Mail and News format. It has been tested with Internet Mail and News version 1.0. E-Mail Export Shield allows exporting of individual Internet Mail and News message folders. Trademarks : Internet Mail and News ...
Email Export: Netscape Messenger
LanTimeAnalyzer - Keeping Your Network Time Accurate
Netscape Messenger Previous Top Next E-Mail Export Shield supports the Netscape Messenger format. It has been tested to work with Netscape Communicator, version 4.05. E-Mail Export Shield allows exporting of individual Netscape Messenger mail folders. Trademarks : All trademarks shown, including ...
Email Export: Pegasus Mail
LanTimeAnalyzer - Keeping Your Network Time Accurate
Pegasus Mail Previous Top Next E-Mail Export Shield supports the Pegasus Mail format. It has been tested to work with Pegasus Mail, version 2.5. E-Mail Export Shield allows exporting of individual Pegasus Mail message folders. Trademarks : Pegasus Mail is a registered trademark or trademark of ...
Email Export: Quick Start Guide
LanTimeAnalyzer - Keeping Your Network Time Accurate
Quick Start Guide Previous Top Next Quick Start Guide will lead you through the export process one step at a time. You might wish to position the E-Mail Export Shield window and the help window side by side - this will enable you to read new instructions as you complete each step. Step 1. Selecting ...
Email Export: Selecting a Target Folder
LanTimeAnalyzer - Keeping Your Network Time Accurate
Selecting a Target Folder Previous Top Next Select a location where exported files are to be saved. Step 6. Exporting your E-Mail Mesages Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Email Export: Selecting an Archive to Export
LanTimeAnalyzer - Keeping Your Network Time Accurate
Selecting an Archive to Export Previous Top Next Select the e-mail archive you wish to export messages from. Step 4. File Name Generation Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Email Export: Selecting your E-Mail Client
LanTimeAnalyzer - Keeping Your Network Time Accurate
Selecting your E-Mail Client Previous Top Next Select the e-mail client application from which you wish to export messages as shown below. Step 2: Locating the E-Mail Client Database Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time ...
Email Export: System Requirements
LanTimeAnalyzer - Keeping Your Network Time Accurate
System Requirements Previous Top Next E-Mail Export Shield Requires : A Personal Computer with a 486/33 MHz CPU or higher. Microsoft Windows 95/98/ME or Microsoft Windows NT/2000/XP. Mouse or compatible pointing device. 3 megabytes of hard-disk space. 8 megabytes of computer memory. A Web Browser ...
Email Export: Unix Mail
LanTimeAnalyzer - Keeping Your Network Time Accurate
Unix Mail - mailx Previous Top Next E-Mail Export Shield supports the "mbox" format used by Mailx (Berkley Mail), the format in use by most major Unix systems. Often the mail spool files maintained by a POP3 daemon on a Unix system are also stored in this format. To access a user's mbox ...
Email Export: Using E-Mail Export Shield
LanTimeAnalyzer - Keeping Your Network Time Accurate
Using E-Mail Export Shield Previous Top Next You can use E-Mail Export Shield as a stand alone application or from within E-Mail Control Console. The interface consists of a single, control panel style dialog. In order to successfully export your e-mail data you will need to complete the following ...
Email Export: What is E-Mail Export Shield ?
LanTimeAnalyzer - Keeping Your Network Time Accurate
What is E-Mail Export Shield ? Top Next E-Mail Export Shield is a tool for the export of e-mail messages. You can use it to extract messages from your e-mail client database and write them to your hard drive as individual text files - readable in any text editor. Most e-mail clients use a vendor ...
Email Management: About Bytefusion Ltd.
About Bytefusion Ltd. Previous Top Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Email Management: About E-Mail Control Console
About E-Mail Control Console Previous Top Next E-Mail Control Console Version 1.2 Copyright (C) 1998-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Email Management: Buy Online
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Email Management: Conduct a Keyword Search
Conduct a Keyword Search Previous Top Next In addition to standard indexing of e-mail files, E-Mail Control Console supports indexing with a search filter. When using this feature, only files will be included in the index that contain a search term you specify. To conduct a keyword search, click ...
Email Management: Convert to Html
Convert to Html Previous Top Next E-Mail messages that have been exported with E-Mail Export Shield can be easily converted to HTML format. This eliminates 'unsightly' e-mail header information when viewing the files in a web browser while preserving the header information when viewing the same ...
Email Management: Indexing your E-Mail
Indexing your E-Mail Previous Top Next Modes of Operation You may operate E-Mail Control Console in classic or in wizard mode. Classic mode is the default. To activate the Index Wizard, select "Help" and then "Index Wizard..." from the application menu ; optionally, you may ...
Email Management: System Requirements
System Requirements Previous Top Next E-Mail Control Console Requires : A Personal Computer with a 486/33 MHz CPU or higher. Microsoft Windows 95/98/ME or Microsoft Windows NT/2000/XP. Mouse or compatible pointing device. 3 megabytes of hard-disk space. 8 megabytes of computer memory. A Web Browser ...
Email Management: View E-Mail Files
View E-Mail Files Previous Top Next Once you have indexed your mail and saved the index to disk, we suggest you use your browser to view archived messages. Depending on your web browser, you will be able to reply to mail messages directly from within the browser. E-Mail Control Console has embedded ...
Email Management: What is E-Mail Control Console
Open systems e-mail archival & management - The final answer ! Top Next Email Control Console Always wanted to : Escape the confines of your e-mail client ? Integrate your mail data with other technologies ? Merge your e-mail with existing database applications ? Share your e-mail with others ...
Free Open PGP for Windows: About Bytefusion Ltd.
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
About Bytefusion Ltd. Previous Top Next Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Free Open PGP for Windows: About Crypto Anywhere
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
About Crypto Anywhere Previous Top Next Crypto Anywhere - OpenPGP Edition Version 2.0 Copyright © 2003-2004, Bytefusion Ltd. All Rights Reserved. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time ...
Free Open PGP for Windows: About Crypto Anywhere
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Free Open PGP for Windows: Acknowledgements
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Acknowledgements Previous Top Next · ISAAC Random Number Generator At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html. ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996. ----------------------------------------------------------------------------------------------------------- ...
Free Open PGP for Windows: Application Themes
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Application Themes Previous Top Next Security need not look conservative. Version 2.0 and later of Crypto Anywhere support user definable application skins. Check www.bytefusion.com for availability of Crypto Anywhere themes. Bytefusion Software Prices Site Map Purchase This Product On-line ...
Free Open PGP for Windows: Create Travel Floppy
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Create Travel Floppy Previous Top Next If you have installed Crypto Anywhere on your hard drive and wish to use on a friend's computer or in an internet cafe, you may wish to create a portable installation on a floppy disk, USB drive or similar removable medium. To do this, simply create a travel ...
Free Open PGP for Windows: Decrypting Mail 1,2,3
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Decrypting Mail 1,2,3 Previous Top Next If you have received a Crypto Anywhere message, follow the simple steps outlined below. Step 1: Copy the encrypted message to the Windows clipboard In your favorite e-mail client or web browser, select the entire encrypted e-mail with your mouse and copy ...
Free Open PGP for Windows: DIG - License
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
DIG - License Previous Top Mail server lookup for direct drop mail delivery is provided via the internet name server BIND utility program DIG. The files DIG.EXE and LIBBIND.DLL are included free of charge as standalone software, licensed under separate license terms. You are free to distribute ...
Free Open PGP for Windows: Direct Drop
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Direct Drop Previous Top Next Direct Drop delivers emails across the internet directly to the recipient's mail box. This feature enhances your privacy because it bypasses your internet service provider's mail server. If you suspect that your internet service provider logs your email messages or ...
Free Open PGP for Windows: Encrypting Mail 1,2,3
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Encrypting Mail 1,2,3 Previous Top Next To encrypt mail, open Crypto Anywhere, select My Messages on the left, then click the Compose Message icon. This will display the compose message view as shown below. Step 1: Specify the recipient(s) Enter recipient email address. Step 2: Enter the subject ...
Free Open PGP for Windows: For your eyes only screen
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
For your eyes only screen Previous Top Next When sending encrypted e-mail, you will need to specify the recipient(s) of your message. As you receive Crypto Anywhere messages from other people, Crypto Anywhere collects encryption keys from the senders - your secure friends. When sending mail to ...
Free Open PGP for Windows: GNU Privacy Guard - License
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
GNU Privacy Guard - License Previous Top Next OpenPGP integration support in Crypto Anywhere is provided via the GNU Privacy Guard, GPG. GPG is included free of charge as standalone software, licensed under separate license terms. The version of the file GPG.EXE included with Crypto Anywhere is ...
Free Open PGP for Windows: Import PGP (tm) Keys
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Import PGP (tm) Keys Previous Top Next Version 2.0 and later of Crypto Anywhere support OpenPGP encryption and provide compatibility with PGP Corporation's PGP TM product. If upgrading from PGP TM to Crypto Anywhere, you may wish to import your old PGP TM 8.0 keys and those of your friends. This ...
Free Open PGP for Windows: ISAAC Random Number Generator
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
ISAAC Random Number Generator Previous Top Next ISAAC (Indirection, Shift, Accumulate, Add, and Count) is a cryptographically secure pseudo random number generator. With an average cycle length of 2 to the 8295th power its output is uniformly distributed and unpredictable. ISAAC has been developed ...
Free Open PGP for Windows: Known Plain Text Attack
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Known Plain Text Attack Previous Top Next A known plain text attack is the attempt by a cryptanalyst to break a cipher based on knowledge about the plain text of a message prior to its encryption. Simply put, if the cryptanalyst knows the method of encryption, any encryption, part or all of the ...
Free Open PGP for Windows: My Identities
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
My Identities Previous Top Next The My Identities screen shows your own SecExMail and OpenPGP keys. From here you can create new keys, change the passphrase on existing keys, back up and restore keys to and from disk. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order ...
Free Open PGP for Windows: One-Time Pads
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
One-Time Pads Previous Top Next A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time ...
Free Open PGP for Windows: Preferences
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Preferences Previous Top Next The preferences window allows you to customize the behavior of Crypto Anywhere. See documentation below. · Send encrypted mail via Direct drop into recipient's mail box : Direct Drop delivers emails across the internet directly to the recipient's mail box.
Free Open PGP for Windows: Registration Advantages
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Registration Advantages Previous Top Next Registered users receive the following benefits : · Commercial use license · Product support · Multiple identities - private keys · Unlimited secure friends - public keys · Encrypt attachments · Themes / application skins ...
Free Open PGP for Windows: Requirements
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Requirements Previous Top Next · Windows 95 / 98 / ME / NT / 2000 / XP · Access to internet mail server ( SMTP & POP3 ) · Pentium class IBM compatible computer Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client ...
Free Open PGP for Windows: RSA Public Key Encryption
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
RSA Public Key Encryption Previous Top Next "c = me mod n" is the algorithm that turns the world of e-commerce. Introduced in 1978 by Rivest, Shamir and Adleman after whom the cipher is named, RSA is the worlds foremost public key encryption system. Contrary to the design of classic encryption ...
Free Open PGP for Windows: SecExMail / Crypto Anywhere Message Format
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
SecExMail / Crypto Anywhere Message Format Previous Top Next SecExMail messages are transferred in base64 encoded format. Messages may be encrypted to multiple recipients. The internal message layout is defined as follows : [<rsa bytes>:<recipient>]key[<rsa bytes>:<recipient>]key...cipher ...
Free Open PGP for Windows: SecExMail / Crypto Anywhere Key File Format
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
SecExMail / Crypto Anywhere Key File Format Previous Top Next The SecExMail keys are stored in conventional text files ending in "#.pubrsa" and "#.privrsa" for public keys and private keys respectively. Files are divided into an administrative segment and a data segment. The ...
Free Open PGP for Windows: SecExMail / Crypto Anywhere Key Transparency
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
SecExMail / Crypto Anywhere Key Transparency Previous Top Next SecExMail is engineered with a focus on transparency to give you the assurance that no backdoor keys or key recovery is embedded in encrypted messages. This means you as the recipient or sender of an encrypted SecExMail message can ...
Free Open PGP for Windows: SecExMail / Crypto Anywhere Keys
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
SecExMail / Crypto Anywhere Keys Previous Top Next SecExMail employs public key encryption. Messages are encrypted to one or more recipients using their public keys. Only the intended recipient can, upon receipt of the message, recover the plain text using his/her private key. Public key encryption ...
Free Open PGP for Windows: Secure Friends
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
Secure Friends Previous Top Next The Secure Friends screen shows people on your secure contact list. On this screen you can add and remove friends from your secure contact list and display key properties including fingerprints. E-mail sent via Crypto Anywhere to people on the secure friends list ...
Free Open PGP for Windows: The SecExMail / Crypto Anywhere Cipher
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
The SecExMail / Crypto Anywhere Cipher Previous Top Next The SecExMail cipher is a composite cipher specifically designed to operate on real-time email streams. It uses cryptographic primitives which are available to the general public and have been subject to extensive peer review. The SecExMail ...
Free Open PGP for Windows: What is Crypto Anywhere ?
Secure Email encryption. Supports OpenPGP and interoperates with PGP. Free for personal use
What is Crypto Anywhere ? Top Next Secure email in an incredibly small package! Don't be a Glass Citizen! Protect your privacy with Crypto Anywhere. Advantages at a glance... · Strong encryption · Small, fast and portable · Supports public key encryption and password based encryption ...
How to Buy Bytefusion Products - Purchase Order
Ordering by Purchase Order Prices can be viewed in a table or can be downloaded as a pdf file here. Purchase Orders must be on company letterhead with an authorized signature. If your company is located within the European Community, you must provide us with your VAT number*. *If you do not, we are required to add United ...
info.pdf
Contents I Table of Contents Part I Introduction 4 1 What is SecExMail ? 4 2 Quick Start7 3 Acknowledgements
info.pdf
Contents I Table of Contents Foreword Part I Introduction 0 3 1 What is Secure Information Courier? 3 2 Secure Information Courier on the web
info.pdf
Crypto Anywhere - OpenPGP Edition User Manual Copyright © 2003-2004 Bytefusion Ltd. I CryptoAnywhere Help Table of Contents Part I Introduction 3 1 What is Crypto Anywhere ? 3 Part II Usage 4 1 Encrypting
info.pdf
Contents I Table of Contents Foreword Part I Introduction 0 2 1 What is SecExClipboard ? 2 2 Making your4 SecExClipboard Disk 3 Using Your
info.pdf
Contents I Table of Contents Part I Overview 2 1 What is BFTelnet ? 2 2 BFTelnet Features 2 3 Configuring
info.pdf
Contents I Table of Contents Part I Overview 2 1 What is Domain Miner ? 2 2 ENABLE word list 2 3 Marketing word list
info.pdf
Contents I Table of Contents Part I Introduction 2 1 What is E-Mail Control Console 2 2 Indexing your E-Mail 3 3 System Requirements
info.pdf
Contents I Table of Contents Part I Query Tool 3 1 Command Dictionary Overview 3 2 Basic Usage4 Part II Diagnostic 4 1 echo 2 get time 3 ...
info.pdf
Contents I Table of Contents Part I Overview 2 1 What is PresenTense98 ? 2 2 Network Time Synchronization 3 3 Time Protocols & Accuracy ...
info.pdf
Contents I Table of Contents Part I Introduction 3 1 What is SecExMail ? 3 2 Quick Start6 3 Acknowledgements
LanTimeAnalyzer
Look for Available Domains: Buy Online
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Look for Available Domains: Bytefusion Ltd.
Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? ...
Look for Available Domains: Defining a search word
Defining a search word Previous Top Next Defining a search word, or key word, is your most important task. The search word should be memorable and should relate to your business activity or organization name. Supposing that your organization is engaged in the sale of marbles, see Selecting a word ...
Look for Available Domains: Defining your own word list
Defining your own word list Previous Top Next If you are conducting a search in a language other than English, or wish to employ words from a specific subject area, such as a medical or legal dictionary, you may provide your own word list. Word lists must be in plain text format and contain one ...
Look for Available Domains: Domain Miner
Domain Miner Previous Top Next Domain Miner Version 1.1 Copyright © 2000-2004, Bytefusion Ltd. All Rights Reserved. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Look for Available Domains: ENABLE word list
ENABLE word list Previous Top Next The Enhanced North American Benchmark LExicon (ENABLE) is a word list of the English language containing over 172,000 entries, originally conceived as an authoritative reference guide for Scrabble (TM) players. See Selecting a word list on how Domain Miner uses ...
Look for Available Domains: Getting started
Getting started Previous Top Next So you are seeking to register a domain name on the internet ? Let Domain Miner help you find a list of available domain names which pertain to your organization name or business activity based on information you provide. The process is outlined below : ·
Look for Available Domains: Initiating the search
Initiating the search Previous Top Next To initiate the search, click "GO" on the Search page. · Automatically Purge Unavailable Items When this option is checked, only domains which are available are shown. Unavailable domain names are automatically deleted from the list. ·
Look for Available Domains: Marketing word list
The marketing word list Previous Top Next The marketing word list contains commonly used marketing power words, such as "allstar", "award", "bargain", etc. See Selecting a word list on how Domain Miner uses word lists to find available domain names. See also ENABLE ...
Look for Available Domains: Selecting a dictionary
Selecting a word list Previous Top Next Domain Miner ships with two word lists, a marketing word list and the comprehensive Enhanced North American Benchmark Lexicon with over 172,000 terms. Consider the following scenario: Suppose your company sells marbles. Further suppose you wish to register ...
Look for Available Domains: Selecting top level domains
Selecting a top level domain Previous Top Next A top level domain is a family of domain names. Before you can register a domain name you need to decide which family or families of domains you want to belong to. Simply check all the top level domains you wish to search, and click Next. Some of the ...
Look for Available Domains: What is Domain Miner ?
What is Domain Miner ? Top Next Domain Miner is a data mining tool for internet domain names. It automates the process of finding a domain name by presenting you with a list of choices from an ever shrinking pool of available names. If you are seeking to register a domain name for your business ...
Look for Available Domains: WHOIS server selection
WHOIS server selection Previous Top Next The server database whois.hosts lists public WHOIS servers on the internet for each of the top level domains supported by Domain Miner. The database is a plain text file in ASCII format and can be edited by hand. The basic format for each database entry ...
MAPI
MAPI is an acronym for "Messaging Application Programming Interface" and provides a standardized interface to email. This interface is comprised of a standardized set of C functions in a dynamic link library (DLL) called "mapi32.dll" in your computer's system directory. Most major email clients support this interface.
NMEARecorder - NMEA Serial Port Capture Tool
NMEARecorder - NMEA Serial Port Capture Tool
NMEARecorder - NMEA Serial Port Capture Tool NMEARecorder is a serial port capture utility used to read NMEA 0183 compliant messages from devices such as GPS (Global Positioning System) units. Our support department uses it to verify proper operation of our time server software. NMEARecorder is available free of charge to all our customers. NMEA Monitor Logfile Output PresenTense Server for Windows ...
NTP Server Scanner
NTP Query - Free ntp server diagnostic tool. Analyzes the quality of timestamps offered by ntp time servers.
NTP Server Scanner - NTP Server Locator NTP Server Scanner helps you easily locate NTP and SNTP servers on your network or the internet. NTP Server Scanner is available free of charge to our customers to help administrators setup and configure time management on their networks. When run, the utility automatically scans and displays available servers. No time server on your network? Click Here for ...
NTPQuery - NTP Server Diagnostic Tool
NTPQuery - NTP Server Diagnostic Tool NTPQuery is a diagnostic tool for NTP and SNTP servers. Our support department uses it to verify connectivity from time clients to NTP servers. NTPQuery is available free of charge to our customers to help administrators setup and configure time management on their networks. NTPQuery simulates a time client, displaying detailed information about the client request ...
NTPTimeServer
"Network Time Protocol" server. Visit www.bytefusion.com/ntp.html for more information on NTP.
PresenTense 98
Network time client for Windows 95 Windows 98 and Windows ME, available from www.bytefusion.com ...
PresenTense Client NT
PresenTense for Windows NT
Network time client for Windows NT/2000/XP, available from www.bytefusion.com ...
PresenTense NTP Auditor
PresenTense Server
PresenTense Time Client
Network time clients available from www.bytefusion.com ...
PresenTense Time Clients
PresenTense Time Clients come in two different versions, depending on which operating system you have. Please choose the correct version from the table below to view more information. Operating System Correct Version of PresenTense Client Windows NT Windows 2000 Windows XP Windows 2003 PresenTense Time Client NT Windows 95 Windows 98 Windows ME PresenTense Time Client98 ...
PresenTense98
prices.pdf
Bytefusion Product Prices Electronic Delivery - E-mail or downloaded from the secure credit card server. Including CD - Product delivered on a CD via airmail or courier. Freight not included. Product Code Product Name Electronic Delivery US Dollars $4.95 $39.95 $149.95 $499.95 $949.95 $949.00 $9599 $14995 $19799 $19.95 $99.95 $39.95 Including CD US Dollars $14.95 $49.95 $159.95 $505.95 $959.95 $949.00 ...
SecExFile Decrypt Screen
This screen lets you select and confirm which SecExFile archive you wish to decrypt. Click the browse button to select an archive to decrypt. Click Next to continue.
SecExFile Encrypt Screen
The SecExFile screen lets you review the file(s) or folder(s) you are about to encrypt. This screen also lets you add and remove files and folders from the list or items to encrypt. Click the browse files button to browse for additional files and then click the Add button to include them on the list of items to encrypt. Click Next to continue.
SecExMail
Secure Email Encryption for Linux: About Bytefusion Ltd.
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About Bytefusion Ltd. Previous Top Next Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Secure Email Encryption for Linux: About SecExMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About SecExMail Previous Top Next SecExMail Version 1.5 Copyright © 2002-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell ...
Secure Email Encryption for Linux: Acknowledgements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Acknowledgements Previous Top Next · ISAAC Random Number Generator At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html. ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996. ----------------------------------------------------------------------------------------------------------- ...
Secure Email Encryption for Linux: Automatic Key Exchange
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Automatic Key Exchange Previous Top Next If the "Enable auto keys" option is checked on the Desktop Tab, SecExMail will discover the encryption keys of other SecExMail users automatically - without any user intervention. SecExMail will simply append your public key to outgoing e-mails ...
Secure Email Encryption for Linux: Basic Email Client Configuration
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Basic Email Client Configuration Previous Top Next Configuring your email client to send and receive email via SecExMail is easy. Simply set your email client to receive mail at "localhost" or IP address "127.0.0.1" on port 2110 and send email via "localhost" or IP ...
Secure Email Encryption for Linux: Configuration Wizard
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Configuration Wizard Previous Top Next When you start SecExMail for the first time you will have the option to configure SecExMail using the configuration wizard. The configuration wizard will attempt to detect existing e-mail accounts and import the settings into SecExMail as well as adjust your ...
Secure Email Encryption for Linux: Create your personal SecExMail keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Create your personal SecExMail keys Previous Top Next The SecEx Key Generator creates encryption keys for you which will enable your friends to send you encrypted mail and enable you to decrypt mail sent to you by your friends. To invoke the SecEx Key Generator, click "Start", "Programs", ...
Secure Email Encryption for Linux: Desktop tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Desktop tab Previous Top Next This page configures how SecExMail integrates with your desktop environment. See option descriptions below. · Start SecExMail at boot Check this option if you want SecExMail to be loaded automatically when you start your computer. Modifying this setting will ...
Secure Email Encryption for Linux: Distributing SecExKeys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Distributing SecExKeys Previous Top Next Sending friends your public key "manually" is easy. See also Automatic Key Exchange. Simply click the "Email Key to Friend" button on the Friends tab. See image. Finally, select the key you wish to send from the list of keys in the ...
Secure Email Encryption for Linux: Does SecExMail support signatures ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Does SecExMail support signatures ? Previous Top Next Digital signatures are not supported at this time. The next version of SecExMail will support this feature. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an ...
Secure Email Encryption for Linux: Does SecExMail work with IMAP?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Does SecExMail work with IMAP? Previous Top Next SecExMail does not work with IMAP mailboxes. SecExMail requires SMTP and POP3. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Secure Email Encryption for Linux: Does SecExMail work with PGP ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Does SecExMail work with PGP ? Previous Top Next SecExMail does not decrypt PGP messages and does not encrypt messages which can be read by PGP users. However, SecExMail encrypts the mail stream and therefore does not interfere with existing methods of encryption. As such, it is possible to encrypt ...
Secure Email Encryption for Linux: Encryption tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Encryption tab Previous Top Next The Encryption tab allows you to configure SecExMail keyed encryption services for your computer. The default values set by the installation program will serve most people. However, if you operate a firewall or other proxy service on your computer, you might have ...
Secure Email Encryption for Linux: Entropy Collection
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Collection Previous Top Next Individual email messages are encrypted via session keys using the Twofish block cipher and ISAAC stream cipher. Each session key is then encrypted with the SecExMail public key for the recipient of the message. Upon receipt of the message, the session key is ...
Secure Email Encryption for Linux: Entropy Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Screen Previous Top Next Your new key will be generated from prime numbers produced by a random number generator. In order for your key to be unpredictable we need to collect a large amount of random data from the only source in the system which is unique : you. This data will be used to ...
Secure Email Encryption for Linux: Font & Display Issues
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Font & Display Issues Previous Top Next If you configured WINE manually for user accounts created after the initial setup of SuSE Linux, some dialogs in SecExMail may not display properly depending on the fonts installed on your system. WINE setup attempts to detect and where available use ...
Secure Email Encryption for Linux: Friends tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Friends tab Previous Top Next The Friends tab lists people on your secure contact list. Email sent via SecExMail to people on the Friends list will be encrypted automatically and without the need for further interaction by you, the user. On this screen you can add and remove friends from your secure ...
Secure Email Encryption for Linux: How secure are SecexMail keys ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
How secure are SecExMail keys ? Previous Top Next SecExMail uses industry standard RSA keys. RSA is the worlds foremost public key encryption system. The security of your personal SecExMail key will vary depending on the key size. Please consult the documentation on the SecEx Key Generator and ...
Secure Email Encryption for Linux: In-Tray Tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
In-Tray Tab Previous Top Next The In-Tray tab shows incoming messages that SecExMail has processed. It is similar to your email client's inbox. Here you can view messages as they "came in off the wire" and decrypt messages which were encrypted to keys for which you hold the private key ...
Secure Email Encryption for Linux: Incoming Mail Filter
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Incoming Mail Filter Previous Top Next SecExMail supports a number of privacy filter options. Incoming HTML messages may be converted from their native HTML format to plain text. The HTML filter is not enabled by default. Check this option if you want SecExMail to convert incoming HTML messages ...
Secure Email Encryption for Linux: IP / DNS Spoofing
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
IP / DNS Spoofing Previous Top Next IP spoofing is the creation of IP packets using someone else's IP address. DNS spoofing is the substitution of a different IP address for a DNS name. DNS spoofing is commonly achieved by corrupting the DNS database of the DNS server your computer connects to ...
Secure Email Encryption for Linux: Is SecExMail legal in my country ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Is SecExMail legal in my country ? Previous Top Next SecExMail is distributed from the Isle of Man, a self governing offshore island in the Irish Sea. The Isle of Man has no laws restricting encryption technologies and is committed to pro e-commerce legislation. See E-Island Fact Sheet published ...
Secure Email Encryption for Linux: Is the source code available for SecExMail ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Is the source code available for SecExMail ? Previous Top Next The source code for the core cryptographic components of SecExMail is freely available on the internet. · Twofish block cipher At the time of writing the Twofish homepage can be found at http://www.counterpane.com/twofish.html.
Secure Email Encryption for Linux: ISAAC Random Number Generator
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
ISAAC Random Number Generator Previous Top Next ISAAC (Indirection, Shift, Accumulate, Add, and Count) is a cryptographically secure pseudo random number generator. With an average cycle length of 2 to the 8295th power its output is uniformly distributed and unpredictable. ISAAC has been developed ...
Secure Email Encryption for Linux: KDE Autostart Menu
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
KDE Autostart Menu Previous Top Next If you want SecExMail to start automatically immediately after you log in, you need to create a shortcut in the Autostart folder of your user home directory. Simply copy the desktop shortcut created by the setup into this folder as shown below. Optionally, you ...
Secure Email Encryption for Linux: Key Size Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Key Size Screen Previous Top Next Deciding on the key size of your new email key is a matter of personal judgement. It is commonly held that RSA keys of 1024 bits will withstand conventional cryptanalytic attacks while key sizes of 512 bits or less are to be regarded as insecure. In general, the ...
Secure Email Encryption for Linux: KMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
KMail Previous Top Next To configure KMail to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between KMail and your ISP's mail server. It encrypts and decrypts messages ...
Secure Email Encryption for Linux: Known Plain Text Attack
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Known Plain Text Attack Previous Top Next A known plain text attack is the attempt by a cryptanalyst to break a cipher based on knowledge about the plain text of a message prior to its encryption. Simply put, if the cryptanalyst knows the method of encryption, any encryption, part or all of the ...
Secure Email Encryption for Linux: Mail server tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Mail server tab Previous Top Next SecExMail operates as a relay agent between your email client software and your internet service provider's mail server. Therefore you need to tell your email client to check and send mail via SecExMail and tell SecExMail about your mail server. To do so, select ...
Secure Email Encryption for Linux: Modifying Netscape Mail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Netscape Mail Previous Top Next To modify an existing Netscape mail account for use with SecExMail, please follow the steps detailed below. · Step 1 Open Netscape Mail and click on Edit > Mail & Newsgroups Account Settings. · Step 2 A pop-up ...
Secure Email Encryption for Linux: My Keys tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
My Keys tab Previous Top Next The My Keys tab lists your own SecExMail keys. From here you can create new keys, change the passphrase on existing keys, back up and restore keys to and from disk, email your key to others and manage the passphrase cache. Technically, keys shown here are private keys ...
Secure Email Encryption for Linux: Netscape Mail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Netscape Mail Previous Top Next To configure Netscape Mail to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Netscape Mail and your ISP's mail server. It ...
Secure Email Encryption for Linux: One-Time Pads
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
One-Time Pads Previous Top Next A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time ...
Secure Email Encryption for Linux: Out-Tray Tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Out-Tray Tab Previous Top Next The Out-Tray tab shows outgoing and sent messages that SecExMail has processed. It is similar to your email client's sent items folder. Here you can view messages exactly as they have been send and decrypt messages which were encrypted to keys for which you hold the ...
Secure Email Encryption for Linux: Outgoing Mail Filter
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Outgoing Mail Filter Previous Top Next This page configures how SecExMail filters SMTP email headers to further protect your privacy. Every email message bears a unique fingerprint or message identifier which may be used to track the message across a network or indeed across the global internet.
Secure Email Encryption for Linux: Passphrase cache
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Passphrase cache Previous Top Next When SecExMail starts you will be prompted to enter the passphrase for any private keys loaded from the registry or disk. This passphrase is required to decode private keys which are stored in 3DES encrypted format. Optionally, you can instruct SecExMail to cache ...
Secure Email Encryption for Linux: Passphrase Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Passphrase Screen Previous Top Next Your new key will be stored in your computer's registry. To protect confidential key information from unauthorized access, it will be encrypted and protected with a passphrase that only you know. Please chose a long phrase containing both letters and numbers ...
Secure Email Encryption for Linux: Personal Details Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Personal Details Screen Previous Top Next The Personal Details screen collects information about you and your email address. This information will later appear on the My Keys tab in SecExMail. SecEx Key Generator will not disclose your information to anyone and you control whom you share your key ...
Secure Email Encryption for Linux: Progress Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Progress Screen Previous Top Next The progress screen shows the estimated time to completion. The estimated time to finish may be readjusted during key generation and you will be advised when key generation is complete. At that time, click Finish to save your keys and restart SecExMail if necessary.
Secure Email Encryption for Linux: Quick Start
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Quick Start Previous Top Next This is the "manual" quick guide to getting you up and running with SecExMail ! For information on wizard based setup, see Configuration Wizard. · Step 1 Start the SecEx Key Generator and create your own SecExMail keys. Click here to learn how.
Secure Email Encryption for Linux: Requirements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Requirements Previous Top · SuSE Linux 8.2 or later · WINE 20030217 · KDE 3.1 or later · SMTP and POP3 compliant email client, such as Netscape Mail, Evolution, KMail, etc. · Access to internet mail server ( SMTP & POP3 ) · Pentium class IBM compatible computer ...
Secure Email Encryption for Linux: RSA Public Key Encryption
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
RSA Public Key Encryption Previous Top Next "c = me mod n" is the algorithm that turns the world of e-commerce. Introduced in 1978 by Rivest, Shamir and Adleman after whom the cipher is named, RSA is the worlds foremost public key encryption system. Contrary to the design of classic encryption ...
Secure Email Encryption for Linux: SecExMail Key File Format
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Key File Format Previous Top Next The SecExMail keys are stored in conventional text files ending in "#.pubrsa" and "#.privrsa" for public keys and private keys respectively. Files are divided into an administrative segment and a data segment. The administrative segment ...
Secure Email Encryption for Linux: SecExMail Key Transparency
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Key Transparency Previous Top Next SecExMail is engineered with a focus on transparency to give you the assurance that no backdoor keys or key recovery is embedded in encrypted messages. This means you as the recipient or sender of an encrypted SecExMail message can verify what keys have ...
Secure Email Encryption for Linux: SecExMail Keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Keys Previous Top Next SecExMail employs public key encryption. Messages are encrypted to one or more recipients using their public keys. Only the intended recipient can, upon receipt of the message, recover the plain text using his/her private key. Public key encryption differs from ...
Secure Email Encryption for Linux: SecExMail Message Format
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Message Format Previous Top Next SecExMail messages are transferred in base64 encoded format. Messages may be encrypted to multiple recipients. The internal message layout is defined as follows : [<rsa bytes>:<recipient>]key[<rsa bytes>:<recipient>]key...cipher ...
Secure Email Encryption for Linux: Send Mail Authentication
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Send Mail Authentication Previous Top Next If your send mail server requires you to authenticate in order send mail click the SMTP AUTH link on the Email Key to Friend dialog. This will invoke the dialog shown below. Enter your user name and password as issued by your internet service provider ...
Secure Email Encryption for Linux: Starting SecExMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Starting SecExMail Previous Top Next To start SecExMail, click "Start", "Programs", "SecExMail" and "SecEx Mail" as shown below. This will start the SecExMail service and place the icon into the system tray. Right-click on the system tray icon with your ...
Secure Email Encryption for Linux: The SecExMail Cipher
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
The SecExMail Cipher Previous Top Next The SecExMail cipher is a composite cipher specifically designed to operate on real-time email streams. It uses cryptographic primitives which are available to the general public and have been subject to extensive peer review. The SecExMail cipher incorporates ...
Secure Email Encryption for Linux: Watch tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Watch tab Previous Top Next The Watch tab shows SecExMail log information in real-time as you send and receive email. A full record of all log entries can be found in the SecExMail application directory under "secexmail.log". Bytefusion Software Prices Site Map Purchase This Product On-line ...
Secure Email Encryption for Linux: What email clients work with SecExMail ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
What email clients work with SecExMail ? Previous Top Next The following email clients have been tested and are known to work with SecExMail : · Outlook 98/2000/Express · Outlook XP/2002 · Eudora · Pegasus · The BAT · Calypso · IncrediMail · Netscape ...
Secure Email Encryption for Linux: What is SecExMail ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
What is SecExMail ? Top Next SecExMail - Secure Email Made Easy Maintaining your privacy on the net is not easy in today's world. Until now, secure email could only be achieved by encryption solutions that were not user friendly. SecExMail changes all that, bringing you secure encrypted email that ...
Secure Email Encryption for Linux: Why can I not mix clear text and cipher recipients ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Why can I not mix clear text and cipher recipients ? Previous Top Next I tried to send email to someone on my secure friends list and CC'ed ( carbon copied ) the message to someone not on my friends list and Outlook reported the following error : "SecExMail rejected the message because you ...
Secure Email Encryption for Linux: WINE Configuration
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
WINE Configuration Previous Top Next SecExMail for Linux has been tested to work with WINE, version 20030217, under SuSE Linux 8.2. All SecExMail functionality is available using the stock WINE configuration in Windows 95 mode as created during SuSE 8.2 setup. If you experience difficulties or ...
Secure Email Encryption for Linux: Ximian Evolution
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Ximian Evolution Previous Top Next To configure Ximian Evolution to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Ximian Evolution and your ISP's mail server.
Secure Email Encryption for Windows: About Bytefusion Ltd.
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for ...
Secure Email Encryption for Windows: About Bytefusion Ltd.
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for ...
Secure Email Encryption for Windows: About SecExClipboard
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About SecExClipboard Previous Top Next SecExClipboard Version 1.5 Copyright © 2002, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Secure Email Encryption for Windows: About SecExMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About SecExMail Previous Top Next SecExMail Version 1.5 Copyright © 2002-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell ...
Secure Email Encryption for Windows: Acknowledgements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Acknowledgements Previous Top Next · ISAAC Random Number Generator At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html. ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996. ----------------------------------------------------------------------------------------------------------- ...
Secure Email Encryption for Windows: Acknowledgements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Acknowledgements Previous Top Next · ISAAC Random Number Generator At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html. ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996. ----------------------------------------------------------------------------------------------------------- ...
Secure Email Encryption for Windows: Automatic Key Exchange
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Automatic Key Exchange Previous Top Next If the "Enable auto keys" option is checked on the Desktop Tab, SecExMail will discover the encryption keys of other SecExMail users automatically - without any user intervention. SecExMail will simply append your public key to outgoing e-mails ...
Secure Email Encryption for Windows: Basic Email Client Configuration
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Basic Email Client Configuration Previous Top Next Configuring your email client to send and receive email via SecExMail is easy. Simply set your email client to receive mail at "localhost" or IP address "127.0.0.1" on port 110 and send email via "localhost" or IP ...
Secure Email Encryption for Windows: Buy Online.
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Secure Email Encryption for Windows: Calypso
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Calypso Previous Top Next To configure Calypso to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Calypso and your ISP's mail server. It encrypts and decrypts ...
Secure Email Encryption for Windows: Configuration Wizard
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Configuration Wizard Previous Top Next When you start SecExMail for the first time you will have the option to configure SecExMail using the configuration wizard. The configuration wizard will attempt to detect existing e-mail accounts and import the settings into SecExMail as well as adjust your ...
Secure Email Encryption for Windows: Create your personal SecExMail keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Create your personal SecExMail keys Previous Top Next The SecEx Key Generator creates encryption keys for you which will enable your friends to send you encrypted mail and enable you to decrypt mail sent to you by your friends. To invoke the SecEx Key Generator, click "Start", "Programs", ...
Secure Email Encryption for Windows: Desktop tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Desktop tab Previous Top Next This page configures how SecExMail integrates with your desktop environment. See option descriptions below. · Start SecExMail at boot Check this option if you want SecExMail to be loaded automatically when you start your computer. Modifying this setting will ...
Secure Email Encryption for Windows: Distributing SecExKeys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Distributing SecExKeys Previous Top Next Sending friends your public key "manually" is easy. See also Automatic Key Exchange. Simply click the "Email Key to Friend" button on the Friends tab. See image. Finally, select the key you wish to send from the list of keys in the ...
Secure Email Encryption for Windows: Does SecExMail support signatures ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Does SecExMail support signatures ? Previous Top Next Digital signatures are not supported at this time. The next version of SecExMail will support this feature. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an ...
Secure Email Encryption for Windows: Does SecExMail work with IMAP?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Does SecExMail work with IMAP? Previous Top Next SecExMail does not work with IMAP mailboxes. SecExMail requires SMTP and POP3. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Secure Email Encryption for Windows: Does SecExMail work with PGP ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Does SecExMail work with PGP ? Previous Top Next SecExMail does not decrypt PGP messages and does not encrypt messages which can be read by PGP users. However, SecExMail encrypts the mail stream and therefore does not interfere with existing methods of encryption. As such, it is possible to encrypt ...
Secure Email Encryption for Windows: Encryption tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Encryption tab Previous Top Next The Encryption tab allows you to configure SecExMail keyed encryption services for your computer. The default values set by the installation program will serve most people. However, if you operate a firewall or other proxy service on your computer, you might have ...
Secure Email Encryption for Windows: Entropy Collection
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Collection Previous Top Next Individual email messages are encrypted via session keys using the Twofish block cipher and ISAAC stream cipher. Each session key is then encrypted with the SecExMail public key for the recipient of the message. Upon receipt of the message, the session key is ...
Secure Email Encryption for Windows: Entropy Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Screen Previous Top Next Your new key will be generated from prime numbers produced by a random number generator. In order for your key to be unpredictable we need to collect a large amount of random data from the only source in the system which is unique : you. This data will be used to ...
Secure Email Encryption for Windows: Eudora
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Eudora Previous Top Next To configure Eudora Mail to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Eudora Mail and your ISP's mail server. It encrypts and ...
Secure Email Encryption for Windows: Friends tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Friends tab Previous Top Next The Friends tab lists people on your secure contact list. Email sent via SecExMail to people on the Friends list will be encrypted automatically and without the need for further interaction by you, the user. On this screen you can add and remove friends from your secure ...
Secure Email Encryption for Windows: How secure are SecexMail keys ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
How secure are SecExMail keys ? Previous Top Next SecExMail uses industry standard RSA keys. RSA is the worlds foremost public key encryption system. The security of your personal SecExMail key will vary depending on the key size. Please consult the documentation on the SecEx Key Generator and ...
Secure Email Encryption for Windows: In-Tray Tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
In-Tray Tab Previous Top Next The In-Tray tab shows incoming messages that SecExMail has processed. It is similar to your email client's inbox. Here you can view messages as they "came in off the wire" and decrypt messages which were encrypted to keys for which you hold the private key ...
Secure Email Encryption for Windows: Incoming Mail Filter
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Incoming Mail Filter Previous Top Next SecExMail supports a number of privacy filter options. Incoming HTML messages may be converted from their native HTML format to plain text. The HTML filter is not enabled by default. Check this option if you want SecExMail to convert incoming HTML messages ...
Secure Email Encryption for Windows: IncrediMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
IncrediMail Previous Top Next To configure IncrediMail to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between IncrediMail and your ISP's mail server. It encrypts ...
Secure Email Encryption for Windows: IP / DNS Spoofing
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
IP / DNS Spoofing Previous Top Next IP spoofing is the creation of IP packets using someone else's IP address. DNS spoofing is the substitution of a different IP address for a DNS name. DNS spoofing is commonly achieved by corrupting the DNS database of the DNS server your computer connects to ...
Secure Email Encryption for Windows: Is SecExMail legal in my country ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Is SecExMail legal in my country ? Previous Top Next SecExMail is distributed from the Isle of Man, a self governing offshore island in the Irish Sea. The Isle of Man has no laws restricting encryption technologies and is committed to pro e-commerce legislation. See E-Island Fact Sheet published ...
Secure Email Encryption for Windows: Is the source code available for SecExMail ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Is the source code available for SecExMail ? Previous Top Next The source code for the core cryptographic components of SecExMail is freely available on the internet. · Twofish block cipher At the time of writing the Twofish homepage can be found at http://www.counterpane.com/twofish.html.
Secure Email Encryption for Windows: ISAAC Random Number Generator
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
ISAAC Random Number Generator Previous Top Next ISAAC (Indirection, Shift, Accumulate, Add, and Count) is a cryptographically secure pseudo random number generator. With an average cycle length of 2 to the 8295th power its output is uniformly distributed and unpredictable. ISAAC has been developed ...
Secure Email Encryption for Windows: Key Size Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Key Size Screen Previous Top Next Deciding on the key size of your new email key is a matter of personal judgement. It is commonly held that RSA keys of 1024 bits will withstand conventional cryptanalytic attacks while key sizes of 512 bits or less are to be regarded as insecure. In general, the ...
Secure Email Encryption for Windows: Known Plain Text Attack
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Known Plain Text Attack Previous Top Next A known plain text attack is the attempt by a cryptanalyst to break a cipher based on knowledge about the plain text of a message prior to its encryption. Simply put, if the cryptanalyst knows the method of encryption, any encryption, part or all of the ...
Secure Email Encryption for Windows: Mail server tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Mail server tab Previous Top Next SecExMail operates as a relay agent between your email client software and your internet service provider's mail server. Therefore you need to tell your email client to check and send mail via SecExMail and tell SecExMail about your mail server. To do so, select ...
Secure Email Encryption for Windows: Making your SecExClipboard Disk
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Making your SecExClipboard Disk Previous Top Next This is the guide for creating a floppy disk to be taken with you on the road. · Step 1 Copy SecExClipboard to a floppy disk. · Step 2 Right-click the SecExMail tray icon on the computer where you have your keys stored, choose Open ...
Secure email Encryption for Windows: Making your SecExClipboard Disk
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Secure Email Encryption for Windows: Modifying Calypso
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Calypso Previous Top Next To modify an existing Calypso email account for use with SecExMail, please follow the steps detailed below. · Step 1 Open Calypso and select Accounts in the tree view with your mouse. Choose the account you wish to configure for use with SecEx Mail on the ...
Secure Email Encryption for Windows: Modifying Eudora
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Eudora Previous Top Next To modify an existing Eudora mail account for use with SecExMail, please follow the steps detailed below. · Step 1 Open Eudora Mail and click on Tools > Options · Step 2 A pop-up menu will appear. Select Getting Started. In the box ...
Secure Email Encryption for Windows: Modifying IncrediMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying IncrediMail Previous Top Next To modify an existing IncrediMail email account for use with SecExMail, please follow the steps detailed below. · Step 1 Open IncrediMail, click Tools and select Accounts on the menu. This will invoke the Mail Accounts screen. · Step 2 Select ...
Secure Email Encryption for Windows: Modifying Netscape Mail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Netscape Mail Previous Top Next To modify an existing Netscape mail account for use with SecExMail, please follow the steps detailed below. · Step 1 Open Netscape Mail and click on Edit > Mail & Newsgroups Account Settings. · Step 2 A pop-up ...
Secure Email Encryption for Windows: Modifying Outlook 98/2000/Express
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Outlook 98/2000/Express Previous Top Next To modify an existing Outlook 98/2000 email account for use with SecExMail, please follow the steps detailed below. · Step 1 Click on the Tools menu and choose Accounts from the available options. The window below will appear. · Step ...
Secure Email Encryption for Windows: Modifying Outlook XP/2002
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Outlook XP/2002 Previous Top Next To modify an existing Outlook XP/2002 email account for use with SecExMail, please follow the steps detailed below. · Step 1 Click on the Tools menu and choose E-Mail Accounts from the available options. The window below will appear. · Step ...
Secure Email Encryption for Windows: Modifying Pegasus
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying Pegasus Previous Top Next To modify an existing Pegasus mail account for use with SecExMail, please follow the steps detailed below. · Step 1 Open Pegasus Mail and select Tools > Internet Options > · Step 2 A pop-up menu will appear Select the Receiving (POP3) ...
Secure Email Encryption for Windows: Modifying The BAT
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Modifying The BAT Previous Top Next To modify an existing The BAT email account for use with SecExMail, please follow the steps detailed below. Open The BAT, highlight the account you wish to configure for use with SecEx Mail using your mouse, then select Account and Properties... from the menu.
Secure Email Encryption for Windows: My Keys tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
My Keys tab Previous Top Next The My Keys tab lists your own SecExMail keys. From here you can create new keys, change the passphrase on existing keys, back up and restore keys to and from disk, email your key to others and manage the passphrase cache. Technically, keys shown here are private keys ...
Secure Email Encryption for Windows: Netscape Mail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Netscape Mail Previous Top Next To configure Netscape Mail to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Netscape Mail and your ISP's mail server. It ...
Secure Email Encryption for Windows: One-Time Pads
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
One-Time Pads Previous Top Next A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time ...
Secure Email Encryption for Windows: Out-Tray Tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Out-Tray Tab Previous Top Next The Out-Tray tab shows outgoing and sent messages that SecExMail has processed. It is similar to your email client's sent items folder. Here you can view messages exactly as they have been send and decrypt messages which were encrypted to keys for which you hold the ...
Secure Email Encryption for Windows: Outgoing Mail Filter
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Outgoing Mail Filter Previous Top Next This page configures how SecExMail filters SMTP email headers to further protect your privacy. Every email message bears a unique fingerprint or message identifier which may be used to track the message across a network or indeed across the global internet.
Secure Email Encryption for Windows: Outlook 98/2000/Express
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Outlook 98/2000/Express Previous Top Next To configure Outlook 98/2000/Express to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Outlook 98/2000/Express ...
Secure Email Encryption for Windows: Outlook XP/2002
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Outlook XP/2002 Previous Top Next To configure Outlook XP/2002 to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Outlook XP/2002 and your ISP's mail server.
Secure Email Encryption for Windows: Passphrase cache
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Passphrase cache Previous Top Next When SecExMail starts you will be prompted to enter the passphrase for any private keys loaded from the registry or disk. This passphrase is required to decode private keys which are stored in 3DES encrypted format. Optionally, you can instruct SecExMail to cache ...
Secure Email Encryption for Windows: Passphrase Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Passphrase Screen Previous Top Next Your new key will be stored in your computer's registry. To protect confidential key information from unauthorized access, it will be encrypted and protected with a passphrase that only you know. Please chose a long phrase containing both letters and numbers ...
Secure Email Encryption for Windows: Pegasus
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Pegasus Previous Top Next To configure Pegasus Mail to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between Pegasus Mail and your ISP's mail server. It encrypts ...
Secure Email Encryption for Windows: Personal Details Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Personal Details Screen Previous Top Next The Personal Details screen collects information about you and your email address. This information will later appear on the My Keys tab in SecExMail. SecEx Key Generator will not disclose your information to anyone and you control whom you share your key ...
Secure Email Encryption for Windows: Progress Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Progress Screen Previous Top Next The progress screen shows the estimated time to completion. The estimated time to finish may be readjusted during key generation and you will be advised when key generation is complete. At that time, click Finish to save your keys and restart SecExMail if necessary.
Secure Email Encryption for Windows: Quick Start
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Quick Start Previous Top Next This is the "manual" quick guide to getting you up and running with SecExMail ! For information on wizard based setup, see Configuration Wizard. · Step 1 Start the SecEx Key Generator and create your own SecExMail keys. Click here to learn how.
Secure Email Encryption for Windows: Requirements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Requirements Previous Top Next · Windows 95 / 98 / ME / NT / 2000 / XP · SMTP and POP3 compliant email client, such as Eudora, Calypso, Outlook, etc. · Access to internet mail server ( SMTP & POP3 ) · Pentium class IBM compatible computer Bytefusion Software Prices Site ...
Secure Email Encryption for Windows: RSA Public Key Encryption
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
RSA Public Key Encryption Previous Top Next "c = me mod n" is the algorithm that turns the world of e-commerce. Introduced in 1978 by Rivest, Shamir and Adleman after whom the cipher is named, RSA is the worlds foremost public key encryption system. Contrary to the design of classic encryption ...
Secure Email Encryption for Windows: SecExMail Key File Format
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Key File Format Previous Top Next The SecExMail keys are stored in conventional text files ending in "#.pubrsa" and "#.privrsa" for public keys and private keys respectively. Files are divided into an administrative segment and a data segment. The administrative segment ...
Secure Email Encryption for Windows: SecExMail Key Transparency
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Key Transparency Previous Top Next SecExMail is engineered with a focus on transparency to give you the assurance that no backdoor keys or key recovery is embedded in encrypted messages. This means you as the recipient or sender of an encrypted SecExMail message can verify what keys have ...
Secure Email Encryption for Windows: SecExMail Keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Keys Previous Top Next SecExMail employs public key encryption. Messages are encrypted to one or more recipients using their public keys. Only the intended recipient can, upon receipt of the message, recover the plain text using his/her private key. Public key encryption differs from ...
Secure Email Encryption for Windows: SecExMail Message Format
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Message Format Previous Top Next SecExMail messages are transferred in base64 encoded format. Messages may be encrypted to multiple recipients. The internal message layout is defined as follows : [<rsa bytes>:<recipient>]key[<rsa bytes>:<recipient>]key...cipher ...
Secure Email Encryption for Windows: Send Mail Authentication
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Send Mail Authentication Previous Top Next If your send mail server requires you to authenticate in order send mail click the SMTP AUTH link on the Email Key to Friend dialog. This will invoke the dialog shown below. Enter your user name and password as issued by your internet service provider ...
Secure Email Encryption for Windows: Starting SecExMail
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Starting SecExMail Previous Top Next To start SecExMail, click "Start", "Programs", "SecExMail" and "SecEx Mail" as shown below. This will start the SecExMail service and place the icon into the system tray. Right-click on the system tray icon with your ...
Secure Email Encryption for Windows: The BAT
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
The BAT Previous Top Next To configure The BAT to work with SecExMail, you will need the password given to you by your internet service provider (ISP) or your system administrator. SecExMail operates as a go-between or relay agent between The BAT and your ISP's mail server. It encrypts and decrypts ...
Secure Email Encryption for Windows: The SecExMail Cipher
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
The SecExMail Cipher Previous Top Next The SecExMail cipher is a composite cipher specifically designed to operate on real-time email streams. It uses cryptographic primitives which are available to the general public and have been subject to extensive peer review. The SecExMail cipher incorporates ...
Secure Email Encryption for Windows: Using Your SecExClipboard Disk
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Using Your SecExClipboard Disk Previous Top Next It is a good idea to test your SecExClipboard Disk before leaving home. You may even wish to make a copy of the disk should one be damaged or lost. · Starting SecExClipboard Insert the floppy disk in the drive and browse to the location where ...
Secure Email Encryption for Windows: Watch tab
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Watch tab Previous Top Next The Watch tab shows SecExMail log information in real-time as you send and receive email. A full record of all log entries can be found in the SecExMail application directory under "secexmail.log". Bytefusion Software Prices Site Map Purchase This Product On-line ...
Secure Email Encryption for Windows: What email clients work with SecExMail ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
What email clients work with SecExMail ? Previous Top Next The following email clients have been tested and are known to work with SecExMail : · Outlook 98/2000/Express · Modifying Outlook XP/2002 · Eudora · Pegasus · The BAT · Calypso · IncrediMail ·
Secure Email Encryption for Windows: What is SecExClipboard ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
What is SecExClipboard? Top Next SecExClipboard is designed primarily to be a travel-mate for SecExMail users. It's small size allows it to be stored on a floppy disk and carried anywhere. When reading or writing email from an internet café, while away from your home or office computer, SecExClipboard ...
Secure Email Encryption for Windows: What is SecExMail ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
What is SecExMail ? Top Next SecExMail - Secure Email Made Easy Maintaining your privacy on the net is not easy in today's world. Until now, secure email could only be achieved by encryption solutions that were not user friendly. SecExMail changes all that, bringing you secure encrypted email that ...
Secure Email Encryption for Windows: Why can I not mix clear text and cipher recipients ?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Why can I not mix clear text and cipher recipients ? Previous Top Next I tried to send email to someone on my secure friends list and CC'ed ( carbon copied ) the message to someone not on my friends list and Outlook reported the following error : "SecExMail rejected the message because you ...
Secure encrypted email for web sites: About Bytefusion Ltd.
Secure Email encryption for web sites.
About Bytefusion Ltd. Previous Top Next Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Secure encrypted email for web sites: About Secure Information Courier
Secure Email encryption for web sites.
About Secure Information Courier Previous Top Next Secure Information Courier Version 1.2 Copyright © 2003, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time ...
Secure encrypted email for web sites: Acknowledgements
Secure Email encryption for web sites.
Acknowledgements Previous Top · ISAAC Random Number Generator At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html. ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996. ----------------------------------------------------------------------------------------------------------- ...
Secure encrypted email for web sites: ActiveX HTML Page
Secure Email encryption for web sites.
ActiveX HTML Page Previous Top Next This wizard will have created a customized edition of Secure Information Courier for you. In order for internet users to be able to send email and documents to your organization securely, you should now upload the file "sic.exe" to your web site, preferably ...
Secure encrypted email for web sites: Basic Configuration
Secure Email encryption for web sites.
Basic Configuration Previous Top Next Secure Information Courier can be customized with your own corporate logo and your own message prompts. You can define default message recipients and pre-load Secure Information Courier with your very own encryption keys, ensuring that only authorized recipients ...
Secure encrypted email for web sites: Confirm Incoming Mail Server
Secure Email encryption for web sites.
Confirm Incoming Mail Server Previous Top Next If the Secure Information Courier Wizard was able to auto-detect your incoming SMTP mail transfer agent, you will be prompted to confirm this setting. It is safe to accept the default. If auto-detection failed, kindly ask your system administrator ...
Secure encrypted email for web sites: Crypto Anyhwhere Decoder
Secure Email encryption for web sites.
Crypto Anywhere Decoder Previous Top Next Crypto Anywhere Decoder allows you to easily decrypt messages in two easy steps by first copying them from your email client to the Windows clipboard and then pasting them into Crypto Anywhere Decoder. Visit Crypto Anywhere on our website at www.bytefusion.com ...
Secure encrypted email for web sites: Decryption Methods
Secure Email encryption for web sites.
Decryption Methods Previous Top Next Secure Information Courier ships with two workstation based decryption tools : 1) Crypto Anywhere Decoder. Decrypt messages in two easy steps by first copying them from your email client to the Windows clipboard and then pasting them into Crypto Anywhere Decoder.
Secure encrypted email for web sites: Default Message Recipient
Secure Email encryption for web sites.
Default Message Recipient Previous Top Next Please select the default recipient of secure emails. This email address will be shown in the "To:" field when Secure Information Courier starts. Users will be able to override this selection with any one or multiple authorized recipients whom ...
Secure encrypted email for web sites: Destination Folder
Secure Email encryption for web sites.
Destination Folder Previous Top Next Please select the destination folder. Your custom edition of Secure Information Courier will be written to this directory as the file "sic.exe". Optionally, you may preview your custom edition of Secure Information Courier using the "Preview"
Secure encrypted email for web sites: Domain Configuration
Secure Email encryption for web sites.
Domain Configuration Previous Top Next Firstly, you will need to provide the name of your organization's internet domain. This information will be used to auto-detect your organization's mail server(s). You may enter the name of your web site, e.g. www.bytefusion.com, or your domain name only, ...
Secure encrypted email for web sites: Encryption Key Selection
Secure Email encryption for web sites.
Encryption Key Selection Previous Top Next Secure Information Courier employs public key infrastructure ( PKI ) encryption keys. See also Secure Information Courier / SecExMail Keys. This technology ensures that only authorized recipients will be able to decrypt messages sent to your organization.
Secure encrypted email for web sites: Encryption Key Selection
Secure Email encryption for web sites.
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Secure encrypted email for web sites: Graphical User Interface
Secure Email encryption for web sites.
Graphical User Interface Previous Top Next You may customize the physical appearance of Secure Information Courier with your own welcome text or corporate logo. When providing your own corporate logo or banner ad, kindly note that the required file format is "BMP", 630x70 pixels, using ...
Secure encrypted email for web sites: How Secure Information Courier works
Secure Email encryption for web sites.
How Secure Information Courier works Previous Top Next Once Secure Information Courier (SIC) is deployed on your website, customers can download SIC and send email and documents securely and directly to your mail server. Mail is never stored on the servers of the customer's ISP. SIC is deployable ...
Secure encrypted email for web sites: ISAAC Random Number Generator
Secure Email encryption for web sites.
ISAAC Random Number Generator Previous Top Next ISAAC (Indirection, Shift, Accumulate, Add, and Count) is a cryptographically secure pseudo random number generator. With an average cycle length of 2 to the 8295th power its output is uniformly distributed and unpredictable. ISAAC has been developed ...
Secure encrypted email for web sites: License - Evaluation
Secure Email encryption for web sites.
License - Evaluation Previous Top Next Secure Information Courier Evaluation Edition Copyright © 2003-2004, Bytefusion Ltd. All rights reserved. READ THE FOLLOWING LICENSE IN IT'S ENTIRETY BEFORE USING THIS SOFTWARE: DEFINITIONS. LICENSEE shall mean you as an individual user. LICENSOR shall mean ...
Secure encrypted email for web sites: License - Retail
Secure Email encryption for web sites.
License - Retail Previous Top Next Secure Information Courier Copyright © 2003, Bytefusion Ltd. All rights reserved. READ THE FOLLOWING LICENSE IN IT'S ENTIRETY BEFORE USING THIS SOFTWARE: DEFINITIONS. LICENSEE shall mean you as an individual user. LICENSOR shall mean Bytefusion Ltd. SOFTWARE shall ...
Secure encrypted email for web sites: Message Prompts
Secure Email encryption for web sites.
Message Prompts Previous Top Next You can provide your own instructions for each of the fields the user needs to fill in before sending a message to your organization. It is safe to keep the defaults. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Secure encrypted email for web sites: One-Time Pads
Secure Email encryption for web sites.
One-Time Pads Previous Top Next A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time ...
Secure encrypted email for web sites: Putting it all together
Secure Email encryption for web sites.
Putting it all together Previous Top Next SIC uses the SecExMail message format. This means only you can unlock your messages. Two easy modes of decryption are supported: server based and workstation based. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File ...
Secure encrypted email for web sites: RSA Public Key Encryption
Secure Email encryption for web sites.
RSA Public Key Encryption Previous Top Next "c = me mod n" is the algorithm that turns the world of e-commerce. Introduced in 1978 by Rivest, Shamir and Adleman after whom the cipher is named, RSA is the worlds foremost public key encryption system. Contrary to the design of classic encryption ...
Secure encrypted email for web sites: SecExMail Message Format
Secure Email encryption for web sites.
SecExMail Message Format Previous Top Next SecExMail messages are transferred in base64 encoded format. Messages may be encrypted to multiple recipients. The internal message layout is defined as follows : [<rsa bytes>:<recipient>]key[<rsa bytes>:<recipient>]key...cipher ...
Secure encrypted email for web sites: SecExMail SOHO
Secure Email encryption for web sites.
SecExMail SOHO Previous Top Next SecExMail SOHO allows you to decrypt messages invisibly in the background. SecExMail is compatible with all SMTP/POP3 compliant email client software. Please visit SecExMail on our website www.bytefusion.com for more information about SecExMail. Bytefusion Software ...
Secure encrypted email for web sites: Secure Information Courier / SecExMail Encryption
Secure Email encryption for web sites.
Secure Information Courier / SecExMail Encryption Previous Top Next SecExMail encryption uses the Twofish block cipher in conjunction with the ISAAC random number generator and is optimized to operate on real-time email streams. It uses cryptographic primitives which are available to the general ...
Secure encrypted email for web sites: Secure Information Courier / SecExMail Keys
Secure Email encryption for web sites.
Secure Information Courier / SecExMail Keys Previous Top Next SecExMail employs public key encryption. Messages are encrypted to one or more recipients using their public keys. Only the intended recipient can, upon receipt of the message, recover the plain text using his/her private key. Public ...
Secure encrypted email for web sites: Secure Information Courier on the web
Secure Email encryption for web sites.
Secure Information Courier on the web Previous Top Next Depicted below are examples of Secure Information Courier on the web. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Secure encrypted email for web sites: Security Advice
Secure Email encryption for web sites.
Security Advice Previous Top Next Secure Information Courier is hosted on your website. If you have stringent security requirements, you might want to consider the use of a secure website using the HTTPS protocol also. The certificate mechanism used in HTTPS authenticates your website to visitors ...
Secure encrypted email for web sites: System Requirements
Secure Email encryption for web sites.
System Requirements Previous Top Next · System Administrator Workstation Disk Space: 7.5 MB of free disk space. · Operating System Compatibility: Administrator Workstation - Configuration Wizard: Windows NT, 2000, XP Secure Information Courier Web Executable : Windows 95/98/Me + Windows ...
Secure encrypted email for web sites: What is Secure Information Courier?
Secure Email encryption for web sites.
What is Secure Information Courier? Top Next Encrypted Email Submissions - Straight from your web site! Advantages at a Glance... · Allows your web site visitors to send you secure encrypted messages with attachments · Visitors to your site need no software to use the secure facilities ...
Secure File Encryption for Windows: About Bytefusion Ltd.
Secure File Encryption Made Easy. Free for personal use
About Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for ...
Secure File Encryption for Windows: About SecExFile
Secure File Encryption Made Easy. Free for personal use
About SecExFile Previous Top Next SecExFile Version 1.1 Copyright © 2002, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell Client ...
Secure File Encryption for Windows: Buy Online
Secure File Encryption Made Easy. Free for personal use
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Secure File Encryption for Windows: Known Plain Text Attack
Secure File Encryption Made Easy. Free for personal use
Known Plain Text Attack Previous Top Next A known plain text attack is the attempt by a cryptanalyst to break a cipher based on knowledge about the plain text of a message prior to its encryption. Simply put, if the cryptanalyst knows the method of encryption, any encryption, part or all of the ...
Secure File Encryption for Windows: One-Time Pads
Secure File Encryption Made Easy. Free for personal use
One-Time Pads Previous Top Next A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time ...
Secure File Encryption for Windows: Proactive Security
Secure File Encryption Made Easy. Free for personal use
Proactive Security Previous Top Next · Pass Phrase Security Pass words and pass phrases tend to be the weakest elements of secure systems. Unfortunately encryption keys and certificates can be complicated to manage and are impossible to remember, so many people prefer the use of passwords ...
Secure File Encryption for Windows: Step 1: Select Archive to Decrypt
Secure File Encryption Made Easy. Free for personal use
Step 1: Select Archive to Decrypt Previous Top Next To decrypt SecExFile encrypted archives, simply right-click the archive you wish to decrypt in Windows explorer and select SecExFile & Decrypt from the drop down menu as shown below. This will invoke the SecExFile Decrypt Screen. Alternatively, ...
Secure File Encryption for Windows: Step 1: Select Files to Encrypt
Secure File Encryption Made Easy. Free for personal use
Step 1: Select Files to Encrypt Previous Top Next To create encrypted archives of files or folders on your hard drive, simply right-click on the files or folders you wish to encrypt and select SecExFile & Encrypt from the drop down menu as shown below. This will invoke the SecExFile Encrypt ...
Secure File Encryption for Windows: Step 2: Confirm Name of Archive
Secure File Encryption Made Easy. Free for personal use
Step 2: Confirm Name of Archive Previous Top Next This screen lets you confirm or change the name of encrypted archive to be created. By default, SecExCipher files use the extension ".sec". When encrypting multiple files or folders, the name of the first item is chosen as the name of ...
Secure File Encryption for Windows: Step 2: Confirm Target Folder
Secure File Encryption Made Easy. Free for personal use
Step 2: Confirm Target Folder Previous Top Next This screen lets you select the folder to which decrypted files will be extracted from the SecExFile archive following their successful decryption. Click Next to continue. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order ...
Secure File Encryption for Windows: Step 3: Define Pass Phrase
Secure File Encryption Made Easy. Free for personal use
Step 3: Define Pass Phrase Previous Top Next This screen lets you chose a passphrase to protect the encrypted archive. The suggested pass phrase length is between 12 and 25 characters for the 128 bit SecExMail cipher version and between 12 and 70 characters for the 384 bit SecExMail cipher version ...
Secure File Encryption for Windows: Step 3: Enter Pass Phrase
Secure File Encryption Made Easy. Free for personal use
Step 3: Enter Pass Phrase Previous Top Next This screen lets you enter the pass phase which unlocks the encrypted archive. Please remember that pass phrases are case sensitive. Click Next to continue. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Secure File Encryption for Windows: Summary
Secure File Encryption Made Easy. Free for personal use
Summary Previous Top Next The summary screen shows the progress of archiving and encryption in real-time. Click Finish. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell ...
Secure File Encryption for Windows: Summary
Secure File Encryption Made Easy. Free for personal use
Summary Previous Top Next The summary screen shows the progress of decryption and file extraction in real-time. Click Finish. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Secure File Encryption for Windows: The SecExMail Cipher
Secure File Encryption Made Easy. Free for personal use
The SecExMail Cipher Previous Top Next The SecExMail cipher is a composite cipher originally designed to operate on real-time email streams. It uses cryptographic primitives which are available to the general public and have been subject to extensive peer review. Message encryption is performed ...
Secure File Encryption for Windows: What is SecExFile?
Secure File Encryption Made Easy. Free for personal use
What is SecExFile? Top Next SecExFile is a data archiving and encryption tool to help you protect the integrity of confidential information contained in files and folders on your computer. General features : · Integrates seamlessly with Windows explorer · Easy to use, password based, ...
Secure Shell Client for Windows: About Bytefusion Ltd.
Secure Shell Client and Secure Terminal Emulation
About Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for ...
Secure Shell Client for Windows: About SecEx
Secure Shell Client and Secure Terminal Emulation
About SecEx Previous Top Next SecEx Security Express Version 1.5 Copyright © 2001-2002, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? ...
Secure Shell Client for Windows: Advanced Session Properties
Secure Shell Client and Secure Terminal Emulation
Advanced Session Properties Previous Top Next Advanced Session Properties lets you fine tune a session profile. To access the Advanced Session Properties dialog, click the Advanced... button in Session Profiles. The following items can be configured: · Initial Remote Directory On UNIX ...
Secure Shell Client for Windows: Application preferences
Secure Shell Client and Secure Terminal Emulation
Application preferences Previous Top Next Use the application preferences dialog to customize the behavior of SecEx. · Default file viewer Application to use for " quick view". · Where to store downloads Default download directory for data transferred from remote ...
Secure Shell Client for Windows: ASCII / Binary Transfer
Secure Shell Client and Secure Terminal Emulation
ASCII / Binary Transfer Previous Top Next The default mode of file transfer is binary. Unless otherwise directed, SecEx will transfer all files in binary mode. You can force ASCII transfer of files via the copy buttons on the toolbar marked with an "a" as shown below. Alternatively, SecEx ...
Secure Shell Client for Windows: Buy Online
Secure Shell Client and Secure Terminal Emulation
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Secure Shell Client for Windows: Command mode
Secure Shell Client and Secure Terminal Emulation
Command mode Previous Top Next To enter command mode, select "Command Mode" from the "Tools" menu. This will enable you to execute SCP ( Secure Copy Program ) and SFTP ( Secure FTP ) commands directly. Output will be displayed in the session log window at the bottom. You will ...
Secure Shell Client for Windows: Deleting remote files
Secure Shell Client and Secure Terminal Emulation
Deleting remote files Previous Top Next To delete a file on the remote server, right-click the file with your mouse and select "Delete" from the pop-up menu. Note that depending on your access privileges on the remote system, you may not be allowed to delete some files. Bytefusion Software ...
Secure Shell Client for Windows: DNS/IP Spoofing
Secure Shell Client and Secure Terminal Emulation
DNS/IP Spoofing Previous Top Next IP spoofing is the creation of IP packets using someone else's IP address. DNS spoofing is the substitution of a different IP address for a DNS name. DNS spoofing is commonly achieved by corrupting the DNS database of the DNS server your computer connects to in ...
Secure Shell Client for Windows: Executing remote files
Secure Shell Client and Secure Terminal Emulation
Executing remote files Previous Top Next To execute a file from the remote server on your computer, right-click the file with your mouse and select "Open" from the pop-up menu. Please note that you will not be able to execute Unix binaries on your Windows computer. Certain files, such ...
Secure Shell Client for Windows: File transfer
Secure Shell Client and Secure Terminal Emulation
File transfer Previous Top Next After successfully logging into a SSH server, you may browse the remote file system and copy files to and from the server. Simply, select the files you wish to copy and drag them to a directory on your local system. The session log window at the bottom will indicate ...
Secure Shell Client for Windows: Folder Bookmarks
Secure Shell Client and Secure Terminal Emulation
Folder Bookmarks Previous Top Next Folder bookmarks are similar to shortcuts on your desktop or bookmarks in your favorite web browser. If you frequently access files in a particular folder on a Secure Shell server, you might wish to bookmark that folder for easy access. To bookmark a folder, simply ...
Secure Shell Client for Windows: Quick start
Secure Shell Client and Secure Terminal Emulation
Quick start Previous Top Next You just want to connect to Secure Shell server and start transferring files ? To connect to a Secure Shell server you will need to tell SecEx about the server's IP address or DNS name and provide your login information. This information is called a session profile.
Secure Shell Client for Windows: Quick view
Secure Shell Client and Secure Terminal Emulation
ASCII / Binary Transfer Previous Top Next To view the contents of a file on the remote server, right-click the file with your mouse and select "Quick View" from the pop-up menu. The file with be downloaded to the temporary working folder and opened in the default viewer. Both, temporary ...
Secure Shell Client for Windows: Saving the sessesion log
Secure Shell Client and Secure Terminal Emulation
Saving the sessesion log Previous Top Next To save the session log, simple select "Save log as..." from the "File" menu. If you submit a bug report, please be sure to include a relevant verbose session log. Bytefusion Software Prices Site Map Purchase This Product On-line How ...
Secure Shell Client for Windows: Secure Command Prompt
Secure Shell Client and Secure Terminal Emulation
Secure Command Prompt Previous Top Next How do I get a secure terminal on a Secure Shell Server ? SecEx supports a "Secure Command Prompt" facility for remote systems which is equivalent to a Windows (TM) command prompt. "Secure Command Prompt" supports fully interactive programs ...
Secure Shell Client for Windows: Server Login
Secure Shell Client and Secure Terminal Emulation
Server Login Previous Top Next To log into a remote server, simply double-click the associated session profile icon in the "Remote Systems" pane on the right. Secex will contact the server and submit your user name and password for authentication. Upon successful login, SecEx will display ...
Secure Shell Client for Windows: Session profile wizard
Secure Shell Client and Secure Terminal Emulation
Session profile wizard Previous Top Next The session profile wizard guides you through the process of entering a new session profile. See New Session Profile for a description of the items contained in a session profile. Bytefusion Software Prices Site Map Purchase This Product On-line How to ...
Secure Shell Client for Windows: Session Profiles
Secure Shell Client and Secure Terminal Emulation
Session Profiles Previous Top Next A session profile holds all information necessary to connect to a Secure Shell server. To create a new session profile, select "New Session Profile" from the "File" menu. The following items are required: · Session Profile Name A descriptive ...
Secure Shell Client for Windows: Technical specifications
Secure Shell Client and Secure Terminal Emulation
Technical specifications Previous Top Next SecEx is compatible with Secure SSH servers. The default mode of communication is SSH protocol version 2 with automatic fall-back to SSH protocol version 1. Secure file transfer to and from SSH servers is achieved via SFTP ( Secure FTP ) where available, ...
Secure Shell Client for Windows: User settings
Secure Shell Client and Secure Terminal Emulation
User Settings Previous Top Next You can define user settings to be used as default login information on all new session profiles. The values you provide here will not alter user information in existing session profiles. · My User Name Your login name on the remote system · Password ...
Secure Shell Client for Windows: Verbose output
Secure Shell Client and Secure Terminal Emulation
Verbose Output Previous Top Next To display verbose output in the session log window, select "Verbose Output" from the "View" menu. This is useful if you are reporting problems or simply want to take a peek "under the hood". Verbose output is printed in a light grey ...
Secure Shell Client for Windows: What is SecEx ?
Secure Shell Client and Secure Terminal Emulation
What is SecEx ? Top Next SecEx is a network file manager and secure terminal emulator that allows encrypted file transfer between your PC and network servers running Secure Shell. SecEx seamlessly interoperates with either SSH1 or SSH2 servers on both Unix and Windows operating systems. You can ...
Secure Shell Client for Windows: What is Secure Shell ?
Secure Shell Client and Secure Terminal Emulation
About SSH Secure Shell Previous Top Next SSH Secure Shell is a replacement for the telnet command and supports encrypted client / server connections. Secure file transfer is achieved via two secure shell supplements : SCP and SFTP. SCP ( secure copy program) accompanies most SSH version 1 servers.
Secure Shell Client for Windows: X11 Forwarding
Secure Shell Client and Secure Terminal Emulation
X11 Forwarding Previous Top Next To securely forward X11 sessions from a SSH server to your PC, simply click the "Secure X11 Terminal" button after logging in to the server. This will create a Secure Command Prompt session which is X11 enabled. All X11 traffic for X based applications ...
Server Based Secure Email Encryption for Windows: About Bytefusion Ltd.
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About Bytefusion Ltd. Previous Top Next Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Server Based Secure Email Encryption for Windows: About SecExMail Gate
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
About SecExMail Gate Previous Top Next SecExMail Version 1.20 Copyright © 2003, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure ...
Server Based Secure Email Encryption for Windows: Acknowledgements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Acknowledgements Previous Top · ISAAC Random Number Generator At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html. ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996. ----------------------------------------------------------------------------------------------------------- ...
Server Based Secure Email Encryption for Windows: Client Event Logs
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Client Event Logs Previous Top Next Client event logs can be used to debug problems between your e-mail clients, SecExMail Gate and your mail server. In order to record client logs, you will first need turn client logging on via the Events tab. It is recommended that client logging only be performed ...
Server Based Secure Email Encryption for Windows: Conventional POP3 clients - LAN
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Conventional POP3 clients - LAN Previous Top Next The POP3 tab allows you to configure SecExMail Gate for operation with mail clients on your local area network. This configuration is recommended where no secure communication between the email client workstation and your mail server is necessary.
Server Based Secure Email Encryption for Windows: Conventional SMTP clients - LAN
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Conventional SMTP clients - LAN Previous Top Next The SMTP tab allows you to configure SecExMail Gate for operation with mail clients on your local area network. This configuration is recommended where no secure communication between the email client workstation and your mail server is necessary.
Server Based Secure Email Encryption for Windows: Create your personal SecExMail keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Create your personal SecExMail keys Previous Top Next The SecEx Key Generator creates encryption keys for you which will enable your friends to send you encrypted mail and enable you to decrypt mail sent to you by your friends. To invoke the SecEx Key Generator, click "Start", "Programs", ...
Server Based Secure Email Encryption for Windows: Entropy Collection
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Collection Previous Top Next Individual email messages are encrypted via session keys using the Twofish block cipher in conjunction with the ISAAC random number generator. Each session key is then encrypted with the SecExMail public key for the recipient of the message. Upon receipt of ...
Server Based Secure Email Encryption for Windows: Entropy Collection Settings
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Collection Settings Previous Top Next This page configures the SecExMail Gate entropy collection. Entropy is important to the generation of random session keys. It is safe to leave the default settings. Light entropy collection options incur minimum impact on CPU performance and are appropriate ...
Server Based Secure Email Encryption for Windows: Entropy Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Entropy Screen Previous Top Next Your new key will be generated from prime numbers produced by a random number generator. In order for your key to be unpredictable we need to collect a large amount of random data from the only source in the system which is unique : you. This data will be used to ...
Server Based Secure Email Encryption for Windows: Friend Keys Management
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Friend Keys Management Previous Top Next The Friends page allows you to manage SecExMail keys of friends and business partners. If a key is displayed on this page, only a public key component is on file for corresponding email address. Messages may be encrypted to the listed email address but only ...
Server Based Secure Email Encryption for Windows: Generating Certificate Requests
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Generating Certificate Requests Previous Top Next Like other SSL based servers, SecExMail Gate uses certificates to authenticate itself to clients, thus preventing breaches of security such as Trojan Horse attacks and DNS spoofing. SSL certificates are based on a chain of trust which requires them ...
Server Based Secure Email Encryption for Windows: Group Key Management
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Group Key Management Previous Top Next The group key management page is used to define associations between individual staff members and their respective departments. To provide interoperability with third party applications such as spreadsheets and database programs, group key associations are ...
Server Based Secure Email Encryption for Windows: Installing Certificates
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Installing Certificates Previous Top Next After you have received your signed SSL certificate, you need to copy the certificate file to the application folder of SecExMail Gate as shown below. You may now delete the "??? CertReq.pem" certificate request file. Then update the "certificate ...
Server Based Secure Email Encryption for Windows: IP / DNS Spoofing
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
IP / DNS Spoofing Previous Top Next IP spoofing is the creation of IP packets using someone else's IP address. DNS spoofing is the substitution of a different IP address for a DNS name. DNS spoofing is commonly achieved by corrupting the DNS database of the DNS server your computer connects to ...
Server Based Secure Email Encryption for Windows: ISAAC Random Number Generator
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
ISAAC Random Number Generator Previous Top Next ISAAC (Indirection, Shift, Accumulate, Add, and Count) is a cryptographically secure pseudo random number generator. With an average cycle length of 2 to the 8295th power its output is uniformly distributed and unpredictable. ISAAC has been developed ...
Server Based Secure Email Encryption for Windows: Key Size Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Key Size Screen Previous Top Next Deciding on the key size of your new email key is a matter of personal judgement. It is commonly held that RSA keys of 1024 bits will withstand conventional cryptanalytic attacks while key sizes of 512 bits or less are to be regarded as insecure. In general, the ...
Server Based Secure Email Encryption for Windows: Known Plain Text Attack
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Known Plain Text Attack Previous Top Next A known plain text attack is the attempt by a cryptanalyst to break a cipher based on knowledge about the plain text of a message prior to its encryption. Simply put, if the cryptanalyst knows the method of encryption, any encryption, part or all of the ...
Server Based Secure Email Encryption for Windows: One-Time Pads
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
One-Time Pads Previous Top Next A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time ...
Server Based Secure Email Encryption for Windows: Overview
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Overview Previous Top Next Before SecExMail The diagram below illustrates the conventional flow of email data across corporate, local area networks and the public internet. Traditionally, email messages travel across the internet unencrypted, not unlike messages on postcards. And just like postcards, ...
Server Based Secure Email Encryption for Windows: Passphrase Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Passphrase Screen Previous Top Next Your new key will be stored in your computer's registry. To protect confidential key information from unauthorized access, it will be encrypted and protected with a passphrase that only you know. Please chose a long phrase containing both letters and numbers ...
Server Based Secure Email Encryption for Windows: Personal and Department Keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Personal and Department Keys Previous Top Next The keys page allows you to manage your SecExMail keys. If a key is displayed on this page, both a public and a private key component is on file for corresponding email address. Messages to and from the listed email address may be encrypted as well ...
Server Based Secure Email Encryption for Windows: Personal Details Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Personal Details Screen Previous Top Next The Personal Details screen collects information about you and your email address. This information will later appear on the Keys tab in SecExMail. SecEx Key Generator will not disclose your information to anyone and you control whom you share your key ...
Server Based Secure Email Encryption for Windows: Progress Screen
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Progress Screen Previous Top Next The progress screen shows the estimated time to completion. The estimated time to finish may be readjusted during key generation and you will be advised when key generation is complete. At that time, click Finish to save your keys and restart SecExMail if necessary.
Server Based Secure Email Encryption for Windows: Requirements
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Requirements Previous Top Next · Windows 95 / 98 / ME / NT / 2000 / XP · SMTP and POP3 compliant email client, such as Eudora, Calypso, Outlook, etc. · Access to internet mail server ( SMTP & POP3 ) · Pentium class IBM compatible computer Bytefusion Software Prices Site ...
Server Based Secure Email Encryption for Windows: RSA Public Key Encryption
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
RSA Public Key Encryption Previous Top Next "c = me mod n" is the algorithm that turns the world of e-commerce. Introduced in 1978 by Rivest, Shamir and Adleman after whom the cipher is named, RSA is the worlds foremost public key encryption system. Contrary to the design of classic encryption ...
Server Based Secure Email Encryption for Windows: SecExMail Encryption
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Encryption Previous Top Next SecExMail encryption uses the Twofish block cipher in conjunction with the ISAAC random number generator and is optimized to operate on real-time email streams. It uses cryptographic primitives which are available to the general public and have been subject ...
Server Based Secure Email Encryption for Windows: SecExMail Key File Format
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Key File Format Previous Top Next The SecExMail keys are stored in conventional text files ending in "#.pubrsa" and "#.privrsa" for public keys and private keys respectively. Files are divided into an administrative segment and a data segment. The administrative segment ...
Server Based Secure Email Encryption for Windows: SecExMail Keys
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Keys Previous Top Next SecExMail employs public key encryption. Messages are encrypted to one or more recipients using their public keys. Only the intended recipient can, upon receipt of the message, recover the plain text using his/her private key. Public key encryption differs from ...
Server Based Secure Email Encryption for Windows: SecExMail Message Format
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail Message Format Previous Top Next SecExMail messages are transferred in base64 encoded format. Messages may be encrypted to multiple recipients. The internal message layout is defined as follows : [<rsa bytes>:<recipient>]key[<rsa bytes>:<recipient>]key...cipher ...
Server Based Secure Email Encryption for Windows: SecExMail POP3 clients - Internet
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail POP3 clients - Internet Previous Top Next The POP3S tab allows you to configure SecExMail Gate for operation with SecExMail corporate email clients. This configuration option is recommended for "roadwarriors" or remote staff who will be connecting to your corporate email server ...
Server Based Secure Email Encryption for Windows: SecExMail SMTP clients - Internet
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
SecExMail SMTP clients - Internet Previous Top Next The SMTPS tab allows you to configure SecExMail Gate for operation with SecExMail corporate email clients. This configuration option is recommended for "road warriors" or remote staff who will be connecting to your corporate email server ...
Server Based Secure Email Encryption for Windows: Secure Socket Layer & Certificates
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
Secure Socket Layer & Certificates Previous Top Next The Secure Socket Layer (SSL) page allows you to fine tune the operation of secure client connections and configure the SSL certificate SecExMail Gate will present to connecting clients. This certificate serves to verify the identity of the ...
Server Based Secure Email Encryption for Windows: System Event Log
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
System Event Log Previous Top Next The system event log page displays the last 50 messages SecExMail Gate has reported to the operating system event log. Hit the Refresh button to update the display. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Server Based Secure Email Encryption for Windows: System Service Settings
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
System Service Settings Previous Top Next This page lets you fine tune the operation of SecExMail Gate as a system service. · Status The status field indicates if the SecExMail Gate service is presently running. If you think the service should be running but the status indication shows that ...
Server Based Secure Email Encryption for Windows: What is SecExMail Gate?
Secure Email encryption. Works with any e-mail client and needs no plugins. Free for personal use
What is SecExMail Gate? Top Next SecExMail Gate is a server based e-mail proxy server which encrypts and decrypts email messages on your corporate network in real-time. This proxy server integrates with your existing corporate infrastructure and operates in conjunction with your SMTP/POP3 mail ...
Page has been moved. Redirecting..... Introduction What is SecExMail ? Quick Start Acknowledgements Configuration Starting SecExMail Mail server tab Encryption tab Desktop tab My Keys tab Friends tab In-Tray Tab Out-Tray Tab Watch tab Distributing SecExKeys Send Mail Authentication Passphrase cache Outgoing Mail Filter Incoming Mail Filter Configuration Wizard Automatic Key Exchange Keys Create your ...
Page has been moved. Redirecting..... Introduction What is Secure Information Courier? Secure Information Courier on the web Customizing Basic Configuration How Secure Information Courier works Domain Configuration Confirm Incoming Mail Server Graphical User Interface Message Prompts Encryption Key Selection Default Message Recipient Destination Folder ActiveX HTML Page Putting it all together Security ...
Page has been moved. Redirecting..... Overview What is PresenTense Network Time Synchronization Time Protocols & Accuracy Which Time Protocol is Right for Me ? GPS Time Synchronization Free Run Support Standard Deviation Statistical Filter System Requirements FAQ Configuration Settings Tab Network Tab GPS Tab NTP4 Plug-In NTP4 Query Command Line Tool NMEA Tab Administration Tab Performance Tab ...
Page has been moved. Redirecting..... Overview What is PresenTense98 ? Network Time Synchronization Time Protocols & Accuracy System Requirements Configuration Settings Tab Advanced Tab Administration Tab Technical RFC 2030 RFC 868 About About PresenTense98 About Bytefusion Ltd.
Page has been moved. Redirecting..... Overview What is PresenTense Server Network Time Synchronization Time Protocols & Accuracy Which Time Protocol is Right for Me ? GPS Time Synchronization Free Run Support Standard Deviation Statistical Filter System Requirements FAQ Configuration Admin Tab Settings Tab Internet Time Server Tab Handheld GPS Tab NTP4+GPS Tab NMEA Tab Performance Tab Log Tab ...
PresenTense NTP Auditor for Windows PresenTense NTP Auditor Overview What is PresenTense NTP Auditor Audit Trails NENA Time NASD OATS Regulatory Compliance National Time Sources Standard Deviation Statistical Filter Real-Time Receipts Configuring PresenTense NTP Auditor Network Configuration Service Administration E-Mail Alarm Action About About PresenTense NTP Auditor About PresenTense Server About ...
Page has been moved. Redirecting..... Overview What is LanTimeAnalyzer ? Quick Start Interpreting the User Interface Network Time Synchronization Time Protocols and Accuracy System Requirements Configuration Adding and Removing Clients True Time Server Auto Fetch Alarm Settings Default Timeouts PresenTense Time Clients Query Tool Using the Query Tool Command Dictionary Diagnostic echo get time get ...
Page has been moved. Redirecting..... Overview What is PresenTense NTP Auditor Audit Trails NENA Time NASD OATS Regulatory Compliance National Time Sources Standard Deviation Statistical Filter Real-Time Receipts Configuration Network Configuration Service Administration E-Mail Alarm Action About About PresenTense NTP Auditor About PresenTense Server About PresenTense Client NT/2000/XP About PresenTense ...
Page has been moved. Redirecting..... Introduction What is SecExMail Gate? Overview Configuration Conventional SMTP clients - LAN SecExMail SMTP clients - Internet Conventional POP3 clients - LAN SecExMail POP3 clients - Internet Secure Socket Layer & Certificates Entropy Collection Settings System Service Settings Personal and Department Keys Group Key Management Friend Keys Management System ...
Page has been moved. Redirecting..... Introduction What is Crypto Anywhere ? Usage Encrypting Mail 1,2,3 Decrypting Mail 1,2,3 My Identities Secure Friends Direct Drop Create Travel Floppy Import PGP (tm) Keys For your eyes only screen Preferences Application Themes Technical RSA Public Key Encryption ISAAC Random Number Generator The SecExMail / Crypto Anywhere Cipher SecExMail / Crypto Anywhere ...
Page has been moved. Redirecting..... Overview What is SecEx ? Quick start Configuration Session Profiles Advanced Session Properties Session profile wizard User settings Application preferences Using SecEx Server Login File transfer ASCII / Binary Transfer Quick view Deleting remote files Secure Command Prompt X11 Forwarding Folder Bookmarks Command mode Executing remote files Verbose output Saving ...
Page has been moved. Redirecting..... Introduction What is SecExFile? Encrypting Files 1,2,3 Step 1: Select Files to Encrypt Step 2: Confirm Name of Archive Step 3: Define Pass Phrase Summary Decrypting Files 1,2,3 Step 1: Select Archive to Decrypt Step 2: Confirm Target Folder Step 3: Enter Pass Phrase Summary Technical Proactive Security The SecExMail Cipher Known Plain Text Attack One-Time Pads ...
Page has been moved. Redirecting..... Overview What is BFTelnet ? BFTelnet Features Configuring BFTelnet System Requirements About BFTelnet Bytefusion Ltd.
USB GPS for under £60
Price: £ 57.00 + VAT VAT is charged at 17.5% for all EU customers unless a valid VAT number is supplied. To get an approximate conversion of this price to your currency, Click Here. USB GPS RECEIVER, TN-200 Gps Navigation With Your Laptop! - WAAS capable for better accuracy - New compact design ...
Versions
Versions SecEx Versions Feature Lite Standard Enterprise Maximum Session Profiles 1 10 unlimited Secure Command Prompt no no yes Secure X11 Forwarding no no yes Command Mode no no yes Bookmarked Folders yes yes yes Selectable Cipher Support yes yes yes SSH1 and SSH2 Support yes yes yes SCP and SFTP yes yes yes ...
What is a WHOIS server
The WHOIS protocol allows access to the databases of internet domain name registrars. Registrars responsible for top level domains such as ".com" operate servers on the internet, open to the public, which may be queried for domain registration information.
What is an internet domain name
Internet domain names are human readable, easy to remember names for computers on the internet. Domain names can be used to associate your web site with your business or trade name.
Windows MD5 Signature Generator: About Bytefusion Ltd.
Generates MD5 Message Digest Signatures
About Bytefusion Ltd. Previous Top Next Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server ...
Windows MD5 Signature Generator: About SecExMD5+
Generates MD5 Message Digest Signatures
About SecExMD5+ Previous Top Next SecExMD5+ Version 1.1 Copyright © 2002, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell Client ...
Windows MD5 Signature Generator: Acknowledgements
Generates MD5 Message Digest Signatures
Acknowledgements Previous Top · RIPEMD-160 The RIPE message digest was written by Antoon Bosselaers for Katholieke Universiteit Leuven, Department of Electrical Engineering ESAT/COSIC, Belgium. License conditions ask us to quote the following : " RIPEMD-160 software written by Antoon ...
Windows MD5 Signature Generator: E-Mailing Reports
Generates MD5 Message Digest Signatures
E-Mailing Reports Previous Top Next SecExMD5+ supports one-click emailing of digital signatures reports. If you check "Email signatures report to a friend" on the reports page, SecExMD5+ will open the compose message window in your favorite email client and enclose the newly generated ...
Windows MD5 Signature Generator: Generating Reports
Generates MD5 Message Digest Signatures
Generating Reports Previous Top Next SecExMD5+ will automatically generate MD5, SHA-1, and RIPEMD-160 signatures for each file you requested. Check "Email signatures report to a friend" if you wish to distribute the report via email. A copy of the report is written to file as shown in ...
Windows MD5 Signature Generator: MD5 Message-Digest Algorithm
Generates MD5 Message Digest Signatures
MD5 Message-Digest Algorithm Previous Top Next The MD5 message digest algorithm specifies a standard for producing a unique 128 bit fingerprint or digital signature for documents of arbitrary length. MD5 was designed by Professor Ronald L. Rivest of MIT and if specified in RFC 1321. Bytefusion ...
Windows MD5 Signature Generator: RFC 1321
Generates MD5 Message Digest Signatures
RFC 1321 Previous Top Next Network Working Group R. Rivest Request for Comments: 1321 MIT Laboratory for Computer Science and RSA Data Security, Inc. April 1992 The MD5 Message-Digest Algorithm Status of this Memo This memo provides information for the Internet community.
Windows MD5 Signature Generator: RFC 3174
Generates MD5 Message Digest Signatures
RFC 3174 Previous Top Next Network Working Group D. Eastlake, 3rd Request for Comments: 3174 Motorola Category: Informational P. Jones Cisco Systems September 2001 US Secure Hash Algorithm 1 (SHA1) Status of this Memo This memo provides information for the Internet ...
Windows MD5 Signature Generator: RIPEMD Cryptographic Hash Function
Generates MD5 Message Digest Signatures
RIPEMD Cryptographic Hash Function Previous Top Next RIPEMD-160 is a cryptographic hash function designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel in the framework of the European Union's RACE Integrity Primitives Evaluation (RIPE) project. RIPEMD-160 is a 160 bit replacement for ...
Windows MD5 Signature Generator: Selecting Files
Generates MD5 Message Digest Signatures
Selecting Files Previous Top Next simply right-click on the file or files you wish to encrypt and select SecExMD5+ & Generate digital signature from the drop down menu as shown below. This will invoke the SecExMD5 Wizard. Alternatively, you may invoke SecExMD5+ - Generate digital signature ...
Windows MD5 Signature Generator: US Secure Hash Algorithm 1 (SHA1)
Generates MD5 Message Digest Signatures
US Secure Hash Algorithm 1 (SHA1) Previous Top Next The Secure Hash Algorithm 1 ( SHA1 ) has been officially adopted by the United States government as the Secure Hash Standard of the Federal Information Processing Standard ( FIPS ) and is specified in RFC 3174. See also FIPS 180-1. SHA1 uses a ...
Windows MD5 Signature Generator: What is SecExMD5+
Generates MD5 Message Digest Signatures
What is SecExMD5+ Top Next SecExMD5+ generates message digest signatures of files. Message digests are digital fingerprints commonly published by distributors of computer software and other digital documents so that end users may verify the authenticity of such documents. Any attempt by a third ...
Windows MD5 Signature Generator: Wizard Interface
Generates MD5 Message Digest Signatures
Wizard Interface Previous Top Next The SecExMD5+ wizard lets you review the file(s) for which you are about to create digital signatures. This screen also lets you add and remove files and folders from the list. Click the browse files button to browse for additional files and then click the Add ...
Windows NTP Auditor: About Bytefusion Ltd.
NTP4.0 Time Client - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Windows NTP Auditor: About PresenTense Client 95/98/ME
NTP4.0 Time Client - Keeping Your Network Time Accurate
About PresenTense Client 95/98/ME Previous Top Next PresenTense98 is a network time client for Windows 95 / 98 / ME. It synchronizes your PC system clock to a network time server. The features of PresenTense98 include : · Multi Protocol Support Time sources of all major protocol families ...
Windows NTP Auditor: About PresenTense Client NT/2000/XP
NTP4.0 Time Client - Keeping Your Network Time Accurate
About PresenTense Client NT / 2000 / XP / 2003 Previous Top Next PresenTense Time Client - Advantages at a glance · Accurate and reliable ( microsecond accuracy, runs as a service ) · Easy to install and maintain ( most users up and running in less than a minute ) · Versatile ( ...
Windows NTP Auditor: About PresenTense NTP Auditor
NTP4.0 Time Client - Keeping Your Network Time Accurate
About PresenTense NTP Auditor Previous Top Next PresenTense NTP Auditor for Windows NT / 2000 / XP / 2003 Version 3.7 Copyright (C) 2003-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for ...
Windows NTP Auditor: About PresenTense Server
NTP4.0 Time Client - Keeping Your Network Time Accurate
About PresenTense Time Server Previous Top Next PresenTense Time Server - Advantages at a glance · Accurate and reliable ( microsecond accuracy, 24/7 availability ) · Easy to install and maintain ( most users up and running in less than a minute ) · Versatile ( able to use ...
Windows NTP Auditor: Audit Trails
NTP4.0 Time Client - Keeping Your Network Time Accurate
Audit Trails Previous Top Next PresenTense NTP Auditor supports the generation of primary, secondary and tertiary audit trails, charting local system time with respect to legal sources of UTC and automatically archives logs according year and month. The display will automatically show the most ...
Windows NTP Auditor: Buy Online
NTP4.0 Time Client - Keeping Your Network Time Accurate
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Windows NTP Auditor: E-Mail Alarm Action
NTP4.0 Time Client - Keeping Your Network Time Accurate
E-Mail Alarm Action Previous Top Next PresenTense NTP Auditor can notify you by email if the computer system time drifts beyond the limits specified in the NENA 911 standard, if your time synchronization software fails, or if audit trails cannot be created. · E-Mail Alarm Notification (SMTP) ...
Windows NTP Auditor: NASD OATS Regulatory Compliance
NTP4.0 Time Client - Keeping Your Network Time Accurate
NASD OATS Regulatory Compliance Previous Top Next PresenTense Auditor allows companies to comply with the time auditing requirements of NASD Rule 6950 - 6957 as specified by the National Association of Securities Dealers and the Securities and Exchange Commission ruling SEC Rule 71a-4 on records ...
Windows NTP Auditor: National Time Sources
NTP4.0 Time Client - Keeping Your Network Time Accurate
National Time Sources & Access Policies Previous Top Next PresenTense NTP Auditor references sources of legal time. Depending on your jurisdiction, the availability of legal time will vary. If you know of a source of legal time in your country which is not listed here, kindly notify us at support@bytefusion.com.
Windows NTP Auditor: NENA Time
NTP4.0 Time Client - Keeping Your Network Time Accurate
NENA Time Previous Top Next The National Emergency Number Association (NENA) identifies time keeping requirements for Public Safety Answering Points (PSAP) such as 911 call centers. These requirements include continuous accuracy of 100 milliseconds to UTC. PresenTense NTP Auditor actively monitors ...
Windows NTP Auditor: Network Configuration
NTP4.0 Time Client - Keeping Your Network Time Accurate
Network & Audit Trail Configuration Previous Top Next The network configuration screen displays settings for the primary, secondary and tertiary audit trails. Use this screen to set the national UTC ( Coordinated Universal Time) sources for PresenTense NTP Auditor and the associated audit intervals.
Windows NTP Auditor: Real-Time Receipts
NTP4.0 Time Client - Keeping Your Network Time Accurate
Real-Time Receipts Previous Top Next PresenTense NTP Auditor supports the generation of real-time logs to a dedicated line printer, creating an official record of system time at configurable intervals or in response to time changes between intervals. Paper logs are created in real-time to safeguard ...
Windows NTP Auditor: Service Administration
NTP4.0 Time Client - Keeping Your Network Time Accurate
Service Administration Previous Top Next The service administration screen allows you to start and stop the PresenTense NTP Auditor service and configure the generation of official real-time receipts via a dedicated line printer. · Service Use the Start and Stop button to manage the running ...
Windows NTP Auditor: Standard Deviation Statistical Filter
NTP4.0 Time Client - Keeping Your Network Time Accurate
Standard Deviation Statistical Filter Previous Top Next Standard Deviation is a statistical measure of variance in a sample set. It is calculated from the square root of the variance of the sample set as shown below : where n is the number of data samples and denotes the arithmetic mean ...
Windows NTP Auditor: What is PresenTense NTP Auditor
NTP4.0 Time Client - Keeping Your Network Time Accurate
What is PresenTense NTP Auditor Top Next PresenTense NTP Auditor monitors your computer's built-in clock and compares it's time to the real time. Most computer clocks lose or gain time so within a few days, your computer does not show the real time. Many software packages claim to synchronize your ...
Windows NTP Query Tool: About Bytefusion Ltd.
NTP4.0 Time Server - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries: sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for ...
Windows NTP Query Tool: About PTQuery
NTP4.0 Time Server - Keeping Your Network Time Accurate
About PTQuery Previous Top Next PTQuery Version 1.2 Copyright © 1999-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? Secure Shell ...
Windows NTP Query Tool: Basic Usage
NTP4.0 Time Server - Keeping Your Network Time Accurate
Basic Usage Previous Top Next To query operating parameters of a PresenTense server / client installed on your network simply enter it's IP address or DNS host name in the Server Address field, enter your query string in the Query Command field as shown below, and press Send. If PresenTense is ...
Windows NTP Query Tool: Command Dictionary Overview
NTP4.0 Time Server - Keeping Your Network Time Accurate
Command Dictionary Overview Top Next You can query all major operating paramaters of PresenTense servers and clients via the PresenTense query tool. This feature is useful in performing remote diagnostic tasks or setting operating parameters over the network. · Diagnostic Commands ECHO GET ...
Windows NTP Query Tool: echo
NTP4.0 Time Server - Keeping Your Network Time Accurate
echo Previous Top Next · Syntax : ECHO <argument> · Parameters : Any string value · Returns : Echoes argument. Use this command to verify connectivity to the client and determine remote operating system. Example: echo hi Returns "hi" on PresenTense for Windows ...
Windows NTP Query Tool: get admins
NTP4.0 Time Server - Keeping Your Network Time Accurate
get admins Previous Top Next · Syntax : GET ADMINS · Parameters : none · Returns : Returns a list of IP addresses representing the administrators that are allowed to make changes to the operating parameters on this client. Bytefusion Software Prices Site Map Purchase This ...
Windows NTP Query Tool: get date
NTP4.0 Time Server - Keeping Your Network Time Accurate
get date Previous Top Next · Syntax : GET DATE · Parameters : none · Returns : Returns the date at the PresenTense client / server Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time ...
Windows NTP Query Tool: get dispoverride
NTP4.0 Time Server - Keeping Your Network Time Accurate
get dispoverride Previous Top Next · Syntax : GET DISPOVERRIDE · Parameters : none · Returns : Returns "YES" if maximum root dispersion override is enabled, otherwise returns "NO". Bytefusion Software Prices Site Map Purchase This Product On-line How to ...
Windows NTP Query Tool: get email
NTP4.0 Time Server - Keeping Your Network Time Accurate
get email Previous Top Next · Syntax : GET EMAIL · Parameters : none · Returns : Returns the administrator email address address PresenTense uses to report critical error messages Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Query Tool: get interval
NTP4.0 Time Server - Keeping Your Network Time Accurate
get interval Previous Top Next · Syntax : GET INTERVAL · Parameters : none · Returns : Returns the polling rate in seconds. This value indicates how often the client synchronizes to the time server. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order ...
Windows NTP Query Tool: get logging
NTP4.0 Time Server - Keeping Your Network Time Accurate
get logging Previous Top Next · Syntax : GET LOGGING · Parameters : none · Returns : Returns ENABLED if event logging is presently enabled on the PresenTense client / server, otherwise returns DISABLED. Bytefusion Software Prices Site Map Purchase This Product On-line How ...
Windows NTP Query Tool: get loglevel
NTP4.0 Time Server - Keeping Your Network Time Accurate
get loglevel Previous Top Next · Syntax : GET LOGLEVEL · Parameters : none · Returns : Returns the numeric identifier for the loglevel - valid only if logging is enabled. Possible values are: 1 = minimal 2 = detailed 3 = errors only Bytefusion Software Prices Site Map ...
Windows NTP Query Tool: get maxadjust
NTP4.0 Time Server - Keeping Your Network Time Accurate
get maxadjust Previous Top Next · Syntax : GET MAXADJUST · Parameters : none · Returns : Returns the maximum number of seconds by which the client may adjust the system clock. This is a safety mechanism to prevent "rogue" server time stamps from destabilizing the ...
Windows NTP Query Tool: get maxdisperse
NTP4.0 Time Server - Keeping Your Network Time Accurate
get maxdisperse Previous Top Next · Syntax : GET MAXDISPERSE · Parameters : none · Returns : Returns the miximum root dispersion in milliseconds (nominal error at the time server) that the client will accept. Bytefusion Software Prices Site Map Purchase This Product On-line ...
Windows NTP Query Tool: get maxoverride
NTP4.0 Time Server - Keeping Your Network Time Accurate
get maxoverride Previous Top Next · Syntax : GET MAXOVERRIDE · Parameters : none · Returns : Returns "YES" if maximum clock adjustment override is enabled, otherwise returns "NO". Bytefusion Software Prices Site Map Purchase This Product On-line How to ...
Windows NTP Query Tool: get memtrim
NTP4.0 Time Server - Keeping Your Network Time Accurate
get memtrim Previous Top Next · Syntax : GET MEMTRIM · Parameters : none · Returns : Returns the setting for memory management. Possible values are AGRESSIVE and MODERATE. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Query Tool: get redundantserver
NTP4.0 Time Server - Keeping Your Network Time Accurate
get redundantserver Previous Top Next · Syntax : GET REDUNDANTSERVER · Parameters : none · Returns : Returns the name or IP address of the fail over server the PresenTense client / server presently synchronizes to. Bytefusion Software Prices Site Map Purchase This Product ...
Windows NTP Query Tool: get server
NTP4.0 Time Server - Keeping Your Network Time Accurate
get server Previous Top Next · Syntax : GET SERVER · Parameters : none · Returns : Returns the name or IP address of the server the PresenTense client / server presently synchronizes to. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure ...
Windows NTP Query Tool: get smtp
NTP4.0 Time Server - Keeping Your Network Time Accurate
get smtp Previous Top Next · Syntax : GET SMTP · Parameters : none · Returns : Returns the address of the SMTP server used to send administrator error messages Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client ...
Windows NTP Query Tool: get time
NTP4.0 Time Server - Keeping Your Network Time Accurate
get time Previous Top Next · Syntax : GET TIME · Parameters : none · Returns : Returns the time at the PresenTense client / server Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time ...
Windows NTP Query Tool: get timeout
NTP4.0 Time Server - Keeping Your Network Time Accurate
get timeout Previous Top Next · Syntax : GET TIMEOUT · Parameters : none · Returns : Returns the network timeout in seconds - how long PresenTense will wait for a server reply. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Query Tool: get type
NTP4.0 Time Server - Keeping Your Network Time Accurate
get type Previous Top Next · Syntax : GET TYPE · Parameters : none · Returns : Returns the type of server the PresenTense client / server presently synchronizes to. Possible values are ntptime, udtptime, and tcptime. The value ntptime includes sntp. Bytefusion Software Prices ...
Windows NTP Query Tool: recycle
NTP4.0 Time Server - Keeping Your Network Time Accurate
recycle Previous Top Next · Syntax : RECYCLE · Parameters : none · Comments : Restart the service, re-reading registry settings. This is necessary after changing any of the operating parameters. · Returns : SERVICE RECYCLED -no reply- Bytefusion Software Prices ...
Windows NTP Query Tool: set admin
NTP4.0 Time Server - Keeping Your Network Time Accurate
set admin Previous Top Next · Syntax : SET ADMIN <ip address> · Parameters : IPV4 IP Address · Comments : Adds an IP address to the list of administrators permitted to make configuration changes on this PresenTense time server / client. · Returns : SUCCESS or ...
Windows NTP Query Tool: set date
NTP4.0 Time Server - Keeping Your Network Time Accurate
set date Previous Top Next · Syntax : SET DATE <yyyy:mm:dd> · Parameters : Date as four digit year, month, day · Comments : Sets the system date at the client. Example: set date 1999:02:22 sets the date to February 22nd, 1999. · Returns : SUCCESS or ERROR ...
Windows NTP Query Tool: set deladmin
NTP4.0 Time Server - Keeping Your Network Time Accurate
set deladmin Previous Top Next · Syntax : SET DELADMIN <ip address> · Parameters : IPV4 IP Address · Comments : Deletes an IP address from the list of administrators permitted to make configuration changes on this PresenTense time client / server. · Returns : ...
Windows NTP Query Tool: set dispoverride
NTP4.0 Time Server - Keeping Your Network Time Accurate
set dispoverride Previous Top Next · Syntax : SET DISPOVERRIDE <yes | no> · Parameters : String literal YES or NO. · Comments : Enables / disables maximum root dispersion override. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase ...
Windows NTP Query Tool: set email
NTP4.0 Time Server - Keeping Your Network Time Accurate
set email Previous Top Next · Syntax : SET EMAIL <email address> · Parameters : email address · Comments : Sets the adminsitrator email address to receive critical error messages. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase This ...
Windows NTP Query Tool: set interval
NTP4.0 Time Server - Keeping Your Network Time Accurate
set interval Previous Top Next · Syntax : SET INTERVAL <seconds> · Parameters : Number of seconds · Comments : Sets the polling rate in seconds. This value determines how often the client synchronizes to the time server. · Returns : SUCCESS or ERROR Bytefusion ...
Windows NTP Query Tool: set logging
NTP4.0 Time Server - Keeping Your Network Time Accurate
set logging Previous Top Next · Syntax : SET LOGGING yes | no · Parameters : String literals yes or no · Comments : Enables or disables event logging on PresenTense. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase This Product On-line ...
Windows NTP Query Tool: set loglevel
NTP4.0 Time Server - Keeping Your Network Time Accurate
set loglevel Previous Top Next · Syntax : SET LOGLEVEL 1|2|3 · Parameters : Possible values : 1,2 or 3 · Comments : Sets the log level on the client. Valid only if logging is enabled. Possible values are: 1 = minimal 2 = detailed 3 = errors only · Returns : ...
Windows NTP Query Tool: set maxadjust
NTP4.0 Time Server - Keeping Your Network Time Accurate
set maxadjust Previous Top Next · Syntax : SET MAXADJUST <seconds> · Parameters : Number of seconds · Comments : Sets the maximum number of seconds by which the client may adjust the system clock. This is a safety mechanism to prevent "rogue" server time ...
Windows NTP Query Tool: set maxdisperse
NTP4.0 Time Server - Keeping Your Network Time Accurate
set maxdisperse Previous Top Next · Syntax : SET MAXDISPERSE <milliseconds> · Parameters : Number of milliseconds · Comments : Sets the miximum root dispersion in milliseconds (nominal error at the time server) that the client will accept. · Returns : SUCCESS ...
Windows NTP Query Tool: set maxoverride
NTP4.0 Time Server - Keeping Your Network Time Accurate
set maxoverride Previous Top Next · Syntax : SET MAXOVERRIDE <yes | no> · Parameters : String literal YES or NO. · Comments : Enables / disables maximum clock adjustment override. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase ...
Windows NTP Query Tool: set memtrim
NTP4.0 Time Server - Keeping Your Network Time Accurate
set memtrim Previous Top Next · Syntax : SET MEMTRIM <moderate | agressive> · Parameters : String literal MODERATE or AGRESSIVE. · Comments : Sets memory management policy. AGRESSIVE results in a smaller memory footprint but higher number of swaps to virtual memory on ...
Windows NTP Query Tool: set redundantserverip
NTP4.0 Time Server - Keeping Your Network Time Accurate
set redundantserverip Previous Top Next · Syntax : SET REDUNTANTSERVERIP <ip address of new time server> · Parameters : IP V4.0 IP address · Comments : Sets a new fail-over time server by IP address. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site ...
Windows NTP Query Tool: set redundantservername
NTP4.0 Time Server - Keeping Your Network Time Accurate
set redundantservername Previous Top Next · Syntax : SET REDUNDANTSERVERNAME <hostname> · Parameters : Fully qualified domain name of new fail-over time source · Comments : Sets a new fail-over time server by dns name. Overrides REDUNDANTSERVERIP · Returns : SUCCESS ...
Windows NTP Query Tool: set serverip
NTP4.0 Time Server - Keeping Your Network Time Accurate
set serverip Previous Top Next · Syntax : SET SERVERIP <ip address of new time server> · Parameters : IP V4.0 IP address · Comments : Sets a new time server by IP address. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase This ...
Windows NTP Query Tool: set servername
NTP4.0 Time Server - Keeping Your Network Time Accurate
set servername Previous Top Next · Syntax : SET SERVERNAME <hostname> · Parameters : Fully qualified domain name of new time source · Comments : Sets a new time server by dns name. Overrides SERVERIP · Returns : SUCCESS or ERROR Bytefusion Software Prices ...
Windows NTP Query Tool: set smtp
NTP4.0 Time Server - Keeping Your Network Time Accurate
set smtp Previous Top Next · Syntax : SET SMTP <IP address or DNS host name> · Parameters : IPV4 IP address or fully qualified DNS host name of SMTP server to use in mailing error messages to the administrator · Comments : none · Returns : SUCCESS or ERROR Bytefusion ...
Windows NTP Query Tool: set time
NTP4.0 Time Server - Keeping Your Network Time Accurate
set time Previous Top Next · Syntax : SET TIME <hh:mm:ss> · Parameters : Time in 24 hour format. hh:mm:ss · Comments : Sets the system time at the client in 24 hour time format. Example: set time 23:15:30 sets the time to 11:15pm and 30 seconds. · Returns : SUCCESS ...
Windows NTP Query Tool: set timeout
NTP4.0 Time Server - Keeping Your Network Time Accurate
set timeout Previous Top Next · Syntax : SET TIMEOUT <seconds> · Parameters : Number of seconds · Comments : Returns the network timeout in seconds - how long the client will wait for a server reply. · Returns : SUCCESS or ERROR Bytefusion Software Prices ...
Windows NTP Query Tool: set type
NTP4.0 Time Server - Keeping Your Network Time Accurate
set type Previous Top Next · Syntax : SET TYPE udptime|tcptime|ntptime · Parameters : True time source time. Possible values are the string literals : udptime or tcptime or ntptime Date as four digit year, month, day · Comments : Sets the time server protocol type ...
Windows NTP Query Tool: sync
NTP4.0 Time Server - Keeping Your Network Time Accurate
sync Previous Top Next · Syntax : SYNC · Parameters : none · Comments : Synchronize to true time source now. · Returns : NTPSNTP ACK TCP ACK UDP ACK -no reply- Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Time Client Management: About Bytefusion Ltd.
LanTimeAnalyzer - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Windows NTP Time Client Management: About Lan Time Analyzer
LanTimeAnalyzer - Keeping Your Network Time Accurate
About Lan Time Analyzer Previous Top Next Lan Time Analyzer Version 1.2 Copyright (C) 1999-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time Server for Windows? ...
Windows NTP Time Client Management: About PresenTense Client 95/98/ME
LanTimeAnalyzer - Keeping Your Network Time Accurate
About PresenTense Client 95/98/ME Previous Top Next PresenTense98 is a network time client for Windows 95 / 98 / ME. It synchronizes your PC system clock to a network time server. The features of PresenTense98 include : · Multi Protocol Support Time sources of all major protocol families ...
Windows NTP Time Client Management: About PresenTense Client NT/XP/2000/2003
LanTimeAnalyzer - Keeping Your Network Time Accurate
About PresenTense Client NT/XP/2000/2003 Previous Top Next PresenTense Time Client - Advantages at a glance · Accurate and reliable ( microsecond accuracy, runs as a service ) · Easy to install and maintain ( most users up and running in less than a minute ) · Versatile ( able ...
Windows NTP Time Client Management: About PresenTense NTP Auditor
LanTimeAnalyzer - Keeping Your Network Time Accurate
About PresenTense NTP Auditor Previous Top Next PresenTense NTP Auditor monitors your computer's built-in clock and compares it's time to the real time. Most computer clocks lose or gain time so within a few days, your computer does not show the real time. Many software packages claim to synchronize ...
Windows NTP Time Client Management: About PresenTense Time Server
LanTimeAnalyzer - Keeping Your Network Time Accurate
About PresenTense Time Server Previous Top Next PresenTense Time Server - Advantages at a glance · Accurate and reliable ( microsecond accuracy, 24/7 availability ) · Easy to install and maintain ( most users up and running in less than a minute ) · Versatile ( able to use ...
Windows NTP Time Client Management: Adding and Removing Clients
LanTimeAnalyzer - Keeping Your Network Time Accurate
Adding and Removing Time Clients Previous Top Next You can add and remove PresenTense time clients to the database of Lan Time Analyzer using the tool bar or the application menu. To add a client via the tool bar click the button. This will invoke the New PresenTense Client dialog. You may specify ...
Windows NTP Time Client Management: Alarm Settings
LanTimeAnalyzer - Keeping Your Network Time Accurate
Alarm Settings Previous Top Next Alarm settings determine what action Lan Time Analyzer takes when one ore more parameters exceed preset boundaries. One possible scenario is the failure of a GPS clock resulting in an error condition on the associated network time server. If Lan Time Analyzer is ...
Windows NTP Time Client Management: Auto Fetch
LanTimeAnalyzer - Keeping Your Network Time Accurate
Auto Fetch Previous Top Next Auto Fetch mode controls how and when Lan Time Analyzer queries clients for time information. In manual mode the operator initiates fetching of time stamps from clients, in auto fetch mode Lan Time Analyzer does this automatically at predefined intervals. To configure ...
Windows NTP Time Client Management: Buy Online
LanTimeAnalyzer - Keeping Your Network Time Accurate
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Windows NTP Time Client Management: Command Dictionary
LanTimeAnalyzer - Keeping Your Network Time Accurate
Query Tool Command Dictionary Previous Top Next You can query all major operating parameters of PresenTense servers and clients via the LanTimeAnalyzer query tool. This feature is useful in performing remote diagnostic tasks or setting operating parameters over the network. · Diagnostic Commands ...
Windows NTP Time Client Management: Default Timeouts
LanTimeAnalyzer - Keeping Your Network Time Accurate
Default Timeouts Previous Top Next The Default Timeouts determine how long Lan Time Analyzer waits for responses from network time clients or servers. The "factory presets" are acceptable in most cases, but you may wish to increase the timeout values if you have a congested network or ...
Windows NTP Time Client Management: echo
LanTimeAnalyzer - Keeping Your Network Time Accurate
echo Previous Top Next · Syntax : ECHO <argument> · Parameters : Any string value · Returns : Echoes argument. Use this command to verify connectivity to the client and determine remote operating system. Example: echo hi Returns "hi" on PresenTense for Windows ...
Windows NTP Time Client Management: get admins
LanTimeAnalyzer - Keeping Your Network Time Accurate
get admins Previous Top Next · Syntax : GET ADMINS · Parameters : none · Returns : Returns a list of IP addresses representing the administrators that are allowed to make changes to the operating parameters on this client. Bytefusion Software Prices Site Map Purchase This ...
Windows NTP Time Client Management: get date
LanTimeAnalyzer - Keeping Your Network Time Accurate
get date Previous Top Next · Syntax : GET DATE · Parameters : none · Returns : Returns the date at the PresenTense client / server Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time ...
Windows NTP Time Client Management: get dispoverride
LanTimeAnalyzer - Keeping Your Network Time Accurate
get dispoverride Previous Top Next · Syntax : GET DISPOVERRIDE · Parameters : none · Returns : Returns "YES" if maximum root dispersion override is enabled, otherwise returns "NO". Bytefusion Software Prices Site Map Purchase This Product On-line How to ...
Windows NTP Time Client Management: get email
LanTimeAnalyzer - Keeping Your Network Time Accurate
get email Previous Top Next · Syntax : GET EMAIL · Parameters : none · Returns : Returns the administrator email address PresenTense uses to report critical error messages Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Time Client Management: get interval
LanTimeAnalyzer - Keeping Your Network Time Accurate
get interval Previous Top Next · Syntax : GET INTERVAL · Parameters : none · Returns : Returns the polling rate in seconds. This value indicates how often the client synchronizes to the time server. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order ...
Windows NTP Time Client Management: get logging
LanTimeAnalyzer - Keeping Your Network Time Accurate
get logging Previous Top Next · Syntax : GET LOGGING · Parameters : none · Returns : Returns ENABLED if event logging is presently enabled on the PresenTense client / server, otherwise returns DISABLED. Bytefusion Software Prices Site Map Purchase This Product On-line How ...
Windows NTP Time Client Management: get loglevel
LanTimeAnalyzer - Keeping Your Network Time Accurate
get loglevel Previous Top Next · Syntax : GET LOGLEVEL · Parameters : none · Returns : Returns the numeric identifier for the loglevel - valid only if logging is enabled. Possible values are: 1 = minimal 2 = detailed 3 = errors only Bytefusion Software Prices Site Map ...
Windows NTP Time Client Management: get maxadjust
LanTimeAnalyzer - Keeping Your Network Time Accurate
get maxadjust Previous Top Next · Syntax : GET MAXADJUST · Parameters : none · Returns : Returns the maximum number of seconds by which the client may adjust the system clock. This is a safety mechanism to prevent "rogue" server time stamps from destabilizing the ...
Windows NTP Time Client Management: get maxdisperse
LanTimeAnalyzer - Keeping Your Network Time Accurate
get maxdisperse Previous Top Next · Syntax : GET MAXDISPERSE · Parameters : none · Returns : Returns the maximum root dispersion in milliseconds (nominal error at the time server) that the client will accept. Bytefusion Software Prices Site Map Purchase This Product On-line ...
Windows NTP Time Client Management: get maxoverride
LanTimeAnalyzer - Keeping Your Network Time Accurate
get maxoverride Previous Top Next · Syntax : GET MAXOVERRIDE · Parameters : none · Returns : Returns "YES" if maximum clock adjustment override is enabled, otherwise returns "NO". Bytefusion Software Prices Site Map Purchase This Product On-line How to ...
Windows NTP Time Client Management: get memtrim
LanTimeAnalyzer - Keeping Your Network Time Accurate
get memtrim Previous Top Next · Syntax : GET MEMTRIM · Parameters : none · Returns : Returns the setting for memory management. Possible values are AGGRESSIVE and MODERATE. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Time Client Management: get redundantserver
LanTimeAnalyzer - Keeping Your Network Time Accurate
get redundantserver Previous Top Next · Syntax : GET REDUNDANTSERVER · Parameters : none · Returns : Returns the name or IP address of the fail over server the PresenTense client / server presently synchronizes to. Bytefusion Software Prices Site Map Purchase This Product ...
Windows NTP Time Client Management: get server
LanTimeAnalyzer - Keeping Your Network Time Accurate
get server Previous Top Next · Syntax : GET SERVER · Parameters : none · Returns : Returns the name or IP address of the server the PresenTense client / server presently synchronizes to. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure ...
Windows NTP Time Client Management: get smtp
LanTimeAnalyzer - Keeping Your Network Time Accurate
get smtp Previous Top Next · Syntax : GET SMTP · Parameters : none · Returns : Returns the address of the SMTP server used to send administrator error messages Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client ...
Windows NTP Time Client Management: get time
LanTimeAnalyzer - Keeping Your Network Time Accurate
get time Previous Top Next · Syntax : GET TIME · Parameters : none · Returns : Returns the time at the PresenTense client / server Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 Time ...
Windows NTP Time Client Management: get timeout
LanTimeAnalyzer - Keeping Your Network Time Accurate
get timeout Previous Top Next · Syntax : GET TIMEOUT · Parameters : none · Returns : Returns the network timeout in seconds - how long PresenTense will wait for a server reply. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Time Client Management: get type
LanTimeAnalyzer - Keeping Your Network Time Accurate
get type Previous Top Next · Syntax : GET TYPE · Parameters : none · Returns : Returns the type of server the PresenTense client / server presently synchronizes to. Possible values are ntptime, udtptime, and tcptime. The value ntptime includes sntp. Bytefusion Software Prices ...
Windows NTP Time Client Management: Interpreting the User Interface
LanTimeAnalyzer - Keeping Your Network Time Accurate
Interpreting the User Interface Previous Top Next The screenshot below shows the output of a typical session with Lan Time Analyzer. Key user interface components are identified by number and explained in the legend at the bottom of this page. 1. Tool bar The tool bar can be used to add time clients ...
Windows NTP Time Client Management: Network Time Synchronization
LanTimeAnalyzer - Keeping Your Network Time Accurate
Network Time Synchronization Previous Top Next A typical network time synchronization scenario is depicted in the diagram shown below. Each workstation synchronizes to a central time server on the corporate LAN. This guarantees a coherent propagation of time to all clients. The corporate time server ...
Windows NTP Time Client Management: PresenTense Time Clients
LanTimeAnalyzer - Keeping Your Network Time Accurate
PresenTense Time Clients Previous Top Next Remote configuration of PresenTense time clients with Lan Time Analyzer is easy. The most commonly accessed operating parameters may be set on multiple clients simultaneously directly from the tool bar. To change the time server for all clients, for instance, ...
Windows NTP Time Client Management: Quick Start
LanTimeAnalyzer - Keeping Your Network Time Accurate
Quick Start Previous Top Next Network time analysis involves measuring the machine times at hosts on the network against a true time source and interpreting the results in the context of nominal and statistical errors. Lan Time Analyzer lets you verify the accuracy of your ntp/sntp time server ...
Windows NTP Time Client Management: recycle
LanTimeAnalyzer - Keeping Your Network Time Accurate
recycle Previous Top Next · Syntax : RECYCLE · Parameters : none · Comments : Restart the service, re-reading registry settings. This is necessary after changing any of the operating parameters. · Returns : SERVICE RECYCLED -no reply- Bytefusion Software Prices ...
Windows NTP Time Client Management: set admin
LanTimeAnalyzer - Keeping Your Network Time Accurate
set admin Previous Top Next · Syntax : SET ADMIN <ip address> · Parameters : IPV4 IP Address · Comments : Adds an IP address to the list of administrators permitted to make configuration changes on this PresenTense time server / client. · Returns : SUCCESS or ...
Windows NTP Time Client Management: set date
LanTimeAnalyzer - Keeping Your Network Time Accurate
set date Previous Top Next · Syntax : SET DATE <yyyy:mm:dd> · Parameters : Date as four digit year, month, day · Comments : Sets the system date at the client. Example: set date 1999:02:22 sets the date to February 22nd, 1999. · Returns : SUCCESS or ERROR ...
Windows NTP Time Client Management: set deladmin
LanTimeAnalyzer - Keeping Your Network Time Accurate
set deladmin Previous Top Next · Syntax : SET DELADMIN <ip address> · Parameters : IPV4 IP Address · Comments : Deletes an IP address from the list of administrators permitted to make configuration changes on this PresenTense time client / server. · Returns : ...
Windows NTP Time Client Management: set dispoverride
LanTimeAnalyzer - Keeping Your Network Time Accurate
set dispoverride Previous Top Next · Syntax : SET DISPOVERRIDE <yes | no> · Parameters : String literal YES or NO. · Comments : Enables / disables maximum root dispersion override. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase ...
Windows NTP Time Client Management: set email
LanTimeAnalyzer - Keeping Your Network Time Accurate
set email Previous Top Next · Syntax : SET EMAIL <email address> · Parameters : email address · Comments : Sets the administrator email address to receive critical error messages. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase This ...
Windows NTP Time Client Management: set interval
LanTimeAnalyzer - Keeping Your Network Time Accurate
set interval Previous Top Next · Syntax : SET INTERVAL <seconds> · Parameters : Number of seconds · Comments : Sets the polling rate in seconds. This value determines how often the client synchronizes to the time server. · Returns : SUCCESS or ERROR Bytefusion ...
Windows NTP Time Client Management: set logging
LanTimeAnalyzer - Keeping Your Network Time Accurate
set logging Previous Top Next · Syntax : SET LOGGING yes | no · Parameters : String literals yes or no · Comments : Enables or disables event logging on PresenTense. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase This Product On-line ...
Windows NTP Time Client Management: set loglevel
LanTimeAnalyzer - Keeping Your Network Time Accurate
set loglevel Previous Top Next · Syntax : SET LOGLEVEL 1|2|3 · Parameters : Possible values : 1,2 or 3 · Comments : Sets the log level on the client. Valid only if logging is enabled. Possible values are: 1 = minimal 2 = detailed 3 = errors only · Returns : ...
Windows NTP Time Client Management: set maxadjust
LanTimeAnalyzer - Keeping Your Network Time Accurate
set maxadjust Previous Top Next · Syntax : SET MAXADJUST <seconds> · Parameters : Number of seconds · Comments : Sets the maximum number of seconds by which the client may adjust the system clock. This is a safety mechanism to prevent "rogue" server time ...
Windows NTP Time Client Management: set maxdisperse
LanTimeAnalyzer - Keeping Your Network Time Accurate
set maxdisperse Previous Top Next · Syntax : SET MAXDISPERSE <milliseconds> · Parameters : Number of milliseconds · Comments : Sets the maximum root dispersion in milliseconds (nominal error at the time server) that the client will accept. · Returns : SUCCESS ...
Windows NTP Time Client Management: set maxoverride
LanTimeAnalyzer - Keeping Your Network Time Accurate
set maxoverride Previous Top Next · Syntax : SET MAXOVERRIDE <yes | no> · Parameters : String literal YES or NO. · Comments : Enables / disables maximum clock adjustment override. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase ...
Windows NTP Time Client Management: set memtrim
LanTimeAnalyzer - Keeping Your Network Time Accurate
set memtrim Previous Top Next · Syntax : SET MEMTRIM <moderate | agressive> · Parameters : String literal MODERATE or AGGRESSIVE. · Comments : Sets memory management policy. AGGRESSIVE results in a smaller memory footprint but higher number of swaps to virtual memory ...
Windows NTP Time Client Management: set redundantserverip
LanTimeAnalyzer - Keeping Your Network Time Accurate
set redundantserverip Previous Top Next · Syntax : SET REDUNTANTSERVERIP <ip address of new time server> · Parameters : IP V4.0 IP address · Comments : Sets a new fail-over time server by IP address. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site ...
Windows NTP Time Client Management: set redundantservername
LanTimeAnalyzer - Keeping Your Network Time Accurate
set redundantservername Previous Top Next · Syntax : SET REDUNDANTSERVERNAME <hostname> · Parameters : Fully qualified domain name of new fail-over time source · Comments : Sets a new fail-over time server by dns name. Overrides REDUNDANTSERVERIP · Returns : SUCCESS ...
Windows NTP Time Client Management: set serverip
LanTimeAnalyzer - Keeping Your Network Time Accurate
set serverip Previous Top Next · Syntax : SET SERVERIP <ip address of new time server> · Parameters : IP V4.0 IP address · Comments : Sets a new time server by IP address. · Returns : SUCCESS or ERROR Bytefusion Software Prices Site Map Purchase This ...
Windows NTP Time Client Management: set servername
LanTimeAnalyzer - Keeping Your Network Time Accurate
set servername Previous Top Next · Syntax : SET SERVERNAME <hostname> · Parameters : Fully qualified domain name of new time source · Comments : Sets a new time server by dns name. Overrides SERVERIP · Returns : SUCCESS or ERROR Bytefusion Software Prices ...
Windows NTP Time Client Management: set smtp
LanTimeAnalyzer - Keeping Your Network Time Accurate
set smtp Previous Top Next · Syntax : SET SMTP <IP address or DNS host name> · Parameters : IPV4 IP address or fully qualified DNS host name of SMTP server to use in mailing error messages to the administrator · Comments : none · Returns : SUCCESS or ERROR Bytefusion ...
Windows NTP Time Client Management: set time
LanTimeAnalyzer - Keeping Your Network Time Accurate
set time Previous Top Next · Syntax : SET TIME <hh:mm:ss> · Parameters : Time in 24 hour format. hh:mm:ss · Comments : Sets the system time at the client in 24 hour time format. Example: set time 23:15:30 sets the time to 11:15pm and 30 seconds. · Returns : SUCCESS ...
Windows NTP Time Client Management: set timeout
LanTimeAnalyzer - Keeping Your Network Time Accurate
set timeout Previous Top Next · Syntax : SET TIMEOUT <seconds> · Parameters : Number of seconds · Comments : Returns the network timeout in seconds - how long the client will wait for a server reply. · Returns : SUCCESS or ERROR Bytefusion Software Prices ...
Windows NTP Time Client Management: set type
LanTimeAnalyzer - Keeping Your Network Time Accurate
set type Previous Top Next · Syntax : SET TYPE udptime|tcptime|ntptime · Parameters : True time source time. Possible values are the string literals : udptime or tcptime or ntptime Date as four digit year, month, day · Comments : Sets the time server protocol type ...
Windows NTP Time Client Management: sync
LanTimeAnalyzer - Keeping Your Network Time Accurate
sync Previous Top Next · Syntax : SYNC · Parameters : none · Comments : Synchronize to true time source now. · Returns : NTPSNTP ACK TCP ACK UDP ACK -no reply- Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption ...
Windows NTP Time Client Management: System Requirements
LanTimeAnalyzer - Keeping Your Network Time Accurate
Requirements Previous Top Next System Requirements : · A Personal Computer with a 486/100 MHz CPU or higher. · Microsoft Windows NT / 2000 / XP, or Windows 95 / 98 / ME. The use of Windows NT / 2000 / XP is strongly recommended to satisfy the real-time requirements of Lan Time Analyzer.
Windows NTP Time Client Management: Time Protocols and Accuracy
LanTimeAnalyzer - Keeping Your Network Time Accurate
Time Protocols and Accuracy Previous Top Next A number of time protocols are widely used to synchronize computer clocks with a network time server. These are : · NTP (Network Time Protocol) "Network Time Protocol". NTP has the ability to synchronize computers across multiple time ...
Windows NTP Time Client Management: True Time Server
LanTimeAnalyzer - Keeping Your Network Time Accurate
True Time Server Previous Top Next The True Time Server is used to synchronize the PC Lan Time Analyzer operates on to "true time". Lan Time Analyzer does this at the beginning of each session and each time it queries clients for their machine times. The true time server should be a full ...
Windows NTP Time Client Management: Using the Query Tool
LanTimeAnalyzer - Keeping Your Network Time Accurate
Using the Query Tool Previous Top Next The Query Tool gives the user of Lan Time Analyzer access to the full command set of PresenTense time clients. This command set constitutes the foundation of inter-process communication between Lan Time Analyzer and PresenTense time clients. To activate the ...
Windows NTP Time Client Management: What is LanTimeAnalyzer ?
LanTimeAnalyzer - Keeping Your Network Time Accurate
Welcome to Lan Time Analyzer Top Next Lan Time Analyzer combines the ability to manage all your PresenTense network time clients centrally with the ability to conduct complex error analysis of time servers and clients. The key features of Lan Time Analyzer include : · Remote administration ...
Windows NTP Time Client: 1. Introduction
NTP4.0 Time Client - Keeping Your Network Time Accurate
1. Introduction Previous Top Next This document constitutes a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize timekeeping among a set of distributed time servers and clients. It defines the architectures, algorithms, entities and protocols used by ...
Windows NTP Time Client: 1.1 Related Technology
NTP4.0 Time Client - Keeping Your Network Time Accurate
1.1 Related Technology Previous Top Next Other mechanisms have been specified in the Internet protocol suite to record and transmit the time at which an event takes place, including the Daytime protocol [POS83a], Time Protocol [POS83b], ICMP Timestamp message [DAR81b] and IP Timestamp option [SU81].
Windows NTP Time Client: 2. System Architecture
NTP4.0 Time Client - Keeping Your Network Time Accurate
2. System Architecture Previous Top Next In the NTP model a number of primary reference sources, synchronized by wire or radio to national standards, are connected to widely accessible resources, such as backbone gateways, and operated as primary time servers. The purpose of NTP is to convey timekeeping ...
Windows NTP Time Client: 2.1 Implementation Model
NTP4.0 Time Client - Keeping Your Network Time Accurate
2.1 Implementation Model Previous Top Next In what may be the most common client/server model a client sends an NTP message to one or more servers and processes the replies as received. The server interchanges addresses and ports, overwrites certain fields in the message, recalculates the checksum ...
Windows NTP Time Client: 2.2 Network Configurations
NTP4.0 Time Client - Keeping Your Network Time Accurate
2.2 Network Configurations Previous Top Next The synchronization subnet is a connected network of primary and secondary time servers, clients and interconnecting transmission paths. A primary time server is directly synchronized to a primary reference source, usually a radio clock. A secondary ...
Windows NTP Time Client: 3. Network Time Protocol
NTP4.0 Time Client - Keeping Your Network Time Accurate
3. Network Time Protocol Previous Top Next This section consists of a formal definition of the Network Time Protocol, including its data formats, entities, state variables, events and event-processing procedures. The specification is based on the implementation model illustrated in Figure 1, but ...
Windows NTP Time Client: 3.1 Data Formats
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.1 Data Formats Previous Top Next All mathematical operations expressed or implied herein are in two's-complement, fixed-point arithmetic. Data are specified as integer or fixed-point quantities, with bits numbered in big-endian fashion from zero starting at the left, or high-order, position.
Windows NTP Time Client: 3.2 State Variables and Parameters
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2 State Variables and Parameters Previous Top Next Following is a summary of the various state variables and parameters used by the protocol. They are separated into classes of system variables, which relate to the operating system environment and local-clock mechanism; peer variables, which ...
Windows NTP Time Client: 3.2.1 Common Variables
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.1 Common Variables Previous Top Next The following variables are common to two or more of the system, peer and packet classes. Additional variables are specific to the optional authentication mechanism as described in Appendix C. When necessary to distinguish between common variables of the ...
Windows NTP Time Client: 3.2.2 System Variables
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.2 System Variables Previous Top Next System Variables Name Procedure Leap Indicator sys.leap clock update Stratum sys.stratum clock update Precision sys.precision system Root Delay sys.rootdelay clock update Root Dispersion sys.rootdispersion clock update Reference Clock Ident sys.refid clock ...
Windows NTP Time Client: 3.2.3 Peer Variables
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.3 Peer Variables Previous Top Next Peer Variables Name Procedure Configured Bit peer.config initialization Peer Address peer.peeraddress receive Peer Port peer.peerport receive Host Address peer.hostaddress receive Host Port peer.hostport receive Leap Indicator peer.leap packet Mode peer.mode ...
Windows NTP Time Client: 3.2.4 Packet Variables
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.4 Packet Variables Previous Top Next Packet Variables Name Procedure Peer Address pkt.peeraddress transmit Peer Port pkt.peerport transmit Host Address pkt.hostaddress transmit Host Port pkt.hostport transmit Leap Indicator pkt.leap transmit Version Number pkt.version transmit Mode pkt.mode ...
Windows NTP Time Client: 3.2.5 Clock-Filter Variables
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.5 Clock-Filter Variables Previous Top Next When the filter and selection algorithms suggested in Section 4 are used, the following state variables are defined in addition to the variables described previously. Filter Register (peer.filter): This is a shift register of NTP.SHIFT stages, where ...
Windows NTP Time Client: 3.2.6 Authentication Variables
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.6 Authentication Variables Previous Top Next When the authentication mechanism suggested in Appendix C is used, the following state variables are defined in addition to the variables described previously. These variables are used only if the optional authentication mechanism described in Appendix ...
Windows NTP Time Client: 3.2.7 Parameters
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.2.7 Parameters Previous Top Next Parameters Name Value Version Number NTP.VERSION 3 NTP Port NTP.PORT 123 Max Stratum NTP.MAXSTRATUM 15 Max Clock Age NTP.MAXAGE 86,400 sec Max Skew NTP.MAXSKEW 1 sec Max Distance NTP.MAXDISTANCE 1 sec Min Polling Interval NTP.MINPOLL 6 (64 sec) Max Polling Interval ...
Windows NTP Time Client: 3.3 Modes of Operation
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.3 Modes of Operation Previous Top Next Except in broadcast mode, an NTP association is formed when two peers exchange messages and one or both of them create and maintain an instantiation of the protocol machine, called an association. The association can operate in one of five modes as indicated ...
Windows NTP Time Client: 3.4 Event Processing
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4 Event Processing Previous Top Next The significant events of interest in NTP occur upon expiration of a peer timer (peer.timer), one of which is dedicated to each peer with an active association, and upon arrival of an NTP message from the various peers. An event can also occur as the result ...
Windows NTP Time Client: 3.4.1 Notation Conventions
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.1 Notation Conventions Previous Top Next The NTP filtering and selection algorithms act upon a set of variables for clock offset theta ,THETA, roundtrip delay delta ,DELTA and dispersion epsilon , EPSILON. When necessary to distinguish between them, lower-case Greek letters are used for variables ...
Windows NTP Time Client: 3.4.2 Transmit Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.2 Transmit Procedure Previous Top Next The transmit procedure is executed when the peer timer decrements to zero for all modes except client mode with a broadcast server and server mode in all cases. In client mode with a broadcast server messages are never sent. In server mode messages are ...
Windows NTP Time Client: 3.4.3 Receive Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.3 Receive Procedure Previous Top Next The receive procedure is executed upon arrival of an NTP message. It validates the message, interprets the various modes and calls other procedures to filter the data and select the synchronization source. If the version number in the packet does not match ...
Windows NTP Time Client: 3.4.4 Packet Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.4 Packet Procedure Previous Top Next The packet procedure checks the message validity, computes delay/offset samples and calls other procedures to filter the data and select the synchronization source. Test 1 requires the transmit timestamp not match the last one received from the same peer;
Windows NTP Time Client: 3.4.5 Clock-Update Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.5 Clock-Update Procedure Previous Top Next The clock-update procedure is called from the receive procedure when valid clock offset, delay and dispersion data have been determined by the clock-filter procedure for the current peer. The result of the clock-selection and clock-combining procedures ...
Windows NTP Time Client: 3.4.6 Primary-Clock Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.6 Primary-Clock Procedure Previous Top Next When a primary reference source such as a radio clock is connected to the host, it is convenient to incorporate its information into the data base as if the clock were represented as an ordinary peer. In the primary-clock procedure the clock is polled ...
Windows NTP Time Client: 3.4.7 Initialization Procedures
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.7 Initialization Procedures Previous Top Next The initialization procedures are used to set up and initialize the system, its peers and associations. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 ...
Windows NTP Time Client: 3.4.7.1 Initialization Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.7.1 Initialization Procedure Previous Top Next The initialization procedure is called upon reboot or restart of the NTP daemon. The local clock is presumably undefined at reboot; however, in some equipment an estimate is available from the reboot environment, such as a battery-backed clock/calendar.
Windows NTP Time Client: 3.4.7.2 Initialization-Instantiation Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.7.2 Initialization-Instantiation Procedure Previous Top Next This implementation-specific procedure is called from the initialization procedure to define an association. The addresses and modes of the peers are determined using information read during the reboot procedure or as the result of ...
Windows NTP Time Client: 3.4.7.3 Receive-Instantiation Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.7.3 Receive-Instantiation Procedure Previous Top Next The receive-instantiation procedure is called from the receive procedure when a new peer is discovered. It initializes the peer variables and mobilizes the association. If the message is from a peer operating in client mode (3), the host ...
Windows NTP Time Client: 3.4.7.4 Primary Clock-Instantiation Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.7.4 Primary Clock-Instantiation Procedure Previous Top Next This procedure is called from the initialization procedure in order to set up the state variables for the primary clock. The value for peer.precision is determined from the radio clock specification and hardware interface. The value ...
Windows NTP Time Client: 3.4.8 Clear Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.8 Clear Procedure Previous Top Next The clear procedure is called when some event occurs that results in a significant change in reachability state or potential disruption of the local clock. begin clear procedure peer.org <-- 0 (undefined); /* mark timestamps undefined */ peer.rec ...
Windows NTP Time Client: 3.4.9 Poll-Update Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.4.9 Poll-Update Procedure Previous Top Next The poll-update procedure is called when a significant event occurs that may result in a change of the poll interval or peer timer. It checks the values of the host poll interval (peer.hostpoll) and peer poll interval (peer.peerpoll) and clamps each ...
Windows NTP Time Client: 3.5 Synchronization Distance Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.5 Synchronization Distance Procedure Previous Top Next The distance procedure calculates the synchronization distance from the peer variables for the peer. begin distance(peer) procedure; DELTA <-- peer.rootdelay + |peer.delay|; EPSILON <-- peer.rootdispersion + peer.dispersion + phi (sys.clock ...
Windows NTP Time Client: 3.6 Access Control Issues
NTP4.0 Time Client - Keeping Your Network Time Accurate
3.6 Access Control Issues Previous Top Next The NTP design is such that accidental or malicious data modification (tampering) or destruction (jamming) at a time server should not in general result in timekeeping errors elsewhere in the synchronization subnet. However, the success of this approach ...
Windows NTP Time Client: 4. Filtering and Selection Algorithms
NTP4.0 Time Client - Keeping Your Network Time Accurate
4. Filtering and Selection Algorithms Previous Top Next A most important factor affecting the accuracy and reliability of time distribution is the complex of algorithms used to reduce the effect of statistical errors and falsetickers due to failure of various subnet components, reference sources ...
Windows NTP Time Client: 4.1 Clock-Filter Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
4.1 Clock-Filter Procedure Previous Top Next The clock-filter procedure is executed upon arrival of an NTP message or other event that results in new data samples. It takes arguments of the form theta, delta, epsilon, where theta is a sample clock offset measurement and delta and epsilon are the ...
Windows NTP Time Client: 4.2 Clock-Selection Procedure
NTP4.0 Time Client - Keeping Your Network Time Accurate
4.2 Clock-Selection Procedure Previous Top Next The clock-selection procedure uses the peer variables THETA, DELTA, EPSILON and tau and is called when these variables change or when the reachability status changes. It consists of two algorithms, the intersection algorithm and the clustering algorithm.
Windows NTP Time Client: 4.2.1 Intersection Algorithm
NTP4.0 Time Client - Keeping Your Network Time Accurate
4.2.1 Intersection Algorithm Previous Top Next begin clock-selection procedure Each peer is examined in turn and added to an endpoint list only if it passes several sanity checks designed to avoid loops and use of exceptionally noisy data. If no peers survive the sanity checks, the procedure exits ...
Windows NTP Time Client: 4.2.2. Clustering Algorithm
NTP4.0 Time Client - Keeping Your Network Time Accurate
4.2.2. Clustering Algorithm Previous Top Next In the original DTS algorithm the clock-selection procedure exits at this point with the presumed correct time set midway in the computed intersection [low,high]. However, this can lead to a considerable loss in accuracy and stability, since the individual ...
Windows NTP Time Client: 5. Local Clocks
NTP4.0 Time Client - Keeping Your Network Time Accurate
5. Local Clocks Previous Top Next In order to implement a precise and accurate local clock, the host must be equipped with a hardware clock consisting of an oscillator and interface and capable of the required precision and stability. A logical clock is then constructed using these components plus ...
Windows NTP Time Client: 5.1 Fuzzball Implementation
NTP4.0 Time Client - Keeping Your Network Time Accurate
5.1 Fuzzball Implementation Previous Top Next The Fuzzball local clock consists of a collection of hardware and software registers, together with a set of algorithms, which implement a logical clock that functions as a disciplined oscillator and synchronizes to an external source. Following is ...
Windows NTP Time Client: 5.2 Gradual Phase Adjustments
NTP4.0 Time Client - Keeping Your Network Time Accurate
5.2 Gradual Phase Adjustments Previous Top Next Left uncorrected, the local clock runs at the offset and frequency resulting from its last update. An update is produced by an event that results in a valid clock selection. It consists of a signed 48-bit integer in whole milliseconds and fraction, ...
Windows NTP Time Client: 5.3 Step Phase Adjustments
NTP4.0 Time Client - Keeping Your Network Time Accurate
5.3 Step Phase Adjustments Previous Top Next When the magnitude of a correction exceeds the maximum aperture CLOCK.MAX, the possibility exists that the clock is so far out of synchronization with the reference source that the best action is an immediate and wholesale replacement of Clock register ...
Windows NTP Time Client: 5.4 Implementation Issues
NTP4.0 Time Client - Keeping Your Network Time Accurate
5.4 Implementation Issues Previous Top Next The basic NTP robustness model is that a host has no other means to verify time other than NTP itself. In some equipment a battery-backed clock/calendar is available for a sanity check. If such a device is available, it should be used only to confirm ...
Windows NTP Time Client: 6. Acknowledgments
NTP4.0 Time Client - Keeping Your Network Time Accurate
6. Acknowledgments Previous Top Next Many people contributed to the contents of this document, which was thoroughly debated by electronic mail and debugged using two different prototype implementations for the Unix 4.3bsd operating system, one written by Louis Mamakos and Michael Petry of the University ...
Windows NTP Time Client: 7. References
NTP4.0 Time Client - Keeping Your Network Time Accurate
7. References Previous Top Next [ABA89] Abate, et al. AT&T's new approach to the synchronization of telecommunication networks. IEEE Communications Magazine (April 1989), 35-45. [ALL74a] Allan, D.W., J.H. Shoaf and D. Halford. Statistics of time and frequency data analysis. In: Blair, B.E.
Windows NTP Time Client: About Bytefusion Ltd.
NTP4.0 Time Client - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Next Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows ...
Windows NTP Time Client: About Bytefusion Ltd.
Time Client - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Windows NTP Time Client: About PresenTense
NTP4.0 Time Client - Keeping Your Network Time Accurate
About PresenTense Previous Top Next PresenTense Time Client for Windows NT / 2000 / XP / 2003 Version 3.8 Copyright (C) 1998-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Windows NTP Time Client: About PresenTense98
Time Client - Keeping Your Network Time Accurate
About PresenTense Previous Top Next PresenTense Time Client for Windows 95 / 98 / ME Time Client Service Version 3.7 Copyright (C) 1999-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for ...
Windows NTP Time Client: Administration Tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
Administration Tab Previous Top Next · Service Status This panel indicates if PresenTense is running or stopped. Use the buttons to start and/or stop the service. · System Status This panel indicates the system time in 24-hour format. Use the buttons to conveniently access other control ...
Windows NTP Time Client: Administration Tab
Time Client - Keeping Your Network Time Accurate
Administration Tab Previous Top Next · Service Status This panel indicates if PresenTense98 is running or stopped. Use the buttons to start and/or stop the service. · System Status This panel indicates the system time in 24-hour format. Use the buttons to conveniently access other ...
Windows NTP Time Client: Advanced Tab
Time Client - Keeping Your Network Time Accurate
Advanced Tab Previous Top Next · Maximum Clock Adjustment This option limits the number of seconds by which PresenTense98 will adjust the local system clock. This prevents serious time server errors from propagating across the network. It is recommended to override this option for initial ...
Windows NTP Time Client: Appendix A
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix A Previous Top Next NTP Data Format - Version 3 The format of the NTP Message data area, which immediately follows the UDP header, is shown in Figure 4. Following is a description of its fields. Leap Indicator (LI): This is a two-bit code warning of an impending leap second to be inserted/deleted ...
Windows NTP Time Client: Appendix B
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix B Previous Top Next NTP Control Messages In a comprehensive network-management environment, facilities are presumed available to perform routine NTP control and monitoring functions, such as setting the leap-indicator bits at the primary servers, adjusting the various system parameters ...
Windows NTP Time Client: Appendix C
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix C Previous Top Next Authentication Issues NTP robustness requirements are similar to those of other multiple-peer distributed protocols used for network routing, management and file access. These include protection from faulty implementations, improper operation and possibly malicious ...
Windows NTP Time Client: Appendix D
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix D Previous Top Next Differences from Previous Versions The original NTP, later called NTP Version 0, was described in RFC-958 [MIL85c]. Subsequently, Version 0 was superseded by Version 1 (RFC-1059 [MIL88a]), and Version 2 (RFC-1119 [MIL89]. The Version-2 description was split into two ...
Windows NTP Time Client: Appendix E
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix E Previous Top Next The NTP Timescale and its Chronometry Introduction Following is an extended discussion on computer network chronometry, which is the precise determination of computer time and frequency relative to international standards and the determination of conventional civil ...
Windows NTP Time Client: Appendix F
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix F Previous Top Next The NTP Clock-Combining Algorithm Introduction A common problem in synchronization subnets is systematic time-offset errors resulting from asymmetric transmission paths, where the networks or transmission media in one direction are substantially different from the other.
Windows NTP Time Client: Appendix G
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix G Previous Top Next Computer Clock Modelling and Analysis A computer clock includes some kind of reference oscillator, which is stabilized by a quartz crystal or some other means, such as the power grid. Usually, the clock includes a prescaler, which divides the oscillator frequency to ...
Windows NTP Time Client: Appendix H
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix H Previous Top Next Analysis of Errors and Correctness Principles Introduction This appendix contains an analysis of errors arising in the generation and processing of NTP timestamps and the determination of delays and offsets. It establishes error bounds as a function of measured roundtrip ...
Windows NTP Time Client: Appendix I
NTP4.0 Time Client - Keeping Your Network Time Accurate
Appendix I Previous Top Next Selected C-Language Program Listings Following are C-language program listings of selected algorithms described in the NTP specification. While these have been tested as part of a software simulator using data collected in regular operation, they do not necessarily ...
Windows NTP Time Client: Buy Online
Time Client - Keeping Your Network Time Accurate
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Windows NTP Time Client: FAQ
NTP4.0 Time Client - Keeping Your Network Time Accurate
FAQ Previous Top Next · Are version upgrades free ? Upgrades within the major version number are free. This includes bug fixes and patches. Example: If you purchased product version 3.4 (major version number three), then upgrades to version 3.5 through 3.9 are free. Such updates are available ...
Windows NTP Time Client: Free Run Support
NTP4.0 Time Client - Keeping Your Network Time Accurate
Free Run Support Previous Top Next Most clocks lose or gain time so within a few days they no longer display the correct time. In the days of old grandfather would wind up the family clock once every couple of days and, where appropriate, adjust the hands of the clock to reflect the correct time.
Windows NTP Time Client: GPS Parts List
NTP4.0 Time Client - Keeping Your Network Time Accurate
GPS Parts List Previous Top Next · GPS Receiver Garmin GPS III Plus, or Garmin GPS V, or Garmin GPS II Plus (discontinued) http://www.garmin.com/products/gpsIIIp/spec.html http://www.garmin.com/products/gps5/spec.html Please see http://www.garmin.com/products/gpsIIIp/spec.html, http://www.garmin.com/products/gps5/spec.html, ...
Windows NTP Time Client: GPS Tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
GPS Tab Previous Top Next · Model Use this option to specify the model of your GPS receiver. Supported units at this time are: a) Generic : Support for generic NMEA GPS receivers that conform to the NMEA 0183 standard and emit the GPRMC sentence at regular, precise intervals of one or ...
Windows NTP Time Client: GPS Time Synchronization
NTP4.0 Time Client - Keeping Your Network Time Accurate
GPS Time Synchronization Previous Top Next The global positioning system ( GPS) is composed of a network of 24 satellites that orbit the earth at an altitude of about 11,625 miles. Each satellite is equipped with an atomic clock which measures time by counting oscillations of a certain type of ...
Windows NTP Time Client: Hand Held GPS Receivers
NTP4.0 Time Client - Keeping Your Network Time Accurate
Hand Held GPS Receivers Previous Top Next Many hand held GPS receivers deliver time information accurate to within 3 to 70 milliseconds via a serial cable which can be connected to your PC's RS-232 serial port. Many GPS clocks advertise accuracy to within the nanosecond range. PresenTense Server ...
Windows NTP Time Client: Log tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
Log tab Previous Top Next The Log tab gives you access to the operating system event log and always displays the last ten entries PresenTense has committed to the system event log. You need to have logging enabled on the Settings tab in order for this feature to work. The log tab entries are refreshed ...
Windows NTP Time Client: NASD OATS Regulatory Compliance
NTP4.0 Time Client - Keeping Your Network Time Accurate
NASD OATS Regulatory Compliance Previous Top Next PresenTense Auditor allows companies to comply with the time auditing requirements of NASD Rule 6950 - 6957 as specified by the National Association of Securities Dealers and the Securities and Exchange Commission ruling SEC Rule 71a-4 on records ...
Windows NTP Time Client: Network Tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
Network Tab Previous Top Next · Accurate time Server This option allows you to specify one primary and one redundant time server from which PresenTense Client derives its own time. You may specify either an IP address, hostname, or DNS name. If you elect to specify a hostname or DNS name, ...
Windows NTP Time Client: Network Time Synchronization
NTP4.0 Time Client - Keeping Your Network Time Accurate
Network Time Synchronization Previous Top Next A typical network time synchronization scenario is depicted in the diagram shown below. Each workstation synchronizes to a central time server on the corporate LAN. This guarantees a coherent propagation of time to all clients. The corporate ...
Windows NTP Time Client: Network Time Synchronization
Time Client - Keeping Your Network Time Accurate
Network Time Synchronization Previous Top Next A typical network time synchronization scenario is depicted in the diagram shown below. Each workstation synchronizes to a central time server on the corporate LAN. This guarantees a coherent propagation of time to all clients. The corporate time server ...
Windows NTP Time Client: NMEA Recorder
NTP4.0 Time Client - Keeping Your Network Time Accurate
NMEA Recorder - NMEA Serial Port Capture Tool Previous Top Next NMEARecorder is a serial port capture utility used to read NMEA 0183 compliant messages from devices such as GPS (Global Positioning System) units. Our support department uses it to verify proper operation of our time server software.
Windows NTP Time Client: NMEA Tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
NMEA Tab Previous Top Next This window will capture NMEA output from your GPS receiver. Use it to verify connectivity to your GPS as well as COM port and Baud settings. If you cannot see any output from your GPS in this window, PresenTense Client will not be able to synchronize to your GPS. Bytefusion ...
Windows NTP Time Client: NTP Server Scanner
NTP4.0 Time Client - Keeping Your Network Time Accurate
NTP Server Scanner Previous Top NTP Server Scanner helps you easily locate NTP and SNTP servers on your network or the internet. NTP Server Scanner is available free of charge to our customers to help administrators setup and configure time management on their networks. When run, the utility automatically ...
Windows NTP Time Client: NTP4 Plug-In
NTP4.0 Time Client - Keeping Your Network Time Accurate
NTP4 Plug-In Previous Top Next Starting with version 3.5, PresenTense Client includes a plug-in which supports NTP version 3 & 4 according to RFC 1305. This plug-in is distributed with PresenTense Client free of charge. If you require the newest, industry standard version of NTP, the use of ...
Windows NTP Time Client: NTP4 Query Command Line Tool
NTP4.0 Time Client - Keeping Your Network Time Accurate
NTP4 Query Command Line Tool Previous Top Next The NTP4 Query Command Line Tool allows you to troubleshoot and benchmark the performance of the NTP4 Plug-In. This tool is included free with PresenTense Client. To view all available commands, type "help". To view the current synchronization ...
Windows NTP Time Client: Performance Tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
Performance Tab Previous Top Next The Priority Boost setting allows you to increase the real-time priority of PresenTense in the context of the Microsoft Windows operating system. Tasks with a higher priority receive a greater share of CPU attention. If your system runs many CPU intensive applications, ...
Windows NTP Time Client: PresenTense NTP Auditor
NTP4.0 Time Client - Keeping Your Network Time Accurate
PresenTense NTP Auditor Previous Top Next PresenTense NTP Auditor monitors your computer's built-in clock and compares it's time to the real time. Most computer clocks lose or gain time so within a few days, your computer does not show the real time. Many software packages claim to synchronize ...
Windows NTP Time Client: Purchase Online
NTP4.0 Time Client - Keeping Your Network Time Accurate
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Windows NTP Time Client: RFC 1305
NTP4.0 Time Client - Keeping Your Network Time Accurate
RFC 1305 Previous Top Next Network Working Group Request for Comments: 1305 Obsoletes RFC-1119, RFC-1059, RFC-958 David L. Mills University of Delaware March 1992 Network Time Protocol (Version 3) Specification, Implementation and Analysis Note: This document consists of an approximate ...
Windows NTP Time Client: RFC 2030
NTP4.0 Time Client - Keeping Your Network Time Accurate
RFC 2030 Previous Top Next Network Working Group Request for Comments: 2030 Obsoletes: 1769 Category: Informational D. Mills University of Delaware October 1996 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI Status of this Memo This memo provides information for the Internet ...
Windows NTP Time Client: RFC 2030
Time Client - Keeping Your Network Time Accurate
RFC 2030 Previous Top Next Network Working Group Request for Comments: 2030 Obsoletes: 1769 Category: Informational D. Mills University of Delaware October 1996 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI Status of this Memo This memo provides information for the Internet ...
Windows NTP Time Client: RFC 868
NTP4.0 Time Client - Keeping Your Network Time Accurate
RFC 868 Previous Top Next Network Working Group Request for Comments: 868 J. Postel - ISI K. Harrenstien - SRI May 1983 Time Protocol This RFC specifies a standard for the ARPA Internet community. Hosts on the ARPA Internet that choose to implement a Time Protocol are expected to adopt and implement ...
Windows NTP Time Client: RFC 868
Time Client - Keeping Your Network Time Accurate
RFC 868 Previous Top Next Network Working Group Request for Comments: 868 J. Postel - ISI K. Harrenstien - SRI May 1983 Time Protocol This RFC specifies a standard for the ARPA Internet community. Hosts on the ARPA Internet that choose to implement a Time Protocol are expected to adopt and implement ...
Windows NTP Time Client: Settings Tab
NTP4.0 Time Client - Keeping Your Network Time Accurate
Settings Tab Previous Top Next · Accurate time Source This option allows you to specify how PresenTense Client obtains accurate time. Possible options are : a) Network : Obtain accurate time from another time server on your local area network or the public internet from servers supporting ...
Windows NTP Time Client: Settings Tab
Time Client - Keeping Your Network Time Accurate
Settings Tab Previous Top Next · Time Server This option allows you to specify one primary and one redundant time server to which PresenTense98 is to synchronize the local system clock. You may specify either an IP address, hostname, or DNS name. If you elect to specify a hostname or DNS ...
Windows NTP Time Client: Standard Deviation Statistical Filter
NTP4.0 Time Client - Keeping Your Network Time Accurate
Standard Deviation Statistical Filter Previous Top Next Standard Deviation is a statistical measure of variance in a sample set. It is calculated from the square root of the variance of the sample set as shown below : where n is the number of data samples and denotes the arithmetic mean ...
Windows NTP Time Client: System Requirements
NTP4.0 Time Client - Keeping Your Network Time Accurate
System Requirements Previous Top Next PresenTense Requires : · A Personal Computer with a 486/33 MHz CPU or higher · Microsoft Windows NT 4.0, Window 2000 or Windows XP · Mouse or compatible pointing device · 800 KB of hard-disk space Also Required: · TCP/IP networking ...
Windows NTP Time Client: System Requirements
Time Client - Keeping Your Network Time Accurate
System Requirements Previous Top Next PresenTense98 Requires : · A Personal Computer with a 486/33 MHz CPU or higher · Microsoft Windows 95 / 98 / ME. PresenTense98 will not run on Windows NT / 2000 / XP systems as it employs special kernel calls not available under these versions ...
Windows NTP Time Client: Time Protocols & Accuracy
NTP4.0 Time Client - Keeping Your Network Time Accurate
Time Protocols & Accuracy Previous Top Next A number of time protocols are widely used to synchronize computer clocks with a network time server. These are : · NTP (Network Time Protocol) "Network Time Protocol". NTP has the ability to synchronize computers across multiple time ...
Windows NTP Time Client: Time Protocols & Accuracy
Time Client - Keeping Your Network Time Accurate
Time Protocols & Accuracy Previous Top Next A number of time protocols are widely used to synchronize computer clocks with a network time server. These are : · NTP (Network Time Protocol) "Network Time Protocol". NTP has the ability to synchronize computers across multiple time ...
Windows NTP Time Client: What is PresenTense
NTP4.0 Time Client - Keeping Your Network Time Accurate
What is PresenTense Time Client Top Next PresenTense Time Client - Advantages at a glance · Accurate and reliable ( microsecond accuracy, runs as a service ) · Easy to install and maintain ( most users up and running in less than a minute ) · Versatile ( able to connect to almost ...
Windows NTP Time Client: What is PresenTense98 ?
Time Client - Keeping Your Network Time Accurate
What is PresenTense98 ? Top Next PresenTense98 is a network time client for Windows 95 / 98 / ME. It synchronizes your PC system clock to a network time server. The features of PresenTense98 include : · Multi Protocol Support Time sources of all major protocol families are supported : ...
Windows NTP Time Client: Which Time Protocol is Right for Me ?
NTP4.0 Time Client - Keeping Your Network Time Accurate
Which Time Protocol is Right for Me ? Previous Top Next PresenTense Client is a multi protocol time client. This means PresenTense Client can acquire accurate time from various different time sources using a number of protocols and in turn distribute accurate time to clients using a range of network ...
Windows NTP Time Server: 1. Introduction
NTP4.0 Time Server - Keeping Your Network Time Accurate
1. Introduction Previous Top Next This document constitutes a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize timekeeping among a set of distributed time servers and clients. It defines the architectures, algorithms, entities and protocols used by ...
Windows NTP Time Server: 1.1 Related Technology
NTP4.0 Time Server - Keeping Your Network Time Accurate
1.1 Related Technology Previous Top Next Other mechanisms have been specified in the Internet protocol suite to record and transmit the time at which an event takes place, including the Daytime protocol [POS83a], Time Protocol [POS83b], ICMP Timestamp message [DAR81b] and IP Timestamp option [SU81].
Windows NTP Time Server: 2. System Architecture
NTP4.0 Time Server - Keeping Your Network Time Accurate
2. System Architecture Previous Top Next In the NTP model a number of primary reference sources, synchronized by wire or radio to national standards, are connected to widely accessible resources, such as backbone gateways, and operated as primary time servers. The purpose of NTP is to convey timekeeping ...
Windows NTP Time Server: 2.1 Implementation Model
NTP4.0 Time Server - Keeping Your Network Time Accurate
2.1 Implementation Model Previous Top Next In what may be the most common client/server model a client sends an NTP message to one or more servers and processes the replies as received. The server interchanges addresses and ports, overwrites certain fields in the message, recalculates the checksum ...
Windows NTP Time Server: 2.2 Network Configurations
NTP4.0 Time Server - Keeping Your Network Time Accurate
2.2 Network Configurations Previous Top Next The synchronization subnet is a connected network of primary and secondary time servers, clients and interconnecting transmission paths. A primary time server is directly synchronized to a primary reference source, usually a radio clock. A secondary ...
Windows NTP Time Server: 3. Network Time Protocol
NTP4.0 Time Server - Keeping Your Network Time Accurate
3. Network Time Protocol Previous Top Next This section consists of a formal definition of the Network Time Protocol, including its data formats, entities, state variables, events and event-processing procedures. The specification is based on the implementation model illustrated in Figure 1, but ...
Windows NTP Time Server: 3.1 Data Formats
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.1 Data Formats Previous Top Next All mathematical operations expressed or implied herein are in two's-complement, fixed-point arithmetic. Data are specified as integer or fixed-point quantities, with bits numbered in big-endian fashion from zero starting at the left, or high-order, position.
Windows NTP Time Server: 3.2 State Variables and Parameters
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2 State Variables and Parameters Previous Top Next Following is a summary of the various state variables and parameters used by the protocol. They are separated into classes of system variables, which relate to the operating system environment and local-clock mechanism; peer variables, which ...
Windows NTP Time Server: 3.2.1 Common Variables
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.1 Common Variables Previous Top Next The following variables are common to two or more of the system, peer and packet classes. Additional variables are specific to the optional authentication mechanism as described in Appendix C. When necessary to distinguish between common variables of the ...
Windows NTP Time Server: 3.2.2 System Variables
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.2 System Variables Previous Top Next System Variables Name Procedure Leap Indicator sys.leap clock update Stratum sys.stratum clock update Precision sys.precision system Root Delay sys.rootdelay clock update Root Dispersion sys.rootdispersion clock update Reference Clock Ident sys.refid clock ...
Windows NTP Time Server: 3.2.3 Peer Variables
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.3 Peer Variables Previous Top Next Peer Variables Name Procedure Configured Bit peer.config initialization Peer Address peer.peeraddress receive Peer Port peer.peerport receive Host Address peer.hostaddress receive Host Port peer.hostport receive Leap Indicator peer.leap packet Mode peer.mode ...
Windows NTP Time Server: 3.2.4 Packet Variables
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.4 Packet Variables Previous Top Next Packet Variables Name Procedure Peer Address pkt.peeraddress transmit Peer Port pkt.peerport transmit Host Address pkt.hostaddress transmit Host Port pkt.hostport transmit Leap Indicator pkt.leap transmit Version Number pkt.version transmit Mode pkt.mode ...
Windows NTP Time Server: 3.2.5 Clock-Filter Variables
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.5 Clock-Filter Variables Previous Top Next When the filter and selection algorithms suggested in Section 4 are used, the following state variables are defined in addition to the variables described previously. Filter Register (peer.filter): This is a shift register of NTP.SHIFT stages, where ...
Windows NTP Time Server: 3.2.6 Authentication Variables
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.6 Authentication Variables Previous Top Next When the authentication mechanism suggested in Appendix C is used, the following state variables are defined in addition to the variables described previously. These variables are used only if the optional authentication mechanism described in Appendix ...
Windows NTP Time Server: 3.2.7 Parameters
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.2.7 Parameters Previous Top Next Parameters Name Value Version Number NTP.VERSION 3 NTP Port NTP.PORT 123 Max Stratum NTP.MAXSTRATUM 15 Max Clock Age NTP.MAXAGE 86,400 sec Max Skew NTP.MAXSKEW 1 sec Max Distance NTP.MAXDISTANCE 1 sec Min Polling Interval NTP.MINPOLL 6 (64 sec) Max Polling Interval ...
Windows NTP Time Server: 3.3 Modes of Operation
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.3 Modes of Operation Previous Top Next Except in broadcast mode, an NTP association is formed when two peers exchange messages and one or both of them create and maintain an instantiation of the protocol machine, called an association. The association can operate in one of five modes as indicated ...
Windows NTP Time Server: 3.4 Event Processing
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4 Event Processing Previous Top Next The significant events of interest in NTP occur upon expiration of a peer timer (peer.timer), one of which is dedicated to each peer with an active association, and upon arrival of an NTP message from the various peers. An event can also occur as the result ...
Windows NTP Time Server: 3.4.1 Notation Conventions
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.1 Notation Conventions Previous Top Next The NTP filtering and selection algorithms act upon a set of variables for clock offset theta ,THETA, roundtrip delay delta ,DELTA and dispersion epsilon , EPSILON. When necessary to distinguish between them, lower-case Greek letters are used for variables ...
Windows NTP Time Server: 3.4.2 Transmit Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.2 Transmit Procedure Previous Top Next The transmit procedure is executed when the peer timer decrements to zero for all modes except client mode with a broadcast server and server mode in all cases. In client mode with a broadcast server messages are never sent. In server mode messages are ...
Windows NTP Time Server: 3.4.3 Receive Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.3 Receive Procedure Previous Top Next The receive procedure is executed upon arrival of an NTP message. It validates the message, interprets the various modes and calls other procedures to filter the data and select the synchronization source. If the version number in the packet does not match ...
Windows NTP Time Server: 3.4.4 Packet Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.4 Packet Procedure Previous Top Next The packet procedure checks the message validity, computes delay/offset samples and calls other procedures to filter the data and select the synchronization source. Test 1 requires the transmit timestamp not match the last one received from the same peer;
Windows NTP Time Server: 3.4.5 Clock-Update Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.5 Clock-Update Procedure Previous Top Next The clock-update procedure is called from the receive procedure when valid clock offset, delay and dispersion data have been determined by the clock-filter procedure for the current peer. The result of the clock-selection and clock-combining procedures ...
Windows NTP Time Server: 3.4.6 Primary-Clock Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.6 Primary-Clock Procedure Previous Top Next When a primary reference source such as a radio clock is connected to the host, it is convenient to incorporate its information into the data base as if the clock were represented as an ordinary peer. In the primary-clock procedure the clock is polled ...
Windows NTP Time Server: 3.4.7 Initialization Procedures
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.7 Initialization Procedures Previous Top Next The initialization procedures are used to set up and initialize the system, its peers and associations. Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 ...
Windows NTP Time Server: 3.4.7.1 Initialization Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.7.1 Initialization Procedure Previous Top Next The initialization procedure is called upon reboot or restart of the NTP daemon. The local clock is presumably undefined at reboot; however, in some equipment an estimate is available from the reboot environment, such as a battery-backed clock/calendar.
Windows NTP Time Server: 3.4.7.2 Initialization-Instantiation Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.7.2 Initialization-Instantiation Procedure Previous Top Next This implementation-specific procedure is called from the initialization procedure to define an association. The addresses and modes of the peers are determined using information read during the reboot procedure or as the result of ...
Windows NTP Time Server: 3.4.7.3 Receive-Instantiation Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.7.3 Receive-Instantiation Procedure Previous Top Next The receive-instantiation procedure is called from the receive procedure when a new peer is discovered. It initializes the peer variables and mobilizes the association. If the message is from a peer operating in client mode (3), the host ...
Windows NTP Time Server: 3.4.7.4 Primary Clock-Instantiation Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.7.4 Primary Clock-Instantiation Procedure Previous Top Next This procedure is called from the initialization procedure in order to set up the state variables for the primary clock. The value for peer.precision is determined from the radio clock specification and hardware interface. The value ...
Windows NTP Time Server: 3.4.8 Clear Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.8 Clear Procedure Previous Top Next The clear procedure is called when some event occurs that results in a significant change in reachability state or potential disruption of the local clock. begin clear procedure peer.org <-- 0 (undefined); /* mark timestamps undefined */ peer.rec ...
Windows NTP Time Server: 3.4.9 Poll-Update Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.4.9 Poll-Update Procedure Previous Top Next The poll-update procedure is called when a significant event occurs that may result in a change of the poll interval or peer timer. It checks the values of the host poll interval (peer.hostpoll) and peer poll interval (peer.peerpoll) and clamps each ...
Windows NTP Time Server: 3.5 Synchronization Distance Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.5 Synchronization Distance Procedure Previous Top Next The distance procedure calculates the synchronization distance from the peer variables for the peer. begin distance(peer) procedure; DELTA <-- peer.rootdelay + |peer.delay|; EPSILON <-- peer.rootdispersion + peer.dispersion + phi (sys.clock ...
Windows NTP Time Server: 3.6 Access Control Issues
NTP4.0 Time Server - Keeping Your Network Time Accurate
3.6 Access Control Issues Previous Top Next The NTP design is such that accidental or malicious data modification (tampering) or destruction (jamming) at a time server should not in general result in timekeeping errors elsewhere in the synchronization subnet. However, the success of this approach ...
Windows NTP Time Server: 4. Filtering and Selection Algorithms
NTP4.0 Time Server - Keeping Your Network Time Accurate
4. Filtering and Selection Algorithms Previous Top Next A most important factor affecting the accuracy and reliability of time distribution is the complex of algorithms used to reduce the effect of statistical errors and falsetickers due to failure of various subnet components, reference sources ...
Windows NTP Time Server: 4.1 Clock-Filter Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
4.1 Clock-Filter Procedure Previous Top Next The clock-filter procedure is executed upon arrival of an NTP message or other event that results in new data samples. It takes arguments of the form theta, delta, epsilon, where theta is a sample clock offset measurement and delta and epsilon are the ...
Windows NTP Time Server: 4.2 Clock-Selection Procedure
NTP4.0 Time Server - Keeping Your Network Time Accurate
4.2 Clock-Selection Procedure Previous Top Next The clock-selection procedure uses the peer variables THETA, DELTA, EPSILON and tau and is called when these variables change or when the reachability status changes. It consists of two algorithms, the intersection algorithm and the clustering algorithm.
Windows NTP Time Server: 4.2.1 Intersection Algorithm
NTP4.0 Time Server - Keeping Your Network Time Accurate
4.2.1 Intersection Algorithm Previous Top Next begin clock-selection procedure Each peer is examined in turn and added to an endpoint list only if it passes several sanity checks designed to avoid loops and use of exceptionally noisy data. If no peers survive the sanity checks, the procedure exits ...
Windows NTP Time Server: 4.2.2. Clustering Algorithm
NTP4.0 Time Server - Keeping Your Network Time Accurate
4.2.2. Clustering Algorithm Previous Top Next In the original DTS algorithm the clock-selection procedure exits at this point with the presumed correct time set midway in the computed intersection [low,high]. However, this can lead to a considerable loss in accuracy and stability, since the individual ...
Windows NTP Time Server: 5. Local Clocks
NTP4.0 Time Server - Keeping Your Network Time Accurate
5. Local Clocks Previous Top Next In order to implement a precise and accurate local clock, the host must be equipped with a hardware clock consisting of an oscillator and interface and capable of the required precision and stability. A logical clock is then constructed using these components plus ...
Windows NTP Time Server: 5.1 Fuzzball Implementation
NTP4.0 Time Server - Keeping Your Network Time Accurate
5.1 Fuzzball Implementation Previous Top Next The Fuzzball local clock consists of a collection of hardware and software registers, together with a set of algorithms, which implement a logical clock that functions as a disciplined oscillator and synchronizes to an external source. Following is ...
Windows NTP Time Server: 5.2 Gradual Phase Adjustments
NTP4.0 Time Server - Keeping Your Network Time Accurate
5.2 Gradual Phase Adjustments Previous Top Next Left uncorrected, the local clock runs at the offset and frequency resulting from its last update. An update is produced by an event that results in a valid clock selection. It consists of a signed 48-bit integer in whole milliseconds and fraction, ...
Windows NTP Time Server: 5.3 Step Phase Adjustments
NTP4.0 Time Server - Keeping Your Network Time Accurate
5.3 Step Phase Adjustments Previous Top Next When the magnitude of a correction exceeds the maximum aperture CLOCK.MAX, the possibility exists that the clock is so far out of synchronization with the reference source that the best action is an immediate and wholesale replacement of Clock register ...
Windows NTP Time Server: 5.4 Implementation Issues
NTP4.0 Time Server - Keeping Your Network Time Accurate
5.4 Implementation Issues Previous Top Next The basic NTP robustness model is that a host has no other means to verify time other than NTP itself. In some equipment a battery-backed clock/calendar is available for a sanity check. If such a device is available, it should be used only to confirm ...
Windows NTP Time Server: 6. Acknowledgments
NTP4.0 Time Server - Keeping Your Network Time Accurate
6. Acknowledgments Previous Top Next Many people contributed to the contents of this document, which was thoroughly debated by electronic mail and debugged using two different prototype implementations for the Unix 4.3bsd operating system, one written by Louis Mamakos and Michael Petry of the University ...
Windows NTP Time Server: 7. References
NTP4.0 Time Server - Keeping Your Network Time Accurate
7. References Previous Top Next [ABA89] Abate, et al. AT&T's new approach to the synchronization of telecommunication networks. IEEE Communications Magazine (April 1989), 35-45. [ALL74a] Allan, D.W., J.H. Shoaf and D. Halford. Statistics of time and frequency data analysis. In: Blair, B.E.
Windows NTP Time Server: About Bytefusion Ltd.
NTP4.0 Time Server - Keeping Your Network Time Accurate
About Bytefusion Ltd. Previous Top Visit us at : http://www.bytefusion.com Contact Support : support@bytefusion.com Contact Sales : sales@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need ...
Windows NTP Time Server: About PresenTense Server
NTP4.0 Time Server - Keeping Your Network Time Accurate
About PresenTense Server Previous Top Next PresenTense Server for Windows NT / 2000 / XP Version 3.8 Copyright (C) 1999-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an ...
Windows NTP Time Server: Admin Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
Admin Tab Previous Top Next · Service Status This panel indicates if PresenTense is running or stopped. Use the buttons to start and/or stop the service. · System Status This panel indicates the system time in 24-hour format. Use the buttons to conveniently access other control ...
Windows NTP Time Server: Appendix A
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix A Previous Top Next NTP Data Format - Version 3 The format of the NTP Message data area, which immediately follows the UDP header, is shown in Figure 4. Following is a description of its fields. Leap Indicator (LI): This is a two-bit code warning of an impending leap second to be inserted/deleted ...
Windows NTP Time Server: Appendix B
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix B Previous Top Next NTP Control Messages In a comprehensive network-management environment, facilities are presumed available to perform routine NTP control and monitoring functions, such as setting the leap-indicator bits at the primary servers, adjusting the various system parameters ...
Windows NTP Time Server: Appendix C
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix C Previous Top Next Authentication Issues NTP robustness requirements are similar to those of other multiple-peer distributed protocols used for network routing, management and file access. These include protection from faulty implementations, improper operation and possibly malicious ...
Windows NTP Time Server: Appendix D
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix D Previous Top Next Differences from Previous Versions The original NTP, later called NTP Version 0, was described in RFC-958 [MIL85c]. Subsequently, Version 0 was superseded by Version 1 (RFC-1059 [MIL88a]), and Version 2 (RFC-1119 [MIL89]. The Version-2 description was split into two ...
Windows NTP Time Server: Appendix E
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix E Previous Top Next The NTP Timescale and its Chronometry Introduction Following is an extended discussion on computer network chronometry, which is the precise determination of computer time and frequency relative to international standards and the determination of conventional civil ...
Windows NTP Time Server: Appendix F
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix F Previous Top Next The NTP Clock-Combining Algorithm Introduction A common problem in synchronization subnets is systematic time-offset errors resulting from asymmetric transmission paths, where the networks or transmission media in one direction are substantially different from the other.
Windows NTP Time Server: Appendix G
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix G Previous Top Next Computer Clock Modelling and Analysis A computer clock includes some kind of reference oscillator, which is stabilized by a quartz crystal or some other means, such as the power grid. Usually, the clock includes a prescaler, which divides the oscillator frequency to ...
Windows NTP Time Server: Appendix H
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix H Previous Top Next Analysis of Errors and Correctness Principles Introduction This appendix contains an analysis of errors arising in the generation and processing of NTP timestamps and the determination of delays and offsets. It establishes error bounds as a function of measured roundtrip ...
Windows NTP Time Server: Appendix I
NTP4.0 Time Server - Keeping Your Network Time Accurate
Appendix I Previous Top Next Selected C-Language Program Listings Following are C-language program listings of selected algorithms described in the NTP specification. While these have been tested as part of a software simulator using data collected in regular operation, they do not necessarily ...
Windows NTP Time Server: Arbiter
NTP4.0 Time Server - Keeping Your Network Time Accurate
Arbiter Previous Top Next Arbiter sells a range of global positioning system satellite clock receivers. This driver supports model 1084, model 1088, model 1092 and model 1093. To operate these units with the PresenTense Server NTP4 plug-in, turn off the daylight savings time feature using the D0 ...
Windows NTP Time Server: Buy Online
NTP4.0 Time Server - Keeping Your Network Time Accurate
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Windows NTP Time Server: FAQ
NTP4.0 Time Server - Keeping Your Network Time Accurate
FAQ Previous Top Next · Are version upgrades free ? Upgrades within the major version number are free. This includes bug fixes and patches. Example: If you purchased product version 3.4 (major version number three), then upgrades to version 3.5 through 3.9 are free. Such updates are available ...
Windows NTP Time Server: Free Run Support
NTP4.0 Time Server - Keeping Your Network Time Accurate
Free Run Support Previous Top Next Most clocks lose or gain time so within a few days they no longer display the correct time. In the days of old grandfather would wind up the family clock once every couple of days and, where appropriate, adjust the hands of the clock to reflect the correct time.
Windows NTP Time Server: Generic NMEA GPS
NTP4.0 Time Server - Keeping Your Network Time Accurate
Generic NMEA GPS Previous Top Next The "Generic NMEA GPS receiver" option is useful if your GPS system or radio clock is not specifically listed here but supports the NMEA protocol. In order to operate NMEA GPS clocks with the PresenTense Server NTP4 plug-in, your GPS must conform to ...
Windows NTP Time Server: GPS Parts List
NTP4.0 Time Server - Keeping Your Network Time Accurate
GPS Parts List Previous Top Next · GPS Receiver Garmin GPS III Plus, or Garmin GPS V, or Garmin GPS II Plus (discontinued) http://www.garmin.com/products/gpsIIIp/spec.html http://www.garmin.com/products/gps5/spec.html Please see http://www.garmin.com/products/gpsIIIp/spec.html, http://www.garmin.com/products/gps5/spec.html, ...
Windows NTP Time Server: GPS Time Synchronization
NTP4.0 Time Server - Keeping Your Network Time Accurate
GPS Time Synchronization Previous Top Next The global positioning system ( GPS) is composed of a network of 24 satellites that orbit the earth at an altitude of about 11,625 miles. Each satellite is equipped with an atomic clock which measures time by counting oscillations of a certain type of ...
Windows NTP Time Server: Hand Held GPS Receivers
NTP4.0 Time Server - Keeping Your Network Time Accurate
Hand Held GPS Receivers Previous Top Next Many hand held GPS receivers deliver time information accurate to within 3 to 70 milliseconds via a serial cable which can be connected to your PC's RS-232 serial port. Many GPS clocks advertise accuracy to within the nanosecond range. PresenTense Server ...
Windows NTP Time Server: Handheld GPS Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
Handheld GPS Tab Previous Top Next · Model Use this option to specify the model of your GPS receiver. Supported units at this time are: a) Generic : Support for generic NMEA GPS receivers that conform to the NMEA 0183 standard and emit the GPRMC or GPGGA sentence at regular, precise intervals ...
Windows NTP Time Server: Hopf 6870 & Compatibles
NTP4.0 Time Server - Keeping Your Network Time Accurate
Hopf 6870 & Compatibles Previous Top Next Hopf Elektronik manufactures GPS satellite clocks as well as radio clocks designed for the DCF77 time signal broadcast by the National Institute of Natural and Engineering Sciences in Germany. This driver supports the Hopf Elektronik clock model 6870 ...
Windows NTP Time Server: Hopf DCF77/GPS PCI-Bus Receiver
NTP4.0 Time Server - Keeping Your Network Time Accurate
Hopf DCF77/GPS PCI-Bus Receiver Previous Top Next Hopf Elektronik manufactures GPS satellite clocks as well as radio clocks designed for the DCF77 time signal broadcast by the National Institute of Natural and Engineering Sciences in Germany. This driver supports the Hopf Elektronik clock model ...
Windows NTP Time Server: Internet Time Server Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
Internet Time Server Tab Previous Top Next · Reference Time Server This option allows you to specify one primary and one redundant time server from which PresenTense Server derives its own time. You may specify either an IP address, hostname, or DNS name. If you elect to specify a hostname ...
Windows NTP Time Server: Log Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
Log Tab Previous Top Next The Log tab gives you access to the operating system event log and always displays the last ten entries PresenTense Server has committed to the system event log. You need to have logging enabled on the Settings tab in order for this feature to work. The log tab entries ...
Windows NTP Time Server: NASD OATS Regulatory Compliance
NTP4.0 Time Server - Keeping Your Network Time Accurate
NASD OATS Regulatory Compliance Previous Top Next PresenTense Auditor allows companies to comply with the time auditing requirements of NASD Rule 6950 - 6957 as specified by the National Association of Securities Dealers and the Securities and Exchange Commission ruling SEC Rule 71a-4 on records ...
Windows NTP Time Server: NeoClock DCF77
NTP4.0 Time Server - Keeping Your Network Time Accurate
NeoClock DCF77 Top Linum Software GmbH manufactures DCF77 radio time receivers. This driver allows the PresenTense Server NTP4 plug-in to operate with the NeoClock4X receiver. Driver tunables : Tunable Values/Units Description time1 seconds offset calibration factor. default is 0.16958333 seconds ...
Windows NTP Time Server: Network Time Synchronization
NTP4.0 Time Server - Keeping Your Network Time Accurate
Network Time Synchronization Previous Top Next A typical network time synchronization scenario is depicted in the diagram shown below. In this scenario, each workstation synchronizes to a central time server on the corporate LAN. The server operates PresenTense Server software to synchronize ...
Windows NTP Time Server: NMEA Recorder
NTP4.0 Time Server - Keeping Your Network Time Accurate
NMEA Recorder - NMEA Serial Port Capture Tool Previous Top Next NMEARecorder is a serial port capture utility used to read NMEA 0183 compliant messages from devices such as GPS (Global Positioning System) units. Our support department uses it to verify proper operation of our time server software.
Windows NTP Time Server: NMEA Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
NMEA Tab Previous Top Next This window will capture NMEA output from your GPS receiver. Use it to verify connectivity to your GPS as well as COM port and Baud settings. If you cannot see any output from your GPS in this window, PresenTense Server will not be able to synchronize to your GPS. Bytefusion ...
Windows NTP Time Server: NTP Server Scanner
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP Server Scanner Previous Top Next NTP Server Scanner helps you easily locate NTP and SNTP servers on your network or the internet. NTP Server Scanner is available free of charge to our customers to help administrators setup and configure time management on their networks. When run, the utility ...
Windows NTP Time Server: NTP4 Key Generator
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP4 Key Generator Previous Top Next The NTP4 key generator, ntp-genkeys, creates encryption keys for your server. These keys may be used by PresenTense client software to authenticate your server's identity. The keys are maintained in the file NTP.KEYS in the PresenTense Server application folder.
Windows NTP Time Server: NTP4 Plug-In Driver Calibration
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP4 Plug-In Driver Calibration Previous Top Next GPS and radio clocks communicating with your server via a serial port connection are subject to serial port delays and other operating system dependent propagation errors. In some cases long antenna cables may introduce further signal propagation ...
Windows NTP Time Server: NTP4 Plug-In Driver Troubleshooting
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP4 Plug-In Driver Troubleshooting Previous Top Next If your GPS or radio clock is listed as supported or you have a clock model which you feel is compatible with a clock listed under NTP4 Plug-In Drivers and your clock is unable to communicate with PresenTense Server, kindly let us know. Please ...
Windows NTP Time Server: NTP4 Plug-In Drivers
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP4 Plug-In Drivers Previous Top Next Besides synchronizing to other NTP servers via a local area or wide area network, the NTP4 plug-in also allows you to synchronize your computer to a number of hardware clocks, including GPS satellite receivers and radio clocks. A number of physics laboratories ...
Windows NTP Time Server: NTP4 Query Command Line Tool
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP4 Query Command Line Tool Previous Top Next The NTP4 Query Command Line Tool allows you to troubleshoot and benchmark the performance of the NTP4 Plug-In. This tool is included free with PresenTense Server. To view all available commands, type "help". To view the current synchronization ...
Windows NTP Time Server: NTP4+GPS Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
NTP4+GPS Tab Previous Top Next Starting with version 3.5, PresenTense Server includes a plug-in which supports NTP version 3 & 4 according to RFC 1305. This plug-in is distributed with PresenTense Server free of charge. If you require the newest, industry standard version of NTP, the use of ...
Windows NTP Time Server: Performance Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
Performance Tab Previous Top Next The Priority Boost setting allows you to increase the real-time priority of PresenTense in the context of the Microsoft Windows operating system. Tasks with a higher priority receive a greater share of CPU attention. If your system runs many CPU intensive applications, ...
Windows NTP Time Server: PresenTense 98/95/ME Client
NTP4.0 Time Server - Keeping Your Network Time Accurate
PresenTense 98/95/ME Client Previous Top Next PresenTense98 is a network time client for Windows 95 / 98 / ME. It synchronizes your PC system clock to a network time server. The features of PresenTense98 include : · Multi Protocol Support Time sources of all major protocol families are supported ...
Windows NTP Time Server: PresenTense NT/2000/XP Client
NTP4.0 Time Server - Keeping Your Network Time Accurate
PresenTense NT/2000/XP Client Time Client Previous Top Next PresenTense is a network time client for Windows NT / 2000 / XP. It synchronizes your PC system clock to a network time server. The features of PresenTense include : · Multi Protocol Support Time sources of all major protocol families ...
Windows NTP Time Server: PresenTense NTP Auditor
NTP4.0 Time Server - Keeping Your Network Time Accurate
PresenTense NTP Auditor Previous Top Next PresenTense NTP Auditor monitors your computer's built-in clock and compares it's time to the real time. Most computer clocks lose or gain time so within a few days, your computer does not show the real time. Many software packages claim to synchronize ...
Windows NTP Time Server: RFC 1305
NTP4.0 Time Server - Keeping Your Network Time Accurate
RFC 1305 Previous Top Next Network Working Group Request for Comments: 1305 Obsoletes RFC-1119, RFC-1059, RFC-958 David L. Mills University of Delaware March 1992 Network Time Protocol (Version 3) Specification, Implementation and Analysis Note: This document consists of an approximate ...
Windows NTP Time Server: RFC 2030
NTP4.0 Time Server - Keeping Your Network Time Accurate
RFC 2030 Previous Top Next Network Working Group Request for Comments: 2030 Obsoletes: 1769 Category: Informational D. Mills University of Delaware October 1996 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI Status of this Memo This memo provides information for the Internet ...
Windows NTP Time Server: RFC 868
NTP4.0 Time Server - Keeping Your Network Time Accurate
RFC 868 Previous Top Next Network Working Group Request for Comments: 868 J. Postel - ISI K. Harrenstien - SRI May 1983 Time Protocol This RFC specifies a standard for the ARPA Internet community. Hosts on the ARPA Internet that choose to implement a Time Protocol are expected to adopt and implement ...
Windows NTP Time Server: Settings Tab
NTP4.0 Time Server - Keeping Your Network Time Accurate
Settings Tab Previous Top Next · Reference Time Source This option allows you to specify how PresenTense Server obtains accurate time. Possible options are : a) Internet Time Server : Obtain accurate time from another time server on your local area network or the public internet from servers ...
Windows NTP Time Server: Spectracom
NTP4.0 Time Server - Keeping Your Network Time Accurate
Spectracom Previous Top Next Spectracom manufactures both GPS and radio clock receivers. This driver supports the following Spectracom clock models : 8182 (WWVB), 8183 (GPS), 8183A (GPS), 8183ES (GPS) and 8189 (GPS). The driver requires the Spectracom clock to be configured to employ data format ...
Windows NTP Time Server: Spectracom Clock Formats
NTP4.0 Time Server - Keeping Your Network Time Accurate
Spectracom Clock Formats Previous Top Next Spectracom Netclocks support a variety of data formats. The NTP4 Plug-In Driver supports format zero and format three. The screenshots below show the real-time interaction between PresenTense Server and a Spectracom Netclock using data format zero and ...
Windows NTP Time Server: Standard Deviation Statistical Filter
NTP4.0 Time Server - Keeping Your Network Time Accurate
Standard Deviation Statistical Filter Previous Top Next Standard Deviation is a statistical measure of variance in a sample set. It is calculated from the square root of the variance of the sample set as shown below : where n is the number of data samples and denotes the arithmetic mean ...
Windows NTP Time Server: System Requirements
NTP4.0 Time Server - Keeping Your Network Time Accurate
System Requirements Previous Top Next PresenTense Server Requires : · A Personal Computer with a 486/33 MHz CPU or higher · Microsoft Windows NT 4.0, Window 2000 or Windows XP · Mouse or compatible pointing device · 800 KB of hard-disk space Also Required: · TCP/IP ...
Windows NTP Time Server: Time Protocols & Accuracy
NTP4.0 Time Server - Keeping Your Network Time Accurate
Time Protocols & Accuracy Previous Top Next A number of time protocols are widely used to synchronize computer clocks with a network time server. These are : · NTP (Network Time Protocol) "Network Time Protocol". NTP has the ability to synchronize computers across multiple time ...
Windows NTP Time Server: TripNav TN-200
NTP4.0 Time Server - Keeping Your Network Time Accurate
Low cost GPS master clock synchronized to atomic time Previous Top Next With PresenTense Server and the TripNav TN-200 you can build your own network enabled, low cost, GPS master clock to synchronize all your computers to atomic time via the global positioning satellite system. The TripNav TN-200 ...
Windows NTP Time Server: Ultralink
NTP4.0 Time Server - Keeping Your Network Time Accurate
Ultralink Previous Top Next Ultralink manufactures precision radio time receivers. Ultralink clocks use the WWVB signal broadcast by the National Institute of Standards and Technology, Ft. Collins, Colorado, USA. The signal transmitted from Ft. Collins can be received throughout most of the continental ...
Windows NTP Time Server: Undisciplined Local Clock
NTP4.0 Time Server - Keeping Your Network Time Accurate
Undisciplined Local Clock Previous Top Next The undisciplined local clock driver assumes that the local system clock reflects accurate time. This is useful when, in the absence of an external time source, you simply wish for all hosts on a network to agree on time. In this case, you may elect one ...
Windows NTP Time Server: What is PresenTense Server
NTP4.0 Time Server - Keeping Your Network Time Accurate
What is PresenTense Time Server Top Next PresenTense Time Server - Advantages at a glance · Accurate and reliable ( microsecond accuracy, 24/7 availability ) · Easy to install and maintain ( most users up and running in less than a minute ) · Versatile ( able to use almost ...
Windows NTP Time Server: Which Time Protocol is Right for Me ?
NTP4.0 Time Server - Keeping Your Network Time Accurate
Which Time Protocol is Right for Me ? Previous Top Next PresenTense Server is a multi protocol time server. This means PresenTense Server can acquire accurate time from various different time sources using a number of protocols and in turn distribute accurate time to clients using a range of network ...
Windows Telnet Server: BFTelnet
BFTelnet - Windows Telnet Server
BFTelnet Previous Top Next BFTelnet Telnet Server Version 1.5 For Windows NT / 2000 / XP Copyright (C) 1999-2004, Bytefusion Ltd. All Rights Reserved Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client for Windows Need an NTP4.0 ...
Windows Telnet Server: BFTelnet Features
BFTelnet - Windows Telnet Server
BFTelnet Features Previous Top Next · Ease of Use BFTelnet accepts telnet connections from UNIX clients, Windows NT/2000/XP/2003, Windows 95/98, and others, right out of the box. · No Connection Limits Our licensing policy imposes no connection limits. You can maintain as many client ...
Windows Telnet Server: Buy Online
BFTelnet - Windows Telnet Server
Secure Credit Card Purchase with Immediate Download of your Software Step 1. Select the number of licenses in the table below and click the "Add to Cart" button. Step 2. Choose whether to download immediately or have a disk sent by airmail (adds $10 cost). Step 3. Click Add to Cart. Step ...
Windows Telnet Server: Bytefusion Ltd.
BFTelnet - Windows Telnet Server
Bytefusion Ltd. Previous Top Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Sales Inquiries: sales@bytefusion.com Support Inquiries: support@bytefusion.com Bytefusion Software Prices Site Map Purchase This Product On-line How to Order Secure File Encryption Time Client ...
Windows Telnet Server: Configuring BFTelnet
BFTelnet - Windows Telnet Server
Configuring BFTelnet Previous Top Next BFTelnet is configured via the BFTelnet control panel applet. On the taskbar, click start, then settings, and select control panel . This will invoke the BFTelnet control panel applet. Select the administration tab to configure the service. · Service ...
Windows Telnet Server: System Requirements
BFTelnet - Windows Telnet Server
System Requirements Previous Top Next · A Personal Computer with a 486/100 MHz CPU or higher · Microsoft Windows NT 4.0, Windows 2000, Windows XP or Windows 2003 · Mouse or compatible pointing device · 800 KB of hard-disk space Also Required: · TCP/IP networking must ...
Windows Telnet Server: What is BFTelnet ?
BFTelnet - Windows Telnet Server
What is BFTelnet ? Top Next Advantages at a glance · Facilitates telnet access to your computer from anywhere in the world · Integrates with Windows security · Runs as a service for reliability · Gives you remote administration of NT/2000/XP/2003 BFTelnet is a telnet server ...
729 pages listed.
Products
Download
Order
Support
Livehelp
Contact
News
Home