SlideShare une entreprise Scribd logo
1  sur  26
QI   USER MANUAL
TABLE OF CONTENTS Introduction to QI Overview Initial Log-in Navigating QI Change default password How to encrypt a file How to decrypt a file How to share a file Previously encrypted Sharing with contact Sharing with non-contact Unencrypted file Sharing with contact Sharing with non-contact Introduction to Qloud Navigating Qloud How to upload a file to Qloud How to download a file Questions or concerns ..................................................Slide 3 ..................................................Slide 4 ..................................................Slide 5 ..................................................Slide 6 ..................................................Slide 7 ...........................................Slide 8 & 9 .......................................Slide 10 & 11 ....................................... Slide 12 - 19 ........................................Slide 12 - 13 .....................................Slide 14 .....................................Slide 15 ........................................Slide 16 - 17 .....................................Slide 18 .....................................Slide 19 ................................................Slide 20 ................................................Slide 21 ........................................Slide 22 & 23 ................................................Slide 24 & 25 ................................................Slide 26
State of the art cryptography US DoD approved AES-256 Easy to use  3 clicks  Plug and play  Nothing to install  Works on any computer Windows, Mac, Linux  Can be deployed across your company with no tech support  Right now!
OVERVIEW
INITIAL LOG-IN  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Settings Information Language Exit Your QI ID
CHANGE DEFAULT PASSWORD ,[object Object],[object Object],[object Object]
ENCRYPTING A FILE ,[object Object],[object Object],1/2
ENCRYPTING A FILE 2/2 ,[object Object],[object Object]
DECRYPTING A FILE ,[object Object],[object Object],1/2
DECRYPTING A FILE 2/2 ,[object Object],[object Object]
SHARING A FILE ,[object Object],[object Object],[object Object],PREVIOUSLY ENCRYPTED 1/2
[object Object],[object Object],[object Object],SHARING A FILE PREVIOUSLY ENCRYPTED 2/2
SHARING A FILE ,[object Object],[object Object],[object Object],SHARING WITH A CONTACT SHARING A FILE
SHARING A FILE SHARING WITH A NON-CONTACT ,[object Object],[object Object],Your QI ID
SHARING A FILE ,[object Object],[object Object],UNENCRYPTED 1/2
SHARING A FILE ,[object Object],[object Object],[object Object],UNENCRYPTED 2/2
SHARING A FILE ,[object Object],[object Object],[object Object],SHARING WITH A CONTACT
SHARING A FILE SHARING WITH A NON-CONTACT ,[object Object],[object Object],Your QI ID
State of the art security   Client, transition and server  Leverage QI benefits  Easy to use, Plug and Play, Audit trail  Secure document storage Splitting techniques Anonymization techniques  Complex shuffling Real time secure exchange  Anywhere, anytime  Chose where your data is stored US, Canada, Ecuador etc…
Navigate your files and folders Upload your document Storage space available Download your document List of files shared with you
UPLOADING TO QLOUD ,[object Object],[object Object],[object Object],1/2
UPLOADING TO QLOUD ,[object Object],[object Object],[object Object],2/2
DOWNLOADING FROM QLOUD ,[object Object],[object Object],[object Object],1/2
DOWNLOADING FROM QLOUD ,[object Object],[object Object],[object Object],2/2
Questions or Concerns? Email us:  [email_address]

Contenu connexe

Similaire à QI User Manual - English

Quick Start Guide.pdf
Quick Start Guide.pdfQuick Start Guide.pdf
Quick Start Guide.pdf
pa jo
 
Cloud Storage Presentationlb
Cloud Storage PresentationlbCloud Storage Presentationlb
Cloud Storage Presentationlb
Anku Vesra
 
Cloud storage imd113
Cloud storage imd113Cloud storage imd113
Cloud storage imd113
Tasha Schaa
 
San disksecureaccess quickstartguide_win
San disksecureaccess quickstartguide_winSan disksecureaccess quickstartguide_win
San disksecureaccess quickstartguide_win
monicagallant2
 
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
evonnehoggarth79783
 
Start using elephant drive
Start using elephant driveStart using elephant drive
Start using elephant drive
min jay
 

Similaire à QI User Manual - English (20)

Quick Start Guide.pdf
Quick Start Guide.pdfQuick Start Guide.pdf
Quick Start Guide.pdf
 
Using SlideShare And Picasa Web Albums
Using SlideShare And Picasa Web AlbumsUsing SlideShare And Picasa Web Albums
Using SlideShare And Picasa Web Albums
 
[Made Easy] How to use Dropbox - Tutorial
[Made Easy] How to use Dropbox - Tutorial[Made Easy] How to use Dropbox - Tutorial
[Made Easy] How to use Dropbox - Tutorial
 
Add a file [autosaved]
Add a file [autosaved]Add a file [autosaved]
Add a file [autosaved]
 
Multimedia in PaperClipPlus
Multimedia in PaperClipPlusMultimedia in PaperClipPlus
Multimedia in PaperClipPlus
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Cloud Storage Presentationlb
Cloud Storage PresentationlbCloud Storage Presentationlb
Cloud Storage Presentationlb
 
Slideshare PPT Training
Slideshare PPT TrainingSlideshare PPT Training
Slideshare PPT Training
 
Slidelinks
SlidelinksSlidelinks
Slidelinks
 
Cloud storage imd113
Cloud storage imd113Cloud storage imd113
Cloud storage imd113
 
Slideshare Demo
Slideshare DemoSlideshare Demo
Slideshare Demo
 
San disksecureaccess quickstartguide_win
San disksecureaccess quickstartguide_winSan disksecureaccess quickstartguide_win
San disksecureaccess quickstartguide_win
 
How to use Google Drive
How to use Google DriveHow to use Google Drive
How to use Google Drive
 
stcLIVE Induction Training
stcLIVE Induction TrainingstcLIVE Induction Training
stcLIVE Induction Training
 
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
 
Start using elephant drive
Start using elephant driveStart using elephant drive
Start using elephant drive
 
Windows File Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows File Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeologyWindows File Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows File Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
 
Https service mule
Https service muleHttps service mule
Https service mule
 
Discovery Education
Discovery EducationDiscovery Education
Discovery Education
 
Vídeos motivacionais
Vídeos motivacionais Vídeos motivacionais
Vídeos motivacionais
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

QI User Manual - English

  • 1. QI USER MANUAL
  • 2. TABLE OF CONTENTS Introduction to QI Overview Initial Log-in Navigating QI Change default password How to encrypt a file How to decrypt a file How to share a file Previously encrypted Sharing with contact Sharing with non-contact Unencrypted file Sharing with contact Sharing with non-contact Introduction to Qloud Navigating Qloud How to upload a file to Qloud How to download a file Questions or concerns ..................................................Slide 3 ..................................................Slide 4 ..................................................Slide 5 ..................................................Slide 6 ..................................................Slide 7 ...........................................Slide 8 & 9 .......................................Slide 10 & 11 ....................................... Slide 12 - 19 ........................................Slide 12 - 13 .....................................Slide 14 .....................................Slide 15 ........................................Slide 16 - 17 .....................................Slide 18 .....................................Slide 19 ................................................Slide 20 ................................................Slide 21 ........................................Slide 22 & 23 ................................................Slide 24 & 25 ................................................Slide 26
  • 3. State of the art cryptography US DoD approved AES-256 Easy to use 3 clicks Plug and play Nothing to install Works on any computer Windows, Mac, Linux Can be deployed across your company with no tech support Right now!
  • 5.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. State of the art security Client, transition and server Leverage QI benefits Easy to use, Plug and Play, Audit trail Secure document storage Splitting techniques Anonymization techniques Complex shuffling Real time secure exchange Anywhere, anytime Chose where your data is stored US, Canada, Ecuador etc…
  • 21. Navigate your files and folders Upload your document Storage space available Download your document List of files shared with you
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Questions or Concerns? Email us: [email_address]