<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title><![CDATA[How-to]]></title>
    <link>https://www.moyeamedia.com/how-to/</link>
    <description><![CDATA[How-to]]></description>
    <pubDate>Thu, 09 Apr 2026 14:13:39 +0000</pubDate>
    <generator>Zend_Feed</generator>
    <docs>http://blogs.law.harvard.edu/tech/rss</docs>
    <item>
      <title><![CDATA[How to start Protected Folder?]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-start-protected-folder/</link>
      <description><![CDATA[<p><span style="font-size: small;"><a href="http://www.moyeamedia.com/protected-folder" target="_blank"><span style="color: #ff0000;"><strong>Protected Folder (5% discount off)</strong></span></a>&nbsp;allows you to make portions of your file system completely invisible and inaccessible to others. It is targeted towards people who are concerned about local file security. It is of particular interest to people who have a shared computer or store sensitive data on their local PC.</span></p>
<p><span style="font-size: small;">&nbsp;</span></p>
<p><span style="font-size: small;">It works like a safety box, just drag and drop the folders or files you want to hide or protect into Protected Folder, then no one can see, read or modify them.</span></p>
<p><span style="font-size: small;">&nbsp;</span></p>
<p><span style="font-size: small;">Before you can use and unlock the functions of Protected Folder, you have to set a password for Protected Folder when you initially use it.</span></p>
<p><span style="font-size: small;">&nbsp;</span></p>
<p><span style="font-size: small;">You can change the password for the program in Options. However, please remember the password for Protected Folder as you need it to open and use the program. You can also set a password hint in case you may forget your password.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: small;"><img src="/media/import/guides2/protected-folder-guide/1.jpg" alt="" width="803" height="511" />&nbsp;</span></p>
<p><span style="font-size: small;">1. Click Options to set the Lock Options, and then press on the green button to set the status and apply the settings.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: small;"><img src="/media/import/guides2/protected-folder-guide/2.jpg" alt="" width="803" height="511" /></span></p>
<p><span style="font-size: small;">Note: This setting will apply for all files and folders you added into the program.</span></p>
<p><span style="font-size: small;">&nbsp;</span></p>
<p><span style="font-size: small;">2. You can click &ldquo;Add&rdquo; button to add folders into this program or easily drag and drop the files and folders. &nbsp;</span></p>
<p>&nbsp;</p>
<p><span style="font-size: small;"><img src="/media/import/guides2/protected-folder-guide/3.jpg" alt="" width="803" height="511" />&nbsp;</span></p>
<p><span style="font-size: small;">3. Some system files and folders should not be protected as they will cause system error while the system cannot access them. To avoid this, we add these files and folders to the "Exclude List". Moreover, you should also add other items which will cause such problems to the "Exclude List".</span></p>
<p>&nbsp;</p>
<p><span style="font-size: small;"><img src="/media/import/guides2/protected-folder-guide/4.jpg" alt="" width="803" height="511" />&nbsp;</span></p>
<p><span style="font-size: small;">4. You can directly click the protected file/folder to open it and deal with it.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: small;"><img src="/media/import/guides2/protected-folder-guide/5.jpg" alt="" width="803" height="511" />&nbsp;</span></p>
<p><span style="font-size: small;">5. Free users have 20 free trials of Protected Folder. When the trials end, please click on the Register button in the left corner and then click Purchase Online to purchase a license code. Or click here to get the 5% discount coupon code. After you get the license code, please click the Register button again to enter into your license code. Then you can enjoy Premium version of Protected Folder.</span></p>
<p><span style="font-size: small;"><img src="/media/import/guides2/protected-folder-guide/6.jpg" alt="" width="803" height="511" /></span></p>]]></description>
      <pubDate>Wed, 31 Jul 2013 08:49:58 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to install eScan Internet Security Suite Home User Version?]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-install-escan-internet-security-suite-home-user-version/</link>
      <description><![CDATA[<p>This guide is showing user how to install <a href="http://www.moyeamedia.com/escan-internet-security-suite-home-user-version" target="_blank"><span style="color: #ff0000;"><strong>eScan Internet Security Suite Home User Version</strong> </span></a>on your computer.</p>
<p>&nbsp;</p>
<p>The steps for installing eScan ISS by using the installation file downloaded via the internet are identical to the steps for installing eScan ISS from a CD-ROM. The setup file for installing eScan ISS has the name iwn2k3ek.exe. eScan ISS uses the interactive installation wizard for its installation.</p>
<p>&nbsp;</p>
<p><strong>Installation Process</strong></p>
<p><strong>STEP 1 - Choosing the Language</strong></p>
<p>Select the preferred language from the drop-down list, and then click OK.</p>
<p>&nbsp;</p>
<p><strong>STEP 2 - Installation Wizard Welcome Screen</strong></p>
<p>To proceed with the installation, click Next. This will display the License Agreement screen.</p>
<p>&nbsp;</p>
<p><strong>STEP 3 - License Agreement</strong></p>
<p>Click &lsquo;I accept the agreement&rsquo;, and then click Next.</p>
<p>&nbsp;</p>
<p><strong>STEP 4 - Selecting the Installation Folder</strong></p>
<p>Type the path of the folder or click Browse to browse to the folder, and then click Next.</p>
<p>&nbsp;</p>
<p><strong>Note:</strong> The default path for 32-bit computer: [Disk Drive]\Program Files\eScan and the default path for 64-bit computers: [Disk Drive]\Program Files (x86)\eScan.</p>
<p>&nbsp;</p>
<p><strong>STEP 5 - Viewing the Summary Report Before Installation</strong></p>
<p>To proceed with the installation, click Install.</p>
<p>&nbsp;</p>
<p><strong>STEP 6 - Installing eScan</strong></p>
<p>The eScan setup runs eScan Anti-Virus Toolkit. This tool scans and removes the viruses and spyware found on your computer.</p>
<p>&nbsp;</p>
<p><strong>STEP 7 - Completing the Installation</strong></p>
<p>After completing all the tasks, eScan gets installed on your computer.</p>
<p>&nbsp;</p>
<p><strong>Note: </strong>After eScan installation, an option for rebooting the system appears, incase if eScan Firewall driver requires rebooting to apply settings.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Fri, 26 Jul 2013 06:54:47 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[Genie Backup Manger Server user guide: How to Restore Data Backed up Using FTP/FTPS?]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-restore-data-backed-up-using-ftp-ftps/</link>
      <description><![CDATA[<p>GBM currently does not support direct data restore from FTP/FTPS sites. In order to restore backed up data, the user needs to first download the backup files from the FTP/FTPS server using either an Internet browser, or a third party FTP software.&nbsp; It is recommended to use third party FTP software to download the backup set for better reliability and speed.</p>
<p>&nbsp;</p>
<p>&nbsp;<a href="http://www.moyeamedia.com/genie-backup-manager-server" target="_blank"><span style="color: #ff0000;"><strong>Get Genie Backup Manager Server here. </strong></span></a></p>
<p>&nbsp;</p>
<p><strong>Restoring from FTP Using the Default Internet Browser</strong></p>
<p>1. Open your default Internet browser.</p>
<p>2. Login to the FTP site containing your backed up data by entering its URL into the address bar in the following format:</p>
<p><a href="ftp://[username]:[password]@[ftpsiteaddress/">ftp://[username]:[password]@[ftpsiteaddress</a>]</p>
<p>&nbsp;</p>
<p><strong>Where:</strong></p>
<p> [username] is the username of the FTP account used for uploading files.</p>
<p> [password] is the password for the FTP account used for uploading files.</p>
<p> [ftpsiteaddress] is the address for the FTP site used for uploading files, including the complete path to the location of the backup set.</p>
<p>E.g.</p>
<p><a href="ftp://sam:mypassword@my.ftp.site.com/genie/monday/">ftp://sam:mypassword@my.ftp.site.com/genie/monday/</a></p>
<p>3. Locate the backup set and then Copy/Paste it onto your hard disk.</p>
<p>4. Follow the local restore procedure.</p>
<p>&nbsp;</p>
<p><strong>Restoring from FTP Using Third Party Software</strong></p>
<p>1. Use a third-party FTP software to download the complete backup set onto your hard</p>
<p>disk.</p>
<p>2. Follow the local restore procedure.</p>
<p>&nbsp;</p>
<p><a href="http://www.moyeamedia.com/brands/genie9" target="_blank"><span style="color: #ff0000;"><strong>Get more Genie9 software here.</strong> </span></a></p>]]></description>
      <pubDate>Tue, 23 Jul 2013 06:55:46 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to protect your PC with Wondershare Time Freeze]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-protect-your-pc-with-wondershare-time-freeze/</link>
      <description><![CDATA[<p>Wondershare Time Freeze is easy-to-use and effective virtual system software. It helps users to surf online and play around with computer on virtual environment, so as to keep computer safe from virus, spyware, Trojans, worms, and other threats.</p>
<p>&nbsp;</p>
<p><span style="text-decoration: underline;"><span style="color: #ff0000;"><strong>Get <a href="http://www.moyeamedia.com/wondershare-time-freeze" target="_blank">Coupon Code for Wondershare Time Freeze</a></strong></span></span></p>
<p><span style="text-decoration: underline;"><span style="color: #ff0000;"><strong><strong>Get more <a href="http://www.moyeamedia.com/brands/wondershare" target="_blank">Wondershare&nbsp;</a><strong><strong><a href="http://www.moyeamedia.com/brands/wondershare" target="_blank">Coupon Code</a>&nbsp;</strong></strong></strong></strong></span></span></p>
<p><span style="text-decoration: underline;"><span style="color: #ff0000;"><strong><strong><br /></strong></strong></span></span></p>
<p><strong>1.</strong> System protection &ndash; Enter virtual system</p>
<ul>
<li>Launch Wondershare Time Freeze, the default window is System Protection which shows general system information of your computer.</li>
<li>To enter virtual system, you need to enable System Protection. Just drag the button to 'ON' or click the blank area to the left of 'ON'.</li>
<li>Do not save files in system partition, or they will be lost after computer reboots.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/1.jpg" alt="" width="450" height="335" /></p>
<p><strong>2. </strong>System protection &ndash; Return to real system<strong></strong></p>
<ul>
<li>To return to real system, drag the button to "OFF" or click the blank area to the right of 'OFF'. There would be 2 options as following:</li>
<li>Save virtual system data to real system- the default option. Just click OK to confirm it.</li>
<li>Discard virtual system data to real system: select it and click OK. Computer will reboot and real system will remain unchanged.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/2.jpg" alt="" width="450" height="335" /></p>
<p><strong>3. </strong>Folder protection &ndash; Add/remove folders to protection list<strong></strong></p>
<ul>
<li>Click 'Folder Protection' to enter the pane.</li>
<li>To add folders to the list: click 'Add' and browse your computer, find the folders you want to protect and click 'OK'.</li>
<li>To remove folders from the list: tick the box in front of the folders, and click 'Remove' to remove them.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/3.jpg" alt="" width="450" height="335" /></p>
<p><strong>4. </strong>Folder protection &ndash; Enable it<strong></strong></p>
<ul>
<li>To enable Folder Protection, tick the box in front of the folders, and drag the button to 'ON' or click the blank area to the left of 'ON'.</li>
<li>To disable Folder Protection, drag the button to 'OFF' or click the blank area to the right of 'OFF'.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/4.jpg" alt="" width="450" height="335" /></p>
<p><strong>5. </strong>Folder protection &ndash; Set protection mode<strong></strong></p>
<ul>
<li>The default protection mode is 'Disable Changes'.</li>
<li>Time Freeze 2.0 allows you to set different protection mode for different folders. Just tick the box in front of the folder, click 'Change Protection Mode', select preferred mode and click 'OK'.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/5.jpg" alt="" width="450" height="335" /></p>
<p><strong>6. </strong>General Settings<strong></strong></p>
<ul>
<li>Click 'Settings' to enter the settings pane</li>
<li><strong>MBR protection</strong>&nbsp;is enabled by default. It can guarantee the normal startup of your computer.</li>
<li>Here you can select '<strong>Auto hide system tray icon</strong>'. Or just press Ctrl+Alt+F8 to hide/show it.</li>
<li>Tick the box in front of the options, and click 'Apply Settings' to save the changes.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/6.jpg" alt="" width="450" height="335" /></p>
<p><strong>7. </strong>Advanced Settings<strong></strong></p>
<ul>
<li>In 'Settings' pane, click 'Advanced Setting' to enter the window.'</li>
<li><strong>Physical Memory Buffer Mode:&nbsp;</strong>this new mode can effectively speed up virtual system at 60%. When you apply this mode, the program will display the recommended memory buffer size, of course you can change it.</li>
<li><strong>USB flash drive restriction:&nbsp;</strong>this can prevent viruses on USB stick to infect computer, and also prevent unauthorized data copy using USB sticks.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/7.jpg" alt="" width="450" height="335" /></p>
<p><strong>8. </strong>Password Settings<strong></strong></p>
<ul>
<li>In 'Settings' pane, click 'Password' to enter the window.</li>
<li>To set a password: just input the password twice, and click 'OK'. After that, you need to input the password to perform necessary activities to the program.</li>
<li>To cancel password protection: enter the Password window, input the password you set before, and leave the new password area blank, click 'OK'. Then the password protection is disabled.</li>
</ul>
<p><img src="/media/import/guides/how-to-use-wondershare-time-freeze/8.jpg" alt="" width="450" height="335" /></p>
<p>&nbsp;</p>]]></description>
      <pubDate>Mon, 22 Jul 2013 07:25:34 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[Genie Timeline Pro FAQs]]></title>
      <link>https://www.moyeamedia.com/how-to/genie-timeline-pr-faqs/</link>
      <description><![CDATA[<p><strong>Q) Can </strong><span style="color: #ff0000;"><a href="http://www.moyeamedia.com/genie-timeline-pro" target="_blank"><span style="color: #ff0000;">Genie Timeline</span></a> </span><strong>recover my system in case of major failure or after formatting my hard drive?</strong></p>
<p>A) Yes, by using the Disaster Recovery feature.</p>
<p>&nbsp;</p>
<p><strong>Q) Is there a way to change the backup time interval? For example I just want Genie Timeline to backup every 30 minutes.</strong></p>
<p>A) Yes, from Tools &gt; Settings &gt; Backup Schedule.</p>
<p>&nbsp;</p>
<p><strong>Q) Can I control how much space Genie Timeline uses for the backup?</strong></p>
<p>A) Users can set how much space Genie Timeline uses of the backup drive from the Advanced Settings page.</p>
<p>&nbsp;</p>
<p><strong>Q) Is there a way to force Genie Timeline to run a backup now?</strong></p>
<p>A) Yes, open the Genie Timeline Dashboard and click Run now.</p>
<p>&nbsp;</p>
<p><strong>Q) My backup is slow. How can I make it faster?</strong></p>
<p>A) You can enable Genie Timeline to run on Turbo mode.</p>
<p>&nbsp;</p>
<p><strong>Q) Will Genie Timeline slow down my system&rsquo;s performance?</strong></p>
<p>A) No, Genie Timeline is a resource-friendly application and has multiple performance modes to adjust resources based on computer usage.</p>
<p>&nbsp;</p>
<p><strong>Q) I want to view my backup on a different machine that does not have Genie Timeline installed. Is that possible?</strong></p>
<p>A) Yes, Genie Timeline saves the data on the backup drive just like the folder\file structure on your PC. Therefore, you can view your data on any machine. Compressed files can be opened using any standard ZIP applications.</p>
<p>&nbsp;</p>
<p><strong>Q) What happens when my drive becomes full?</strong></p>
<p>A) If the free space becomes low, Genie Timeline will intelligently delete older versions of files taken into backup to free space.</p>
<p>&nbsp;</p>
<p><strong>Q) Do I have to configure backup for each user?</strong></p>
<p>A) Yes, it is recommended that each user configures their backup. Disaster Recovery only requires configuration once to protect the entire system.</p>
<p>&nbsp;</p>
<p><strong>Q) How often are files monitored and when does the backup run?</strong></p>
<p>A) Genie Timeline detects changes as soon as they are made. With Genie&rsquo;s IntelliCDP changes will be backed up at different time intervals based on the file&rsquo;s size and type.</p>
<p><strong>&nbsp;</strong></p>
<p><strong>Q) If I change my backup drive can I restore files from older backups?</strong></p>
<p>A) Yes, go to Advanced Restore in the Dashboard &gt; Click on Restore an older backup &gt; browse for the older backup, then follow the on-screen instructions to proceed.</p>
<p>&nbsp;</p>
<p><strong>Q) Can I backup files from network locations or external drives?</strong></p>
<p>A) Yes, as soon as you select the network locations or external drive from the My Computer tab in Data Selections page, Genie Timeline will automatically monitor and backup the files.</p>
<p>&nbsp;</p>
<p><strong>Q) Are there any special requirements for the backup drive?</strong></p>
<p>A) No special requirements; however, Genie Timeline recommends an external or network drive with plenty of free space.</p>
<p>&nbsp;</p>
<p><strong>Q) Can I schedule when Genie Timeline runs?</strong></p>
<p>A) Yes, from Tools &gt; Settings &gt; Backup Schedule.</p>
<p>&nbsp;</p>
<p><strong>Q) Can I turn off my PC while the first backup is running?</strong></p>
<p>A) Yes, Genie Timeline will resume where it left off without any problems. You can also turn off your PC during any backup run.</p>
<p>&nbsp;</p>
<p><strong>Q) Do I need to close my open files so they can be backed up?</strong></p>
<p>A) No, Genie Timeline uses Microsoft&rsquo;s Volume Shadow Copy Service to backup open and locked files so that there is no need to close the programs you are working on.</p>
<p>&nbsp;</p>
<p><strong>Q) Are there any limitations to the free trial of Genie Timeline?</strong></p>
<p>A) Genie Timeline (Home and Pro) trial version has no feature limitation. After 30 days, you will need to purchase a license.</p>
<p>&nbsp;</p>
<p><strong>Q) Is Genie Timeline Disk defragmentation friendly? Will the backup take all files again after defragmentation?</strong></p>
<p>A) Genie Timeline performs backup on a file base meaning that it is disk defragmentation friendly; the backup will not revert to full after this operation, it will only backup changes.</p>]]></description>
      <pubDate>Thu, 18 Jul 2013 08:49:48 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[Shadow Defender User Guide]]></title>
      <link>https://www.moyeamedia.com/how-to/shadow-defender-user-guide/</link>
      <description><![CDATA[<p>This guide will show you how to use Shadow Defender step by step. If you haven't got a Shadow Defender by now, just click here to <a href="http://www.moyeamedia.com/shadow-defender"><strong>get coupon code for Shadow Defender</strong></a> with high discount off. </p>
<p><strong>Getting started</strong></p>
<p>Step1. Installing Shadow Defender</p>
<p>Use the installation instructions corresponding to the interface and whether the product was downloaded from the web.</p>
<ol start="1">
<li>Click the Setup.exe file.&nbsp;</li>
<li>At the main screen click the NEXT button.&nbsp;</li>
<li>Select I Agree to accept the license agreement and click NEXT.&nbsp;</li>
<li>Type the name and organization and click NEXT.</li>
<li>Click NEXT to confirm the installation.&nbsp;</li>
<li>Once the installation is complete, click the CLOSE button.&nbsp;</li>
<li>Reboot the system.</li>
</ol>
<p>Step2. Register Shadow Defender</p>
<p>You must register Shadow Defender with a valid serial number obtained from ShadowDefender.com. Otherwise, the software will expire in 30 days. To activate Shadow Defender complete the following steps.</p>
<ol start="1">
<li>Right-click and select "Copy" or press Ctrl + C to copy the register code in the registration letter</li>
<li>Click Register in the main interface of Shadow Defender</li>
<li>Right-click the "Serial Number" field and select "Paste" or press Ctrl+V to enter your registration code</li>
<li>Press "OK" and Shadow Defender is registered</li>
</ol>
<p>Step3. <strong>Starting Shadow Defender</strong></p>
<p>Click Start &gt; Programs &gt; Shadow Defender &gt; Shadow Defender to open the Shadow Defender interface.</p>
<p><strong><img src="/media/import/guides/shadow-defender/1.gif" alt="" width="750" height="560" /></strong></p>
<p><strong>Using Shadow Defender</strong></p>
<ul>
<li><strong>Shadow Mode</strong></li>
</ul>
<p>Basing on the original windows, Shadow Defender clone an independent system platform that we call them "shadow mode". With the same configuration and function to the original windows, people could do anything as he were in normal mode. The substantial difference between the normal mode and the shadow mode is: everything in the shadow mode, which includes the file you downloaded, the document you created or the settings that you have changed will disappear at all when you exit the shadow mode.That is the reason why shadow mode can absolutely leave no trace in the computer.</p>
<ul>
<li><strong>Write Cache</strong></li>
</ul>
<p>Shadow Defender can use RAM as write cache. When write cache is enabled, Shadow Defender will write all the changes into the cache. This will increase the disk access speed. And when the write cache is exhausted, all the write operations will be redirected to disk seamlessly.</p>
<ul>
<li><strong>Enter Shadow Mode</strong></li>
</ul>
<p>Open "Shadow Defender" interface under normal mode, switch to the "Mode Settings"page, select the volume which will enter Shadow Mode, then click "Enter Shadow Mode".</p>
<p><img src="/media/import/guides/shadow-defender/2.gif" alt="" width="740" height="550" /></p>
<p>then a message box will display:</p>
<p><img src="/media/import/guides/shadow-defender/3.gif" alt="" width="394" height="274" /></p>
<p>there are 2 options you can select:</p>
<ol start="1">
<li>Exit Shadow Mode when shutdown</li>
<li>Enter Shadow Mode on boot</li>
</ol>
<p>Select one option above and click "OK", then the volumes you selected will be in Shadow Mode.</p>
<p><strong>NOTE</strong>: If you select 'Exit Shadow Mode when shutdown' the volume will exit Shadow Mode automatically when OS reboot or shutdown. If you select 'Enter Shadow Mode on boot' the volume will exit Shadow Mode automatically when OS reboot or shutdown. BUT when you log into windows next time, the volume will enter Shadow Mode automatically.</p>
<ul>
<li><strong>Exit Shadow Mode</strong></li>
</ul>
<p>Open "Shadow Defender" interface under normal mode, switch to the "Volume Settings"page, select the volume which will exit Shadow Mode, then click "Exit Shadow Mode".</p>
<p><img src="/media/import/guides/shadow-defender/4.gif" alt="" width="750" height="560" /></p>
<p>then a message box will display:</p>
<p><img src="/media/import/guides/shadow-defender/5.gif" alt="" width="394" height="274" /></p>
<p>there are 2 options you can select:</p>
<ol start="1">
<li>Discard all changes except Exclusion List</li>
<li>Commit all changes</li>
</ol>
<p>Select one option above and click "OK", then the volumes you selected will be out of Shadow Mode.</p>
<p><strong>NOTE</strong>: If you select 'Discard all changes except Exclusion List'&nbsp;<strong>all the changes in the volume will be discarded</strong>. If you select 'Commit all changes' all the changes will be kept in the volume.</p>
<p><strong>NOTE</strong>: Because some volumes are being used by system, so these volumes cannot exit Shadow Mode without a reboot or shutdown.</p>
<p><strong>NOTE</strong>: If you select 'Force dismount volume', Shadow Defender will try to close all the files used by other applications before exit Shadow Mode.</p>
<ul>
<li><strong>Exclusion List</strong></li>
</ul>
<p>Select the files and folders you wish to exclude from a Shadow Mode.&nbsp;When accessing these files and folders, the changes will automatically be saved to the original volume.</p>
<p><strong>To add an excluded file do the following:</strong></p>
<ol start="1">
<li>Select Add File.</li>
<li>Use the windows explore window to select the file you wish to exclude from Shadow Mode.</li>
<li>The selected file will be displayed in the Exclusion List.</li>
</ol>
<p><strong>To add an excluded folder, which will exclude from Shadow Mode all contents of the folder, including subfolders and their contents, do the following:</strong></p>
<ol start="1">
<li>Select Add Folder.</li>
<li>Use the windows explorer window to select the folder you wish to exclude from Shadow Mode.</li>
<li>The selected folder will be displayed in the Exclusion List.</li>
</ol>
<p><strong>To delete a file or folder from the Exclusion List</strong></p>
<ol start="1">
<li>Just highlight the file or folder.</li>
<li>click the Delete button.&nbsp;</li>
<li>The file or folder will be removed from the Exclusion List.</li>
</ol>
<ul>
<li><strong>Commit</strong></li>
</ul>
<p>The feature performs just like an exclusion file, but the action must be taken manually.&nbsp;There are 2 ways to commit files and folders to original volume permanently:</p>
<ul>
<li><strong>Commit from Shadow Defender Main Interface</strong></li>
</ul>
<p>Switch to the "Commit Now" page, then</p>
<p>To save file to original volume:</p>
<ol start="1">
<li>Select Add File.</li>
<li>Use the windows explore window to select the file you wish to save to original volume.</li>
<li>The selected file will be displayed in the Commit List.</li>
<li>Click the button "Apply".</li>
</ol>
<p>To save folder to original volume:</p>
<ol start="1">
<li>Select Add Folder.</li>
<li>Use the windows explorer window to select the folder you wish to save to original volume.</li>
<li>The selected folder will be displayed in the Commit List.</li>
<li>Click the button "Apply".</li>
</ol>
<p>To delete a file or folder from the Commit List</p>
<ol start="1">
<li>highlight the file or folder and click the Delete button.&nbsp;The file or folder will be removed from the Commit List</li>
</ol>
<ul>
<li><strong>Commit from Context Menu</strong></li>
</ul>
<p>The Commit from the context menu can be used at anytime to save a file or folder permanently to the volume.&nbsp;To use the feature right click on the file or folder to save changes to the disk and select Commit by Shadow Defender. </p>
<p><strong>NOTE</strong>: If subsequent changes are made to the file, the Commit must be repeated to permanently save those changes</p>
<p>l&nbsp; <strong>Encrypt Write Cache</strong></p>
<p>When this option is checked, all the changes made to the protected volume will be encrypted automatically.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Sat, 08 Jun 2013 02:33:05 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to use PhoneSheriff]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-use-phonesheriff/</link>
      <description><![CDATA[<p>This user guide will show you how to use PhoneSheriff.</p>
<p>PhoneSheriff defines the latest in mobile parental controls. This revolutionary software allows parents to easily install software to their child's compatible cell phone or tablet. Once the software is installed it gives the parent the ability to restrict, filter and monitor everything their child does with the phone or tablet. It also allows them to get instant unlimited GPS locates of their child at zero charge per track.</p>
<p><img src="/media/import/guides/phonesheriff/work_gr.jpg" alt="" width="628" height="168" /></p>
<p><strong>First Step: Make Purchase<br /> </strong>In order to purchase this software you must first acknowledge and agree that you are the owner of the device you wish to install the software onto and you are the legal parent of the child being monitored.&nbsp;<br /> If you qualify and are ready to purchase, you can click here to <a href="http://www.moyeamedia.com/phonesheriff"><strong>get coupon code for PhoneSheriff</strong></a> and purchase with lower prices.</p>
<p><strong>Second Step:&nbsp;Download to Phone or Tablet<br /> </strong>After the order is complete, you will be instantly emailed a receipt with a code to create your Username/Password. This email will also contain a link to download the program. You can install the application onto your phone or tablet easily using the included instructions.<br /> After PhoneSheriff is downloaded to the device you will run the installer file on the it. The program will run in the background each time the device is started.. Once the software is installed you are ready to adjust settings.</p>
<p><strong>Third Step: Adjust Settings<br /> </strong>Once PhoneSheriff is installed it is completely hidden from the child, parents can use a secret code to enter into the interface. This is the same interface you will go into to setup your choices of what the program should do.<br /> Use the instructions contained in the order email to enter the PhoneSheriff interface. Select any time or phone number restrictions to apply. Select which activities you wish to monitor and then select the option to HIDE the interface. Click Yes when it asks.</p>
<p><strong>Fourth Step:&nbsp;Login to View Activities<br /> </strong>After you have hidden the interface, the software will remain active from that point on. Even if the device is turned off and back on it will still remain active in the background. Activities will now be filtered and recorded and rapidly uploaded to your PhoneSheriff account.<br /> Then you can login to your account by visiting the&nbsp;<a href="http://www.phonesheriff.com/login.html"><strong>Login Page</strong></a>&nbsp;anytime. After entering your username and password you will be brought to the Secure Online Control Panel. Log entries are categorized by activity types on the left side. Click a type to start viewing!</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Sat, 08 Jun 2013 02:26:53 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to use Net Spy Pro]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-use-net-spy-pro/</link>
      <description><![CDATA[<p><strong>Platform: Windows 95/98/2000/NT/XP /2003/Vista&nbsp;</strong></p>
<p><strong><a href="http://www.moyeamedia.com/net-spy-pro">Get Coupon Code for Net Spy Pro</a>.<br /></strong></p>
<p><strong>Installing Net Spy Pro</strong></p>
<p>The download file of Net Spy Pro is a zip file containing two exe files. Extract the two files to your workstation. Then to install Net Spy Pro, first copy the client.exe installer program to a shared folder.&nbsp;</p>
<p><strong><em>How do I create a shared folder?</em></strong><em><br /> <br /> </em>Create a folder on your desktop, such as NSP. Now right click on it and choose properties. Then click on the sharing tab. Next, click the option box &ldquo;Share this folder on the network&rdquo;. Then click Apply. For more information check the Windows Help. Now a shortcut is created in your Network Neighborhood to this folder. In Windows Vista, you can easily put the NSP client setup to your Public folder.</p>
<p>Then go to all individual workstations and browse to the shared folder and run the client installer.</p>
<p><img src="/media/import/guides/net-spy-pro/1.gif" alt="" width="261" height="203" /></p>
<p>It is recommended that you change the password from the default one on each machine later by connecting to it from your workstation and changing the password in the General menu. The default password is located inside the help file of the server (Admin) installer program.</p>
<p>You should install the admin setup on your workstation. (the PC you will use to monitor other workstations)</p>
<p><strong>Getting Started</strong></p>
<p>After you have installed the client installer to each machine you want to monitor, and you install the admin.exe installer to your workstation, you are ready to begin using NSP.</p>
<p><strong>How to connect to a PC to view logs or perform commands</strong></p>
<p>To view logs or use the NSP web interface on a machine from your workstation, you must first connect to the machine. Bring up your NSP&nbsp;Admin Control Panel. Use the View Logs screen to organize this easy task. Click "Add", then select a PC from the drop down list. After your list is complete, select a PC by clicking its "Network Users" entry. Then click "View Activities". Your browser window will open to that machine's login screen. Enter the password and you will be connected to the Web Based Interface where you can perform a wide range of monitoring and admin tasks.</p>
<p><img src="/media/import/guides/net-spy-pro/2.jpg" alt="" width="247" height="249" /></p>
<p><strong>How the connection process works if you have a large or dynamic IP network</strong></p>
<p>In most instances you can entirely use the View Logs screen to connect to workstations. But if you have a large network or a network that assigns dynamic IP addresses, you will do things a little differently. You will need to scan your IP range each time you view logs using the Network Scan. This is so you can find the latest addresses for the workstations.&nbsp;</p>
<p><strong>Other ways to connect to a machine</strong></p>
<p>Although you can connect to a PC through View Logs or Network Scan screens, you can also access PC's manually. Simply type the IP address of a client machine (on which NSP server is running) in your browser's address bar such as http://192.168.1.101 to access the web interface for the associated client. This feature can be turned off in Advanced settings by applying an IP Filter.</p>
<p>Also note, additional features can be found in a separate viewer called the Real Time Viewer. This viewer can show you the current process or the actual screens of a specific group of machines.</p>
<p><strong>How to adjust settings for a workstation</strong></p>
<p>To adjust settings for a particular workstation, you can change them through the web panel while you are connected to a machine. Another option is to run the Admin Control Panel installer on that workstation. Then make the changes, and remove the Admin Control Panel.</p>
<p>Note: Some settings require you to restart the monitoring process by clicking "Stop" then "Start" again before the new changes will take effect.</p>
<p><strong>Using Full Remote Control Feature</strong></p>
<p>To use the remote control feature built into NSP, bring up the NSP control panel on your workstation. Then click CONTROL PC. Then select which PC you want to connect to and which mode you would like. It will then connect to the remote PC.</p>
<p><strong>Net Spy Pro: How does it work?</strong></p>
<p>Net Spy Pro is like a web server which runs on each client PC. Web servers allow you to view the web pages stored on them. The web server is listening by default on the port number 80. When you type the web page address (for example: www.xyz.com/abc.html) it is converted to the IP address of the web server (for example: 243.98.101.19) and your browser searches for this IP address. Once it is found it sends the page request (i.e. abc.html) to the server. The server in return sends the page to the browser. And hence the page abc.html is displayed inside your browser.</p>
<p>Net Spy Pro functions exactly the same. The NSP program acts like a web server listening by default on port number 80. When you send a request to it through your browser, it extracts out what action you are seeking and then performs that action and hence returns the result again to your browser. All the pages are generated dynamically upon request. You can customize which port NSP is listening to.&nbsp;</p>
<p>All-in-all Net Spy Pro is a revolutionary idea to give you the best results.</p>
<p><strong>Web Interface</strong><br /> After you have connected to a PC you can then use the various commands and live monitoring tasks included with Net Spy Pro. Each command is outlined below.</p>
<p><strong>GENERAL COMMANDS</strong></p>
<p>*Change Password<br /> Changes the NSP access password for the current machine you are connected to. This should be done on each machine for added security.<br /> *Logout of Net Spy Pro<br /> Logs you out of the current PC so that you can either close the window or connect to another PC in the same window.<br /> *Close Server<br /> Closes the Net Spy Pro server on the connected PC. Useful if you don't want the server to run on a specific PC anymore until that PC is rebooted.<br /> *Home<br /> Takes you to the welcome screen of the NSP web panel. This screen shows you which settings are enabled or disabled.</p>
<p><strong>SYSTEM SUPERVISION COMMANDS</strong></p>
<p>*Active Processes<br /> Shows you a list of processes currently running on the connected PC. Clicking a process terminates that process.<br /> *Active Applications<br /> Shows you a list of all active applications running on the connected PC.<br /> *File System<br /> Here you can navigate the file system of the remote PC. You can delete, execute on the remote pc, or download any file from the remote PC.<br /> *System Information<br /> Shows you specific information about the PC you are connected to. Shows vital data such as system and Windows information.<br /> *Services<br /> Here you will find a list of services running on the connected PC.<br /> *Shared Folders<br /> Here you will find a list of shared folders on the connected PC.&nbsp;<br /> *Registry Startup Keys<br /> Here you will find a list of keys in the Windows Registry Startup sequence. You can also delete any key by clicking on it.</p>
<p><strong>LIVE SYSTEM MONITORING COMMANDS</strong></p>
<p>*Live Desktop<br /> Here you can view an actual screenshot of the connected workstation instantly an in a new window. This is used to check-up on a user to see if they are working or playing.&nbsp;<br /> *Live Keystrokes<br /> Displays the latest keystrokes as typed by the user in real time! You can actually watch any text the user types without needing to search logs.<br /> *Live Events<br /> Displays the latest events recorded by NSP&nbsp;in real time!&nbsp;You can watch every event as it is recorded for a live look at every action performed.<br /> *View Recent Documents<br /> Here you can view a list of recent documents opened by the user. Shows all types of files such as Excel, Word, Notepad, etc.<br /> *View Open Ports<br /> Here you can view all open ports on a workstation. This is useful for making sure that there are no outbound Internet connections other than authorized connections.<br /> *View Temporary Histories<br /> Here you can view a list of temporary history (cache) of the Internet Explorer browser. This allows you to check up on employee's past activity even before you purchased.<br /> *View Browser Favorites<br /> Here you can view a list of the favorites on the user's Internet Explorer Browser. This shows the full list and includes any categories that the user may have created.</p>
<p><strong>SYSTEM CONTROL COMMANDS</strong></p>
<p>*Lock PC<br /> This command locks down the connected PC from being used. To unlock, click "System Unlock".<br /> *Unlock PC<br /> This command unlocks the "System Lockdown" command and makes the computer usable again.<br /> *Freeze Mouse<br /> This command freezes the mouse on the connected PC. The mouse will not move when this command is on. To regain mouse use click "Unfreeze Mouse".<br /> *Unfreeze Mouse<br /> This command unfreezes the "Freeze Mouse" command and makes the mouse function normally again.<br /> *Restart PC<br /> This command restarts the remote PC. Click it and the user will then be prompted with a restart window.<br /> *Shutdown PC<br /> This command shuts down the remote PC. Click it and the user will then be prompted with a shut down window.<br /> *Logoff User<br /> This command logs the current Windows user off of the remote PC. Click it and the user will then be prompted with a logout screen.<br /> *Display Message<br /> This allows you to enter a short text message into the interface that will then be instantly displayed on the remote PC's screen. The message will stay up for ten seconds or until the user clicks "OK".<br /> *Launch URL<br /> This allows you to launch any URL on the remote PC. If Internet Explorer isn't already open, NSP will open it and launch the given URL.<br /> *Launch Application<br /> This allows you to launch any application or file with an association on the remote PC. If the program isn't already open, NSP will open it and launch the given file. Use the "File System" command to navigate and find files.<br /> *Run Screensaver<br /> This command instantly runs the selected screensaver on the remote PC.<br /> *Hide Taskbar<br /> This command instantly hides the taskbar on the remote PC. To show the taskbar click "Show Taskbar" command.<br /> *Show Taskbar<br /> This command returns the taskbar to its normal state.<br /> *Show Desktop Icons<br /> This command hides all open windows so that the desktop is visible.<br /> *Hide Desktop Icons<br /> This command opens any available window to hide the desktop.<br /> *Empty Recycle Bin<br /> This allows you to empty the recycle bin of the remote PC. Click it and the user will be prompted with a confirmation.&nbsp;<br /> <br /> <strong>LOGGED SYSTEM MONITORING COMMANDS</strong>&nbsp;</p>
<p>*Web Sites Log<br /> Here you can view the list of web sites viewed in Internet Explorer by date. First select a date and then scroll down to the content below the date section. Each date will show you a list of sites visited that day along with the time visited.<br /> *Chat Transcripts Log<br /> Here you can view any chat transcripts recorded for a selected date.<br /> *Screenshots Log<br /> Here you can view the screenshot files by date. First select a date and then scroll down to the content below the date section. Each date will show you a list of windows that were captured. Click a window to view its screenshot in a new window.<br /> *Keystrokes Log<br /> Here you can navigate recorded keystroke logs by date. First select a date and then scroll down to the content below the date section. Each new window has an entry for text typed into that window.<br /> *Applications Log<br /> Here you can view the list of applications or files launched by date. First select a date and then scroll down to the content below the date section. Each date will show you a list of files and applications visited that day along with the time visited.<br /> *Files Activity Log<br /> Here you can view any files created, deleted or changed for a selected date.<br /> *Net Spy Pro Log<br /> Here you can view a listing of all NSP activity that has occurred since installation.<br /> *Configure Logging<br /> Here you can specify which monitoring and administration functions will be active on the remote PC.</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Sat, 08 Jun 2013 01:49:42 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to lock files, folders and drives with Folder Lock?]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-lock-files-folders-drives-with-folder-lock/</link>
      <description><![CDATA[<p>Folder Lock uses kernel level filtering and hooking on the files, folders and drives you lock with it, keeping them locked and hidden even in Safe Mode. You can simply drag and drop your favorite pictures, documents or videos in 'Lock Files' to lock them in seconds and keep a list of all of them in one place. No need to unlock or remove their protection to open them, simply double click to run them from Folder Lock while they are protected in the background. Later, you can simply go to 'Lock Files' and enter the correct password to unlock and unhide your files. Locking' in Folder Lock refers to the process of protecting your files, folders, drives, and even programs by putting a protective lock on them. With the 'Lock' feature in place, any file, folder, drive, or an EXE program file that you have 'Locked', will be instantly hidden and locked from access and view.</p>
<p>&nbsp;</p>
<p><strong>Step 1</strong></p>
<p>Before you can start Locking your files, folders, drives with<span style="color: #ff0000;"> <a title="folder lock" href="http://www.moyeamedia.com/folder-lock" target="_blank"><span style="color: #ff0000;">Folder Lock (30% disocunt off)</span></a></span>, you will need to run Folder Lock and enter your Master Password that you have set during the installation.</p>
<p><img title="folder lock" src="/media/import/guides/folder-lock-guide/1.jpg" alt="" width="599" height="178" /></p>
<p>A Master Password is a user-selected password or passphrase that a user sets when he/she first installs Folder Lock. As a result, ALL administrative rights to the program will belong to the user with the Master Password. Please remember that ONLY the Master Password holder can use the Lock Files feature.</p>
<p>&nbsp;</p>
<p>You will have the option to enter your password using the Virtual Keyboard available. The Virtual Keyboard allows you to enter your password without the fear of your password being hacked into by a Keystroke recorder or Keyloggers.</p>
<p>Once you have entered the password to access your Locked files, click 'OK' to continue to the Lock Files list.</p>
<p><strong>&nbsp;</strong></p>
<p><strong>Step 2</strong></p>
<p>Once you access the Lock Files feature, you will enter a main window showing a list of Locked files. Please note that this Locked files list will be empty if you are entering the Lock Files feature for the first time. You can add files, folders, drives to the Locking list by simply dragging and dropping them in Lock Files or by clicking the 'Add' button. Additionally, you can also Remove and Unlock or Lock certain items as needed. Once you enter the Lock Files list window, you can start adding your data for Locking.</p>
<p>&nbsp;</p>
<p><strong>Step 3</strong></p>
<p>To add your files, folders, and drives to the Locking list, click on the 'Add' button on the top menu. You will then be given a pull down menu with options to add your files, folders, or drives.</p>
<p><img src="/media/import/guides/folder-lock-guide/2.jpg" alt="" width="599" height="217" /></p>
<p>To add Files to the Locking list, simply click on the 'Add File(s)' option in the pull down menu, and select your file(s). You can also select multiple files. Once you select your file(s), click on 'Add'.</p>
<p><img src="/media/import/guides/folder-lock-guide/3.jpg" alt="" width="599" height="242" /></p>
<p>To add a Folder to the Locking list, simply click on the 'Add Folder(s)' option in the pull down menu, and select your folder(s). Once you select your folder(s), click 'Add'.</p>
<p><img src="/media/import/guides/folder-lock-guide/4.jpg" alt="" width="599" height="242" /></p>
<p>To add a Drive to the Locking list, simply click on the 'Add Drives(s)' option in the pull down menu, and select your drive(s). Once you select your drive(s), click 'Add'.</p>
<p><img src="/media/import/guides/folder-lock-guide/5.jpg" alt="" width="599" height="242" /></p>
<p>You can also add your files, folders and drives by dragging them anywhere from your computer and dropping them into the program window. As soon as the selected item is dropped, it gets listed in the Locked items.</p>
<p>&nbsp;</p>
<p>Please note that you can Lock and Unlock individual items by just selecting the file, folder or drive and clicking on the 'Lock' or 'Unlock' button. This way, except for the file you selected and performed Locking and Unlocking operation on, the rest of the items in the locking list will remain Locked.</p>
<p>&nbsp;</p>
<p>Also note that even though you can add folder(s) and drive(s) containing Locker files (flk, flka, flkb), you CANNOT add Locker files directly to the Locking list. Furthermore, all restricted files, folders, and drives, as well as System Drives, Virtual Drives, USB Drives, Memory Card, Camera, and any other external drives CANNOT be added to the Lock list for Lock protection.</p>
<p>As soon as you have added your selected file(s), folder(s), and/or drive(s) to the Locking list, the security setting of Locked and Hidden will both be applied to the items by default, which will make your Locked items both inaccessible (Locked) as well as hidden. Additionally, the security setting of 'Settings &gt; Preferences &gt; Locking and Encryption &gt; Set Locking ON for all unlocked items when I exit Folder Lock' will also be applied to the listed Lock items by default (for full version only).</p>
<p>&nbsp;</p>
<p><strong>Note:</strong> When you add your drive(s) to the Locking list, the drive(s) will get added to the Locking list but WILL NOT be hidden. Furthermore, the 'Lock' and 'Unlock' function will also NOT work in the case of drive(s) under the Hidden security setting.</p>]]></description>
      <pubDate>Fri, 31 May 2013 06:43:14 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to configure Bitdefender Security for Mail Servers from Remote Admin - UNIX]]></title>
      <link>https://www.moyeamedia.com/how-to/bitdefender-security-for-mail-servers-guide/</link>
      <description><![CDATA[<p align="left"><strong>Get discoun for <a href="http://www.moyeamedia.com/bitdefender-security-for-mail-servers"><span style="color: #0000ff;">Bitdefender Security for Mail Servers</span></a><br /></strong></p>
<p align="left"><strong>Bitdefender Security for Mail Servers </strong>protects Windows or UNIX-based mail servers for known and unknown security threats with award winning proactive antivirus, antispyware, antispam, antiphishing, content and attachment filtering technologies. The solution secures organizations email services and provides increased productivity by blocking spam and providing common centralized management tools<strong>;</strong><br /> <br /> Besides the "bdsafe" command line tool that may be used in order to manage in a very detailed manner, we have the Bitdefender Remote Admin web interface which offers almost all the configuration options available with "bdsafe".</p>
<p align="left">You will start by connecting to the Remote Admin and will enter in browser the address of the socket that you set up at product installation. This address may be obtained by running as root bdsafe:</p>
<p align="left"># ./bdsafe registry get /BDUX/Radmin/Host</p>
<p align="left">In /opt/Bitdefender/bin directory. You have to enter the user "administrator" and the password that you set at installation. In case you forgot the password, it might be necessary to run again the setup:</p>
<p align="left"># /opt/Bitdefender/bin/bd setup</p>
<p align="left">You may also change the configured password by clicking in "administrator" links in the top left corner of the window, after you log in. The login page should look similar to this one:</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-1.jpg" alt="" width="404" height="224" /></p>
<p align="left">After logging in the main status screen will appear. Here you may see the running services and will be able to stop/start/restart them.</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-2.jpg" alt="" width="843" height="423" /></p>
<p align="left">Here we may also view the license status, enter a new one and also will be able to create or log into an existing Bitdefender account:</p>
<p align="left"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-3.jpg" alt="" width="853" height="420" /></p>
<p align="left"><br /> &nbsp;&nbsp;</p>
<p align="left">The next tab will present the list of Bitdefender packages, each of them with its own description, version and components.</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-4.jpg" alt="" width="878" height="478" /></p>
<p align="left">&nbsp;<br /> In the next section, Policies, you may configure the base components of the product: antivirus, antispam and content filter module.</p>
<p align="center">&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-5.jpg" alt="" width="847" height="752" /></p>
<p align="left">Here you may also set up another group besides the default one. The default group includes all the senders and recipients and treat the emails using its own settings. However, there are situations when you would want to treat different emails sent from or to given users or domains. In this case you may create another group, name it, configure the senders and/or recipients that will be included and the configuration for this group.</p>
<p align="left"><br /> You may notice that only the new created groups may be deleted. At this moment you may configure the newly created group by adding the targeted senders and/or recipients.</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-6.jpg" alt="" width="870" height="863" /></p>
<p align="left">We'll go further by modifying the default actions with the desired ones for the group. We may change the antivirus settings</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-7.jpg" alt="" width="860" height="792" /></p>
<p align="left">the antispam settings</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-8.jpg" alt="" width="865" height="904" /></p>
<p align="left">the content filter settings and rules</p>
<p align="center">&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-9.jpg" alt="" width="1254" height="481" /></p>
<p align="left">and the smtp forward facility, which enables the email forwarding to a given SMTP server and email address.</p>
<p align="left">The next section is Quarantine. Here you may search quarnatined emails, specifying one ore more criterias. You may search using the size, time of quarantine, recipient, subject, etc. You also have the option to download them in mbox or maildir format. If you have a qurantine that increase its size very fast and you want to search the quarantine for an email that arrived after the moment you logged into Remote Admin, you need to press "Rebuild file list" button in order to re-read the index file.</p>
<p align="left">Let's take one step ahead, and go to "Components" tab. Here you may enable or disable the real-time reporting enable/disable the asian and/or cyrillic character sets. Please note that in order to enable this filter (marking as spam the emails that contains cyrillic and/or asian characters), you must also check the Multi(purpose) filter from the Antispam section corresponding to the desired group. Also, you may set up RBL servers, configure the Spam Submit module and configure the SMTP proxy, if used. In order to configure Spam Submit, you may want to view this article :</p>
<p align="center">&nbsp;</p>
<p align="left">The update settings are under the "Maintenance". Here you may change the update interval, the server used for update and also ask for an immediate update. Also, there is a patches section here, where you may view and install/uninstall them. At "Users" section can be created users, another than the default one "administrator", with specific permissions for every Remote Admin module.<br /> If you use a proxy server, you may configure it at "Global Proxy" section.</p>
<p>&nbsp;</p>
<p align="left">The scanning statistics are presented in the next section, "Reports". You will find here the number of emails scanned, infected, disinfected, ignored, dropped, spam,etc. The next tab has some charts related to the activity and resource usage of every Bitdefender daemon.</p>
<p align="center">&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-mail-servers-guide/Bitdefender%20Security%20for%20Mail%20Servers-guide-10.jpg" alt="" width="1105" height="583" /></p>
<p align="left">The next and last part deals with the logging details of Bitdefender product. Here you may handle both logger plugins: the file plugin and the mail alert plugin. You may view the logs type and location, as well as create another log files for different Bitdefender modules and types of logging. In the "Mail Alerts" section you may view and create mail, also on a daemon and type of logging basis.</p>
<p align="center">&nbsp;</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 03:48:49 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to configure Bitdefender Security for ISA Servers]]></title>
      <link>https://www.moyeamedia.com/how-to/bitdefender-security-for-isa-servers-guide/</link>
      <description><![CDATA[<p align="left"><strong></strong><strong>Get discout coupon for <a href="http://www.moyeamedia.com/bitdefender-security-for-isa-servers"><span style="color: #0000ff;"><strong>Bitdefender Security for ISA Servers</strong></span></a><br /></strong><strong></strong></p>
<p align="left"><strong>Bitdefender Security for ISA Servers</strong> allows organizations to protect their Microsoft&reg; ISA Servers to block specific types of websites, scan downloaded files and email attachments from web email services. Ensuring compliance to corporate security policies becomes easier and companies will be able to maintain control of sensitive data that would otherwise leak from inside of the organization.</p>
<p align="left">&nbsp;</p>
<p align="left">After installing the product, you need to configure it in order to scan the traffic - HTTP and/or FTP. In order to do that, first, you need to create groups and then apply traffic rules onto those groups.</p>
<p align="left">In order to create the groups, please open the Bitdefender Security for ISA Servers console and go to the Policies menu, expand it and go to Policy Elements menu, which expanded, will give you the two options: Client Groups and Content Groups.&nbsp;&nbsp;&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-isa-servers-guide/Bitdefender%20Security%20for%20ISA%20Servers-guide-1.jpg" alt="" width="697" height="556" /></p>
<p align="left">&nbsp;</p>
<p align="left">&nbsp;</p>
<p align="left">By selecting the Client Groups menu, you can define custom client groups to be used when creating rules. A group can contain one or more computers.To create a group you must run the Client Group Wizard (from the contextual menu point New and select Client Group). The wizard is a four step procedure that will easily guide you into creating different Client Groups on which you can apply different traffic rules.</p>
<p align="left">&nbsp;</p>
<p align="left">By selecting the Content Groups menu, you can define custom content groups to be used when creating rules. A content group can contain more content types which can be file extensions (.xyz) or MIME types (class/subclass). The second form (MIME types) is only used for the HTTP traffic, when the header is present.<br /> When analyzing an FTP traffic rule, Bitdefender will compare the file extension to the extensions defined in the content group. As for the HTTP traffic, if the content-type header is present, its value will be searched in the group content type list. If the content type is not found or the header does not exist, Bitdefender will search for the file extension. By default, Bitdefender comes with 5 content groups: Application, Image, Text, Audio and Video. To create a content group you must run the Content Group Wizard (from the contextual menu point New and select Content Group). The wizard is a four step procedure.&nbsp;</p>
<p align="left">Once the groups are created, you can setup the Rules that will scan the traffic. In order to create them, please select the option Rules under the Policies menu.</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-isa-servers-guide/Bitdefender%20Security%20for%20ISA%20Servers-guide-2.jpg" alt="" width="697" height="556" /></p>
<p align="left"><br /> Here you can define specific filtering rules for specific IP address groups across multiple scan types. A system of safe domain white lists configurable by the administrator is also available so that the traffic between the ISA Server and the respective domains is not scanned. By default Bitdefender scans all downloaded files through the HTTP protocol and downloaded &amp; uploaded files through the FTP protocol.</p>
<p align="left"><strong>Note</strong>:A rule is built for a group of clients.</p>
<p align="left"><br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1.&nbsp; Assignment to a group is done based on the IP address of the client having made the request to access the web page or file.<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2.&nbsp; Rules are analyzed by order of definition, until the IP address is matched to a Client Group.<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3.&nbsp; The defined action is taken (scan or no scan, depending on the constraints defined in the Address White List and the Content Group). Then, the IP address leaves the content filter.<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; 4.&nbsp; If no rule is found for the respective IP, the implicit action will be applied: scanning.</p>
<p align="left">&nbsp;</p>
<p align="left">It is recommended that one rule be defined for each group as no other newly defined rules will be taken into consideration once a match has been found.</p>
<p align="left">&nbsp;</p>
<p align="left">In the next step, you will go through the Configuration sections:<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &bull;&nbsp; Application Filters<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &bull;&nbsp; Antivirus Engine<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &bull;&nbsp; Alerts<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &bull;&nbsp; Antivirus Update<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &bull;&nbsp; RTVR<br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &bull;&nbsp; General</p>
<p align="left">&nbsp;</p>
<p align="left">In the Application Filters section, you can enable or disable the Bitdefender filters that scan all HTTP and FTPbased<br /> traffic.&nbsp;</p>
<p align="left">&nbsp;</p>
<p align="left">&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-isa-servers-guide/Bitdefender%20Security%20for%20ISA%20Servers-guide-3.jpg" alt="" /></p>
<p align="left">&nbsp;</p>
<p align="left"><br /> <strong>HTTP</strong>: All HTTP responses to clients are sent by the Firewall service of the Microsoft ISA to the Bitdefender filter,<br /> which decides if they need to be scanned or not. After being scanned, the responses are sent to the clients. The unscanned responses are let through without being intercepted.</p>
<p align="left">&nbsp;</p>
<p align="left"><strong>FTP</strong>:<strong> </strong>The FTP filter is attached by the Firewall to each FTP session opened by the client. The filter monitors the FTP<br /> FTP client-server communication and in case it detects a Bitdefender for MS ISA Servers Enterprise Edition Filter Description data connection for file transfer (upload or download), it intercepts such transfer and scans it or not, according to the defined rules.</p>
<p align="left">&nbsp;</p>
<p align="left">In the Antivirus Engine section, you can set the actions to be taken on the infected files and the quarantine location as followed. Bitdefender allows for the selection of two actions to be taken in case an infected document is found.</p>
<p align="left">&nbsp;</p>
<p align="left">&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-isa-servers-guide/Bitdefender%20Security%20for%20ISA%20Servers-guide-4.jpg" alt="" width="368" height="435" /></p>
<p align="left">&nbsp;</p>
<p align="left">&nbsp;</p>
<p align="left"><strong>First action</strong></p>
<p align="left">&nbsp;</p>
<p align="left"><strong>Ignore</strong> - Ignore infected objects. No action taken.<br /> <strong>Disinfect</strong> - Disinfect infected objects.<br /> <strong>Delete</strong> - Delete infected objects.<br /> <strong>Move to Quarantine </strong>- Isolate infected objects in the quarantine zone.</p>
<p align="left">&nbsp;</p>
<p align="left"><strong>The Second action</strong> is a supplementary measure of protection and it is only activated if the first action is Disinfect.<br /> <br /> <strong>Ignore - </strong>Ignore infected objects. No action taken.<br /> <strong>Delete</strong> - Delete infected objects.<br /> <strong>Move to Quarantine</strong> - Isolate infected objects in the quarantine zone.</p>
<p align="left">&nbsp;</p>
<p align="left">The Quarantine option allows for the selection of the quarantine location. The default location of the quarantine zone is: C:\Program Files\Common Files\Softwin\ADD-ONS\quar. If you want to change it, type the complete path in the Quarantine location field (the specified folder must have been previously created).</p>
<p align="left">&nbsp;</p>
<p align="left">In the Alerts section,you can configure the alarm messages. The alert service of Microsoft Internet Security and Acceleration (ISA) Server notifies you when specified events occur. Bitdefender has designed 5 special types of events that can generate alarm messages:</p>
<p align="left">&nbsp;</p>
<p align="left"><strong>Bitdefender Information: </strong>An alert is generated when Bitdefender services start and stop.</p>
<p align="left"><strong>Bitdefender Warning: </strong>An alert is generated in case a special situation appears: e.g. license expiration (Bitdefender will alert you three days in advance), protection disabled, etc.</p>
<p align="left"><strong>Bitdefender Error: </strong>An alert is generated upon the occurrence of a malfunction of Bitdefender. Such situations may appear, for example, because of the accidental deletion of some files or of the failure to load the Antivirus engines.</p>
<p align="left"><strong>Bitdefender HTTP Virus:</strong> An alert is generated in case an infected file is detected in the HTTP traffic.</p>
<p align="left"><strong>Bitdefender FTP Virus:</strong> An alert is generated in case an infected file is detected in the FTP traffic.</p>
<p align="left">&nbsp;</p>
<p align="left">In the Antivirus Update section, you can configure the Bitdefender update settings. Nowadays the risk of having your computer infected is higher both because of the appearance of new viruses and spyware and of the spread of existing ones.<br /> Bitdefender for MS ISA Servers Enterprise Edition has a built-in function for the automatic update of virus definitions. Every 3 hours the update function is launched and it connects to the Bitdefender upgrade server. In case an update is found, such update is done transparently, without administrator's intervention, through a file download.&nbsp;</p>
<p align="left">&nbsp;</p>
<p align="center"><img src="/media/import/guides/bitdefender-security-for-isa-servers-guide/Bitdefender%20Security%20for%20ISA%20Servers-guide-5.jpg" alt="" width="368" height="440" /></p>
<p align="left">&nbsp;</p>
<p align="left">In the RTVR (Real TIme Virus Reporting) section, you can enable the virus reporting feature.<br /> The module is customized for each country and it allows for the sending of alerts on found viruses to the Bitdefender Lab. The reports will contain no confidential data, such as your name, IP address or other, and they will not be used for commercial purposes. The information supplied will only include the name of the country and the virus name and it will solely be used to create statistic reports.</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 03:38:25 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to Install Admin Panel of Security Curator?]]></title>
      <link>https://www.moyeamedia.com/how-to/security-curator-guide/</link>
      <description><![CDATA[<p align="left">Get Promote Code for <a href="http://www.moyeamedia.com/security-curator">Security Curator </a>here.</p>
<p align="left">Security Curator has three&nbsp;components:</p>
<ul>
<li><strong>A gate module</strong> where all agent-collected information is stored.</li>
<li><strong>An admin panel module</strong> for managing the entire system and viewing collected information.</li>
<li><strong>An agent (monitoring) module</strong> that is installed directly on the computer to be monitored.</li>
</ul>
<p align="left">&nbsp;</p>
<p align="left">Install the admin panel module on the&nbsp;computer on which you will set the rules for the system. It will receive all collected information.</p>
<p align="left">Use the Administration.msi installation file to install the Admin Panel.</p>
<p align="left">The Admin Panel automatically connects to the installed Gate.</p>
<p align="left">&nbsp;</p>
<p align="left"><strong>Connecting to the Gate manually:</strong><strong></strong></p>
<p align="left">After installing the Admin Panel on&nbsp;a computer, you need to establish a connection with the Gate server. The Gate locates and connects to the Admin Panel automatically, but if autoconnection has been blocked, it is possible to connect manually.</p>
<p align="left">To connect to the Gate manually, go into the program's settings through&nbsp;File / Options / Gate&nbsp;and in the "Host" field, enter the IP address or name of the computer on which the Gate module is installed.</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 03:16:47 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[Advanced SystemCare pro v6 FAQ]]></title>
      <link>https://www.moyeamedia.com/how-to/advanced-systemcare-pro-v6-faq/</link>
      <description><![CDATA[<ol>
<li><strong>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>What does <span style="color: #ff0000;"><a href="http://www.moyeamedia.com/advanced-systemcare-pro-v6"><span style="color: #ff0000;">Advanced SystemCare</span></a></span> back-up and restore?</strong></li>
</ol>
<p>Advanced SystemCare has the most advanced and convenient backup and recovery technology. It will automatically back up all registry related changes and Internet Boost changes.</p>
<p>If some unwanted registry related changes are made by ASC, please click on the Rescue icon to go to the rescue center, select one backup and then click "Undo Changes" button to restore those changes.</p>
<p>If some unwanted changes are made by Internet Boost, please click Rescue all Internet Boost changes link to restore those changes.</p>
<p>&nbsp;</p>
<ol>
<li><strong>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How do I configure Turbo Boost?</strong></li>
</ol>
<p>Turbo Boost works by temporarily closing your unnecessary processes and services to increase physical memory and resources to enhance your computer performance for other serious work. Hence, it is necessary for you to configure your Turbo Boost before running it to keep the processes and services you need.</p>
<p>To configure your Turbo Boost:</p>
<p>Click "Turbo Boost" icon or "Configure" under the Turbo Boost icon.</p>
<p>Select boost mode and click Next</p>
<p>Clear the box for the items you want to keep throughout the wizard to build your own Turbo Boost.</p>
<p>&nbsp;</p>
<ol>
<li><strong>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How do I configure Junk Files Clean?</strong></li>
</ol>
<p>Please follow the steps below to configure Junk Files Clean:</p>
<p>Load Advanced SystemCare</p>
<p>Click More on the top right of the interface and then click Settings</p>
<p>Click Junk Files Clean under Care</p>
<p>Configure the settings according to your needs and click Apply button</p>
<p>&nbsp;</p>
<ol>
<li><strong>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How do I defrag other Disks, beside Disk: C?</strong></li>
</ol>
<p>Load Advanced SystemCare</p>
<p>Click More on the top right of the interface and then click Settings</p>
<p>Click Disk Defragment under Care</p>
<p>Choose the Disk you want to defrag</p>
<p>Click Apply button.</p>
<p>&nbsp;</p>
<ol>
<li><strong>5.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How do I configure Privacy Sweep?</strong></li>
</ol>
<p>Please follow the steps below to configure Privacy Sweep:</p>
<p>Load Advanced SystemCare</p>
<p>Click More on the top right of the interface and then click Settings</p>
<p>Click Privacy Sweep under Care</p>
<p>Configure the settings according to your needs and click Apply button</p>
<p>Make the same settings under AutoClean</p>
<p>Then click Apply button.</p>
<p>&nbsp;</p>
<ol>
<li><strong>6.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How do I ignore the problem scanned out in the Registry Fix module?</strong></li>
</ol>
<p>Please click the item name "Registry Fix" after the scan is finished to check the scan result in detail Right click on the item you want to ignore</p>
<p>Select "Ignore"</p>
<p>&nbsp;</p>
<ol>
<li><strong>7.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How to check the scan result in detail?</strong></li>
</ol>
<p>To check the scan result in detail, please click the item name under "Summary" after the scan is finished.</p>
<p>&nbsp;</p>
<ol>
<li><strong>8.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>Where can I find the repair logs after automatic or manual scan and repair?</strong></li>
</ol>
<p>There are two methods to find the repair logs.</p>
<p>You can find the logs by following the instructions below:</p>
<p>Load Advanced SystemCare -&gt; select "Settings" under "More settings" icon on the right top of the main interface -&gt; click Logs &amp; Backup on the left-hand panel -&gt; you can click the items under Saved Logs and then View Log button to view the logs directly.</p>
<p>Or click Open Log Folder link to go to the saved log folder.</p>
<p>&nbsp;</p>
<ol>
<li><strong>9.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong><strong>How to check the last scan time?</strong></li>
</ol>
<p>In the Simplified Mode, please click on the expression icon or the words "PC Health" to view the last scan time and some other statistic.</p>
<p>&nbsp;</p>
<ol>
<li><strong>10.&nbsp;&nbsp; </strong><strong>When scanning Malware Removal, kinds of malware are listed under the progress </strong>bar. Does that mean my computer has already been infected by those malware?</li>
</ol>
<p>No. Please note that they are only our database information. When it scans, Advanced SystemCare compares those files in your computer with our database. If they match, your computer is infected. We will show the scan result as soon as the scan is finished, so please only refer to the scan result.</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:59:19 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[Auslogics Antivirus Tutorial]]></title>
      <link>https://www.moyeamedia.com/how-to/auslogics-antivirus-guide/</link>
      <description><![CDATA[<p align="left"><strong><br /></strong></p>
<p align="left"><strong>Get coupon code for <a href="http://www.moyeamedia.com/auslogics-antivirus">Auslogics Antivirus </a></strong></p>
<p align="left"><strong>1. How can Auslogics Antivirus be installed?</strong></p>
<p align="left">Important: Since having more than one security solution on one computer may cause conflicts and lower the protection level, you need to uninstall other antivirus software prior to installing Auslogics Antivirus.</p>
<p align="left">To install Auslogics Antivirus, first of all locate the setup file and double-click it. This will launch a wizard, which will guide you through the setup process. Before launching the setup wizard, Auslogics will check for newer versions of the installation package. If a newer version is available, you will be prompted to download it. Click Yes to download the newer version or No to continue installing the version available in the setup file.</p>
<p align="left">Follow these steps to install Auslogics Antivirus:</p>
<ul>
<li>Click Next to continue or click Cancel if you want to quit installation.</li>
<li>Antivirus alerts you if you have other security products installed on your computer and asks if you would like to remove them (one at a time). Click Yes to uninstall the corresponding product.</li>
<li>Please read the License Agreement and click I agree.</li>
<li>By default, Antivirus will be installed into C:\Program Files\Auslogics Software\Auslogics Software Antivirus. If you want to change the installation path, click Browse and select the folder where you would like Auslogics Antivirus to be installed. Click Next when you are ready to continue.</li>
<li>Select options regarding the installation process.</li>
<li>Click Install in order to begin the installation of the product.</li>
<li>Click Finish. You will be asked to restart your system so that the setup wizard can complete the installation. We recommend doing so as soon as possible.</li>
</ul>
<p>&nbsp;</p>
<p><strong>2. What to do when Auslogics Antivirus cannot detect a virus or spyware?</strong></p>
<p>&nbsp;</p>
<p>'False negatives', meaning that the program fails to detect a file that is malicious, occur very rarely. This usually happens when the malware uses an unknown technique to hide itself from the antivirus software. This doesn't happen often and when it does, Antivirus is promptly updated to detect and remove this new type of malware.</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:57:16 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to Deploy Bitdefender Client Security?]]></title>
      <link>https://www.moyeamedia.com/how-to/deploy-bitdefender-client-security-guide/</link>
      <description><![CDATA[<p align="left">Get <a href="http://www.moyeamedia.com/bitdefender-client-security"><strong>Bitdefender Client Security</strong> </a>with discount.</p>
<p align="left">Before you proceed, prepare computers for deployment to make sure it goes smoothly.<br /> <br /> Four main components are of interest for the deployment:</p>
<ul>
<li>Bitdefender Management Server, which allows you to centrally manage the Bitdefender security solutions in your network;</li>
<li>Bitdefender Management Console, which is the graphical interface of Bitdefender Management Server.</li>
<li>Bitdefender Management Agent, the local management component installed on all managed computers, which ensures communication between the managed computers and Bitdefender Management Server;</li>
<li>Bitdefender Business Client, which protects workstations against a wide range of security threats. If you also want to protect servers and manage their protection, you must add support for the Bitdefender server security solutions.</li>
</ul>
<p align="left"><br /> <strong>1. Installing the management server</strong></p>
<p align="left">At the server side you will need to install the following components: Bitdefender Management Server, Bitdefender Management Console and Bitdefender Update Server.</p>
<p align="left"><strong><span style="text-decoration: underline;">Note:</span></strong> if you want to use an existing database instead of letting Bitdefender create a new one please make sure to prepare for this action before actually starting to install the management server.</p>
<p align="left">For a complete overview of this process, follow steps from this KB article.</p>
<p align="left"><strong>2. Installing the clients</strong></p>
<p align="left">In order to be able to install and manage the network stations you need to install Bitdefender Management Agent (action called deployment). Once the deployment is finished you can proceed with installing and managing Bitdefender Business Client.</p>
<p align="left"><strong><span style="text-decoration: underline;">Note:</span></strong> before attempting to deploy the agents throughout the network please make sure to prepare the clients. Additionally, you can deploy the communication agent onto the servers in the network.</p>
<p align="left"><strong>3. Securing the server</strong><br /> <br /> Keep in mind that after installing the Bitdefender Management Server, the server itself is not protected against malware infections.</p>
<p align="left">We strongly recommend using Bitdefender Security for File Servers in order to protect the server,&nbsp; If you have several servers that you need to protect throughout the network, contact your Bitdefender vendor in order to obtain a Bitdefender Client Security license that allows the management server to manage this type of protection.</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:52:51 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to use Mobile Spy]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-use-mobile-spy/</link>
      <description><![CDATA[<p><strong>Phone Requirements</strong></p>
<p>Any Smartphone running one of the following operating systems:</p>
<p>Windows Mobile 6.x or Symbian OS 9.x</p>
<p>or Android 1.x / 2.x /3.x / 4.x or BlackBerry 4.x / 5.x / 6.x / 7.0 / 7.1 or Apple iPhone 3.x / 4.x / 5.0 / 5.0.1 / 5.1.1 / 6.x</p>
<p>&nbsp;</p>
<p><strong>Internet Connection Requirements</strong></p>
<p>Carrier which allows the use of GPRS upload (almost every carrier)</p>
<p>The inserted SIM card's account must have Internet access enabled to upload.</p>
<p>&nbsp;Download and get coupon code for <a href="http://www.moyeamedia.com/acespy" target="_blank"><strong>Mobile Spy</strong></a>.</p>
<p align="center"><strong>THREE BASIC STEPS TO SETUP AND USAGE OF MOBILE SPY</strong></p>
<p align="center"><strong>&nbsp;</strong></p>
<p align="left">1. Register your account to make your username and password.</p>
<p align="left">2. Install Mobile Spy directly to your monitored phone and launch the program.</p>
<p align="left">3. Login to your account after 60 minutes to view logs. Check logs anytime.</p>
<p align="left">&nbsp;</p>
<p align="left">Step1. Register Your Account</p>
<p align="left">After ordering Mobile Spy you will instantly receive an email containing your registration code.</p>
<p align="left">&nbsp;</p>
<p align="left">If you have already registered using a trial account:</p>
<p align="left">Please contact our Technical Support department at 1-888-475-5345 so that they may register your account(s) as a paid subscription, and you can maintain the same username for that account.</p>
<p align="left">&nbsp;</p>
<p align="left">If you have never created a Mobile Spy account:</p>
<p align="left">You will first need to create your username and password by registering. DO NOT USE any spaces or characters other than numbers or letters. Paste your registration number to the appropriate box. You must agree to the legal requirements on the registration page. Then click Submit.</p>
<p align="left">&nbsp;</p>
<p align="left">Step2. Install Mobile Spy</p>
<p align="left">After you have registered your account, it's time to install the software to your phone. You have to download and install Mobile Spy directly onto the phone you own &amp; intend to monitor.</p>
<p align="left">&nbsp;</p>
<p align="left">Step3. Login to View Logs</p>
<p align="left">After you have installed the software you can login SECURELY to your account to view logs anytime. Please allow up to a few hours after installing for logs to show up the first time. Usually the first logs show up after one hour.</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:50:27 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to use AceSpy]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-use-acespy/</link>
      <description><![CDATA[<p>Thank you for choosing AceSpy program for monitoring needs. The following post is a user guide for AceSpy for Windows to share a quick reference for users.</p>
<p>After purchasing <a href="http://www.moyeamedia.com/acespy" target="_blank">AceSpy</a>, install AceSpy in your computer. Installing AceSpy is extremely easy. After you order you will receive an email with detailed, step-by-step instructions on how to download the program and start the installation. For maximum stealthiness, we recommend keeping all the default options during installation.</p>
<p><strong>Get Started:</strong></p>
<p>1. Once AceSpy is installed it loads automatically with each computer boot in stealth mode. After you finish installation you will be asked to create your password as shown below.</p>
<p><img src="/media/import/guides/how-to-use-acespy/interface.jpg" alt="" width="468" height="350" /></p>
<p>After you create your password, the password box will pop up. Enter your password and you will be taken to the AceSpy Main Interface as shown below.</p>
<p><img src="/media/import/guides/how-to-use-acespy/login.jpg" alt="" width="300" height="149" /></p>
<p><strong>Basic Usage Instructions:</strong></p>
<p>Anytime you are within the interface, AceSpy automatically stops monitoring. When you are finished inside the interface, click the "X" at the top right corner. Then, click "Yes" to hide the interface and continue monitoring. Additionally, you can stop or start monitoring activity by clicking the "Start/Stop" button on the Home Screen.</p>
<p>So when you want to view recorded activity, you would open the interface with the hot key sequence. After you are inside, click any of the categories on the left side. Then choose the activity type you wish to view from the category menu. You can change options the same way by clicking an Options category, then choosing an option type in the category menu.</p>
<p>If you ever want to *completely* exit AceSpy and stop monitoring until your computer is rebooted, simply click the "X" at the top right corner. Then select "NO" and AceSpy will shut down completely. It will reload again the next time your computer is rebooted.</p>
<p><strong>VIEWING ACTIVITY OVERVIEW&nbsp;</strong><br /> There are THREE different categories of activity viewers within AceSpy. Each is outlined and then described below.</p>
<ul>
<li>General Activity Category: Basic PC non-Internet activity including keystrokes.</li>
<li>Internet Activity Category Internet Activity such as emails and chats.</li>
<li>Visual Surveillance Category: Screenshots and Webcam recordings.</li>
</ul>
<p><strong>GENERAL ACTIVITY CATEGORY</strong></p>
<ul>
<li>Applications Ran: View programs executed on the PC.</li>
<li>Clipboard Activities: View text sent to clipboard by date and window title.</li>
<li>File/Folder Activities: View a list of new files/folders created or deleted.</li>
<li>Keystrokes Log: View keystrokes typed by date and window title.</li>
<li>Printer Activities: View documents printed by date.</li>
<li>Windows Opened: View windows opened or clicked on by the user.</li>
<li>AceSpy Events: View AceSpy's program activity log.</li>
</ul>
<p><strong>INTERNET ACTIVITY CATEGORY</strong></p>
<ul>
<li>Chat Conversations Log: View full chat transcripts.</li>
<li>MySpace Web Pages: View each MySpace page visited in it's entirety.</li>
<li>MySpaceIM Logs: View rapid screenshots of MySpaceIM chats.</li>
<li>Web Sites Visited: View list of URLs visited in major browsers.</li>
<li>Emails Sent/Received: View full emails sent and received.</li>
</ul>
<p><strong>VISUAL SURVEILLANCE CATEGORY</strong></p>
<ul>
<li>Screenshots Captured: View screenshots with date and window title.</li>
<li>Webcam Pics: View surveillance snapshots taken by your webcam.</li>
</ul>
<p><strong>SETTINGS/SEARCH OVERVIEW</strong><br /> There are THREE different options panels within AceSpy. These are the GENERAL OPTIONS, ADVANCED OPTIONS, and BLOCKING AND FILTERING panels. The six icon names on the "Settings" menu are shortcuts to specific sections within one of the three panels. The icons are described below, and after that, each panel is described in detail.</p>
<ul>
<li>General: This takes you to the GENERAL OPTIONS panel.</li>
<li>Advanced: This takes you to the ADVANCED OPTIONS panel.</li>
<li>Email: This takes you to the ADVANCED OPTIONS panel.</li>
<li>Screenshots: This takes you to the GENERAL OPTIONS panel.</li>
<li>Filtering: This takes you to the BLOCKING AND FILTERING panel.</li>
<li>Schedule Monitoring: This takes you to the GENERAL OPTIONS panel.</li>
<li>Lockdown Schedule: This takes you to the GENERAL OPTIONS panel.</li>
<li>Search Logs: This takes you to the SEARCH LOGS screen.</li>
</ul>
<p><strong>GENERAL OPTIONS PANEL</strong></p>
<ul>
<li>General: Stealth, Startup and Password options.</li>
<li>Logging: The checklist to determine what will be recorded.</li>
<li>Screen: Screen capture and webcam settings and options.</li>
<li>Location: Specifies where AceSpy logs will be stored.</li>
<li>Schedule: Enables/Disables scheduled logging.</li>
<li>Lockdown: Enables/Disables PC Lockdown schedule.</li>
</ul>
<p><strong>ADVANCED OPTIONS PANEL</strong></p>
<ul>
<li>Priority: Thread Priority settings to adjust system performance.</li>
<li>Splash: Enables/Disables the Splash Screen startup warning.</li>
<li>Emails: Enables/Disables email delivery of logs.</li>
<li>Hot-Key: Changes the defaults Hot Key sequence.</li>
<li>Auto-Clean: Automatic maintenance, UNINSTALL ACESPY and DELETE ALL LOGS button.</li>
</ul>
<p><strong>BLOCKING AND FILTERING PANEL</strong></p>
<ul>
<li>Instant Mails: This is where you tell AceSpy whether or not to FORWARD EMAILS AND CHATS. Forward Email Delivery instantly copies every email sent or received to the email address in the "Email To:" field of your Email Configuration. Express Delivery of IMs / Chats instantly copies all chat conversations recorded the instant the chat window is closed.</li>
<li>Block URLs: Enter URLs to be blocked in Internet Explorer and Firefox. To block all pages of a certain site, enter two entries for it. One would be http://www.whatever.com and the second one would be http://whatever.com. You can also select categories of websites for AceSpy to block.</li>
<li>Keystrokes: Enter words that will cause Instant Keyword Alerts to be sent anytime someone types a specified keyword within this list. For this option to properly work, you must have already setup your Auto Email settings. Example entries could be sex or a person's name. Check the "Attach Screenshot" field to attach a current screenshot as the word was typed!</li>
<li>Windows: Window Title Blocking will close windows containing any of the keywords within their title. i.e. outlook or a filename such as msmsgs.exe</li>
<li>Web Content: This feature tells AceSpy to scan every web page that is visited in Internet Explorer. If a word on this list is encountered, then the user will be forwarded to an access denied page. Example entry is same as Keystrokes examples.</li>
<li>Applications: Application and Window Blocking will close windows containing any of the keywords within their title. i.e. outlook or a filename such as msmsgs.exe or you can click Browse to select an application from your hard drive to be blocked when executed.</li>
<li>User Filter: User filtering settings to avoid monitoring specific users. Enter any unique portion of a Windows username to avoid monitoring a user. In Windows XP/Vista, the username can be found by clicking Start, and then looking at the top of the menu. This is your username and any unique portion can be typed. For example, if your name username is Tom Smith, you could simply enter Tom.</li>
</ul>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:43:20 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to Use BitDefender Antivirus Scanner for Unices?]]></title>
      <link>https://www.moyeamedia.com/how-to/bitdefender-antivirus-scanner-for-unices/</link>
      <description><![CDATA[<p align="left">Get <a href="http://www.moyeamedia.com/bitdefender-antivirus-scanner-for-unices">BitDefender Antivirus Scanner for Unices </a>with coupon code</p>
<p align="left">1. Getting Started</p>
<p align="left">After installing BitDefender Antivirus Scanner for Unices, you can start using it. You can run this command both as a root and as a regular user. This guide will show you how to use graphic user interface.<strong></strong></p>
<p align="left">&bull; On Gnome desktops, follow this path: <strong>Applications </strong>&rarr; <strong>System Tools </strong>&rarr;<strong>BitDefender Scanner</strong>.</p>
<p align="left">&bull; On KDE desktops, follow this path: <strong>Applications </strong>&rarr; <strong>System </strong>&rarr; <strong>BitDefender Scanner</strong>.<strong></strong></p>
<p align="left">&bull; On Xfce desktops, either click the Xfce menu or right-click the desktop, and then</p>
<p align="left">follow this path: <strong>System </strong>&rarr; <strong>BitDefender Scanner</strong>.</p>
<p align="left">The main interface is displayed.</p>
<p align="left">&nbsp;</p>
<p align="left"><strong>Scanner</strong>. Click it to start scanning your computer for viruses</p>
<p align="left">and other malware.</p>
<p align="left"><strong>Update</strong>. Click it to update BitDefender, thus keeping the</p>
<p align="left">malware signatures database up to date.</p>
<p align="left"><strong>Settings</strong>. Click it to customize your BitDefender.</p>
<p align="left">If you configure BitDefender to run in the background, a <strong>Hide </strong>button is available next to <strong>Exit</strong>. Click this button to hide the window.</p>
<p align="left">Exit the application.</p>
<p align="left">2. Scanning with BitDefender</p>
<p align="left">There are several ways to set BitDefender to scan the files and folders on your</p>
<p align="left">computer:</p>
<p align="left">&bull; Drag&amp;drop the file or directory you want to scan on the main window.</p>
<p align="left">&bull; Click the <strong>Scanner </strong>button, select the file or directory you want to scan and click</p>
<p align="left"><strong>Open</strong>.</p>
<p align="left">&bull; If you have configured BitDefender to run in the background, you can use the file</p>
<p align="left">drop zone.</p>
<p align="left">&nbsp;<img src="/media/import/guides/bitdefender-antivirus-scanner-for-unices-guide/BitDefender%20Antivirus%20Scanner%20for%20Unices-guide-1.jpg" alt="BitDefender Antivirus Scanner for Unices-guide" width="760" height="588" /></p>
<p align="left">To scan your computer for viruses and other malware, follow these steps:</p>
<p align="left">1. Click the Scanner button. A new window will appear.</p>
<p align="left">2. Choose the location (file or folder) to be scanned and click <strong>Open</strong>.</p>
<p align="left">3. BitDefender will start scanning the selected objects. Wait for BitDefender to finish scanning. You can see the scanning location, status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other).</p>
<p align="left"><strong>Note: </strong>The scanning process may take a while, depending on the complexity of the scan.<strong> </strong>You can stop scanning anytime you want by clicking <strong>Cancel</strong>. You will go directly<strong> </strong>to the last step of the wizard.<strong></strong></p>
<p align="left">4. When the scanning is completed, a new window will appear, where you can see the scan results.</p>
<p align="left"><img src="/media/import/guides/bitdefender-antivirus-scanner-for-unices-guide/BitDefender%20Antivirus%20Scanner%20for%20Unices-guide-2.jpg" alt="BitDefender Antivirus Scanner for Unices-guide" width="760" height="588" /></p>
<p align="left">You can see the number of issues affecting your system. To find out more information about a specific threat detected on your system, just click it. You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues.</p>
<p align="left">5. When BitDefender has finished fixing the issues, click <strong>Close </strong>and then <strong>Finish</strong>. The scan results will appear in a new window.</p>
<p>&nbsp;</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:31:29 +0000</pubDate>
    </item>
    <item>
      <title><![CDATA[How to use SniperSpy]]></title>
      <link>https://www.moyeamedia.com/how-to/how-to-use-sniperspy/</link>
      <description><![CDATA[<p>This page is designed to guide you every step of the way after your software purchase. The minimum system requirements for your local and remote computers are listed below:</p>
<p>&nbsp;</p>
<p>Minimum System Requirements</p>
<p>Pentium or AMD 433mhz or Better Processor, 64MB RAM</p>
<p>Windows 2000 / XP / Vista / 7 / 8</p>
<p>Internet Connection Requirements</p>
<p>Any Standard Dial-up (56k) or High-Speed Internet Connection</p>
<p align="center"><strong><br /></strong></p>
<p align="center"><strong>FIVE BASIC STEPS TO SETUP AND USAGE OF SNIPERSPY</strong></p>
<p>&nbsp;</p>
<p>1. <strong>Purchase </strong>to receive your registration code and module creator program. Get coupon code for&nbsp;<a href="http://www.moyeamedia.com/sniperspy" target="_blank">SniperSpy</a> and download it here.</p>
<p>2. <strong>Register</strong> Account to make your customized username and password.</p>
<p>After you order you will instantly receive an email containing two things: Your registration code and a link to download the module creator program. You can't create your module until you have your username and password. For this you will need to register your account.</p>
<p>By registering your account you will create your username and password. To register, go to the Create Account page which is shown below. After you have reached the Create Account page, input data into the following fields:</p>
<p><strong>Username/Password</strong></p>
<p>Enter a username / password you wish to use. Up to 60 characters each.</p>
<p><strong>Registration Number</strong></p>
<p>Copy and Paste the registration number from your order email.</p>
<p><strong>Name/Email Address</strong></p>
<p>Enter your name / email address in case we need to email you updates.</p>
<p>After you have completed all fields, click SUBMIT to create your account. You can then use the module creator to create your module.</p>
<p>3. <strong>Create Module</strong> using the username/password you made in step two.</p>
<p>After you have set your username and password, you can create module which will be later sent to your remote PC as an email attachment if you deploy remotely. To get started, go to your order email and there will be a link to download the module creator program. Click the link and install this small program. Once you are inside the module creator your screen will look something like the screen shown in the outline below.</p>
<p>The module creator consists of five screens which you can navigate by clicking BACK or NEXT on the program itself. Follow the five screens (steps) as outlined below. The program also includes instructions on each step.</p>
<p>Step 1: Validate Account</p>
<p>Enter the username &amp; password you created during registration.</p>
<p>Step 2: Logging Settings</p>
<p>Choose the activities you wish to monitor.</p>
<p>Step 3: Alert Options</p>
<p>Choose whether or not to alert reminder the user.</p>
<p>Step 4: Create Module</p>
<p>Click browse &amp; choose a location and name to save your module.</p>
<p>Step 5: Setup Complete</p>
<p>The module is ready to be deployed. Don't execute it!</p>
<p>4. <strong>Deploy Module</strong> by attaching it to an email or deploying locally.</p>
<p>The information in this section will assist you in deploying to your remote PC. For help on installing onto your local PC (rather than remote) then please see the next section.</p>
<p>Step 1: Create a New Email</p>
<p>Open your email program. Click the create mail button from within the program. Then choose your email from and to addresses. The To: address would be the address of your child or employee on your remote PC.</p>
<p>Step 2: Enter Email Contents</p>
<p>Type a subject and regular email text to instruct your child or employee to run the file.</p>
<p>Step 3: Insert Attachment</p>
<p>Click "Attach" and navigate to and select the module file you created. It will be saved in the location you chose when you created your module. The module file can be named whateveryouwish.exe where "whateveryouwish" is any name you choose.</p>
<p>Step 4: Click Send</p>
<p>After you have filled in the appropriate fields, entered a subject and email contents and have inserted the module attachment, click the Send button to send the email to the remote computer.</p>
<p>Step 5: Wait for Installation</p>
<p>After you have sent the email then you will need to wait until your child or employee runs the program. After they have executed the module then it will install and start uploading results so you can view activity.</p>
<p>5. <strong>View Activity</strong> by waiting until module is executed and then logging in.</p>
<p>After deployment you should wait some time until your child or employee runs the module. This can be minutes or hours. Once they run the module, activity will start showing in your account within fifteen minutes. You can log into your account anytime to check for results.</p>]]></description>
      <pubDate>Wed, 03 Apr 2013 02:20:12 +0000</pubDate>
    </item>
  </channel>
</rss>
