Go to page of
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Ironkey Basic D250, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Ironkey Basic D250 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Ironkey Basic D250. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Ironkey Basic D250 should contain:
- informations concerning technical data of Ironkey Basic D250
- name of the manufacturer and a year of construction of the Ironkey Basic D250 item
- rules of operation, control and maintenance of the Ironkey Basic D250 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Ironkey Basic D250 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Ironkey Basic D250, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Ironkey service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Ironkey Basic D250.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Ironkey Basic D250 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
P A GE 1 IR ONKEY USER GUIDE IR ONKEY P ersonal User Guide Models S200, S100 D200[...]
-
Page 2
P A GE 1 IR ONKEY USER GUIDE Thank y ou for y our inter est in Ir onK e y . Ir onK ey is committed to cr eating and dev eloping the best security technologies and making them simple-to-use , affor dable , and a vailable to e ver y one . Y ears of r esear ch and millions of dollars of de velopment ha v e gone into bringing this technolog y to y ou i[...]
-
Page 3
P A GE 2 IR ONKEY USER GUIDE CONTENTS What is it? ................................................ 3 Meet the Ir onK ey ....................................................... 3 Core F eatur es .......................................................... 3 Device Diagrams ....................................................... 5 T echnical and Securi[...]
-
Page 4
P A GE 3 IR ONKEY USER GUIDE What is it? Meet the Ir onK ey The Ir onK ey P ersonal Secure Flash Driv e, designed to be the w orld’ s most secur e USB ash drive, protects y our data, passw ords, and Internet privacy with some of toda y’ s most advanced security technologies. Even if your Ir onK e y is lost or stolen, your data r emains prote[...]
-
Page 5
P A GE 4 IR ONKEY USER GUIDE P ortable Cr oss-Platform Data Access The Ir onK ey Unlock er allows y ou to access your encrypted les on Windows 2000, XP , Vista, Mac OS X and n umerous distributions of Lin ux. Simple De vice Manag ement Y our IronK e y includes the IronK e y Control Panel, a central launchpad for launching your a pplications, edi[...]
-
Page 6
P A GE 5 IR ONKEY USER GUIDE De vice Diagrams The Ir onK ey has been designed fr om the ground up with security in mind. A combination of advanced security technologies ar e used to ensure maximum pr otection of y our data. Additionally , the IronK ey has been designed to be ph ysically secur e, to pr ev ent hardwar e-le vel attacks and tampering, [...]
-
Page 7
P A GE 6 IR ONKEY USER GUIDE T echnical and Security Notes W e are endea v oring to be very open about the security architectur e and technology that we use in designing and building the Ir onK ey devices and online ser vices. There is no hocus-pocus or handwa ving here. W e use established cr yptographic alg orithms, we de velop thr eat models, an[...]
-
Page 8
P A GE 7 IR ONKEY USER GUIDE Identity Manag er Pr otection The Ir onK ey Identity Manager and my .ironk ey.com w ork together , giving you the ability to back up y our online passw ords to y our Online Security V ault at my .ir onk ey .com . First, you m ust unlock your Ir onK ey de vice, which requir es tw o-factor authentication. Y our passwor ds[...]
-
Page 9
P A GE 8 IR ONKEY USER GUIDE Secure Sessions: Making T or F aster and More Secur e Ir onK ey maintains a secur e , private T or network with its o wn, high- performance servers (separate fr om the public T or network). This impr ov es the overall security in at least tw o wa ys: Since Ir onK ey contr ols the “exit-node” in your encrypted T or c[...]
-
Page 10
P A GE 9 IR ONKEY USER GUIDE Ho w does it work? Pr oduct W alkthr ough Y our IronK e y Personal Secur e Flash Driv e consists of the following components: » Ir onK ey Unlock er (Windows, Mac and Linux) » Ir onK ey Contr ol P anel (Windows and Mac) » Ir onK ey Virtual K e yboard (Windo ws only) » Mozilla Firef o x and IronK e y’ s Secur e Sess[...]
-
Page 11
P A GE 10 IR ONKEY USER GUIDE 3 Create a de vice passw ord and a nickname for y our Ir onK ey . Because y ou can ha ve multiple Ir onK eys associated with one Ir onK ey account, the nickname helps you distinguish between diff erent Ir onK ey de vices. Y our passw ord is case-sensitiv e and must be at least 4 characters in length. The threat of brut[...]
-
Page 12
P A GE 11 IR ONKEY USER GUIDE USING THE IRONKEY UNLOCKER ON WINDO WS The Ir onK ey Unlock er allows y ou to securel y access your les on m ultiple operating systems. It pr ompts you f or your pass wor d, securely validates it, and then mounts your secur e volume where all of y our les ar e stored on the Ir onK ey . Here is ho w to unlock your[...]
-
Page 13
P A GE 12 IR ONKEY USER GUIDE INITIALIZING AND A CTIV A TING Y OUR IR ONKEY ON A MA C If you pr efer to use a Mac, you can choose to initialize y our Ir onK ey on a Mac OS X computer : Step Description 1 Plug the Ir onK ey into y our computer’ s USB port. Y our IronK e y will run on Mac OS X (10.4+, Intel) computers. It can also be set up and use[...]
-
Page 14
P A GE 13 IR ONKEY USER GUIDE 6 Activate your m y .ironk ey .com account. my .ir onk ey.com is a secur e site where y ou can manage your Ir onK e y account and devices. Accessing my .ir onk ey.com r equires tw o-factor authentication (y our Ir onK ey and y our passwor d). 7 Follo w the onscreen dir ections to setup your m y .ironk ey .com account. [...]
-
Page 15
P A GE 14 IR ONKEY USER GUIDE INITIALIZING Y OUR IRONKEY ON LINUX If you pr efer to use a Lin ux computer , you can choose to initialize y our Ir onK ey on Linux: Step Description 1 Plug it into y our computer’ s USB port. Y our IronK e y can be initialized on Linux 2.6+ (x86 systems only). It can also be setup and used on Windows and a Mac. T o [...]
-
Page 16
P A GE 15 IR ONKEY USER GUIDE NO TE: ironkey only unlocks the secur e volume; it must then be mounted. Many modern Linux distributions will do this automatically; if not, run the mount program fr om the command line, using the de vice name printed by ironkey . T o change the passw ord of the Ir onK ey named “devicename, ” enter : ironkey --chan[...]
-
Page 17
P A GE 16 IR ONKEY USER GUIDE Step Description 1 Creating, editing, deleting secure les When you click “Secure Files” in the Ir onK ey Contr ol Panel, the default br owser on y our computer opens directl y to your secur e v olume . All les on your Ir onK e y are str ongly encrypted with militar y-grade AES encr yption. Encr ypting les [...]
-
Page 18
P A GE 17 IR ONKEY USER GUIDE 2 Updating device rmwar e/softwar e The Ir onK ey can secur ely update its softwar e and rmware thr ough signed updates that ar e v eried in hardwar e. This allows users to k eep their de vices up- to-date and pr otect themselves fr om futur e malwar e and online thr eats. T o check for a vailable updates, cli[...]
-
Page 19
P A GE 18 IR ONKEY USER GUIDE 5 Creating a Lost and F ound Message This featur e allows y ou to create a message that will appear on the Ir onK ey Unlock er window . In the ev ent that you lose y our Ir onK ey , someone can return it to you if y ou pr ovide y our contact information. 6 Changing y our device passw ord Y ou can change your de vice pa[...]
-
Page 20
P A GE 19 IR ONKEY USER GUIDE USING THE IRONKEY VIR TU AL KEYBO ARD (WINDO WS ONL Y) If you ar e using y our IronK e y on an unfamiliar computer and are concerned about k eylogging and scr eenlogging sp yware, use the IronK e y Vir tual K eyboar d, which helps protects y our passw ords b y letting you click out letters and numbers. The underlying t[...]
-
Page 21
P A GE 20 IR ONKEY USER GUIDE USING THE ONBO ARD FIREFO X AND SECURE SESSIONS SER VICE (WINDO WS) Since your Ir onK e y comes with a Firefo x web br o wser already onboar d, none of your cookies, histor y les, bookmarks, add-ons or online passw ords ar e stor ed on the local computer . Now you can car r y your personalized w eb experience with y[...]
-
Page 22
P A GE 21 IR ONKEY USER GUIDE USING THE IRONKEY IDENTITY MANA GER (WINDO WS ONL Y) The Ir onK ey Identity Manager secur ely stor es and uses many of y our most important identity credentials, including login information and one-time pass wor ds to applications and online accounts. With a click of a button, it automatically launches a specied app[...]
-
Page 23
P A GE 22 IR ONKEY USER GUIDE 2 Automatically logging into an account The next time you r eturn to a w ebsite or application for which y ou ha ve stor ed a passw ord, your login automatically lls in for y ou. If you ha v e the auto-login option enabled for that account, the Identity Manager also submits the login. Y ou can also automatically log[...]
-
Page 24
P A GE 23 IR ONKEY USER GUIDE USING THE SECURE BA CKUP SOFTW ARE (WINDO WS ONL Y) If your Ir onK e y is lost or stolen, you ha v e peace of mind knowing that your condential information cannot be seen by an yone but y ou. And getting y our data back is simple with Ir onK ey’ s Secure Backup softwar e , which, if enabled, securel y restor es y [...]
-
Page 25
P A GE 24 IR ONKEY USER GUIDE IMPOR TING A DIGIT AL CER TIFICA TE INT O THE IRONKEY (WINDO WS ONL Y) The Ir onK ey Cr yptochip includes a limited amount of extr emely secure har dwar e storage space , which can be used for storing the private k e y associated with a digital cer ticate. This pr ovides you with ad ditional str ong authentication c[...]
-
Page 26
P A GE 25 IR ONKEY USER GUIDE 4 Note that Ir onK ey’ s certicate is a vailable her e . Now y ou can add y our own. Click the “Impor t” button. 5 Br owse to the PKCS#12- format certicate le and open it. Y ou will be prompted f or the location of the PKCS#12- format certicate le (le extension will be .p12 in UNIX/ Linux, .pfx [...]
-
Page 27
P A GE 26 IR ONKEY USER GUIDE USING MY .IRONKEY .COM (WINDO WS AND MA C) Y our IronK e y suppor ts advanced cr yptographic authentication using str ong PKI k ey pairs generated in the Ir onK ey Cr yptochip . When you log into m y .ir onke y .com fr om y our device, it uses these unique k eys as y our digital identity cr edentials. This locks down y[...]
-
Page 28
P A GE 27 IR ONKEY USER GUIDE 4 Monitoring account activities The Account Dashboard sho ws you the r ecent activities on your account, such as logins, failed passw ord attempts, and when your de vice passw ord has been r ecov ered. 5 Enabling Account Aler ts for r eal-time account monitoring Y ou can enable a number of Account Aler ts for additiona[...]
-
Page 29
P A GE 28 IR ONKEY USER GUIDE USING Y OUR IRONKEY IN READ-ONL Y MODE (WINDO WS, MA C , LINUX) Y ou can unlock your Ir onK ey in a r ead-only state such that les on y our Ir onK ey cannot be edited. An example of when this is useful is when you want to access a le on y our Ir onK ey while using an untrusted or unknown computer . If you unlock [...]
-
Page 30
P A GE 29 IR ONKEY USER GUIDE * Adver tised capacity is appro ximate and not all of it will be available for storag e . Some space is requir ed for onboard softw are. Pr oduct Specications For details about y our device, see “About Ir onK ey” in Ir onK ey Contr ol Panel Settings. CAP A CITY* Up to 32GB, depending on the model DIMENSIONS 75mm[...]
-
Page 31
P A GE 30 IR ONKEY USER GUIDE What’ s next? In many wa ys, that’ s up to y ou. W e ar e focused on building not only the world’ s most secure ash driv e, but also enabling technologies that are simple and enjo yable to use. Y our feedback r eally matters to us, and we car efully r evie w all featur e requests and customer f eedback for pri[...]
-
Page 32
P A GE 31 IR ONKEY USER GUIDE Contact Information Pr oduct F eedback F eature Requests feedback@ironk ey .com featur erequest@ir onk ey .com Ir onK ey Online IronK e y Suppor t https://my .ir onk ey.com https://suppor t.ir onk ey .com https://learn.ironk ey .com suppor t@ironk ey.com https://suppor t.ironk ey .com 5150 El Camino Real, Suite C31 htt[...]