MXC Software Logo  
MXC Software provides low cost software to protect your digital assets.  
HomeSolutions/ProductsDeployment/InstallationAbout CryptographyUser ManualTutorialFAQ

  Getting Started
  Login and Logout
  Managing Keys And Certificates
  Working With Certificate Authorities (CAs)
  Exchanging Certificates/Public Keys
  Signing and Encrypting Your Files and Folders
  Signing and Encrypting Your Emails
  Working With Archives
  Managing Your Online Account
  Using the Personal Information Editor
  Wiping Files and Cleaning Disk Free Space
  Other Microsoft Outlook Support
  Using Security Tokens
  Changing Options
  Changing Pass Phrase

Changing Options

If you want to change the software settings, such as changing the encryption algorithm, you use the options dialog box.

  1. Login if you are not currently logged in
  2. Locate the golden lock icon on the taskbar
  3. Right click your mouse button on the lock
  4. Select Change Options from the popup menu
  5. Change options and then click OK to accept your changes; or click Cancel to discard your changes.


This tab shows you

  1. The full path of the profile you are using
  2. The registration code (RegCode), and
  3. Auto Logout settings

They are pretty straightforward and need no further explanation.

A Note About Auto Logout: After the specified number of minutes of inactivity iSafeguard™ will log you out automatically. However if there are active iSafeguard™ message boxes, dialog, progress window, etc. iSafeguard™ will not logout automatically until you close all of them, to avoid data loss.


This tab allows you to change the default encryption and signature algorithms.

The encryption algorithm is the algorithm that is used to encrypt a message or file when you choose "Encrypt" or "Sign & Encrypt". The signature algorithm is the algorithm that is used to generate a signature of a message or file when you choose "Sign" or "Sign & Encrypt".

The software support three encryption algorithms and two signature algorithms listed in the following tables.

Encryption Algorithm Key Length (Bits) Salt
Triple-DES 168 Not allowed
RC2 128 Not added
RC4 128 Optional

Signature Algorithm Description
sha1RSA SHA1 hash algorithm plus RSA
md5RSA MD5 hash algorithm plus RSA


Hotkeys are used for signing and encrypting emails, filling forms, etc.

  • To disable a hotkey un-check the related check box.
  • To enable a hotkey check the related check box.
  • To change a default hotkey enter your customized character in the related edit field. The character must be from A to Z.

Your changes will take effects immediately after you click the OK button.

Files & Folders

This tab gives you control over what to do after signing and encrypting files, decrypting and verifying encoded files. The available file wiping options are also shown in the tab. You can include folders and sub-folders for the selection action. You can also choose to wipe the original files when the action is completed for each file.

Warning before wiping check box: if checked the program will ask you for confirmation before wiping files. It is a good idea to keep it checked because when a file is wiped you cannot get it back.

Include subdirectories check box: if checked the files in the subdirectories are also wiped recursively.

Number of passes: is the number of times a file is overwritten when wiping. Normally 3 are enough for most people. With extremely sensitive data, you may increase the number.


The Certificate tab has three check boxes:

  1. Allow using certificates on my computer: When checked the certificates on your computer will be available to sign and encrypt data.
  2. Trust root CA certificate on my computer: When checked all root CA certificates in the ROOT store on your computer will be trusted automatically.
  3. Enable searching CA certificates from the Internet: When checked the software will try to find CA certificates from known Internet Directory Services if it cannot find them in your profile and your computer.


From this tab you can

  1. Setup automatic CRL update interval
  2. Enable CRL checking, and
  3. Enable CRL update at the time a CRL is used

Again this tab is pretty much self-explanatory.


This tab allows you to choose how much information you want iSafeguard™ to save to the log file. The log file name is 'iSafeguard.log' and is located under "My Documents". Once again this tab is self-explanatory.

Trademarks Copyright 2001-2007 MXC Software. All rights reserved.