|
||||
Online Keys |
Para Español clic aqui For other languages visit the Online Keys home |
|||
| Compatibility Configuration Add Replace Remove What is the clipboard Clipboard Clean Oops! Reset Link Open Security Capture License Registering |
||||
|
|
||||
| |
||||
| Compatibility | ||||
| The Import command found on the menu is purposelly disabled and can not be enabled by the user. This command was used to import databases from older versions. No longer supported. | ||||
| Registering Online Keys | ||||
| This is a 20 day evaluation version of Online Keys. To use the product with
no time limitations you need to pay for a license. When you do, we will send you instructions to unlock the time restrictions, remove banners, registration reminders etc. To register your copy please visit Online Keys area on our Internet website at http://citywidemall.com/isinetsoftware/ok . |
||||
| What is the clipboard | ||||
| The clipboard is a temporary buffer to store readily available information.
You can store virtually any amount of text data on the clipboard for later use for as long as the content is not
replaced and Windows is running. There are about 4 methods to manually load the clipboard. Consult MS Windows Help for additional information. Check out "Isi Clip It" which is a full-featured clipboard manager. There is an evaluation version you can download at http://citywidemall.com/isinetsoftware/clipit |
||||
| |
||||
| Clipboard | ||||
| With Online Keys the clipboard can be loaded with a Username, Password or
Path. To do this, just click on the nametag next to the input line that contains the information. If the click was successful, the nametag color will change to red and will stay on that color until you click another clipboard-enabled nametag or you clear the clipboard. The purpose of coloring is mainly to remind you which was the last information you loaded into the clipboard. If you have stored confidential information on the clipboard, clear it up as soon as it is no longer needed to avoid pasting it somewhere else by mistake. |
||||
| |
||||
| Clipboard Clean | ||||
| To clear the clipboard, just click anywhere on the Online Keys display where
there is a plain surface. When all name tags switch color to black, the clipboard is empty. Note: If you load the clipboard with information from another application and you do a clipboard clean up with Online Keys, the clipboard will be cleared up and the information will be lost. If you clean the clipboard using another method, the nametag on Online Keys will not switch color back to black but whatever information had the clipboard will be lost. Information present on the clipboard will remain unaffected when you quit the program. |
||||
| |
||||
| Link Open | ||||
| You can store a Path (web address or PC directory path) on the input line
with the nametag Path. Double clicking the mouse on the Path nametag will open a browser instance and attempt to load that web site. It will only succeed if there is a live Internet connection. If the line contains a path to a local disk, explorer will pop open and display the content of that folder. If the line points to a file (ej: c:/my documents/mypict.jpg), Windows will attempt to display the picture. If the line points to a program (ej: c:/windwows/notepad.exe), that program will launch. |
||||
| Alternately you can use this line to store a path to a program that requires login and password authentication to run. Double clicking the nametag will call that program to run. | ||||
| |
||||
| Reset Button | ||||
| It clears up all input lines and resets special commands. No other content is affected. |
||||
| Add Button | ||||
| Includes the information into the database. It will remain disabled until all required information is filed. |
||||
| |
||||
| Replace Button | ||||
| Will replace the entire content of an item. An Item is the entire content. Username, Password, etc. | ||||
| Remove Button | ||||
| It deletes the entire content of an item from display and from the database. | ||||
| |
||||
| Configure Button | ||||
|
|
||||
| |
||||
| Security You can set the program to open upon successful password verification and to encrypt the database as well. Normally, the database is encrypted with a special security algorithm and cannot be viewed by any means other than trough Online Keys. However, it can be transported to other computer and be opened with Online Keys if it is installed on that computer. You can instruct Online Keys to enforce a deep encryption on the data base and open it only with your password. In this way the database is useless in another computer without your password. The security interface allows to set a password of your choice or to generate it with the included engine. You can use this screen also to generate passwords to be used with other services. The password generation engine comes with 3 levels. Level 1 ( 6 characters ) Level 2 ( 8 characters ) Level 3 ( configurable length ) To begin generating passwords, click on Suggest Password chose the security level and click on the Go button. If you are not satisfied with a particular result, click the Go button to generate a new one. Or change the security level and try again. Once the password is generated, the result will be shown in upper and lower cases. You can use any of them. However, if you do not choose one, the program will use the one on the left side. If you rather want to use the one in lower cases, move it to the left side of the line, deleting the one in upper cases and remove the parenthesis. An expiration date can be set for a determinate password. This feature might increase local security depending on your particular needs. The program will alert you when the password expiration date has reached, provided the program is running on that day and that you have set one. At that moment you shall go back to the Security configuration interface to renew or set up a new password and expiration date. The right format for a date on the Configuration screen is month-day-year written as mm-dd-yyyy. For example 09-25-2001 is an accepted date. Do not use other conventions or the program might not behave as expected. The reach section sets your preferences for what part of the program are to be protected. If Program only is chosen, the database will have the standard encryption only and the program will request a password before opening. If Program and Database are chosen, the database will be encrypted with the higher encryption method and the program will also request a password in order to open. If none is set, the program will open without asking for a password and only the basic encryption will affect the database. If you use the interface to generate passwords to be used in other applications, remember NOT to press the Accept button or the program will replace the password you have set for Online Keys. |
||||
| |
||||
| Oops! | ||||
| Oops is the equivalent to the Undo command. Oops will affect only the input fields. The main display or database will not be affected nor changed just by using a Oops to recall an old line. |
||||
| Capture | ||||
| The Capture function will transfer the content of the clipboard to the input
line that has focus at the time. This facilitates the addition of a service to the program. For example you can enable this function and then copy from other applications the data you want to transfer to Online Keys interface. Click the left-mouse-button over the line where you want to do the transfer then go to the other application, highlight and copy the text. |
||||
| IsiNet Software http://citywidemall.com/isinetsoftware/ok http://www.geocities.com/isiprograms |
||||
| |
||||