Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Here are the following main parts:

  1. Package title, if filled in by the sender. If not, the package ID will be displayed.

...

  1. Actions concerning the package, such as: Forward the package, Add recipients to the package, Edit the package, Add files to the package and Delete the package (only those that make sense for the specific package are shown).

  2. Information about the sender and recipients of the package. If the package is private, recipients can be removed by clicking the X next to their email. After removal, they can no longer access the package.

  3. Other detailed package information, including:

    • State: It indicates the state of the package. For details, see Package states.

...

    • Encryption status: if the package is encrypted with the package password, it is stated so here. The administrator must enable this feature, for it to be available. For more see Encrypt the package data with the package password.

    • Package integrity: Shows the result of the last data integrity check and optionally an icon for executing a new integrity check (if the administrator enabled this). The integrity check computes current checksums for all files in the package and compares those to the original checksums computed when files were uploaded. Possible states are:

      • The integrity of the package data has not been checked yet. - Checksum not yet computed and verified.

      • The integrity of the package data is OK. - Checksum computed and verified to match.

      • The integrity of the package data is compromised. - Checksum computed and differs from the original.

      • The integrity of the package data cannot be verified. - Checksum cannot be computed (file inaccessible).

    • Package access: Shows whether the package is public

...

    • , internal or private. Affects package accessibility, see description in

...

    • Send a package as a logged-in user.

    • Uploaded: The date and time the package was uploaded by the sender.

    • Package ID: A unique ID that uniquely identifies a particular package.

    • Name: The name/title of the package, filled in by the sender. It is optional.

    • Total size: The total size of all package files together.

    • Password protected: Whether the package is password protected or not. If so, it cannot be accessed, and the files cannot be downloaded without entering a password.

    • Download link: A unique link for this package, under which it can be viewed and downloaded. It can be copied and sent to recipients. However, for the link to work, the

...

...

    • .

...

    • Finally, you can see when the package is automatically deleted (expires). You will no longer be able to download it after that. The administrator may still be able to restore the package, depending on the configuration (The package is in the recycle bin.).

  1. The button allows you to

...

  1. download

...

  1. a ZIP archive containing package files. The function is suitable for packages with a large number of files, so that there is no need to download files individually. Files larger than the specified size (set by the administrator) will not be included in the ZIP archive.

...

  1. The icon for immediate start of a new data integrity check of all the files in the package. For details see section 4. If the package is big, the check may take a long time.

  2. List of files in the package:

    • First the active files are listed.

    • Below, the deleted files may be listed (if it is a package sent by the user and an administrator enabled users to delete files in their sent packages).

    • Click the blue file name to download the file

...

    • . Files which are quarantined, deleted, or from own sent packages (if an administrator prohibited this) cannot be downloaded.

    • Clicking the plus icon expands the detailed file information about the file.

      • The administrator can permit a user to display even the detailed results of file checks using the detection engines (antiviruses, sandboxes). By default this is not allowed for users.

    • In the file integrity column, there is an icon representing the result of the last integrity check, an icon for copying the checksum of the file to the clipboard and optionally an icon for immediate start of a new data integrity check of the file (if the administrator enabled this).

    • If the administrator allowed this, the active file list for sent packages may contain an action icon on the right of each file, which enables the sender to:

      • Rename the file.

      • Delete the file. A deleted file cannot be restored by the user, but the user can add it again as a new file.

    • If the administrator has activated the CDR module for converting files to a safe format, the list of files in the package may additionally display:

      • For compatible files set by the administrator, a safe copy in PDF format without active content will be created. This is indicated by a PDF icon: image-20240325-153946.pngImage Added. By clicking on it, you can download this safe PDF copy.

      • If deleting of the original files is enabled, only this safe PDF copy may be displayed in the list of active files instead of them. This can be recognized by the file having a .pdf extension and "Safe Copy" displayed in the Status column.

Before any download of an archive or a file, the user might be requested to enter his login password again. This is specified by setting the permissions by the application administrator.