To reset your personal access previously done, you can use "Options" / "My personal access" :
In the "Personal access" window, click on "Reset my password" :
Notice that all the previously created containers will open with the old access.
The windows shown are from the Windows version, but are similar in Linux and MacOS X versions.
All file formats are accepted. Zed! imposes no limits in this regard: it will encrypt and compress all file types, whatever their format (Office, PDF, exe, image file, sound file, etc.).
To create a container, run the application (Zed! PRO or Zed! FREE, as the case may be) and click on [New container]. A window opens in which to enter a name for this encrypted container and define
its location. Note that the extension of the created container is ".zed". You then simply need to add one or more files (or, indeed, folders), define one or more accesses for your correspondents, and
you're ready to send your .zed file by e-mail.
You can perform this operation in several ways: by copy/pasting the "source" files in the .zed (the keyboard shortcuts [Ctrl-C/Ctrl-V] can also be used); by drag/dropping the "source" files to the
container; by using the pop-up menu option [Add ...] available by right-clicking on the container background (in this case, a window pops up allowing you to browse through your file structure and
select the "source" files).
Is it possible to quickly delete all the folders and files contained in a .zed?
Yes. To do so, right-click on the container and select "Empty the container". This functionality is also accessible from the .zed container menus.
You can use the traditional method, too: select all the folders and files in the .zed and choose the "Delete" menu item or hit the "Del" key on your keyboard.
Is it possible to send folders, subfolders and files?
Zed! can be used to send an entire tree structure of folders and subfolders. The Zed! Free version supports up to 200 files and 200Mb of data. For more than that, you need to buy the Zed! PRO
version.
Can a .zed container contain a file tree structure?
A .zed container may be considered in the same way as a "regular" folder: it can contain as many files as you like (the FREE version supports up to 200 files and 200 MB of data; for more than that,
use Zed! PRO), of all types (there are no restrictions), and which may be filed in folders and subfolders.
You will also find most of the classic operations associated with "Windows" folders: copying one or more files/folders; moving them around or cut&pasting them elsewhere (inside or outside the
container); renaming files or folders; deleting them, etc.
A container is therefore handled in a very similar way to a traditional folder, the difference being that it is "transportable" and that its content is both compressed and encrypted (AES 256
encryption algorithm) and so you need a key to access it.
I've sent a secure .zed container to a client. How can he open it?
If your client is not yet equipped with Zed!, he simply needs to download and install the Zed! Free version available from the site. You also need to provide him (by phone or by text message, for
example) with the password that you have allocated to him in the .zed container. He will then be able to open the .zed that you have sent him and continue to exchange any confidential data with you
in complete security.
Where can I obtain the free version of Zed! for my customers and partners?
The free version of Zed! is available from this site on the Zed! Free Download page. Available for all operating systems, .zed encrypted containers are universal.
The "New folder" button allows you to create a new folder in the container. The .zed containers accept folder and subfolder tree structures containing several levels.
You can also copy/paste a tree structure of folders and files already on your workstation to the encrypted container.
The "Add" button allows you to browse through your computer and select the file that you wish to add to this Zed! container. Adding a file consists in copying the source file on your computer,
compressing its content, encrypting it and adding it to the .zed container.
Afterwards, you need to add accesses for the people meant to open and read the files contained in this Zed!.
This operation lets you delete a file from the container. If a folder is deleted, all the files (and folders) it contains will also be deleted.
Warning: for obvious security reasons, files deleted from a Zed! container are not placed in the Recycle Bin.
Extraction consists in decrypting, decompressing and extracting the selected files to a specific location on your local computer or on a network location you are connected to.
Extraction maintains the tree structure of the stored and protected files in the .zed container.
The "Extract all" button is used to extract the entire content of the container. Zed! decrypts, uncompresses and deposits a copy of all the files in the container at the location you previously
chose. By default, the software suggests complete extraction in the folder containing the .zed for extraction.
Extraction maintains the tree structure of the files stored and protected in the .zed container.
Encryption prevents files from being read by anyone other than the recipients who are fully authorized and identified for their access. The "Access" function is used to display the Authorized
accesses window for managing access to the container. You can define as many accesses as you need, of any type (password, key file and token), and manage them.
A watermark image is an image that can be seen in the background of the .zed containers. The default background image of .zed containers is a green padlock.
You can define your own particular container background image, and ensure that this image is "embedded" in the container. It means that it is shipped with the container, a different disk drive will
see this image. You may select one of the images supplied with the software or choose one of your own, such as your logo for custom branding, for example.
This function is used to open the container and access its content. To do so, the software asks for your personal access key that allows you to open your Zed! electronic vault. Your access key may be
a password, a key file or a private key protected by a token.
Can I customize the display of my Zed! containers?
Yes, it is entirely possible to customize .zed containers.
By default, the containers have a default background image (green padlock). Users may replace this background image (or watermark) with their logo or any other image of their choice, or else select
from the library of background images supplied with the Zed! encryption software.
Why are the names of the files and folders contained in a .zed archive coloured green?
In order to distinguish between the classic file Explorer and that of the .zed encrypted containers, the names of the folders and files stored in a Zed! container are coloured green.
Zed! is an encryption application that allows the files and data that it contains to be protected from unauthorised access. The contents of a .zed should therefore be handled with discretion. By
having the file names displayed in green, users are constantly reminded that the displayed files have a specific status and that precautions need to be taken.
For example, deleting a file in a .zed does not send it to the Recycle bin: the deletion is immediate and definitive.
Why is a .zip with the same content as a .zed container slightly smaller?
Zed! supports the management of multiple accesses, with several accesses of different types in the same container. You can configure as many recipients with different passwords as you like. This
takes up a little storage space, but the size is negligible (just a few bytes).
The version and the build are indicated in the name of the executable file you downloaded (e.g. Setup Zed! Pro 1.0 x86 (b170)
stands for version 1 build 170).
The Zed! version and builds are also displayed by clicking on the "Help" button in a Zed! container, then "About …"