User Manual

K
K
K
G
G
G
U
U
U
A
A
A
R
R
R
D
D
D
S
S
S
T
T
T
A
A
A
N
N
N
D
D
D
A
A
A
L
L
L
O
O
O
N
N
N
E
E
E
D
D
D
V
V
V
R
R
R
S
S
S
H
H
H
A
A
A
-
-
-
1
1
1
0
0
0
4
4
4
.
.
.
V
V
V
2
2
2
/
/
/
1
1
1
0
0
0
8
8
8
.
.
.
V
V
V
2
2
2
U
U
U
S
S
S
E
E
E
R
R
R
M
M
M
A
A
A
N
N
N
U
U
U
A
A
A
L
L
L

www.kguardsecurity.com
All Rights Reserved

                 














                







                 

Insert included CD into CD-ROM, and then click onRemove OCX Tool” icon, and you will find
the file ”RM_SHA_OCX. Then close the IE browser and click it.


Приложение H – Список e-mail серверов
Информация ниже для примера
Web-сайт E-mail адрес
Сервер отправки
25
Сервер получения
110