MagySecure 2004 Documentation

Getting Started
Securing Files
Securing Folders
Distributing Files & Folders


Step 1.

When the "Registration" window appear press "Next" button to go to the next step.

Step 2.

The second step is the "License Agreement". Read it carefully before going forward. If you do not agree to be bound by the terms of the license agreement, then do not install or use the software. But if you agree to be bound by the terms of the license agreement then click "I Agree" and then "Next" button.

Step 3.

In the third step you have to fill in your information. In field "Name" write your full name. In field "Company" write your company name, in field "E-Mail" write your e-mail address. Note that the e-mail address will be used to transfer business information if needed, so check it after writing it. In fields "Prod. ID" and "Serial #" enter the "Product ID" and "Serial Number" of your copy of MagySecure 2004, which is written in "MAGY® SOFTWARE END USER LICENSE AGREEMENT AND PRODUCT INFORMATION" documentation (given to you when purchasing the product on CD) or given to you when purchasing online. After you have filled in the form click "Next" button.

You will be asked to confirm your e-mail address. Once more check that it is correct and click "Yes".

Step 4.

Now you just need to wait while MagySecure 2004 communicates with the server for registering the product.

Step 5.

Congratulations! Now your copy of MagySecure 2004 is registered and you are able to use the software as much as you want.

Note: There are technological measures in this Software that are designed to prevent unlicensed or illegal use of the Software. You agree that Magy may use those measures and you agree to follow any requirements regarding such technological measures. You may also need to reregister the Software if you modify your computer hardware or alter the Software. Product registration is based on the exchange of information between your computer and Magy. None of this information will be used to identify any personal information about you or any characteristics of your computer configuration.

Next Chapter
Home     |     MagySecure 2004     |     Weak Chain II     |     MagyPath

Copyright 2005 Magy, Inc. All Rights Reserved.