The Executables tab allows you to define the e-mail, fax, encryption, and decryption programs that are available to use with your system.
Complete the fields on the Executables tab:
Encrypt – enter the name of the encryption program. Encryption is the conversion of data into a form, called a cipher, that cannot be easily intercepted by unauthorized people.
Decrypt – enter the name of the decryption program. Decryption is the process of converting encrypted data back into its original form, so it can be understood. To recover the contents of an encrypted message, the correct decryption key is required. The key is an algorithm that translates the work of the encryption algorithm. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the decryption key.