Appreciate CryptoPro CSP. Pokrokova installation with programs without installation disk CryptoPro csp version 3.6 r4

CryptoProvider CryptoPro CSP features for:
  • authorization and protection of the legal significance of electronic documents when exchanging them between criminals, with the help of other registration procedures for the formulation and revision of the electronic digital signature (EDS) up to GOST R 34.10-94.
  • security of confidentiality and control of the integrity of information for additional encryption and security, subject to GOST 28147-89; securing the authenticity, confidentiality and protection of TLS;
  • control of the integrity, system and application software security for the purpose of detecting unauthorized changes, for example, the failure of the correctness of the function; management of key elements of the system in accordance with the regulations for the acquisition.

Key noses for CryptoPro CSP

CryptoPro CSP You can vikoristovuvatisya spilo with no key sockets, and more often for everything in keynotes vikoristovuvatya Windows registry, flash drives and markers.

Naybіlsh unburned and hand-held key noses, such as vikoristovuyu spіlno s CryptoPro CSP, Є tokens. The stench allows you to manually and infinitely secure your electronic signature. Tokens are in such a rank that they can be found in the case of stealing, but you cannot be quick with your certificate.

Pidtrimuvani CryptoPro CSP key noses:
  • floppy disks 3.5 ";
  • processor cards MPCOS-EMV and Russian intellectual cards (Oscar, RVC) for smart card readers, which accept the PC / SC protocol (GemPC Twin, Towitoko, Oberthur OCR126 and in.);
  • Touch-Memory tablets DS1993 - DS1996 with Akord 4+ attachments, electronic lock "Sobol" or attachments for reading Touch-Memory DALLAS tablets;
  • electronic keys with USB interface;
  • changeable media with USB interface;
  • Windows OS registry;

Digital signature certificate for CryptoPro CSP

CryptoPro CSP Correctly, the certification is carried out with certificates issued for all purposes up to GOST, and this means a large number of certificates issued by the approved center in Russia.

In order to learn how to use CryptoPro CSP, you will need a digital signature certificate. I still haven't gotten a digital signature certificate, it is recommended to you.

Windows operating systems

CSP 3.6 CSP 3.9 CSP 4.0
Windows 10 x86 / x64 x86 / x64
Windows 2012 R2 x64 x64
Windows 8.1 x86 / x64 x86 / x64
Windows 2012 x64 x64 x64
Windows 8 x86 / x64 x86 / x64 x86 / x64
Windows 2008 R2 x64 / itanium x64 x64
Windows 7 x86 / x64 x86 / x64 x86 / x64
Windows 2008 x86 / x64 / itanium x86 / x64 x86 / x64
Windows Vista x86 / x64 x86 / x64 x86 / x64
Windows 2003 R2 x86 / x64 / itanium x86 / x64 x86 / x64
Windows XP x86 / x64
Windows 2003 x86 / x64 / itanium x86 / x64 x86 / x64
Windows 2000 x86

Adapted UNIX-specific operating systems

CSP 3.6 CSP 3.9 CSP 4.0
iOS 11 ARM7 ARM7
iOS 10 ARM7 ARM7
iOS 9 ARM7 ARM7
iOS 8 ARM7 ARM7
iOS 6/7 ARM7 ARM7 ARM7
iOS 4.2 / 4.3 / 5 ARM7
Mac OS X 10.12 x64 x64
Mac OS X 10.11 x64 x64
Mac OS X 10.10 x64 x64
Mac OS X 10.9 x64 x64
Mac OS X 10.8 x64 x64 x64
Mac OS X 10.7 x64 x64 x64
Mac OS X 10.6 x86 / x64 x86 / x64

Android 3.2+ / 4 ARM7
Solaris 10/11 x86 / x64 / sparc x86 / x64 / sparc x86 / x64 / sparc
Solaris 9 x86 / x64 / sparc
Solaris 8
AIX 5/6/7 PowerPC PowerPC PowerPC
FreeBSD 10 x86 / x64 x86 / x64
FreeBSD 8/9 x86 / x64 x86 / x64 x86 / x64
FreeBSD 7 x86 / x64
FreeBSD 6 x86
FreeBSD 5
LSB 4.0 x86 / x64 x86 / x64 x86 / x64
LSB 3.0 / LSB 3.1 x86 / x64
RHEL 7 x64 x64
RHEL 4/5/6 x86 / x64 x86 / x64 x86 / x64
RHEL 3.3 spec. zbirka x86 x86 x86
RedHat 7/9
CentOS 7 x86 / x64 x86 / x64
CentOS 5/6 x86 / x64 x86 / x64 x86 / x64
TD OS AIS FSSP Russia (GosLinux) x86 / x64 x86 / x64 x86 / x64
CentOS 4 x86 / x64
Ubuntu 15.10 / 16.04 / 16.10 x86 / x64 x86 / x64
Ubuntu 14.04 x86 / x64 x86 / x64
Ubuntu 12.04 / 12.10 / 13.04 x86 / x64 x86 / x64
Ubuntu 10.10 / 11.04 / 11.10 x86 / x64 x86 / x64
Ubuntu 10.04 x86 / x64 x86 / x64 x86 / x64
Ubuntu 8.04 x86 / x64
Ubuntu 6.04 x86 / x64
ALTLinux 7 x86 / x64 x86 / x64
ALTLinux 6 x86 / x64 x86 / x64 x86 / x64
ALTLinux 4/5 x86 / x64
Debian 9 x86 / x64 x86 / x64
Debian 8 x86 / x64 x86 / x64
Debian 7 x86 / x64 x86 / x64
Debian 6 x86 / x64 x86 / x64 x86 / x64
Debian 4/5 x86 / x64
Linpus Lite 1.3 x86 / x64 x86 / x64 x86 / x64
Mandriva Server 5
Buisness Server 1
x86 / x64 x86 / x64 x86 / x64
Oracle Enterprice Linux 5/6 x86 / x64 x86 / x64 x86 / x64
Open SUSE 12.2 / 12.3 x86 / x64 x86 / x64 x86 / x64
SUSE Linux Enterprice 11 x86 / x64 x86 / x64 x86 / x64
Linux Mint 18 x86 / x64 x86 / x64
Linux Mint 13/14/15/16/17 x86 / x64 x86 / x64

Adapted by algorithms

CSP 3.6 CSP 3.9 CSP 4.0
GOST R 34.10-2012 Statement of signature 512/1024 bit
GOST R 34.10-2012 Revision of signature 512/1024 bit
GOST R 34.10-2001 Statement of signature 512 bit 512 bit 512 bit
GOST R 34.10-2001 Revision of signature 512 bit 512 bit 512 bit
GOST R 34.10-94 Statement of signature 1024 bit *
GOST R 34.10-94 Revision of signature 1024 bit *
GOST R 34.11-2012 256/512 bit
GOST R 34.11-94 256 bit 256 bit 256 bit
GOST 28147-89 256 bit 256 bit 256 bit

* - up to version of CryptoPro CSP 3.6 R2 (collection 3.6.6497 from 2010-08-13) included.

Mind the licenses of CryptoPro CSP

Buy CryptoPro CSP, you will remove the serial number that you need to enter during the installation process or the settings with the programs. The term of the key must be kept under another license. CryptoPro CSP can be expanded in two options: with a license or a stringless one.

having bought a lineless license, You should take away the CryptoPro CSP key, the term will not be enclosed. If you buy it, you will remove the serial number CryptoPro CSP Whenever you are going to reach out to rock for a purchase.

KrіptoPro CSP 5.0 - Nové pokolіnnya CSP, rozvivayuche three osnovnі produktovі lіnіyki kompanії KrіptoPro: KrіptoPro CSP (klasichnі token i INSHI pasivnі skhovischa Secret klyuchіv) KrіptoPro PKU CSP / Rutoken CSP (neіzvlekaemie Kljuchi on tokens of zahischenim obmіnom povіdomlennyami) i KrіptoPro DSS (Kljuchi in chmari).

All product trips in every line are not only saved, but multiplied in CryptoPro CSP 5.0: a wider list of platforms and algorithms, more advanced code, handy for a corystuvach interface. Ale golovne - a robot with key noses, including keys in hmari, is now the same. For the transfer of the applied system, in whatever version of the CryptoPro CSP, be it a version, on the new keys with unused keys, if you do not need it, if you do not need the software key, you will need to access the interface. see exactly the same, as with the classic key nose.

Appreciate CryptoPro CSP

  • Formation and revision of the electronic signature.
  • Securing the confidentiality and control of the integrity of information for additional encryption and security.
  • Securing the authenticity, confidentiality and protection of the data according to the protocols, i.
  • Control of the integrity of the system and application software security for the user of unauthorized changes and the failure of new functions.

Adapted by algorithms

CryptoPro CSP 5.0 has an order with Russian implementations of foreign cryptographic algorithms. Now you may have the opportunity to choose keys for saving RSA and ECDSA secret keys.

Adapted technologies for the selection of keys

Hmarny token

The CryptoPro CSP 5.0 crypto provider now has the ability to retrieve keys, which can be accessed on the cold CryptoPro DSS service through the CryptoAPI interface. Now, the keys to getting in the cold can easily be victorious, like being corystuvatsky supplements, and more supplements from the Microsoft company.

Nose with unvarnished keys and stolen by exchange

CryptoPro CSP 5.0 has added support for noses with non-tight keys to implement the protocol SESPAKE It allows you to carry out authentication without transmitting the password of the keystroke to the current viewer, and set up the encryption channel for exchanging between the encryption provider and the carrier. A thief, if you are in the channel between the nose and the add-on of a koristuvach, you cannot steal the password when authenticating, or submitting the data. In case of victorious noses, the problem of unbreakable robots with non-intrusive keys is growing.

The companies Asset, InfoCript, SmartPark and Gemalto have broken new stolen tokens, which adapt the Danish protocol (SmartPark and Gemalto can be repaired with version 5.0 R2).

Nose with unvarnished keys

Bagato koristuvachіv want to mother the power of pratsyuvati with nevityaguvany keys, but at the same time don’t use tokens up to the level of PKU. Especially for them, the provider has added the support of the popular key carriers Rutoken ETSP 2.0, JaCarta-2 GOST and InfoCrypt VPN-Key-TLS.

List of virobniks and models of pre-installed CryptoPro CSP 5.0

List of virobniks and models of noses with non-intrusive keys for the ready-to-use CryptoPro CSP 5.0
company Nosiy
ISBC Esmart Token GOST
assets Rutoken 2151
Rutoken PINPad
Rutoken ECP
Rutoken ECP 2.0
Rutoken ECP 2.0 2100
Rutoken ECP 2.0 3000
Rutoken EDS PKI
Rutoken ECP 2.0 Flash
Rutoken ECP 2.0 Bluetooth
Rutoken ECP 2.0 Touch
Smart card Rutoken 2151
Smart card Rutoken ECP 2.0 2100
Aladdin R.D. JaCarta-2 GOST
Інфокріпт InfoCrypt Token ++ TLS
InfoCrypt VPN-Key-TLS

Classic passive USB tokens and smart cards

A large number of koristuvachiv vazhaє for more beautiful shvidki, cheap and handy solutions for the selection of keys. As a rule, rewiring is issued by tokens and smart cards without cryptographic coprocessors. Yak and in the previous versions of the provider, CryptoPro CSP 5.0 saves the appearance of all the crazy noses of the active companies, Aladdin R.D., Gemalto / SafeNet, Multisoft, NovaCard, Rosan, Aliothі, MorphoKST.

In addition, it is important to learn how to save keys in the Windows registry, on a hard disk, on flash drives on all platforms.

List of virobniks and models of pre-installed CryptoPro CSP 5.0

List of virobniks and models of classic passive USB-tokens and smart-cards generated by CryptoPro CSP 5.0
company Nosiy
Alioth SCOne Series (v5 / v6)
Gemalto Optelio Contactless Dxx Rx
Optelio Dxx FXR3 Java
Optelio G257
Optelio MPH150
ISBC Esmart Token
Esmart Token GOST
MorphoKST MorphoKST
NovaCard Cosmo
Rosan G & D element V14 / V15
G & D 3.45 / 4.42 / 4.44 / 4.45 / 4.65 / 4.80
Kona 2200s / 251 / 151s / 261/2320
Kona2 S2120s / C2304 / D1080
SafeNet eToken Java Pro JC
eToken 4100
eToken 5100
eToken 5110
eToken 5105
eToken 5205
assets Rutoken 2151
Rutoken S
Rutoken KP
Rutoken Lite
Rutoken ECP
Rutoken ECP 2.0
Rutoken ECP 2.0 3000
Rutoken EDS Bluetooth
Rutoken EDS Flash
Smart card Rutoken 2151
Smart card Rutoken Lite
Smart card Rutoken EDS SC
Smart card Rutoken ESP 2.0
Aladdin R.D. JaCarta GOST
JaCarta PKI
JaCarta PRO
JaCarta LT
JaCarta-2 GOST
Інфокріпт InfoCrypt Token ++ lite
Multisoft MS_Key іsp.8 Angara
MS_Key ESMART іsp.5
SmartPark master
R301 Foros
Oscar
Oscar 2
Rutoken Magistra

CryptoPro tools

At the warehouse of CryptoPro CSP 5.0 there is a cross-platform (Windows / Linux / macOS) graphical additions - "CryptoPro Tools".

The main idea is to give the power to the koristuvach by hand to see the type of work. All the main functions are available in a simple interface - at the same time, we have implemented a mode for additional corticosteroids, so that they can display additional possibilities.

With the help of CryptoPro tools, we can check the management of containers, smart cards and crypto provider settings, as well as the ability to update and reconfigure the PKCS # 7 electronic signature.

Pidtrimuvane software

CryptoPro CSP allows quick and safe use of Russian cryptographic algorithms in the upcoming standard supplements:

  • official package Microsoft Office;
  • mail server Microsoft Exchange i client Microsoft Outlook;
  • products Adobe Systems Inc.;
  • browsers Yandex.browser, Sputnik, Internet Explorer,Edge;
  • because of the form and the revision of the signature of the documents Microsoft Authenticode;
  • web servers Microsoft IIS, nginx, Apache;
  • most of the working tables Microsoft Remote Desktop Services;
  • Microsoft Active Directory.

Integration with the CryptoPro platform

For the first time, you will be ensured that the response and consistency with our products:

  • CryptoPro UC;
  • TC services;
  • CryptoPro ETSP;
  • CryptoPro IPsec;
  • CryptoPro EFS;
  • CryptoPro.NET;
  • CryptoPro Java CSP.
  • CryptoPro NGate

Operational systems and hardware platforms

Traditionally, it is practical in an unverified wide range of systems:

  • Microsoft Windows;
  • Mac OS;
  • Linux;
  • FreeBSD;
  • Solaris;
  • Android;
  • Sailfish OS.

hardware platforms:

  • Intel / AMD;
  • PowerPC;
  • MIPS (Baikal);
  • VLIW (Elbrus);
  • Sparc.

and virtual centers:

  • Microsoft Hyper-V
  • VMWare
  • Oracle Virtual Box
  • RHEV.

Created by new versions of CryptoPro CSP.

For vikoristannya CryptoPro CSP with a license for a workstation and server.

Interface for wading

To add add-ons to all CryptoPro CSP platforms available through standard interfaces for cryptographic applications:

  • Microsoft CryptoAPI;
  • PKCS # 11;
  • OpenSSL engine;
  • Java CSP (Java Cryptography Architecture)
  • Qt SSL.

Productivity for any relish

The hardware access to the development allows us to hunt all solutions from miniature ARM-boards, such as Raspberry PI, to high-performance servers based on Intel Xeon, AMD EPYC and PowerPC, to increase productivity.

regulatory documents

A new change of regulatory documents

  • The cryptographic provider has the following algorithms, protocols and parameters, values ​​in the upcoming documents of the Russian system and standardization:
  • R 50.1.113-2016 "Information technology. Cryptographic information provider. Cryptographic algorithms, supporting algorithms for electronic digital signature and hashing function "(also div. RFC 7836" Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 ")
  • R 50.1.114-2016 "Information technology. Cryptographic information provider. Parameters of efficient curves for cryptographic algorithms and protocols "(also div. RFC 7836" Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 ")
  • R 50.1.111-2016 "Information technology. Cryptographic information provider. Password recovery of key information "
  • R 50.1.115-2016 "Information technology. Cryptographic information provider. Password-based encryption protocol for password-based authentication "(also div. RFC 8133 The Security Evaluated Standardized Password-Authenticated Key Exchange (SESPAKE) Protocol")
  • Methodical recommendations TC 26 "Cryptographic information retrieval"
  • Methodical recommendations TC 26 "Cryptographic information retrieval"
  • Technical specifics of TC 26 "Cryptographic information retrieval" "Vikoristannya GOST 28147-89, GOST R 34.11-2012 and GOST R 34.10-2012 in protocols of exchange with IKE and ISAKMP keys"
  • Technical specifics TC 26 "Cryptographic information logger" "Vikoristannya GOST 28147-89 with encrypted contribution in IPsec ESP protocols"
  • Technical specifics TC 26 "Cryptographic information logger" "Vikoristannya algorithms GOST R 34.10, GOST R 34.11 in the certificate profile and the list of clicks of certificates (CRL) of the infrastructure for X.509 keys"
  • Technical specifics of TC 26 "Cryptographic information retrieval"
  • Generation of EP keys and keys
  • Formation and revision of the electronic signature
  • Import of software-generated encrypted keys of the EP - to make it harder for them
  • Updating the Instalation base of the CryptoPro CSP crypto provider

Features

The main feature (formerly the product was called "CryptoPro eToken CSP") is the registration of the technology of the functional key carrier (FKU).

Functional key nose (PKU)- architecture of software and hardware products on the basis of smart cards or USB tokens, which implements a fundamentally new drive before securing a secure key on smart cards or USB tokens.

The settings of the semblance of the stolen channel are connected between the token and the cryptographic provider, a part of the cryptographic rewriting, including the capture of the encrypted keys and the keys of the EP in an unrecoverable viewer, are sent to a smart card or a USB token.

Apart from the hardware generation of keys, the form of the EP in the microprocessor of the key carrier, the architecture of the PKU allows to effectively resist attacks, we will link the hash value to the channel from the software to the program.

In "CryptoPro PKU CSP" version 3.9, in the capacity of a key carrier, the JaCarta CryptoPro token is specially broken down, representations in the form factors of a smart card and a USB token.

To the warehouse ЗКЗІ "CryptoPro PKU CSP" version 3.9 enter the special distribution of the JaCarta CryptoPro token with the possibility of calculating the EP for the technology of the PKU of the company "Crypto-PRO" and issued in the form factors of a USB token (in the case of Nano or XL) or a smart card.

JaCarta CryptoPro is safe to secure and secure the encrypted keys of the EP, the vicon is in return for the authentication of the CSP and the token, as well as the two-factor authentication of the token owner.

JaCarta CryptoPro keys

  • Є by the most efficient token among PKU-attachments (viperjaє iznuyuchі products, scho work from PKU, for the quick formulation of an electronic signature in 3 times - on the basis of the Protocol of vimіrіv shvidkoyi.
  • stuck principle Secure by design- to make theft of a microcontroller, to construct a safe one, for the purpose of securing security, it’s possible to investigate a microcontroller for the purpose of securing the hardware, so on the software ravnya because of the cloning, the evil and all the attacks on the house.
  • Generation of UU keys, UU keys, as well as the end of the UU will be issued in the middle of the JaCarta CryptoPro token.
  • Vikoristovuє abductions channel of transmission of data from the program part "CryptoPro PKU CSP".

warehouse

"CryptoPro PKU CSP" version 3.9 to be stored in two key components.

1.USB token abo JaCarta CryptoPro smart card:

  • є functional key carrier (PKU), in which the Russian cryptography is implemented;
  • allowing you to infinitely secure and close the keys of the EP;
  • the form of the EP "under the mask" - K (h), which allows you to seize the channel by exchanging with a token (smart card) and a software encryption provider (CSP);
  • I will return the authentication of the CSP and the token and the two-factor authentication of the koristuvach - the owner of the token.

2. Crypto Provider (CSP):

  • є high-end software interface (MS CAPI) for new additions and a set of cryptographic functions;
  • from the signature "by mask", from the rim of the device token (smart-picture) - K (h), "know" the mask K (s) and the form "normal" signature, the intelligence for the call tokens

Architecture "CryptoPro PKU CSP" version 3.9


Technical characteristics of the JaCarta CryptoPro token

microcontroller characteristics VirobnikINSIDE Secure
ModelAT90SC25672RCT
EEPROM Memory72 Kb
Operating system characteristics Operating systemAthena Smartcard Solutions OS755
international certificationCC EAL4 +
Pidtrimuvani cryptoalgorithmsGOST R 34.10-2001, GOST 28147-89, GOST R 34.11-94
Pidtrimuvani interface USBSo
Contact interface (ISO7816-3)T = 1
certificates of safety FSB RussiaCertificate of approval of the FSB of Russia No. SF / 114-2734
Certificate of approval of the FSB of Russia No. SF / 114-2735
Pidtrimuvani OS Microsoft Windows Server 2003(32/64-bit platforms)
Microsoft Windows Vista(32/64-bit platforms)
Microsoft Windows 7(32/64-bit platforms)
Microsoft Windows Server 2008(32/64-bit platforms)
Microsoft Windows Server 2008 R2(32/64-bit platforms)
CentOS 5/6(32/64-bit platforms)
Linpus Lite 1.3(32/64-bit platforms)
Mandriva Server 5(32/64-bit platforms)
Oracle Enterprise Linux 5/6(32/64-bit platforms)
Open SUSE 12(32/64-bit platforms)
Red Hat Enterprise Linux 5/6(32/64-bit platforms)
SUSE Linux Enterprise 11(32/64-bit platforms)
Ubuntu 8.04 / 10.04 / 11.04 / 11.10 / 12.04(32/64-bit platforms)
ALT Linux 5/6(32/64-bit platforms)
Debian 6(32/64-bit platforms)
FreeBSD 7/8/9(32/64-bit platforms)
Cryptographic Operations Hour key import3.2 op / s (USB token), 2.4 op / s (smart card)
registration sign5.8 op / s (USB token), 3.9 op / s (smart card)
Available keys Smart cardJaCarta CryptoPro
USB tokenJaCarta CryptoPro

certificates of safety

pidtverzhu, for the cryptographic information retriever (CIP) "CryptoPro FKU CSP" Version 3.9 (vikonannya 1) prompted to the vimogs GOST 28147-89, GOST R 34.11-94, GOST R 34.10-2001B to the ciphers class KS1, vimogam before sending an electronic signature, approved by the order of the Federal Security Service of Russia dated 27th March 2011, No. 796, we will establish for the class KS1, and we can register for a cryptographic retriever (the establishment of the memory and management of encryption keys , calculating the value of the hash function for the donors, to take revenge in the area of ​​operational memory, the TLS-donor, the implementation of the functions of the electronic signature on the basis of the Federal Law on April 6, 2011 signature, reversal of the electronic signature, the key of the electronic signature, the key of the reversal of the electronic signature) information, the sovereign chamber.

pidtverzhu, for the cryptographic information retriever (CIP) "CryptoPro FKU CSP" Version 3.9 (vikonannya 2) promises to vimogs GOST 28147-89, GOST R 34.11-94, GOST R 34.10-2001S to ciphers class KS2, vimogam before sending an electronic signature, approved by the order of the Federal Security Service of Russia dated 27th March 2011, no. 796, we will establish for class KS2, and we can register for a cryptographic acquirer , calculating the value of the hash function for the donors, to take revenge in the area of ​​operational memory, the TLS-donor, the implementation of the functions of the electronic signature on the basis of the Federal Law on April 6, 2011 signature, reversal of the electronic signature, the key of the electronic signature, the key of the reversal of the electronic signature) information, the sovereign's house.

To install a system without an installation disk, you need to install and install all distributions of components from the given instructions. The installation must be checked with the rights of a local administrator.

Installation ЗКЗІ CryptoPro CSP

Download and install the CryptoPro CSP distribution kit according to the current license.

Open the CryptoPro CSP program and enter the license serial number. Left behind a computer, it can be done in different ways:

Installing the RuToken driver

Download and install components for robots from RuToken. (You can be certified on flash-carriers to skip the croc). When installing the components, turn on the RuToken from the computer.

installing Capicom

Installation of certificates to be sent to the center

Download and install certificates of the Air Conditioning Center

Installing and adjusting the browser

The system works in offensive browsers: Internet Explorer version not lower than 11, Mozilla Firefox, Google Chrome, Yandex browser, Opera.
For installation .

For correct robots Internet Explorer with the Kontur.Ekstern system, you need to run the utility to configure the view.
Also, the setting of the view can be handled by the visonati. For tsogo speed up given.

From the power of the installation of the other browsers, it must be routed to the system administrator.

Install Adobe Reader

Download and install Adobe Reader. Hurry up to check out the Adobe official website. To get a copy of the installation, you need to vibrate the operating system and mobile version.

setting a shortcut

For ease of entry into the system, save on the workstyle. After the installation is complete, it is necessary to re-install the computer. Do not forget to set up a certificate of signature before you start a robot in the system. Hurry up to the instructions for the establishment of a special certificate.

Installation completed