HomeNewsLoginCataloguePurchase CoursewareDeferment DemoHelp DeskContact Us




Passcode directions for term access

Knowledgebase
Passcode directions for term access
 

Problem
Passcodes are employed to assure the most current product use.

Solution

Passcode directions for term access

Product passcodes

Passcodes are employed to assure the most current product use.

  • DVD product passcodes
    • The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).

  • iPod product passcodes
    • The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).

  • Reader file passcodes
    • The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).

  • Activity pack passcodes
    • The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).


Still need help? Please send us an email.



Content Copyright 2024 Faulkner Press LLC, All Rights Reserved.