Welcome to CORA-X lite

CORA Cyber Security Inc. (CORAcsi) is happy to provide these video tutorials free of charge, and without warranty, liability, or guarantee.

If you find discrepencies with these tutorials, we welcome your feedback and suggestions.

These video tutorials are meant to help you to get started with CORA-X lite.

  • These are not a replacement for CORA-X lite Help (available in the navigation bar above).
  • CORA-X lite Help is more thorough and should be used to better understand CORA-X lite.
  • These video tutorials are meant to supplement the Help provided for CORA-X lite.

How to navigate this online help is explained in CORA-X lite Help.


Engage with us.

Stay tuned as we add new video tutorials.

We hope you share our passion:

  • A passion for excellence.
  • A passion for math, physics and technology.
  • A passion for security and privacy.

CORA makes hacking irrelevent .

Here is a short video that outlines some of the reasons we believe that CORA makes hacking irrelevent.

 


CORA-X lite - Tutorial series

An Easy Install from the Microsoft Store

It is easy to download and install CORA-X lite from the Microsoft Store

    Key takeaways:
  1. CORA-X lite is validate, secure, protected and safe; yes, we have jumped through the hoops that Microsoft insists upon.
  2. Open the Microsoft store in your Windows 10 or Windows 11 computer.
  3. Enter CORA-X or CORAx in the search bar and press the Enter key.
  4. Click on our beautiful logo (CORA-X).
  5. Click on 'Install'.
  6. Ofcourse, we wouldn't mind at all a good rating :).

CORA-X lite: First time setup

After you have downloaded your free copy of CORA-X lite from the Microsoft Store and installed it on your computer, you will need to:

  1. Read and agree to the End User License Agreement (EULA).

    Read more »

    Please understand that you are responsible for the security of your data. We encourage "Best practices", however, we do not force you to take these Best practices. Therefore we need to have the EULA include these key takeaways.

      Key takeaways:
    • CORA-X lite is provided "as is".
    • CORA-X lite is provided "without warranty or guarantee".
    • You alone are responsible for the security of your data. We encourage "Best practices", such as using disperse files on different devices, however, the setup and use of CORA-X lite is your responsibility alone.
    • You may not lease, sub-lease, sell, lend or otherwise provide CORA to someone else. If you are interested in this type of activity, then contact CORAcsi about partnership opportunities.
    • All intellectual property and creative aspects of CORA belong to CORAcsi.
    • You will not reverse engineer any part of this software.
    • There is no liability for damages.
  2. Enter a UserName with a minimum of 3 characters. You may use your name, or an email address; the choice is yours.
  3. Create a Password with either a minimum of 10 characters, OR a minimum of 6 characters with at least one uppercase, lowercase, number and special character.
  4. Create a system "Profile" - our fancy term for your Encryption key (more formally, a Mulitple Use Pad - our encryption keys are a minimum of 1 million bits in length).


CORA-X lite: Protect your sensitive data.

After you have setup CORA-X lite, including your system profile, you may use it to CORAfy (encrypt) and unCORAfy (decrypt) your sensitive files and/or folders.

    Key takeaways:
  1. CORA-X lite is meant to be loaded when you first start your computer. It should run until it is time to shut down or reboot your computer.
  2. You install the dispersed System Profile (encryption key) using your dispersed files which "should NOT" be on the same device (computer). For example, one dispersed file is on a USB flash drive and another is in the cloud. After installing the System, remove this USB flash drive, and / or, disconnect the Cloud drive.
  3. You may lock CORA-X lite to protect it while your computer is running.
  4. You may CORAfy (encrypt) actionable items in CORA-X lite.
  5. You may unCORAfy (decrypt) actionable items in CORA-X lite.
  6. You may use "Auto CORAfy" to automatically encrypt/decrypt select files.
  7. You may easily open a CORAfied (encrypted) file using the "Open item" action button.

CORA-X lite: Backup your System and User data.

It is absolutely imperative that you Backup your System and User data!

    Key takeaways:
  1. It is imperative that users backup their System profile and user data.
  2. CORA is unbreakable - if a "single byte" in your system profile becomes corrupted or violated, then the user will "never" read any CORAfied (encrypted ) data that was CORAfied using this System (MUP=encryption key). This cannot be overly stressed - and therefore, it is absolutely crucial that users properly create and maintain backups of the System, and the "user data" (preferences, password hash, etc.).
  3. User data backups may use a single file, however, using 2 dispersed files that are placed on different devices is always a recommended "Best practice".
  4. System backups must use dispersed files. The recommended Best practice is to place these dispersed files on separate devices. For example, place one on Microsoft's one drive, and another on Google Drive, or alternatively, use a USB flash drive.
  5. Backups must use a proper password. This may be a passphrase that 6 characters including upper case, lower case, numbers and special characters, or 10 characters (excluding leading/trailing blanks). The larger the passphrase the better!
  6. In order to backup a System profile, it must be loaded into CORA-X lite.
  7. Unlike an Export of the System (for use with team members, friends or family), a System Backup will include the "Actionable items".

CORA-X lite: Import another System Profile (encryption key).

CORA-X was designed for enterprise applications in which the System is loaded during a reboot of a server, and then runs securely, in memory, until the next reboot. At the same time, authenticated users may belong to multiple teams and need access to their protected data.

Therefore CORA-X lite is meant to empower individuals, teams and organizations to protect and share their sensitive data.

    Key takeaways:
  1. An export is similar to a System backup except that it doesn't the "actionable files". It only provides the essential system files to allow for the sharing of protected data.
  2. An import is similar to a System restore except that:
    1. it does not include the actionable items.
    2. an import requires that a System profile is installed prior to the import. An imported system cannot be "restored" as a primary system.
    3. imported systems (keys = MUPs) are associated with a previously installed system.
  3. mported System profiles may be renamed to provide more description information, such as the team, organization or group it will be used with.
  4. Imported System profiles may be "Automatically loaded" when the primary Profile is installed. This convenient feature attaches one or more "Imported systems" to the user's Primary Profile.
    Such an "Auto load" may be removed at any time using the "Profiles" dialog window.
  5. Users may add files/folders to an imported profile. These will be identified in the "Actionable items" listbox.
  6. The "Profiles" dialog allows users to quickly switch between Profiles.
  7. When switching between profiles, that profile's System (MUP=encryption key) and "Actionable items" will become active (installed/loaded).