Here are the hardware and software requirements to use tEC, the Electronic Confidant.
Configuration
Note: tEC may very well work on other configurations. Let the user community know.
at this time there is only one known incompatibility: with Netscape Navigator.
.
Over dial up connections, approximate loading time is:
  • 6-8 mn, 1 MB @ 56K bps
  • 12-16 mn, 1 MB @ 28K bps
.
(1) tEC needs the Java Virtual Machine (JVM) from Sun MicroSystems
In case of download problems with MS Explorer, please verify your version have such a JVM.
On the MS Explorer menu pick:
  • "Tools"
  • "Internet Options..."
  • "Advanced"
    if you have a title which says
    • "Java (Sun)", you have a Sun JVM but make sure its version is 1.4.2 or above
If there is no Sun JVM on your computer, you can always request to download one from Sun as part of the tEC download process.
.
(2) the browser Java Virtual Machine (JVM) from Sun must be enabled
  • On the Mozilla Firefox menu, pick:
    • "Tools"
    • "Options"
    • "Content"
    and check to Enable Java.
    .
  • On the MS Explorer menu pick:
    • "Tools"
    • "Internet Options..."
    • "Advanced"
    See above how to find a JVM.
    When both the MS and the Sun JVM are present:
    • check "Use JRE 1.5.0..." to enable the Sun JVM
      Remember to restart MS Explorer to ensure the proper configuration will take effect.
.
(3) the browser must allow for Javascript execution and have proper Security settings
  • On the Mozilla Firefox menu, pick:
    • "Tools"
    • "Options"
    • "Content"
    and check to Enable Javascript.
    .
  • On the MS Explorer menu pick:
    • "Tools"
    • "Internet Options..."
    • "Security"
    • With Explorer V7:
      • Click on "Trusted Sites"
      • Set the protection level for this zone to "Low"
      • uncheck the cell enabling "Protected Mode"
      • Add http://www.eprivacy.com to the list of "Trusted sites"
      • Make sure to uncheck the cell requiring server verification (https:)
    • With Explorer V5 or V6:
      • Set the "Internet" zone security level to "medium" or lower
    • If you have customized your protection level
      carefully review your options:
      • Active X Controls:
        prompt for download signed ActiveX controls
        run ActiveX controls and plug-ins
        enable Script ActiveX controls marked safe for scripting
      • Java: set Java permissions to high safety
      • Downloads: enable all options
      • Scripting: enable Active Scripting and other options
        .
    • You should also check "Internet Options..." "Advanced":
      Under the title "Security", look for a line called:
      • Allow active contents to run in files on My Computer
        and check up the corresponding cell
        .
(***) Legal Notices

The tEC platform client is FREE FOR COMMERCIAL AND NON-COMMERCIAL USE and can be freely redistributed as long as the following conditions are adhered to.
- No duplication or redistribution is made except through the download of a so-called trusted applet bearing the developer's certificate of ePrio Inc.
- No modification is made to such trusted applet package without the prior and explicit consent of ePrio Inc.

THIS SOFTWARE and ANY SERVICE BASED ON ITS USE ARE PROVIDED BY ePrio Inc ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ePrio Inc BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE and ANY SERVICE BASED ON ITS USE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

tEC includes a binary version of Cryptix-Java V2.2 covered by the following license:
Copyright 1995, 1996, 1997 Systemics Ltd (http://www.systemics.com/) on behalf of the Cryptix Development Team (http://www.systemics.com/docs/cryptix/). All rights reserved.
This library and applications are FREE FOR COMMERCIAL AND NON-COMMERCIAL USE as long as the following conditions are adhered to.
Copyright remains with Systemics Ltd, and as such any Copyright notices in the code are not to be removed. If this code is used in a product, the Cryptix Development Team should be given attribution as the author of the parts used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1.Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3.All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the Cryptix Development Team (http://www.systemics.com/docs/cryptix/)

THIS SOFTWARE IS PROVIDED BY SYSTEMICS LTD ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.