Post on 13-Dec-2015
description
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 1
License Agreement - Unistal Systems Pvt. Ltd The entire risk of the use or the result of the use of this software and documentation remains with
the user. No part of this documentation may be reproduced in any means, electronic or
mechanical, for any purpose, except as expressed in the Software End User License Agreement.
User license of this software is valid for one year after the Activation. This software and documentation are copyrighted. All other rights, including ownership of the
software, are reserved to Unistal Systems Pvt. Ltd. Unistal, Unistal 3 in 1 and the Unistal marks
are registered trademarks of Unistal Systems Pvt. Ltd. in India and elsewhere. Microsoft,
Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Windows 8 and Windows 8.1
are trademarks or registered trademarks of Microsoft Corporation. All other brand and product
names are trademarks or registered trademarks of the respective owners.
All rights, titles and interest in and to Unistal 3 in 1 and all copyright rights in and to Unistal 3
in 1 (including but not limited to any images, photographs, logos, animations, video, audio,
music, text, and "applets" incorporated into Unistal 3 in 1), the accompanying printed materials,
and any copies of Unistal 3 in 1 are owned by Unistal. Unistal 3 in 1 is protected by copyright
laws and international treaty provisions. Therefore, you must treat Unistal 3 in 1 like any other
copyrighted material. You may not copy the printed materials accompanying Unistal 3 in 1. You
must produce and include all copyright notices in their original form for all copies created
irrespective of the media or form in which Unistal 3 in 1 exists.
Copyright
Copyright © 2007-2015. Unistal Systems Pvt. Ltd. The software that accompanies this license (the "software") is the property of Unistal systems Pvt. Ltd. or its licensors and is protected by the copyright law. You may:
• Use one copy of the software on a single computer and you may not transfer this to another person or allow another person to use other versions.
• Copy the software onto the hard disk of the computer and retain the original for archival purposes.
You may not: • Copy the documentation which accompanies the software,
• Install the software on the network,
• Sublicense, rent or lease any portion of the software, • Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the
source code of the software.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 2
Unistal 3 in 1- End User License Minimum Terms
This End User License Agreement (“EULA”) governs use of software (“Software”) from Unistal
Systems Pvt. Ltd. References to “End User” in this EULA refer to any entity or individual which
has obtained a copy of the Software from Unistal Systems Pvt. Ltd. Limited License Subject to all of the terms and conditions of this EULA, Unistal Systems Pvt. Ltd grants to End
User a non-transferable, non-sub licensable, non-exclusive license to use the object code form of
the Software internally, but only in accordance with the technical specification documentation
generally made available with the Software. “Software” shall also include any documentation
and any support and maintenance releases of the same Software provided to End User.
Application Software
You may install and use the Software, on as many computers as necessary with the limitation imposed by the total number of licensed users. You may make one additional copy for back-up purpose.
Term of License The license granted hereunder shall commence on the purchasing date of the Software and shall expire at the end of the period for which the license is purchased.
Restrictions End User shall not (and shall not allow any third party to): (a) decompile, disassemble, or
otherwise reverse engineer the Software or attempt to reconstruct or discover any source code,
underlying ideas, algorithms, file formats or programming interfaces of the Software by any
means whatsoever (except and only to the extent that applicable law prohibits or restricts reverse
engineering restrictions, and then only with prior written notice to Unistal Systems Pvt. Ltd); (b)
distribute, sell, sublicense, rent, lease or use the Software (or any portion thereof) for time
sharing, hosting, service provider or like purposes; (c) remove any product identification,
proprietary, copyright or other notices contained in the Software; (d) modify or create a
derivative work of any part of the Software, except to the extent expressly authorized in writing
by Unistal Systems Pvt. Ltd; or (e) publicly disseminate performance information or analysis
(including, without limitation, benchmarks) from any source relating to the Software.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 3
Ownership Notwithstanding anything to the contrary contained herein, except for the limited license rights
expressly provided herein, Unistal Systems Pvt. Ltd has and will retain all rights, title and
interest (including, without limitation, all patent, copyright, trademark, trade secret and other
intellectual property rights) in and to the Software and all copies, modifications and derivative
works thereof. End User acknowledges that it is obtaining only a limited license right to the
Software and that irrespective of any use of the words “purchase”, “sale” or like terms hereunder
no ownership rights are being conveyed to you under this Agreement or otherwise.
If requested, End User shall certify in writing that End User is using the Software for the number
of servers, with the number of copies, on the system configuration and at the site agreed upon by
the parties (as applicable). End User agrees that no more than once annually its use of the
Software may be audited by Unistal Systems Pvt. Ltd (or an independent auditor work on such
party’s behalf) during normal business hours upon reasonable advance written notice for the
purpose of verifying End User’s compliance with this EULA.
Confidentiality End User acknowledges that, it may obtain information relating to the Software or Unistal
Systems Pvt. Ltd, including, but not limited to, any code, technology, know-how, ideas,
algorithms, testing procedures, structure, interfaces, specifications, documentation, bugs,
problem reports, analysis and performance information, and other technical, business, product,
and data (“Confidential Information”). End User shall not disclose Confidential Information to
any third party or use Confidential Information for any purpose other than the use of the
Software as licensed under the EULA.
Warranty Disclaimer
EXCEPT FOR ANY EXPRESS LIMITED WARRANTY OFFERED BY UNISTAL
SYSTEM PVT LTD FOR WHICH END USER’S REMEDY IS LIMITED TO
REPAIR, REPLACEMENT OR REFUND BY UNISTAL SYSTEM PVT LTD, THE
SOFTWARE IS PROVIDED “AS IS” AND UNISTAL SYSTEM PVT LTD MAKES
NO WARRANTIES TO ANY PERSON OR ENTITY WITH RESPECT TO THE
SOFTWARE OR ANY SERVICES AND DISCLAIMS ALL IMPLIED
WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF
TITLE, NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 4
Limitation of Damages and Remedies IN NO EVENT SHALL UNISTAL SYSTEM PVT LTD BE LIABLE UNDER CONTRACT,
TORT, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY
INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE SOFTWARE. NOTWITHSTANDING ANYTHING HEREIN TO
THE CONTRARY, THE TOTAL LIABILITY OF UNISTAL SYSTEM PVT LTD TO END
USER, INCLUDING BUT NOT LIMITED TO DAMAGES OR LIABILITY ARISING OUT
OF CONTRACT, TORT, BREACH OF WARRANTY, INFRINGEMENT OR OTHERWISE,
SHALL NOT IN ANY EVENT EXCEED THE FEES PAID BY END USER WITH RESPECT
TO THE SOFTWARE. UNISTAL SYSTEM PVT LTD SHALL NOT BE LIABLE FOR LOSS
OR INACCURACY OF DATA, COST OF PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, SYSTEM DOWNTIME, FAILURE OF SECURITY MECHANISMS,
GOODWILL, PROFITS OR OTHER BUSINESS LOSS, REGARDLESS OF LEGAL
THEORY, EVEN IF UNISTAL SYSTEM PVT LTD HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. THE PARTIES AGREE THAT THE LIMITATIONS OF THIS SECTION ARE ESSENTIAL
AND THAT UNISTAL SYSTEM PVT LTD WOULD NOT PERMIT END USER TO USE
THE SOFTWARE ABSENT THE TERMS OF THIS SECTION. THIS SECTION SHALL
SURVIVE AND APPLY EVEN IF ANY REMEDY SPECIFIED IN THIS EULA SHALL BE
FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE. THIS SOFTWARE IS NOT FAULT-TOLERANT AND IS NOT DESIGNED OR INTENDED
FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE
PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT FOR USE IN THE
OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, OR
COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-
SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR
INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL
INJURY OR PROPERTY DAMAGE.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 5
Termination and Survival Upon any termination of this EULA, End User shall immediately cease use of the Software and
remove all Software from its systems. The terms set forth in the sections entitled Restrictions,
Ownership, Confidentiality, Warranty Disclaimer, Limitation of Damages and Remedies shall
survive any termination of this EULA.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 6
Table of Contents 1. Introduction .......................................................................................................................................... 8
2. System Requirements ........................................................................................................................... 9
3. How To Install ..................................................................................................................................... 10
3.1. Preparing to Install Unistal 3 in 1 ................................................................................................ 11
3.2. Installation Path .......................................................................................................................... 12
3.3. Finish ........................................................................................................................................... 12
4. Product Registration ........................................................................................................................... 14
4.1. When PC is connected to the internet ........................................................................................ 14
4.2. When PC is not connected to the internet or act as offline ....................................................... 16
4.3. To Evaluate the Product .............................................................................................................. 23
5. Getting Started .................................................................................................................................... 25
6. Unistal 3 in 1 Working Guide .............................................................................................................. 27
6.1. Crash Proof ...................................................................................................................................... 27
6.1.1. Features ..................................................................................................................................... 28
6.1.2. Crash Proof Startup ................................................................................................................... 28
6.1.3. Scheduler Settings ..................................................................................................................... 29
6.1.4. File Recovery ............................................................................................................................ 29
6.2. SysBoost (System Tuneup Software) .............................................................................................. 32
6.2.1. Features .............................................................................................................................. 32
6.2.2. Sys Boost Startup ................................................................................................................ 32
6.2.3. Sys Boost – Select and Wipe ............................................................................................... 33
6.2.4. Sys Boost– Select Extensions .............................................................................................. 34
6.2.5. Sys Boost- Defrag drive ....................................................................................................... 35
6.2.6. Sys Boost – Internet Wipe ................................................................................................... 36
6.2.7. Sys Boost – Registry Clean .................................................................................................. 37
6.2.8. Sys Boost – Registry Restore ............................................................................................... 38
6.3. Locate Laptop .................................................................................................................................. 39
6.3.1. Features .............................................................................................................................. 39
6.3.2. Locate Laptop Startup ......................................................................................................... 39
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 7
6.3.3. Locate Laptop - Encrypt Files & Folders .............................................................................. 40
6.3.4. Locate Laptop - Decrypt Files & Folders ............................................................................. 42
6.3.5. View personal information ................................................................................................. 46
6.3.6. Update personal information ............................................................................................. 47
6.3.7. Report Theft ........................................................................................................................ 48
6.3.8. Update and Withdraw Theft Report ................................................................................... 48
6.3.9. Laptop Statistics .................................................................................................................. 50
6.3.10. Update ................................................................................................................................. 52
6.3.11. Logout ................................................................................................................................. 53
7. COMPANY OVERVIEW ......................................................................................................................... 54
8. FAQ’S ................................................................................................................................................... 55
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 8
1. Introduction
In recent scenario, Unistal 3 in 1 is the elite priority from the broader aspect for the entire individual and corporate world which includes protection from Data Theft, Data Loss and protection from unethical activity like Laptop Theft.
Unistal 3 in 1 has 3-tier protection. It includes following software components:
• Crash Proof • Port Locker • Locate Laptop
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 9
2. System Requirements
You may install only on computers running the following operating systems:
• Windows XP with Service Pack 2
• Windows Vista with Service Pack 1
• Windows 7
• Windows 8
• Windows 8.1
Before installation, make sure that your computer meets the minimum system requirements.
Note: To find out the Windows operating system your computers is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.
Minimum System Requirements
• Operating System:
� Windows XP (Service Pack 3)
� Vista (Service Pack 1)
� Windows 7
� Windows 8
� Windows 8.1
• CPU: 450 MHZ
• RAM: 512 MB
• HDD: 100 MB
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 10
3. How To Install
For installing Unistal 3 in 1 either we have the installation disk or the product folder
downloaded from the internet. The installation process starts with double clicking the
Setup.exe file. This will start a setup wizard, which will guide you in installing. Before
running setup make sure, your system is covering minimum system requirements.
First checkpoint in installation is License Agreement. The license agreement needs to be read properly and then accepted for continuing the installation process.
The second step is to select the additional task as:
• Create a desktop icon. • Create a Quick Launch icon.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 11
After selecting the additional task, welcome to installation wizard of Unistal 3 in 1 will come into frame. Click next to start the installation of Unistal 3 in 1.
3.1. Preparing to Install Unistal 3 in 1
Now in order to select the products, the dialog box display as “Welcome to install
Wizard of Unistal 3 in 1”. Please select the products you want to install.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 12
3.2. Installation Path
By default, Unistal 3 in 1 will be installed in “C:\Program Files\Unistal3in1LL”.
Click Next to start the installation.
3.3. Finish
Once installation is done, it will proceed to display all the components that has been installed and marked as done in the dialogue box.
After finishing the Unistal 3 in 1, a set password dialogue box will display in order to set the password. This password in used for further authentication process of Unistal 3 in 1. User needs to enter a password with the given requirements and then confirm the same.
The requirements for the password are:
• Password length should be minimum 6 characters.
• Special characters are not allowed.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 13
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 14
4. Product Registration
4.1. When PC is connected to the internet
While registering the product, it will ask for the key number.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 15
Enter Key Number and click Next button.
Now it will ask for the user details to complete the registration process.
Fill all the user details and click Register button. On clicking register button, you get acknowledgment for registration (Registration is successfully done) And below screen will pop up.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 16
4.2. When PC is not connected to the internet or act as offline
This represents offline registration using the activation code received by the user when PC is not connected to the internet. On clicking the next button, it asks for the password you set earlier.
On clicking ok, it will ask for the key number.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 17
Enter key number and click Next.
Note: Unistal 3 in 1 offline activation dialog box will prompt which display the message
as:
“Unistal3in1LL_ activation .exe file is created. Copy this file from desktop and run from any internet enabled PC. After filling the registration form, you will get 20 Digit offline activation code.”
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 18
On clicking the OK, automatically the “Unistal3in1LL_ activation.exe” file will be generated
on users desktop that needs to be executed from a internet connected PC.
On executing this executable from a internet connected PC, below screen will appear.
Click on the “Register now” and the registration form will be displayed.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 19
Fill the form and click on Register button.
Web page will show the acknowledgement for successful registration and will display the 20 digit Offline Activation Code. Same activation code is sent to your email id as well.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 20
Now open Unistal 3 in 1application from Start Menu. Below window will get open.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 21
Click on “License Info”. Below screen will get open.
Click on “Activate License”. Below screen will get open.
Select Offline registration and click Next. Below screen will get open.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 22
Fill in your Key number and 20 digit offline activation code. Your product will get register
and you will get the success message as below.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 23
4.3. To Evaluate the Product
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 24
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 25
5. Getting Started
• From Desktop
User can run the Unistal 3 in 1from the desktop through Unistal 3 in 1icon.
• From Start Menu
Click on Start → All Programs → Unistal3in1LL → Unistal 3 in 1
Now to run the Unistal 3 in 1, user need to enter the password.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 26
On clicking Ok, below screen appears.
Select the desired module and click Start.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 27
6. Unistal 3 in 1 Working Guide
6.1.Crash Proof
The Crash Proof / Data Leakage Prevention feature of Unistal 3 in 1software creates the image of our systems data, Image of file. Crash Proof helps the user to keep the updated backup of data. This Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at regular intervals. In this business world, data volume have increased hence the computer dependency has also increased. As the dependency increases the downtime increases as well due to data loss and the data lost cost us more than the recreation cost. Data Recovery cannot provide you the satisfactory results every time. So the users have the requirement of Software that can help users to keep the image of the data. Crash Proof takes the image of your data after regular intervals and this information is stored in a protected area. You can recover the lost files with the help of this Software and you can un-format any lost drive.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 28
6.1.1. Features
• A new concept in data loss prevention
• Unique un-format feature
• Revival with original file name
• Revival if files/directories are deleted
• Revival if any virus has crashed the hard disk
• Revival if disk is not booting
• Revival if hard disk partitions are corrupted
• Revival if fat/MFT is corrupted
• Revival if root directory is damaged
• Revival if partition is recreated
• Revival of files deleted few days back
• Recovery of fragmented files
6.1.2. Crash Proof Startup
• Crash proof icon gets created in task bar.
• Right click on Crash Proof icon, Select desired feature as shown in below image
to start that feature.
• If you select “Take Image” feature, Crash Proof takes image of your system
details and generates a message in systray once image taking process is complete.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 29
6.1.3. Scheduler Settings
You can schedule the software for the intervals for taking image and updating the software by selecting the desired "Update Image" option as displayed in following image:
6.1.4. File Recovery
If you want to restore any previously taken image, File Recovery will be used. Select the date of image from which you want to recover data
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 30
Once selected the image date then, click next.
Click on the radio button of Hard disk.
When File Recovery is Complete, Select the files which you want to save
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 31
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 32
6.2. SysBoost (System Tuneup Software)
Sysboost is system tuneup software which is easy to use and developed for Microsoft Windows which helps to manage, maintain, optimize a computer system. It improves bootup time and overall performance by cleaning junk registry, junk files and folders, temporary internet files and by performing defragmentation of drives.
This software - analyses the registry and brings out the unwanted registries to clean. Backup of wiping folders can also be taken and can be restored for future usage. Registries which are deleted can be restored easily if you want.
6.2.1. Features
• Wiping of folders
• Defragmentation of drive
• Internet wipe
• Registry cleaning
• Registry restoring
Wiping of folders
It deletes the selected folder permanently
Defragmentation of drive
It analyses and defrag the selected drive.
Internet wipe
It wipes all the temporary internet files, internet history and internet cookies permanently.
Registry cleaning
It identifies and deletes those unwanted registries to improve the performance of the
computer system.
Registry restoring
It restores cleaned registries easily if needed.
6.2.2. Sys Boost Startup
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 33
6.2.3. Sys Boost – Select and Wipe
Select and Wipe is used to wipe particular file(s)/folder(s). Click on Select and Wipe tab. Here you can select file(s)/folder(s), you want to wipe using check marks against each file and folder. Check the option
"Remove Links from Recent Folder" for removing links from recent folder, containing the links of recently opened files.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 34
6.2.4. Sys Boost– Select Extensions
Sometimes we want to delete some particular files from a folder. In this feature we can
select folder and can mention the extensions of the file (doc, xls, txt etc) we want to
delete. If we delete a f deleted from our system; it still remains as it is on In this feature we can select a folder and mention all the extension files which you want to wipe permanently so that it can’t be removed.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 35
6.2.5. Sys Boost- Defrag drive
Defragmentation of drive can be performed using this feature. Due to excessive usage
of files and folders fragmentation occurs in the drives. Fragmentation can hinder
overall throughput of the system. Due to fragmentation there can be loss of files results
in performance loss of the system. Defragging of drives attempts to elevate these
problems. By defragging the drive we can optimize the performance of our computer
system. Defragging reduces the amount of fragmentation and helps the computer
system to work efficiently. It analyses the selected drive and gives the information
weather the drive needs to be defragmented
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 36
6.2.6. Sys Boost – Internet Wipe
When we use internet, all its information gets stored in the computer system. This
information includes list of the visited websites, cookies, information you have entered in
the web form (passwords, ID, name, address) . When we delete history it doesn‟t get
deleted from our system. Its still exist in the disk. Internet Wipe deletes the internet
history, temporary internet files and internet cookies permanently. Internet history
can be misused by third party. This feature ensures security of your system. It helps you
to protect your system from unwanted threats.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 37
6.2.7. Sys Boost – Registry Clean
Registry cleaner is designed to help remove invalid references made in the registry pointing to uninstalled program or other programs which are no longer in use by the user. These programs are left behind in the registry causing several problems leading to a poor system performance. By using Registry clean we can remove unwanted registry entries from our system. We can optimize the performance of our system by using this feature. We work on uncountable programs daily out of which few are of least importance, but we do not get time to clean them manually.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 38
6.2.8. Sys Boost – Registry Restore
Sometimes after registry cleanup we notice that some programs are not working properly and some applications failed to function properly. This is due to missing registry keys. This may be caused by shared keys which were deleted during the registry cleaning or by other deleted keys. Sometimes we delete registry by mistake and realize that the deleted file is of utmost importance. In that case we can use this feature of registry restoration.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 39
6.3. Locate Laptop
Locate Laptop is not only able to track your laptop’s location if it has gone to
unauthorized person but also for employers, it is the best way to track employee
location. This tracking facility will continuously inform you about the location of the
laptop. This laptop tracking module will provide you the complete information about the
location of the laptop, its IP address, Internet Service Provider along with date and time
without knowledge the of laptop user.
The data encryption feature of Locate Laptop provides the facility to encrypt crucial data
in case of laptop theft or missing. If user doesn’t get connect to the internet for a certain
period of time or laptop theft is detected then your data will be encrypted.
6.3.1. Features
• Secure web page for every user to monitor - Keep a close eye on movements of person with the designated Laptop e.g. company employee.
• Reports contain information on data, time, public IP, Locate, country, state, city, ISP, Longitude, Latitude.
• Interactive steps to report a laptop theft
• Remotely launch the data encryption module on predefined sensitive files & folders
• Encrypts data even if Laptop is not connected to internet for particular period.
6.3.2. Locate Laptop Startup
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 40
6.3.3. Locate Laptop - Encrypt Files & Folders
Using Locate Laptop, one can encrypt files & folders when stolen laptop is tracked by
web crawlers.
To encrypt the file & folders follow the steps discussed below:
After installing & registering the Locate Laptop, software displays following screen.
Or same can be accessed later from Start >All Programs >Unistal3in1LL>Locate
Laptop.
Select Encrypt Folders and click Start.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 41
If you want to encrypt some files & folders, choose 'Do you want to encrypt folders
when the stolen laptop is tracked by web crawlers?' option at the top of the screen.
Then click... button to browse & select crucial files/folders to be encrypted.
Select the files & folders to encrypt, click OK.
Choose 'Encrypt Selected Folders even if Laptop is not connected to internet for'
selected period. Click Apply.
Choosing this option for <1> days will automatically encrypt all the selected files &
folders after <1> days if Laptop does not connect to internet for 1 consecutive days.
Also when you submit a theft report on www.protegent.in then online encryption
module gets activated and as soon as unauthorized user will connect your laptop to
internet, all predefined file & folders will be encrypted.
Note: To add more files or folder using the Encryption module, you will be asked
for Username & Password, which is same as you entered during product registration.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 42
6.3.4. Locate Laptop - Decrypt Files & Folders
To decrypt files & folders select Locate Laptop from Start >Programs >
Unistal3in1LL> Locate laptop.
Select Decrypt Folders and click Start.
Encrypted folders will be shown as below or click on “…” to select.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 43
After this click Decrypt.
In order to file a theft, user need to visit the www.protegent.in where user need to fill
the user name and the password which is already set while installing the software
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 44
After login the user name and the password, user will land up on the home page
where he find the list in grid manner as
• View personal information • Update personal information
• Report Theft
• Laptop Statistics
• Update
• Logout
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 45
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 46
6.3.5. View personal information
On clicking the view personal information, user can view his personal information.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 47
6.3.6. Update personal information
On clicking the update personal information, user can update his personal
information.
After this, user needs to click on the update information once he updated his
information. Or else cancel if he is not interested to update his personal information.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 48
6.3.7. Report Theft
6.3.8. Update and Withdraw Theft Report
User can update details using “Update theft report/ attached documents”
User can attach the FIR including the personal details,
• Laptop Details
• Report Theft
• Stolen location Details
In case if the user finds his laptop back, user can to withdraw the report theft using
“Withdraw theft report/ report laptop recovery”
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 49
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 50
6.3.9. Laptop Statistics
On clicking the laptop statistics, user can view the laptop location reports for a given
duration.
On clicking on the view location report, user can get the complete details of his stolen
laptop includes
• Date
• Time
• Static IP Address
• Local IP Address
• Country
• Region
• City
• Internet Service Provider
• Organization
• Longitude
• Latitude
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 51
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 52
6.3.10. Update
In order to update the product user needs to click on the update:
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 53
6.3.11. Logout
Click logout button in order to get logout.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 54
7. COMPANY OVERVIEW
Unistal Systems Pvt. Ltd. is the Data Care Industry's largest, most experienced and technologically advanced provider of data recovery products and services. In case of any kind of data loss on any type of computer storage media, Unistal has a solution with fast, advanced and cost-effective products and services - ranging from do-it-yourself software products, data loss prevention solutions to 24/7/365
services network. With nearly 19 years‟ experience performing successful data
recoveries, Unistal has served customers across the globe including Secret services, government agencies, corporate houses, and numerous computer users. Unistal has developed the industry's widest range of data recovery products and services, providing desktop, laptop, server, email, and database and tape recoveries for all media types and operating systems - anywhere, anytime. Headquartered right in the heart of New Delhi has four offices and 14 service labs strategically located across India.
Unistal's decade long experience in data recovery services has helped to continuously evolve new methods of retrieving data, provide business continuity solutions, disaster recovery solutions, data loss prevention and data recovery software.
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 55
8. FAQ’S
1. If we install “Unistal 3 in 1” than it slow down the speed of our system? Ans: If all the system requirements are fulfilled then it will not slow down the system if still it problem persist you need to reinstall the “Unistal 3 in 1” because it is not installed properly.
2. Can we install “Unistal 3 in 1” on windows 7 64-bit Service pack 1?
Ans: Yes we can install.
3. After how many days “Unistal 3 in 1” license will expire?
Ans: 370 days.
4. After how many days trial pack of “Unistal 3 in 1” will expire?
Ans: You can get the trail pack of 30 days.
5. Can we check information about license any time?
Ans: You can check the license status any time.
6. Can we install all components of “Unistal 3 in 1” simultaneously?
Ans: You can install the entire component in one go.
7. Can we install any specific component of “Unistal 3 in 1”?
Ans: Yes, you can install the specific component.
8. Can we change the password of “Unistal 3 in 1”? Ans: Yes, you can change the password of “Unistal 3 in 1”.
9. Can we configure setting of “Unistal 3 in 1” at the time of installation?
Ans: Yes, you can configure the settings of “Unistal 3 in 1”.
10. How many components are available in “Unistal 3 in 1”?
Ans: Three components are there in “Unistal 3 in 1”.
11. Can we renew license of “Unistal 3 in 1” after expiry? Ans: yes.
12. Unistal 3 in 1” pop up any message before expiry? Ans: yes. Ans: yes
13. Before how many days “Unistal 3 in 1” warns about expiry? Ans: 10 days
14. If our system goes slow after installation of “Unistal 3 in 1” than what should we do?
Ans: First we need to check the system requirements, which should be fulfilled. Then we need to check for the software if any conflicting software is there in the
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved 56
system or not. (Make sure no conflicting software should be there). We need to run a deep scan of the system (there might be some viruses in the system) If everything is proper then we need to uninstall and reinstall the software again.
15. Can we convert “Unistal 3 in 1” from trial to retail? Ans: Yes we can convert the trail pack to retail product by using Activation key.
16. Can we uninstall any single component of “Unistal 3 in 1”? Ans: Yes we can uninstall the single component.
17. Unistal 3 in 1” has any default setting? Ans: Yes there are few default settings for every component.
18. Do you provide technical support? Ans: Yes. After your purchase you will receive a premium software product with step-by-step instructions. In the extremely rare case of a problem, our support team will give you step-by-step instructions to correct your issue. 100% Guaranteed.
19. If I want to monitor more than one computer, do I need to buy another license? Ans: An individual license is required for every computer that you wish to monitor.
20. Can we install the “Unistal 3 in 1” in Windows XP 64-bit? Ans: “Unistal 3 in 1” will not work on Windows XP 64-bit.