Vous êtes sur la page 1sur 56

License Agreement - Unistal Systems Pvt.

Ltd
The entire risk of the use or the result of the use of this software and documentation remains with
the user. No part of this documentation may be reproduced in any means, electronic or
mechanical, for any purpose, except as expressed in the Software End User License Agreement.
User license of this software is valid for one year after the Activation.
This software and documentation are copyrighted. All other rights, including ownership of the
software, are reserved to Unistal Systems Pvt. Ltd. Unistal, Unistal 3 in 1 and the Unistal marks
are registered trademarks of Unistal Systems Pvt. Ltd. in India and elsewhere. Microsoft,
Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Windows 8 and Windows 8.1
are trademarks or registered trademarks of Microsoft Corporation. All other brand and product
names are trademarks or registered trademarks of the respective owners.
All rights, titles and interest in and to Unistal 3 in 1 and all copyright rights in and to Unistal 3
in 1 (including but not limited to any images, photographs, logos, animations, video, audio,
music, text, and "applets" incorporated into Unistal 3 in 1), the accompanying printed materials,
and any copies of Unistal 3 in 1 are owned by Unistal. Unistal 3 in 1 is protected by copyright
laws and international treaty provisions. Therefore, you must treat Unistal 3 in 1 like any other
copyrighted material. You may not copy the printed materials accompanying Unistal 3 in 1. You
must produce and include all copyright notices in their original form for all copies created
irrespective of the media or form in which Unistal 3 in 1 exists.

Copyright
Copyright 2007-2015. Unistal Systems Pvt. Ltd.
The software that accompanies this license (the "software") is the property of Unistal systems
Pvt. Ltd. or its licensors and is protected by the copyright law.
You may:
Use one copy of the software on a single computer and you may not transfer this to
another person or allow another person to use other versions.
Copy the software onto the hard disk of the computer and retain the original for archival
purposes.
You may not:
Copy the documentation which accompanies the software,
Install the software on the network,
Sublicense, rent or lease any portion of the software,
Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the
source code of the software.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

Unistal 3 in 1- End User License Minimum Terms


This End User License Agreement (EULA) governs use of software (Software) from Unistal
Systems Pvt. Ltd. References to End User in this EULA refer to any entity or individual which
has obtained a copy of the Software from Unistal Systems Pvt. Ltd.
Limited License
Subject to all of the terms and conditions of this EULA, Unistal Systems Pvt. Ltd grants to End
User a non-transferable, non-sub licensable, non-exclusive license to use the object code form of
the Software internally, but only in accordance with the technical specification documentation
generally made available with the Software. Software shall also include any documentation
and any support and maintenance releases of the same Software provided to End User.
Application Software
You may install and use the Software, on as many computers as necessary with the limitation
imposed by the total number of licensed users. You may make one additional copy for back-up
purpose.
Term of License
The license granted hereunder shall commence on the purchasing date of the Software and shall
expire at the end of the period for which the license is purchased.
Restrictions
End User shall not (and shall not allow any third party to): (a) decompile, disassemble, or
otherwise reverse engineer the Software or attempt to reconstruct or discover any source code,
underlying ideas, algorithms, file formats or programming interfaces of the Software by any
means whatsoever (except and only to the extent that applicable law prohibits or restricts reverse
engineering restrictions, and then only with prior written notice to Unistal Systems Pvt. Ltd); (b)
distribute, sell, sublicense, rent, lease or use the Software (or any portion thereof) for time
sharing, hosting, service provider or like purposes; (c) remove any product identification,
proprietary, copyright or other notices contained in the Software; (d) modify or create a
derivative work of any part of the Software, except to the extent expressly authorized in writing
by Unistal Systems Pvt. Ltd; or (e) publicly disseminate performance information or analysis
(including, without limitation, benchmarks) from any source relating to the Software.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

Ownership
Notwithstanding anything to the contrary contained herein, except for the limited license rights
expressly provided herein, Unistal Systems Pvt. Ltd has and will retain all rights, title and
interest (including, without limitation, all patent, copyright, trademark, trade secret and other
intellectual property rights) in and to the Software and all copies, modifications and derivative
works thereof. End User acknowledges that it is obtaining only a limited license right to the
Software and that irrespective of any use of the words purchase, sale or like terms hereunder
no ownership rights are being conveyed to you under this Agreement or otherwise.
If requested, End User shall certify in writing that End User is using the Software for the number
of servers, with the number of copies, on the system configuration and at the site agreed upon by
the parties (as applicable). End User agrees that no more than once annually its use of the
Software may be audited by Unistal Systems Pvt. Ltd (or an independent auditor work on such
partys behalf) during normal business hours upon reasonable advance written notice for the
purpose of verifying End Users compliance with this EULA.

Confidentiality
End User acknowledges that, it may obtain information relating to the Software or Unistal
Systems Pvt. Ltd, including, but not limited to, any code, technology, know-how, ideas,
algorithms, testing procedures, structure, interfaces, specifications, documentation, bugs,
problem reports, analysis and performance information, and other technical, business, product,
and data (Confidential Information). End User shall not disclose Confidential Information to
any third party or use Confidential Information for any purpose other than the use of the
Software as licensed under the EULA.

Warranty Disclaimer
EXCEPT FOR ANY EXPRESS LIMITED WARRANTY OFFERED BY UNISTAL
SYSTEM PVT LTD FOR WHICH END USERS REMEDY IS LIMITED TO
REPAIR, REPLACEMENT OR REFUND BY UNISTAL SYSTEM PVT LTD, THE
SOFTWARE IS PROVIDED AS IS AND UNISTAL SYSTEM PVT LTD MAKES
NO WARRANTIES TO ANY PERSON OR ENTITY WITH RESPECT TO THE
SOFTWARE
OR
ANY
SERVICES
AND
DISCLAIMS
ALL
IMPLIED
WARRANTIES,
INCLUDING
WITHOUT
LIMITATION
WARRANTIES
OF
TITLE, NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

Limitation of Damages and Remedies


IN NO EVENT SHALL UNISTAL SYSTEM PVT LTD BE LIABLE UNDER CONTRACT,
TORT, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY
INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE SOFTWARE. NOTWITHSTANDING ANYTHING HEREIN TO
THE CONTRARY, THE TOTAL LIABILITY OF UNISTAL SYSTEM PVT LTD TO END
USER, INCLUDING BUT NOT LIMITED TO DAMAGES OR LIABILITY ARISING OUT
OF CONTRACT, TORT, BREACH OF WARRANTY, INFRINGEMENT OR OTHERWISE,
SHALL NOT IN ANY EVENT EXCEED THE FEES PAID BY END USER WITH RESPECT
TO THE SOFTWARE. UNISTAL SYSTEM PVT LTD SHALL NOT BE LIABLE FOR LOSS
OR INACCURACY OF DATA, COST OF PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, SYSTEM DOWNTIME, FAILURE OF SECURITY MECHANISMS,
GOODWILL, PROFITS OR OTHER BUSINESS LOSS, REGARDLESS OF LEGAL
THEORY, EVEN IF UNISTAL SYSTEM PVT LTD HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
THE PARTIES AGREE THAT THE LIMITATIONS OF THIS SECTION ARE ESSENTIAL
AND THAT UNISTAL SYSTEM PVT LTD WOULD NOT PERMIT END USER TO USE
THE SOFTWARE ABSENT THE TERMS OF THIS SECTION. THIS SECTION SHALL
SURVIVE AND APPLY EVEN IF ANY REMEDY SPECIFIED IN THIS EULA SHALL BE
FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.
THIS SOFTWARE IS NOT FAULT-TOLERANT AND IS NOT DESIGNED OR INTENDED
FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE
PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT FOR USE IN THE
OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, OR
COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFESUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR
INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL
INJURY OR PROPERTY DAMAGE.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

Termination and Survival


Upon any termination of this EULA, End User shall immediately cease use of the Software and
remove all Software from its systems. The terms set forth in the sections entitled Restrictions,
Ownership, Confidentiality, Warranty Disclaimer, Limitation of Damages and Remedies shall
survive any termination of this EULA.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

Table of Contents
1.

Introduction .......................................................................................................................................... 8

2.

System Requirements ........................................................................................................................... 9

3.

How To Install ..................................................................................................................................... 10

4.

3.1.

Preparing to Install Unistal 3 in 1 ................................................................................................ 11

3.2.

Installation Path .......................................................................................................................... 12

3.3.

Finish ........................................................................................................................................... 12

Product Registration ........................................................................................................................... 14


4.1.

When PC is connected to the internet ........................................................................................ 14

4.2.

When PC is not connected to the internet or act as offline ....................................................... 16

4.3.

To Evaluate the Product.............................................................................................................. 23

5.

Getting Started.................................................................................................................................... 25

6.

Unistal 3 in 1 Working Guide .............................................................................................................. 27


6.1. Crash Proof ...................................................................................................................................... 27
6.1.1. Features ..................................................................................................................................... 28
6.1.2. Crash Proof Startup ................................................................................................................... 28
6.1.3. Scheduler Settings ..................................................................................................................... 29
6.1.4. File Recovery ............................................................................................................................ 29
6.2. SysBoost (System Tuneup Software) .............................................................................................. 32
6.2.1.

Features .............................................................................................................................. 32

6.2.2.

Sys Boost Startup ................................................................................................................ 32

6.2.3.

Sys Boost Select and Wipe ............................................................................................... 33

6.2.4.

Sys Boost Select Extensions .............................................................................................. 34

6.2.5.

Sys Boost- Defrag drive ....................................................................................................... 35

6.2.6.

Sys Boost Internet Wipe ................................................................................................... 36

6.2.7.

Sys Boost Registry Clean .................................................................................................. 37

6.2.8.

Sys Boost Registry Restore ............................................................................................... 38

6.3. Locate Laptop .................................................................................................................................. 39


6.3.1.

Features .............................................................................................................................. 39

6.3.2.

Locate Laptop Startup ......................................................................................................... 39

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

6.3.3.

Locate Laptop - Encrypt Files & Folders .............................................................................. 40

6.3.4.

Locate Laptop - Decrypt Files & Folders ............................................................................. 42

6.3.5.

View personal information ................................................................................................. 46

6.3.6.

Update personal information ............................................................................................. 47

6.3.7.

Report Theft ........................................................................................................................ 48

6.3.8.

Update and Withdraw Theft Report ................................................................................... 48

6.3.9.

Laptop Statistics .................................................................................................................. 50

6.3.10.

Update................................................................................................................................. 52

6.3.11.

Logout ................................................................................................................................. 53

7.

COMPANY OVERVIEW ......................................................................................................................... 54

8.

FAQS ................................................................................................................................................... 55

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

1. Introduction
In recent scenario, Unistal 3 in 1 is the elite priority from the broader aspect for the entire
individual and corporate world which includes protection from Data Theft, Data Loss and
protection from unethical activity like Laptop Theft.

Unistal 3 in 1 has 3-tier protection. It includes following software components:

Crash Proof
Port Locker
Locate Laptop

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

2. System Requirements
You may install only on computers running the following operating systems:

Windows XP with Service Pack 2


Windows Vista with Service Pack 1
Windows 7
Windows 8
Windows 8.1

Before installation, make sure that your computer meets the minimum system
requirements.
Note: To find out the Windows operating system your computers is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.
Minimum System Requirements

Operating System:
Windows XP (Service Pack 3)
Vista (Service Pack 1)
Windows 7
Windows 8
Windows 8.1

CPU: 450 MHZ


RAM: 512 MB
HDD: 100 MB

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

3. How To Install
For installing Unistal 3 in 1 either we have the installation disk or the product folder
downloaded from the internet. The installation process starts with double clicking the
Setup.exe file. This will start a setup wizard, which will guide you in installing. Before
running setup make sure, your system is covering minimum system requirements.
First checkpoint in installation is License Agreement. The license agreement needs to be
read properly and then accepted for continuing the installation process.

The second step is to select the additional task as:

Create a desktop icon.


Create a Quick Launch icon.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

10

After selecting the additional task, welcome to installation wizard of Unistal 3 in 1 will
come into frame. Click next to start the installation of Unistal 3 in 1.

3.1.

Preparing to Install Unistal 3 in 1

Now in order to select the products, the dialog box display as Welcome
Wizard of Unistal 3 in 1. Please select the products you want to install.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

to

install

11

3.2.

Installation Path

By default, Unistal 3 in 1 will be installed in C:\Program Files\Unistal3in1LL.


Click Next to start the installation.

3.3.

Finish

Once installation is done, it will proceed to display all the components that has been
installed and marked as done in the dialogue box.

After finishing the Unistal 3 in 1, a set password dialogue box will display in order to set
the password. This password in used for further authentication process of Unistal 3 in 1.
User needs to enter a password with the given requirements and then confirm the same.
The requirements for the password are:

Password length should be minimum 6


characters.
Special characters are not allowed.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

12

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

13

4. Product Registration

4.1. When PC is connected to the internet

While registering the product, it will ask for the key number.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

14

Enter Key Number and click Next button.

Now it will ask for the user details to complete the registration process.

Fill all the user details and click Register button.


On clicking register button, you get acknowledgment for registration (Registration is
successfully done) And below screen will pop up.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

15

4.2. When PC is not connected to the internet or act as offline

This represents offline registration using the activation code received by the user when PC is
not connected to the internet.
On clicking the next button, it asks for the password you set earlier.

On clicking ok, it will ask for the key number.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

16

Enter key number and click Next.

Note: Unistal 3 in 1 offline activation dialog box will prompt which display the message
as:

Unistal3in1LL_ activation .exe file is created. Copy this file from desktop and run
from any internet enabled PC. After filling the registration form, you will get 20 Digit
offline activation code.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

17

On clicking the OK, automatically the Unistal3in1LL_ activation.exe file will be generated
on users desktop that needs to be executed from a internet connected PC.

On executing this executable from a internet connected PC, below screen will appear.

Click on the Register now and the registration form will be displayed.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

18

Fill the form and click on Register button.


Web page will show the acknowledgement for successful registration and will display the
20 digit Offline Activation Code. Same activation code is sent to your email id as well.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

19

Now open Unistal 3 in 1application from Start Menu. Below window will get open.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

20

Click on License Info. Below screen will get open.

Click on Activate License. Below screen will get open.

Select Offline registration and click Next. Below screen will get open.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

21

Fill in your Key number and 20 digit offline activation code. Your product will get register
and you will get the success message as below.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

22

4.3. To Evaluate the Product

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

23

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

24

5. Getting Started

From Desktop
User can run the Unistal 3 in 1from the desktop through Unistal 3 in 1icon.

From Start Menu


Click on Start All Programs Unistal3in1LL Unistal 3 in 1

Now to run the Unistal 3 in 1, user need to enter the password.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

25

On clicking Ok, below screen appears.

Select the desired module and click Start.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

26

6. Unistal 3 in 1 Working Guide

6.1.Crash Proof
The Crash Proof / Data Leakage Prevention feature of Unistal 3 in 1software creates
the image of our systems data, Image of file. Crash Proof helps the user to keep the
updated backup of data. This Software is designed to keep the image of the file
indexes/ disk properties and it keeps updating them at regular intervals. In this
business world, data volume have increased hence the computer dependency has also
increased. As the dependency increases the downtime increases as well due to data
loss and the data lost cost us more than the recreation cost. Data Recovery cannot
provide you the satisfactory results every time. So the users have the requirement of
Software that can help users to keep the image of the data. Crash Proof takes the image
of your data after regular intervals and this information is stored in a protected area.
You can recover the lost files with the help of this Software and you can un-format any
lost drive.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

27

6.1.1. Features

A new concept in data loss prevention


Unique un-format feature
Revival with original file name
Revival if files/directories are deleted
Revival if any virus has crashed the hard disk
Revival if disk is not booting
Revival if hard disk partitions are corrupted
Revival if fat/MFT is corrupted
Revival if root directory is damaged
Revival if partition is recreated
Revival of files deleted few days back
Recovery of fragmented files

6.1.2. Crash Proof Startup

Crash proof icon gets created in task bar.

Right click on Crash Proof icon, Select desired feature as shown in below image
to start that feature.

If you select Take Image feature, Crash Proof takes image of your system
details and generates a message in systray once image taking process is complete.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

28

6.1.3. Scheduler Settings


You can schedule the software for the intervals for taking image and
updating the software by selecting the desired "Update Image" option as
displayed in following image:

6.1.4. File Recovery


If you want to restore any previously taken image, File Recovery will be used. Select
the date of image from which you want to recover data

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

29

Once selected the image date then, click next.

Click on the radio button of Hard disk.

When File Recovery is Complete, Select the files which you want to save

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

30

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

31

6.2. SysBoost (System Tuneup Software)


Sysboost is system tuneup software which is easy to use and developed for Microsoft
Windows which helps to manage, maintain, optimize a computer system. It improves
bootup time and overall performance by cleaning junk registry, junk files and folders,
temporary internet files and by performing defragmentation of drives.
This software - analyses the registry and brings out the unwanted registries to clean.
Backup of wiping folders can also be taken and can be restored for future usage.
Registries which are deleted can be restored easily if you want.
6.2.1. Features

Wiping of folders
Defragmentation of drive
Internet wipe
Registry cleaning
Registry restoring

Wiping of folders
It deletes the selected folder permanently
Defragmentation of drive
It analyses and defrag the selected drive.
Internet wipe
It wipes all the temporary internet files, internet history and internet cookies permanently.
Registry cleaning
It identifies and deletes those unwanted registries to improve the performance of the
computer system.
Registry restoring
It restores cleaned registries easily if needed.

6.2.2. Sys Boost Startup

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

32

6.2.3. Sys Boost Select and Wipe

Select and Wipe is used to wipe particular file(s)/folder(s). Click on


Select and Wipe tab. Here you can select file(s)/folder(s), you want to
wipe using check marks against each file and folder. Check the option
"Remove Links from Recent Folder" for removing links from recent
folder, containing the links of recently opened files.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

33

6.2.4. Sys Boost Select Extensions

Sometimes we want to delete some particular files from a folder. In this feature we can
select folder and can mention the extensions of the file (doc, xls, txt etc) we want to
delete. If we delete a f deleted from our system; it still remains as it is on
In this feature we can select a folder and mention all the extension files
which you want to wipe permanently so that it cant be removed.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

34

6.2.5. Sys Boost- Defrag drive

Defragmentation of drive can be performed using this feature. Due to excessive usage
of files and folders fragmentation occurs in the drives. Fragmentation can hinder
overall throughput of the system. Due to fragmentation there can be loss of files results
in performance loss of the system. Defragging of drives attempts to elevate these
problems. By defragging the drive we can optimize the performance of our computer
system. Defragging reduces the amount of fragmentation and helps the computer
system to work efficiently. It analyses the selected drive and gives the information
weather the drive needs to be defragmented

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

35

6.2.6. Sys Boost Internet Wipe

When we use internet, all its information gets stored in the computer system. This
information includes list of the visited websites, cookies, information you have entered in
the web form (passwords, ID, name, address) . When we delete history it doesnt get
deleted from our system. Its still exist in the disk. Internet Wipe deletes the internet
history, temporary internet files and internet cookies permanently. Internet history
can be misused by third party. This feature ensures security of your system. It helps you
to protect your system from unwanted threats.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

36

6.2.7. Sys Boost Registry Clean

Registry cleaner is designed to help remove invalid references made in the registry
pointing to uninstalled program or other programs which are no longer in use by the
user. These programs are left behind in the registry causing several problems leading
to a poor system performance. By using Registry clean we can remove unwanted
registry entries from our system. We can optimize the performance of our system by
using this feature. We work on uncountable programs daily out of which few are of
least importance, but we do not get time to clean them manually.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

37

6.2.8. Sys Boost Registry Restore

Sometimes after registry cleanup we notice that some programs are not working
properly and some applications failed to function properly. This is due to missing
registry keys. This may be caused by shared keys which were deleted during the
registry cleaning or by other deleted keys. Sometimes we delete registry by mistake
and realize that the deleted file is of utmost importance. In that case we can use this
feature of registry restoration.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

38

6.3. Locate Laptop


Locate Laptop is not only able to track your laptops location if it has gone to
unauthorized person but also for employers, it is the best way to track employee
location. This tracking facility will continuously inform you about the location of the
laptop. This laptop tracking module will provide you the complete information about the
location of the laptop, its IP address, Internet Service Provider along with date and time
without knowledge the of laptop user.
The data encryption feature of Locate Laptop provides the facility to encrypt crucial data
in case of laptop theft or missing. If user doesnt get connect to the internet for a certain
period of time or laptop theft is detected then your data will be encrypted.
6.3.1. Features
Secure web page for every user to monitor - Keep a close eye on movements of
person with the designated Laptop e.g. company employee.
Reports contain information on data, time, public IP, Locate, country, state, city, ISP,
Longitude, Latitude.
Interactive steps to report a laptop theft
Remotely launch the data encryption module on predefined sensitive files & folders
Encrypts data even if Laptop is not connected to internet for particular period.

6.3.2. Locate Laptop Startup

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

39

6.3.3. Locate Laptop - Encrypt Files & Folders

Using Locate Laptop, one can encrypt files & folders when stolen laptop is tracked by
web crawlers.
To encrypt the file & folders follow the steps discussed below:
After installing & registering the Locate Laptop, software displays following screen.
Or same can be accessed later from Start >All Programs >Unistal3in1LL>Locate
Laptop.

Select Encrypt Folders and click Start.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

40

If you want to encrypt some files & folders, choose 'Do you want to encrypt folders
when the stolen laptop is tracked by web crawlers?' option at the top of the screen.
Then click... button to browse & select crucial files/folders to be encrypted.
Select the files & folders to encrypt, click OK.
Choose 'Encrypt Selected Folders even if Laptop is not connected to internet for'
selected period. Click Apply.
Choosing this option for <1> days will automatically encrypt all the selected files &
folders after <1> days if Laptop does not connect to internet for 1 consecutive days.
Also when you submit a theft report on www.protegent.in then online encryption
module gets activated and as soon as unauthorized user will connect your laptop to
internet, all predefined file & folders will be encrypted.

Note: To add more files or folder using the Encryption module, you will be asked
for Username & Password, which is same as you entered during product registration.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

41

6.3.4. Locate Laptop - Decrypt Files & Folders

To decrypt files & folders select Locate Laptop from Start >Programs >
Unistal3in1LL> Locate laptop.
Select Decrypt Folders and click Start.

Encrypted folders will be shown as below or click on to select.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

42

After this click Decrypt.

In order to file a theft, user need to visit the www.protegent.in where user need to fill
the user name and the password which is already set while installing the software

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

43

After login the user name and the password, user will land up on the home page
where he find the list in grid manner as

View personal information


Update personal information
Report Theft
Laptop Statistics
Update
Logout

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

44

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

45

6.3.5. View personal information

On clicking the view personal information, user can view his personal information.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

46

6.3.6. Update personal information

On clicking the update personal information, user can update his personal
information.
After this, user needs to click on the update information once he updated his
information. Or else cancel if he is not interested to update his personal information.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

47

6.3.7. Report Theft

6.3.8. Update and Withdraw Theft Report

User can update details using Update theft report/ attached documents
User can attach the FIR including the personal details,
Laptop Details
Report Theft
Stolen location Details

In case if the user finds his laptop back, user can to withdraw the report theft using
Withdraw theft report/ report laptop recovery

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

48

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

49

6.3.9. Laptop Statistics

On clicking the laptop statistics, user can view the laptop location reports for a given
duration.

On clicking on the view location report, user can get the complete details of his stolen
laptop includes

Date
Time
Static IP Address
Local IP Address
Country
Region
City
Internet Service Provider
Organization
Longitude
Latitude

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

50

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

51

6.3.10. Update

In order to update the product user needs to click on the update:

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

52

6.3.11. Logout

Click logout button in order to get logout.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

53

7. COMPANY OVERVIEW
Unistal Systems Pvt. Ltd. is the Data Care Industry's largest, most experienced and
technologically advanced provider of data recovery products and services. In case
of any kind of data loss on any type of computer storage media, Unistal has a
solution with fast, advanced and cost-effective products and services - ranging
from do-it-yourself software products, data loss prevention solutions to 24/7/365
services network. With nearly 19 years experience performing successful data
recoveries, Unistal has served customers across the globe including Secret
services, government agencies, corporate houses, and numerous computer users.
Unistal has developed the industry's widest range of data recovery products and
services, providing desktop, laptop, server, email, and database and tape
recoveries for all media types and operating systems - anywhere, anytime.
Headquartered right in the heart of New Delhi has four offices and 14 service labs
strategically located across India.
Unistal's decade long experience in data recovery services has helped to
continuously evolve new methods of retrieving data, provide business continuity
solutions, disaster recovery solutions, data loss prevention and data recovery
software.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

54

8. FAQS

1.

If we install Unistal 3 in 1 than it slow down the speed of our system?


Ans: If all the system requirements are fulfilled then it will not slow down the
system if still it problem persist you need to reinstall the Unistal 3 in 1 because it
is not installed properly.

2.

Can we install Unistal 3 in 1 on windows 7 64-bit Service pack 1?


Ans: Yes we can install.

3.

After how many days Unistal 3 in 1 license will expire?


Ans: 370 days.

4.

After how many days trial pack of Unistal 3 in 1 will expire?


Ans: You can get the trail pack of 30 days.

5.

Can we check information about license any time?


Ans: You can check the license status any time.

6.

Can we install all components of Unistal 3 in 1 simultaneously?


Ans: You can install the entire component in one go.

7.

Can we install any specific component of Unistal 3 in 1?


Ans: Yes, you can install the specific component.

8.
9.

Can we change the password of Unistal 3 in 1?


Ans: Yes, you can change the password of Unistal 3 in 1.
Can we configure setting of Unistal 3 in 1 at the time of installation?
Ans: Yes, you can configure the settings of Unistal 3 in 1.

10. How many components are available in Unistal 3 in 1?


Ans: Three components are there in Unistal 3 in 1.
11. Can we renew license of Unistal 3 in 1 after expiry?
Ans: yes.
12. Unistal 3 in 1 pop up any message before expiry? Ans: yes.
Ans: yes
13. Before how many days Unistal 3 in 1 warns about expiry?
Ans: 10 days
14. If our system goes slow after installation of Unistal 3 in 1 than what should we
do?
Ans: First we need to check the system requirements, which should be fulfilled.
Then we need to check for the software if any conflicting software is there in the
2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

55

system or not. (Make sure no conflicting software should be there). We need to run a
deep scan of the system (there might be some viruses in the system) If everything is
proper then we need to uninstall and reinstall the software again.

15. Can we convert Unistal 3 in 1 from trial to retail?


Ans: Yes we can convert the trail pack to retail product by using Activation key.
16. Can we uninstall any single component of Unistal 3 in 1?
Ans: Yes we can uninstall the single component.
17. Unistal 3 in 1 has any default setting?
Ans: Yes there are few default settings for every component.
18. Do you provide technical support?
Ans: Yes. After your purchase you will receive a premium software product with
step-by-step instructions. In the extremely rare case of a problem, our support team
will give you step-by-step instructions to correct your issue. 100% Guaranteed.
19. If I want to monitor more than one computer, do I need to buy another license?
Ans: An individual license is required for every computer that you wish to monitor.
20. Can we install the Unistal 3 in 1 in Windows XP 64-bit?
Ans: Unistal 3 in 1 will not work on Windows XP 64-bit.

2007-2015 Unistal Systems Pvt. Ltd. All rights Reserved

56

Vous aimerez peut-être aussi