Académique Documents
Professionnel Documents
Culture Documents
Ltd
The entire risk of the use or the result of the use of this software and documentation remains with
the user. No part of this documentation may be reproduced in any means, electronic or
mechanical, for any purpose, except as expressed in the Software End User License Agreement.
User license of this software is valid for one year after the Activation.
This software and documentation are copyrighted. All other rights, including ownership of the
software, are reserved to Unistal Systems Pvt. Ltd. Unistal, Unistal 3 in 1 and the Unistal marks
are registered trademarks of Unistal Systems Pvt. Ltd. in India and elsewhere. Microsoft,
Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Windows 8 and Windows 8.1
are trademarks or registered trademarks of Microsoft Corporation. All other brand and product
names are trademarks or registered trademarks of the respective owners.
All rights, titles and interest in and to Unistal 3 in 1 and all copyright rights in and to Unistal 3
in 1 (including but not limited to any images, photographs, logos, animations, video, audio,
music, text, and "applets" incorporated into Unistal 3 in 1), the accompanying printed materials,
and any copies of Unistal 3 in 1 are owned by Unistal. Unistal 3 in 1 is protected by copyright
laws and international treaty provisions. Therefore, you must treat Unistal 3 in 1 like any other
copyrighted material. You may not copy the printed materials accompanying Unistal 3 in 1. You
must produce and include all copyright notices in their original form for all copies created
irrespective of the media or form in which Unistal 3 in 1 exists.
Copyright
Copyright 2007-2015. Unistal Systems Pvt. Ltd.
The software that accompanies this license (the "software") is the property of Unistal systems
Pvt. Ltd. or its licensors and is protected by the copyright law.
You may:
Use one copy of the software on a single computer and you may not transfer this to
another person or allow another person to use other versions.
Copy the software onto the hard disk of the computer and retain the original for archival
purposes.
You may not:
Copy the documentation which accompanies the software,
Install the software on the network,
Sublicense, rent or lease any portion of the software,
Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the
source code of the software.
Ownership
Notwithstanding anything to the contrary contained herein, except for the limited license rights
expressly provided herein, Unistal Systems Pvt. Ltd has and will retain all rights, title and
interest (including, without limitation, all patent, copyright, trademark, trade secret and other
intellectual property rights) in and to the Software and all copies, modifications and derivative
works thereof. End User acknowledges that it is obtaining only a limited license right to the
Software and that irrespective of any use of the words purchase, sale or like terms hereunder
no ownership rights are being conveyed to you under this Agreement or otherwise.
If requested, End User shall certify in writing that End User is using the Software for the number
of servers, with the number of copies, on the system configuration and at the site agreed upon by
the parties (as applicable). End User agrees that no more than once annually its use of the
Software may be audited by Unistal Systems Pvt. Ltd (or an independent auditor work on such
partys behalf) during normal business hours upon reasonable advance written notice for the
purpose of verifying End Users compliance with this EULA.
Confidentiality
End User acknowledges that, it may obtain information relating to the Software or Unistal
Systems Pvt. Ltd, including, but not limited to, any code, technology, know-how, ideas,
algorithms, testing procedures, structure, interfaces, specifications, documentation, bugs,
problem reports, analysis and performance information, and other technical, business, product,
and data (Confidential Information). End User shall not disclose Confidential Information to
any third party or use Confidential Information for any purpose other than the use of the
Software as licensed under the EULA.
Warranty Disclaimer
EXCEPT FOR ANY EXPRESS LIMITED WARRANTY OFFERED BY UNISTAL
SYSTEM PVT LTD FOR WHICH END USERS REMEDY IS LIMITED TO
REPAIR, REPLACEMENT OR REFUND BY UNISTAL SYSTEM PVT LTD, THE
SOFTWARE IS PROVIDED AS IS AND UNISTAL SYSTEM PVT LTD MAKES
NO WARRANTIES TO ANY PERSON OR ENTITY WITH RESPECT TO THE
SOFTWARE
OR
ANY
SERVICES
AND
DISCLAIMS
ALL
IMPLIED
WARRANTIES,
INCLUDING
WITHOUT
LIMITATION
WARRANTIES
OF
TITLE, NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Table of Contents
1.
Introduction .......................................................................................................................................... 8
2.
3.
4.
3.1.
3.2.
3.3.
Finish ........................................................................................................................................... 12
4.2.
4.3.
5.
Getting Started.................................................................................................................................... 25
6.
Features .............................................................................................................................. 32
6.2.2.
6.2.3.
6.2.4.
6.2.5.
6.2.6.
6.2.7.
6.2.8.
Features .............................................................................................................................. 39
6.3.2.
6.3.3.
6.3.4.
6.3.5.
6.3.6.
6.3.7.
6.3.8.
6.3.9.
6.3.10.
Update................................................................................................................................. 52
6.3.11.
Logout ................................................................................................................................. 53
7.
8.
FAQS ................................................................................................................................................... 55
1. Introduction
In recent scenario, Unistal 3 in 1 is the elite priority from the broader aspect for the entire
individual and corporate world which includes protection from Data Theft, Data Loss and
protection from unethical activity like Laptop Theft.
Crash Proof
Port Locker
Locate Laptop
2. System Requirements
You may install only on computers running the following operating systems:
Before installation, make sure that your computer meets the minimum system
requirements.
Note: To find out the Windows operating system your computers is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.
Minimum System Requirements
Operating System:
Windows XP (Service Pack 3)
Vista (Service Pack 1)
Windows 7
Windows 8
Windows 8.1
3. How To Install
For installing Unistal 3 in 1 either we have the installation disk or the product folder
downloaded from the internet. The installation process starts with double clicking the
Setup.exe file. This will start a setup wizard, which will guide you in installing. Before
running setup make sure, your system is covering minimum system requirements.
First checkpoint in installation is License Agreement. The license agreement needs to be
read properly and then accepted for continuing the installation process.
10
After selecting the additional task, welcome to installation wizard of Unistal 3 in 1 will
come into frame. Click next to start the installation of Unistal 3 in 1.
3.1.
Now in order to select the products, the dialog box display as Welcome
Wizard of Unistal 3 in 1. Please select the products you want to install.
to
install
11
3.2.
Installation Path
3.3.
Finish
Once installation is done, it will proceed to display all the components that has been
installed and marked as done in the dialogue box.
After finishing the Unistal 3 in 1, a set password dialogue box will display in order to set
the password. This password in used for further authentication process of Unistal 3 in 1.
User needs to enter a password with the given requirements and then confirm the same.
The requirements for the password are:
12
13
4. Product Registration
While registering the product, it will ask for the key number.
14
Now it will ask for the user details to complete the registration process.
15
This represents offline registration using the activation code received by the user when PC is
not connected to the internet.
On clicking the next button, it asks for the password you set earlier.
16
Note: Unistal 3 in 1 offline activation dialog box will prompt which display the message
as:
Unistal3in1LL_ activation .exe file is created. Copy this file from desktop and run
from any internet enabled PC. After filling the registration form, you will get 20 Digit
offline activation code.
17
On clicking the OK, automatically the Unistal3in1LL_ activation.exe file will be generated
on users desktop that needs to be executed from a internet connected PC.
On executing this executable from a internet connected PC, below screen will appear.
Click on the Register now and the registration form will be displayed.
18
19
Now open Unistal 3 in 1application from Start Menu. Below window will get open.
20
Select Offline registration and click Next. Below screen will get open.
21
Fill in your Key number and 20 digit offline activation code. Your product will get register
and you will get the success message as below.
22
23
24
5. Getting Started
From Desktop
User can run the Unistal 3 in 1from the desktop through Unistal 3 in 1icon.
25
26
6.1.Crash Proof
The Crash Proof / Data Leakage Prevention feature of Unistal 3 in 1software creates
the image of our systems data, Image of file. Crash Proof helps the user to keep the
updated backup of data. This Software is designed to keep the image of the file
indexes/ disk properties and it keeps updating them at regular intervals. In this
business world, data volume have increased hence the computer dependency has also
increased. As the dependency increases the downtime increases as well due to data
loss and the data lost cost us more than the recreation cost. Data Recovery cannot
provide you the satisfactory results every time. So the users have the requirement of
Software that can help users to keep the image of the data. Crash Proof takes the image
of your data after regular intervals and this information is stored in a protected area.
You can recover the lost files with the help of this Software and you can un-format any
lost drive.
27
6.1.1. Features
Right click on Crash Proof icon, Select desired feature as shown in below image
to start that feature.
If you select Take Image feature, Crash Proof takes image of your system
details and generates a message in systray once image taking process is complete.
28
29
When File Recovery is Complete, Select the files which you want to save
30
31
Wiping of folders
Defragmentation of drive
Internet wipe
Registry cleaning
Registry restoring
Wiping of folders
It deletes the selected folder permanently
Defragmentation of drive
It analyses and defrag the selected drive.
Internet wipe
It wipes all the temporary internet files, internet history and internet cookies permanently.
Registry cleaning
It identifies and deletes those unwanted registries to improve the performance of the
computer system.
Registry restoring
It restores cleaned registries easily if needed.
32
33
Sometimes we want to delete some particular files from a folder. In this feature we can
select folder and can mention the extensions of the file (doc, xls, txt etc) we want to
delete. If we delete a f deleted from our system; it still remains as it is on
In this feature we can select a folder and mention all the extension files
which you want to wipe permanently so that it cant be removed.
34
Defragmentation of drive can be performed using this feature. Due to excessive usage
of files and folders fragmentation occurs in the drives. Fragmentation can hinder
overall throughput of the system. Due to fragmentation there can be loss of files results
in performance loss of the system. Defragging of drives attempts to elevate these
problems. By defragging the drive we can optimize the performance of our computer
system. Defragging reduces the amount of fragmentation and helps the computer
system to work efficiently. It analyses the selected drive and gives the information
weather the drive needs to be defragmented
35
When we use internet, all its information gets stored in the computer system. This
information includes list of the visited websites, cookies, information you have entered in
the web form (passwords, ID, name, address) . When we delete history it doesnt get
deleted from our system. Its still exist in the disk. Internet Wipe deletes the internet
history, temporary internet files and internet cookies permanently. Internet history
can be misused by third party. This feature ensures security of your system. It helps you
to protect your system from unwanted threats.
36
Registry cleaner is designed to help remove invalid references made in the registry
pointing to uninstalled program or other programs which are no longer in use by the
user. These programs are left behind in the registry causing several problems leading
to a poor system performance. By using Registry clean we can remove unwanted
registry entries from our system. We can optimize the performance of our system by
using this feature. We work on uncountable programs daily out of which few are of
least importance, but we do not get time to clean them manually.
37
Sometimes after registry cleanup we notice that some programs are not working
properly and some applications failed to function properly. This is due to missing
registry keys. This may be caused by shared keys which were deleted during the
registry cleaning or by other deleted keys. Sometimes we delete registry by mistake
and realize that the deleted file is of utmost importance. In that case we can use this
feature of registry restoration.
38
39
Using Locate Laptop, one can encrypt files & folders when stolen laptop is tracked by
web crawlers.
To encrypt the file & folders follow the steps discussed below:
After installing & registering the Locate Laptop, software displays following screen.
Or same can be accessed later from Start >All Programs >Unistal3in1LL>Locate
Laptop.
40
If you want to encrypt some files & folders, choose 'Do you want to encrypt folders
when the stolen laptop is tracked by web crawlers?' option at the top of the screen.
Then click... button to browse & select crucial files/folders to be encrypted.
Select the files & folders to encrypt, click OK.
Choose 'Encrypt Selected Folders even if Laptop is not connected to internet for'
selected period. Click Apply.
Choosing this option for <1> days will automatically encrypt all the selected files &
folders after <1> days if Laptop does not connect to internet for 1 consecutive days.
Also when you submit a theft report on www.protegent.in then online encryption
module gets activated and as soon as unauthorized user will connect your laptop to
internet, all predefined file & folders will be encrypted.
Note: To add more files or folder using the Encryption module, you will be asked
for Username & Password, which is same as you entered during product registration.
41
To decrypt files & folders select Locate Laptop from Start >Programs >
Unistal3in1LL> Locate laptop.
Select Decrypt Folders and click Start.
42
In order to file a theft, user need to visit the www.protegent.in where user need to fill
the user name and the password which is already set while installing the software
43
After login the user name and the password, user will land up on the home page
where he find the list in grid manner as
44
45
On clicking the view personal information, user can view his personal information.
46
On clicking the update personal information, user can update his personal
information.
After this, user needs to click on the update information once he updated his
information. Or else cancel if he is not interested to update his personal information.
47
User can update details using Update theft report/ attached documents
User can attach the FIR including the personal details,
Laptop Details
Report Theft
Stolen location Details
In case if the user finds his laptop back, user can to withdraw the report theft using
Withdraw theft report/ report laptop recovery
48
49
On clicking the laptop statistics, user can view the laptop location reports for a given
duration.
On clicking on the view location report, user can get the complete details of his stolen
laptop includes
Date
Time
Static IP Address
Local IP Address
Country
Region
City
Internet Service Provider
Organization
Longitude
Latitude
50
51
6.3.10. Update
52
6.3.11. Logout
53
7. COMPANY OVERVIEW
Unistal Systems Pvt. Ltd. is the Data Care Industry's largest, most experienced and
technologically advanced provider of data recovery products and services. In case
of any kind of data loss on any type of computer storage media, Unistal has a
solution with fast, advanced and cost-effective products and services - ranging
from do-it-yourself software products, data loss prevention solutions to 24/7/365
services network. With nearly 19 years experience performing successful data
recoveries, Unistal has served customers across the globe including Secret
services, government agencies, corporate houses, and numerous computer users.
Unistal has developed the industry's widest range of data recovery products and
services, providing desktop, laptop, server, email, and database and tape
recoveries for all media types and operating systems - anywhere, anytime.
Headquartered right in the heart of New Delhi has four offices and 14 service labs
strategically located across India.
Unistal's decade long experience in data recovery services has helped to
continuously evolve new methods of retrieving data, provide business continuity
solutions, disaster recovery solutions, data loss prevention and data recovery
software.
54
8. FAQS
1.
2.
3.
4.
5.
6.
7.
8.
9.
55
system or not. (Make sure no conflicting software should be there). We need to run a
deep scan of the system (there might be some viruses in the system) If everything is
proper then we need to uninstall and reinstall the software again.
56