Vous êtes sur la page 1sur 15

Laptop/Desktop

Troubleshooting Guide

FAQ’s
Frequently Asked Questions (FAQ’s)

1. Is there an update for nTracker ANTI-THEFT?

SyNET constantly update nTracker software to provide most up to date


software for your laptop protection. Our new update files are usually distributed
through the patch files. However, there are times when the change in software
update requires completely new installation. New updated software can be found
here. http://www.synet.biz/nTracker/nTracker_patch.htm
Updates for nTracker ANTI-THEFT is available for free download for all
nTracker owners.

2. I have installed nTracker ANTI-THEFT on to my computer, and I have received


e-mail with nTracker.ntk attachment. How do I open or view this file?

When you have received e-mail from nTracker, this e-mail will have
nTracker.ntk attachment. This file can be in various ways.

1. If viewing from the nTracker installed computer, simply choose to open


this file.
2. If viewing from another computer without nTracker installed, simply
save the attachment file and drag into nTrackerViewer.exe file found in
nTracker CD-ROM.
3. If you do not have the CD available, download the nTrackerViewer.exe
file from our website.
http://www.synet.biz/nTracker/nTrackerViewer.exe

3. How does nTracker ANTI-THEFT protect my files when my when my nTracker


protected computer is lost?

nTracker ANTI-THEFT automatic protection setting is executed when both


boot count AND number of days elapsed is met.
*** Users must understand that nTracker automatic protection DOES NOT
execute immediately the very first time unauthorized user uses the lost or stolen
computer. For this reason, we recommend that you keep your most sensitive files
encrypted at all times using the manual encryption features found in
nTrackerViewer.exe. ***

4. How do I change the settings configured on nTracker?

You can change the nTracker setting by executing nTrackerViewer.exe file


found in nTracker installed computer. This can be done by running file found
in: C:\Program Files\nTrackerViewer\nTrackerViewer.exe.
Question and Answer

General Part

1. In the event that a computer is unable to be connected to communication


networks, can it be operated?
When a computer was not connected to communication networks after a
computer is robbed or lost, it can be operated until specified protection setting
is reached. Upon reaching specified limit, proper password must be entered. If
user failed to use a password more than three times, the function of personal
information protection and alarm will be executed according to automatic
protection setting.

2. In case of the lost computer, can the nTracker really help and find the
lost computer?
nTracker program sends e-mail with attachment to the owner of computer
providing information of location where the lost or stolen computer has been
used.
After filing theft report, by providing the information obtained via nTracker,
police or to the cyber investigation squad can use the information to quickly
find where your lost or stolen computer is.

3. Should the user monitor communication networks?


Our nTracker program directly transmits the information on computers to the
personal user's e-mail box. So it is enough for you to check your e-mail
occasionally.

4. What should I do after inputting user information?


After user has input the initial user information, the mail is transmitted to the e-
mail address created by user. An addresser should confirm whether the mail is
transmitted to his own name or mail address, and then download the attach file
and execute the file. It’s good ideal to check that nTracker is working properly
after the initial setup. Refer to Help of "nTrackerViewer Login" for more
information.

1
5. Does nTracker work with Dialup Modem?
nTracker works well even with Analog Dialup(56k) modem as long as Dialup
modem is connected with telephone line and nTracker does not require actual
internet connection from Dialup modem.

For Dialup modem connection, nTracker also sends E-mail notification to the
Owner, informing telephone number(instead of IP/ISP) who uses laptop PC at
that time. For Dialup connection only, it may take 10 seconds of telephone
charge(5~10 cents) at a time to be laid on the user and you may modify the
e-mail sending frequency up to 15 days to reduce telephone charge, using
“nTrackerViewer” easily.

6. Does nTracker work with Firewall programs?


Yes, nTracker works well with most of Firewall or Proxy server and can send
E-mail notification to the owner searching Public IP/ISP of the user of laptop
PC.

E-Mail Part

1. Can nTracker work even without e-mail setting of Windows Outlook or


Outlook Express?
- Yes, it can because NTracker has its own e-mail engine built-in.
- nTracker can send e-mail notice to the laptop owner with or without the
setting of Windows Outlook, Outlook Express.
- nTracker sends e-mail as long as it is connected with Internet.

2. In case sending e-mail, where is the e-mail server?


- nTracker does not use any kind of e-mail server which can raise personal
privacy issue.
- nTracker program works as e-mail server
- nTracker can make outgoing e-mail only.

3. When does e-mail notice executed or sent?


- First time when nTracker is installed on the laptop
- When each time user-predefined settings are met for e-mail notification.
- When IP address has changed to different IP (connection through different
ISP)

2
4. nTracker starts working after laptop completely boots.
nTracker stops working after e-mail notification is sent to the laptop owner
successfully.

5. What happens when nTracker fails to make successful e-mail notification


to the owner?
If it fails to send e-mail notification, nTracker attempts to send e-mail again
after 3~4 minutes (3~5 attempt in total).
If it fails with all 3~5 attempt, nTracker terminate its process. (Usually caused
by wrong e-mail address or mail server problem)
nTracker will attempt again after each booting.

6. In case wrong e-mail address of laptop user was set:


E-mail address should be corrected by running C:\Program
files\ntrackerViewer\ntrackerViewer.exe
For modification, Correct Password is required.

7. How happened if the user does not know the password when Logon after
booting?
nTracker starts working 10~20 seconds after logon windows is displayed and
enters into nTracker Auto Protection Mode to protect the data/file/information.
nTracker sends e-mail to the laptop owner, when connection with Internet is
available.

3
Auto Protection Part

1. Alarm Function
nTracker’ alarm function generally works like screen saver, which displays
warning message (3 types) with contact information, (e-mail address,
telephone number) while informing user to contact the owner of laptop PC.
Warning Messages Setting
- Disable: When checked “Disable”, nTracker does not display any warning
message.
- Theme 1: Courteous Persuasion message
- Theme 2: Humorous Message
- Theme 3: Severe Warning Message
Each Theme has 2 images, which changes continuously alternates.

2. Folder Encryption.
nTracker can protect information leak by using its folder encryption function.
nTracker can initially encrypt 3 folders maximum.
Folder to be encrypted must have Maximum folder name of 255 Bytes.
Following folders cannot be encrypted:
- System Folder ( ex) C:\windows\System folder; C:\windows, ..)
- Entire Drive: ex) C:\, D:\, ..
- Removable Drive: Network Drive,CD-Rom, FDD, …

3. Encryption/Decryption Processing Method


- Symmetric key type algorithm.
- Whole Encryption/Decryption on the files, byte by byte.
- Encryption/Decryption Processing Time
- Approx.100Mb/min
- Need additional 20~40% of time in case encryption and decryption of large
size of Audio Video files

4. Others.
- After file encryption, do not change password.
- Decryption cannot execute if the password is different.

4
5. Automatic Protection Execution Conditions
This function works only when all 3 following conditions are met:
Must meet the boot count frequency defined by user
Must elapse user defined date interval since last e-mail notification.
Change to non-registered network, different IP (ISP)
- from the IP(ISP) which nTracker installed for the first time
- from the IP(ISP) which the owner inputs correct password and received
first e-mail notice

6. Booting frequency and Date interval


Select one from 3 types of booting frequency and date interval:
- 5 times/7 days
- 10 times/15 days
- 15 times/30 days
Booting frequency: Only one booting count per day

7. Date Interval:
First time installation date or from the date correct password is input on the first
e-mail notification (Password is required to open the nTracker.ntk file which
contains full detail user information, laptop information and current laptop
location information)

8. IP (ISP) Verification Method


nTracker manages multiple IP(ISP) addresses as authorized IPs(ISPs).
nTracker recognizes laptop owner’s home IP(ISP) and office IP(ISP) as
authorized IP(ISP) mostly, through the password recognition when receipt of
first e-mail notice.
Auto Protection Mode of nTracker does not execute on the authorized IP (ISP).

9. IP (ISP) Authorization Process


Such IP (ISP) address used when nTracker is installed first time.
Such IP (ISP) address used when laptop owner inputs correct password to
open nTracker.ntk file attached to the e-mail.
Such IP (ISP) address used when laptop owner inputs correct password when
nTracker makes alarm function upon user defined setting.

5
10. Clearing point of times of Booting frequency and Date Interval
Booting frequency/date Interval will be re-initialized from the beginning when
nTracker authorizes IP (ISP) address with correct password recognition on
nTracker.ntk file attached to the e-mail.

11. Auto Protection Mode Process under ON-Line (which is connected with
Internet)
nTracker shows Password screen
User inputs correct PasswordÆ Auto Protection Mode is not executed and
regards the current IP (ISP) as an authorized, then, Auto Protection Mode will
not executed from this IP (ISP) address.

12. Auto Protection Mode Process under OFF-Line (which is not


connected with Internet)
Auto Protection Mode will be executed when Booting frequency and Date
Interval are met with pre-defined setting values.
Alarm function does not work (even though user originally made setting for this
function because there are usually lots of OFF-Line situation which are actually
not stolen or lost laptop.)

13. Cannot open file because it is encrypted.


”nTrackerViewer.exe” is executed at nTracker CD or C:\Program
files\nTrackerViewer. Add encrypted folder to Encrypted Folder list at Folder
Encryption/Decryption window

14. Password is forgotten.


Without correct password, you cannot open nTracker attached file
(“nTracker.ntk”) and cannot uninstall nTracker program and cannot modify any
information pre-defined. User Information exists only at User PC.
For this case, please contact SyNET Tech Support by e-mail at
support@synet.biz.

6
15. Automatic Protection Mode- Sample Explanation

1) Install nTracker at office on Feb 1, 2004


-Mail sending frequency; 3 days
-Automatic Protection Mode; 5 times/ 7 days
-Select Alarm function, Theme #1
-Folder Encryption; My Documents
-nTracker sends e-mail as office IP(ISP) is authorized.

2) Use Laptop PC at office on Feb 2, 2004


-nTracker does not send e-mail (original user place)
-Automatic Protection Mode does not execute (Current Booting
frequency and Date Interval: 1/1)

3) Use Laptop PC at home on Feb 3, 2004


-nTracker sends e-mail to the user (owner) because of IP(ISP) address
has been changed.
-Open the e-mail attached “nTracker.ntk” file.
nTracker regards home IP(ISP) address as authorized with correct
password recognition.
- Clearing Booting frequency and Date collapsed and re-initialized.
(Current Booting frequency and Date Interval is 0/0).
- From now, Automatic Protection Mode will not execute at home.

4) Use Laptop PC at office on Feb 4, 2004


-nTracker does not send e-mail as office IP (ISP) is authorized.
-Automatic Protection Mode does not execute (Current Booting
frequency and Date Interval: 1/1)

5) Use Laptop PC at office on Feb 6, 2004


-nTracker sends e-mail as user set e-mail sending frequency every 3
days.
-Automatic Protection Mode does not work (Current Booting frequency
and Date Interval: 2/3)

6) Use Laptop PC at office on Feb 7, 2004


-nTracker does not send e-mail as office IP (ISP) is authorized.

7
-Automatic Protection Mode does not execute (Current Booting
frequency and Date Interval: 3/4)

7) Use Laptop PC at office on Feb 9, 2004


-nTracker sends e-mail as user predefined e-mail sending frequency
over 3 days.
-Automatic Protection Mode does not execute (Current Booting
frequency and Date Interval: 4/6)

8) Use Laptop PC at home on Feb 12, 2004


-nTracker does not send e-mail as home IP(ISP) is authorized.
-Automatic Protection Mode does not execute (Current Booting
frequency and Date collapsed: 5/9) because 5 times/9 days of Booting
frequency and Date Interval is fulfilled but IP(ISP) is already
authorized.

9) Use Laptop PC outside on Feb 13, 2004


-nTracker sends e-mail to the user (owner) because of IP(ISP) address
has been changed which is unauthorized.
-Automatic Protection Mode is executed (Current Booting frequency and
Date collapsed: 6/10)
-Input correct Password on the Password screen then, nTracker regards
the current IP (ISP) as authorized even though IP (ISP) has been
changed, as long as password is correct.
-Without input password, nTracker asks user to input correct password
continuously.

10) Use Other PC to check nTracker E-mail Notification on Feb 14, 2004
-Laptop was not used, e-mail was not sent. However, you can check the
previously sent e-mail Notification sent on Feb. 13, 2004. E-mail
Attachment (“nTracker.ntk” file) with correct password recognition
using another computer (and other ISP/IP).
-In this case, Booting frequency and Date collapsed does not re-initialize
because it was checked using another computer.
(It does not count Booting frequency because laptop was not used, but
Date Interval increases when day elapse).
-Automatic Protection Mode does not execute since Laptop was not
used. (Current Booting frequency and Date Interval: 6/11)

8
11) Use Laptop PC at office on Feb 15, 2004
-nTracker does not send e-mail as office IP(ISP) is authorized.
-Automatic Protection Mode does not execute (Currently, 7/12 of Booting
frequency and Date collapsed is fulfilled but IP(ISP) is already
authorized).

*If user inputs correct password, all Booting frequency and Date
Interval will be clear and re-initialized from the beginning.

*Unique nTracker’s E-mail Notification and Auto Protection Mode will


be very strictly executed under the conditions as the user pre-
defined settings and very intelligently interact upon user’s
environment.

<Summary of Auto Protection Sample Explanation>

E-mail Auto Protection Execution


Internet Boot
Notification Folder Reading E-mail
No Date Connection Count/ Remark
to the User Alarm Encry Attachment
at Collapsed
(Owner) -ption (“nTracker.ntk”)
Time
ISP/IP
1 02.01 Office O X X X 0/0 initially
Authorized
2 02.02 Office X X X X 1/1
Authorized
3 02.03 Home O X X O 0/0
ISP/IP
4 02.04 Office X X X X 1/1
5 02.06 Home O X X X 2/3
6 02.07 Office X X X X 3/4
7 02.09 Office O X X X 4/6
8 02.12 Home X X X X 5/9 *1
9 02.13 Outside O O O X 6/10 *2
User can receive E-mail *3
Notification and read E-mail
10 02.14 - O 6/11
Attachment(“nTracker.ntk”)
using other computer
11 02.15 Office X X X X 7/12 *4

9
*1. Automatic Protection Mode does not execute (Because 5 times/8 days of
Booting frequency and Date Interval is fulfilled but IP(ISP) is already
authorized.
*2. nTracker sends e-mail to the user(owner) and Automatic Protection Mode
works, because IP(ISP) address has been changed.
*3. User(Owner) can receive E-mail Notification and read E-mail
Attachment(“nTracker.ntk” file) with correct password recognition using other
computer( and other ISP/IP). In this case, Booting frequency and Date do not
re-initialize because another computer was used.(It does not count Booting
frequency but Date Interval will increase if day has elapsed).
*4. Automatic Protection Mode does not work.(Because pre-defined Booting
frequency and Date Interval is fulfilled but IP(ISP) is already authorized.)

10
Reformat Protection (BIOS Boot Protection)

You can further protect your computer after it has been lost or stolen by
configuring to disable booting from Floppy or CD drive. Booting disable for
Floppy and CD can be done in the BIOS. It is also good idea to set a password
for the BIOS, so no one else can enter the BIOS and change the setting back to
enable Floppy and CD booting.

With BIOS password set and Floppy and CD booting disabled, the computer hard
drive is protected from being erased by installing another fresh copy of operating
system.

To configure BIOS password and disable Floppy and CD booting, you will need
to enter BIOS configuration. Entering BIOS configuration differs from computer to
computer. Refer to your computer documentation for detailed information.

Normally you can enter BIOS configuration setup by pressing DEL key or F2 key
when the BIOS screen appear. (Example shown below)

We will use following BIOS setup as an example. However different brand of


BIOS may have different interface, but the configuration is very similar.
Once you have pressed DEL key or F2 key to enter the BIOS setup, you will see
the following screen.

We will first configure and set password for the BIOS setup. Make sure to set
Supervisor Password, not the boot password. In order to retrieve the lost
computer, we want the thief to connect to Internet so we can track and retrieve
the lost or stolen computer.

11
1. To configure the password, select SUPERVISOR PASSWORD.

You will be prompt to enter the password and confirm.

2. To disable booting from Floppy & CD drive, select BIOS Features Setup.

Below BIOS Features Setup window will appear. From this BIOS Features Setup,
you can configure boot protection.

12
Configure “Anti Virus Protection” on the screen above, <Enabled>.

Example screen above shows the Boot Sequence configured as A, C, SCSI.


By changing the “Boot Sequence” to <C Only>, you can disable booting from
Floppy or CD. After you have made the boot sequence change, you can press
Esc key to return to the CMOS Setup Utility window.

Configure “Security Option” <Setup>.

3. You will need to save the changes you have made in order of it to take place.
Select <Save & Exit Setup> from the menu as shown below. This will save your
changes and exit the BIOS setup.

13

Vous aimerez peut-être aussi