Sie sind auf Seite 1von 45

License Agreement - Unistal Systems Pvt.

Ltd
The entire risk of the use or the result of the use of this software and documentation remains with
the user. No part of this documentation may be reproduced in any means, electronic or
mechanical, for any purpose, except as expressed in the Software End User License Agreement.
User license of this software is valid for one year after the Activation.
This software and documentation are copyrighted. All other rights, including ownership of the
software, are reserved to Unistal Systems Pvt. Ltd. Unistal, Unistal 3 in 1 and the Unistal marks
are registered trademarks of Unistal Systems Pvt. Ltd. in India and elsewhere. Microsoft,
Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Windows 8 , Windows 8.1
and windows 10 are trademarks or registered trademarks of Microsoft Corporation. All other
brand and product names are trademarks or registered trademarks of the respective owners.

All rights, titles and interest in and to Unistal 3 in 1 and all copyright rights in and to Unistal 3
in 1 (including but not limited to any images, photographs, logos, animations, video, audio,
music, text, and "applets" incorporated into Unistal 3 in 1), the accompanying printed materials,
and any copies of Unistal 3 in 1 are owned by Unistal. Unistal 3 in 1 is protected by copyright
laws and international treaty provisions. Therefore, you must treat Unistal 3 in 1 like any other
copyrighted material. You may not copy the printed materials accompanying Unistal 3 in 1. You
must produce and include all copyright notices in their original form for all copies created
irrespective of the media or form in which Unistal 3 in 1 exists.

Copyright
Copyright © 2007-2017. Unistal Systems Pvt. Ltd.
The software that accompanies this license (the "software") is the property of Unistal systems
Pvt. Ltd. or its licensors and is protected by the copyright law.
You may:
 Use one copy of the software on a single computer and you may not transfer this to
 another person or allow another person to use other versions. 
 Copy the software onto the hard disk of the computer and retain the original for archival
purposes. 
You may not:
 Copy the documentation which accompanies the software, 
 Install the software on the network, 
 Sublicense, rent or lease any portion of the software, 

 Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the
source code of the software. 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1


Unistal 3 in 1- End User License Minimum Terms
This End User License Agreement (“EULA”) governs use of software (“Software”) from Unistal
Systems Pvt. Ltd. References to “End User” in this EULA refer to any entity or individual which
has obtained a copy of the Software from Unistal Systems Pvt. Ltd.

Limited License
Subject to all of the terms and conditions of this EULA, Unistal Systems Pvt. Ltd grants to End
User a non-transferable, non-sub licensable, non-exclusive license to use the object code form of
the Software internally, but only in accordance with the technical specification documentation
generally made available with the Software. “Software” shall also include any documentation
and any support and maintenance releases of the same Software provided to End User.

Application Software
You may install and use the Software, on as many computers as necessary with the limitation
imposed by the total number of licensed users. You may make one additional copy for back-up
purpose.

Term of License

The license granted hereunder shall commence on the purchasing date of the Software and shall
expire at the end of the period for which the license is purchased.

Restrictions

End User shall not (and shall not allow any third party to): (a) decompile, disassemble, or
otherwise reverse engineer the Software or attempt to reconstruct or discover any source code,
underlying ideas, algorithms, file formats or programming interfaces of the Software by any
means whatsoever (except and only to the extent that applicable law prohibits or restricts reverse
engineering restrictions, and then only with prior written notice to Unistal Systems Pvt. Ltd); (b)
distribute, sell, sublicense, rent, lease or use the Software (or any portion thereof) for time
sharing, hosting, service provider or like purposes; (c) remove any product identification,
proprietary, copyright or other notices contained in the Software; (d) modify or create a
derivative work of any part of the Software, except to the extent expressly authorized in writing
by Unistal Systems Pvt. Ltd; or (e) publicly disseminate performance information or analysis
(including, without limitation, benchmarks) from any source relating to the Software.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 2


Ownership
Notwithstanding anything to the contrary contained herein, except for the limited license rights
expressly provided herein, Unistal Systems Pvt. Ltd has and will retain all rights, title and
interest (including, without limitation, all patent, copyright, trademark, trade secret and other
intellectual property rights) in and to the Software and all copies, modifications and derivative
works thereof. End User acknowledges that it is obtaining only a limited license right to the
Software and that irrespective of any use of the words “purchase”, “sale” or like terms hereunder
no ownership rights are being conveyed to you under this Agreement or otherwise.

If requested, End User shall certify in writing that End User is using the Software for the number
of servers, with the number of copies, on the system configuration and at the site agreed upon by
the parties (as applicable). End User agrees that no more than once annually its use of the
Software may be audited by Unistal Systems Pvt. Ltd (or an independent auditor work on such
party’s behalf) during normal business hours upon reasonable advance written notice for the
purpose of verifying End User’s compliance with this EULA.

Confidentiality

End User acknowledges that, it may obtain information relating to the Software or Unistal
Systems Pvt. Ltd, including, but not limited to, any code, technology, know-how, ideas,
algorithms, testing procedures, structure, interfaces, specifications, documentation, bugs,
problem reports, analysis and performance information, and other technical, business, product,
and data (“Confidential Information”). End User shall not disclose Confidential Information to
any third party or use Confidential Information for any purpose other than the use of the
Software as licensed under the EULA.

Warranty Disclaimer

EXCEPT FOR ANY EXPRESS LIMITED WARRANTY OFFERED BY UNISTAL SYSTEM


PVT LTD FOR WHICH END USER’S REMEDY IS LIMITED TO REPAIR,
REPLACEMENT OR REFUND BY UNISTAL SYSTEM PVT LTD, THE SOFTWARE IS
PROVIDED “AS IS” AND UNISTAL SYSTEM PVT LTD MAKES NO WARRANTIES TO
ANY PERSON OR ENTITY WITH RESPECT TO THE
SOFTEATE OR ANY SERVICES AND DISCLAMISALLIMPLIED WARRRANTIES
INCLUDING WITHOUT LIMITATION WARRANTIES OF TITLE NON-
INFERINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 3


Limitation of Damages and Remedies

IN NO EVENT SHALL UNISTAL SYSTEM PVT LTD BE LIABLE UNDER CONTRACT,


TORT, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY
INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE SOFTWARE. NOTWITHSTANDING ANYTHING HEREIN TO
THE CONTRARY, THE TOTAL LIABILITY OF UNISTAL SYSTEM PVT LTD TO END
USER, INCLUDING BUT NOT LIMITED TO DAMAGES OR LIABILITY ARISING OUT
OF CONTRACT, TORT, BREACH OF WARRANTY, INFRINGEMENT OR OTHERWISE,
SHALL NOT IN ANY EVENT EXCEED THE FEES PAID BY END USER WITH RESPECT
TO THE SOFTWARE. UNISTAL SYSTEM PVT LTD SHALL NOT BE LIABLE FOR LOSS
OR INACCURACY OF DATA, COST OF PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, SYSTEM DOWNTIME, FAILURE OF SECURITY MECHANISMS,
GOODWILL, PROFITS OR OTHER BUSINESS LOSS, REGARDLESS OF LEGAL
THEORY, EVEN IF UNISTAL SYSTEM PVT LTD HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.

THE PARTIES AGREE THAT THE LIMITATIONS OF THIS SECTION ARE ESSENTIAL
AND THAT UNISTAL SYSTEM PVT LTD WOULD NOT PERMIT END USER TO USE
THE SOFTWARE ABSENT THE TERMS OF THIS SECTION. THIS SECTION SHALL
SURVIVE AND APPLY EVEN IF ANY REMEDY SPECIFIED IN THIS EULA SHALL BE
FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.

THIS SOFTWARE IS NOT FAULT-TOLERANT AND IS NOT DESIGNED OR INTENDED


FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE
PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT FOR USE IN THE
OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, OR
COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-
SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR
INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL
INJURY OR PROPERTY DAMAGE.

Termination and Survival

Upon any termination of this EULA, End User shall immediately cease use of the Software and
remove all Software from its systems. The terms set forth in the sections entitled Restrictions,
Ownership, Confidentiality, Warranty Disclaimer, Limitation of Damages and Remedies shall
survive any termination of this EULA.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 4


Table of Contents

1. Introduction .............................................................................................................................................. 7
2. System Requirements ............................................................................................................................... 8
3. How To Install............................................................................................................................................ 9
3.1 Preparing to Install Unistal 3 in 1 ..................................................................................................... 10
3.2 Installation Path ................................................................................................................................ 11
3.3 Finish ................................................................................................................................................. 11
4. Product Registration ............................................................................................................................... 12
4.1. When PC is connected to the internet............................................................................................. 12
4.2. When PC is not connected to the internet or act as offline ............................................................ 13
5. Getting Started ........................................................................................................................................ 17
From Desktop .......................................................................................................................................... 17
From Start Menu ................................................................................................................................. 17
6. Unistal 3 in 1 Working Guide............................................................................................................ 19
6.1.Crash Proof........................................................................................................................................ 19
6.1.1. Features .................................................................................................................................... 20
6.1.2. Crash Proof Startup ................................................................................................................... 20
6.1.3. Scheduler Settings..................................................................................................................... 21
6.1.4. File Recovery ............................................................................................................................. 21
6.2. SysBoost (System Tuneup Software) ............................................................................................... 23
6.2.1. Features.................................................................................................................................... 23
6.2.2. Sys Boost Startup ..................................................................................................................... 24
6.2.3. Sys Boost – Select and Wipe .................................................................................................... 24
6.2.4. Sys Boost– Select Extensions ................................................................................................... 25
6.2.5. Sys Boost- Defrag drive ............................................................................................................ 26
6.2.6. Sys Boost – Internet Wipe ........................................................................................................ 27

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 5


6.2.7. Sys Boost – Registry Clean ....................................................................................................... 28
6.2.8. Sys Boost – Registry Restore .................................................................................................... 29
6.3 Locate Laptop .................................................................................................................................... 30
6.3.1. Features.................................................................................................................................... 30
6.3.2. Locate Laptop Startup .............................................................................................................. 30
6.3.3. Locate Laptop - Encrypt Files & Folders ................................................................................... 31
6.3.4. Locate Laptop - Decrypt Files & Folders................................................................................... 33
6.3.5. View personal information....................................................................................................... 36
6.3.6. Update personal information................................................................................................... 37
6.3.7. Report Theft ............................................................................................................................. 38
6.3.8 Update and Withdraw Theft Report ......................................................................................... 38
6.3.9. Laptop Statistics ....................................................................................................................... 40
6.3.10 Update..................................................................................................................................... 42
6.3.11 Logout ..................................................................................................................................... 42
7. COMPANY OVERVIEW ............................................................................................................................. 43
8. FAQ’S ....................................................................................................................................................... 44

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 6


1. Introduction

In recent scenario, Unistal 3 in 1 is the elite priority from the broader aspect for the entire
individual and corporate world which includes protection from Data Theft, Data Loss and
protection from unethical activity like Laptop Theft.

Unistal 3 in 1 has 3-tier protection. It includes following software components:


 Crash Proof 
 Port Locker 
 Locate Laptop

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 7


2. System Requirements

You may install only on computers running the following operating systems
 Windows XP with Service Pack 2 
 Windows Vista with Service Pack 1 
 Windows 7 
 Windows 8 
 Windows 8.1 
 Windows 10

Before installation, make sure that your computer meets the minimum system
requirements.

Note: To find out the Windows operating system your computers is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.

Minimum System Requirements

 Operating System: 
Windows XP (Service Pack 3)
Vista (Service Pack 1)
Windows 7
Windows 8
Windows 8.1
Windows 10

  CPU: 450 MHZ 


 RAM: 512 MB 
 HDD: 100 MB 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 8


3. How To Install
For installing Unistal 3 in 1 either we have the installation disk or the product folder
downloaded from the internet. The installation process starts with double clicking the
Setup.exe file. This will start a setup wizard, which will guide you in installing. Before
running setup make sure, your system is covering minimum system requirements.

First checkpoint in installation is License Agreement. The license agreement needs to be


read properly and then accepted for continuing the installation process.

The second step is to select the additional task as:


 Create a desktop icon. 
 Create a Quick Launch icon. 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 9


After selecting the additional task, welcome to installation wizard of Unistal 3 in 1 will come
into frame. Click next to start the installation of Unistal 3 in 1.

3.1 Preparing to Install Unistal 3 in 1


Now in order to select the products, the dialog box display as “Welcome to install Wizard
of Unistal 3 in 1”. Please select the products you want to install.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 10


3.2 Installation Path

By default, Unistal 3 in 1 will be installed in “C:\Program Files\Unistal3in1LL”.

Click Next to start the installation.

3.3 Finish
Once installation is done, it will proceed to display all the components that has been
installed and marked as done in the dialogue box.

After finishing the Unistal 3 in 1, a set password dialogue box will display in order to set
the password. This password in used for further authentication process of Unistal 3 in 1.
User needs to enter a password with the given requirements and then confirm the same.

The requirements for the password are:


 Password length should be minimum 6
characters. 
 Special characters are not allowed.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 11


4. Product Registration

4.1. When PC is connected to the internet

While registering the product, it will ask for the key number.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 12


Fill all the user details and click Register button.
On clicking register button, you get acknowledgment for registration (Registration is
successfully done) And below screen will pop up.

4.2. When PC is not connected to the internet or act as offline

This represents offline registration using the activation code received by the user when PC
is not connected to the internet.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 13


On clicking the next button, it asks for the password you set earlier.

On clicking ok, it will ask for the key number.

Note: Unistal 3 in 1 offline activation dialog box will prompt which display the message
as:
“Unistal3in1LL_ activation .exe file is created. Copy this file from desktop and run
from any internet enabled PC. After filling the registration form, you will get 20
Digit offline activation code.”

On clicking the OK, automatically the “Unistal3in1LL_ activation.exe” file will be


generated on users desktop that needs to be executed from a internet connected PC.

On executing this executable from a internet connected PC, below screen will appear.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 14


Click on the “Register now” and the registration form will be displayed.

open Unistal 3 in 1application from Start Menu. Below window will get open.

Click on “License Info”. Below screen will get open.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 15


2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 16
5. Getting Started

From Desktop 

User can run the Unistal 3 in 1from the desktop through Unistal 3 in 1icon. 

From Start Menu 


Click on Start → All Programs → Unistal3in1LL → Unistal 3 in 1 

Now to run the Unistal 3 in 1, user need to enter the password

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 17


On clicking Ok, below screen appears.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 18


6. Unistal 3 in 1 Working Guide

6.1.Crash Proof

The Crash Proof / Data Leakage Prevention feature of Unistal 3 in 1software creates
the image of our systems data, Image of file. Crash Proof helps the user to keep the
updated backup of data. This Software is designed to keep the image of the file
indexes/ disk properties and it keeps updating them at regular intervals. In this
business world, data volume have increased hence the computer dependency has also
increased. As the dependency increases the downtime increases as well due to data
loss and the data lost cost us more than the recreation cost. Data Recovery cannot
provide you the satisfactory results every time. So the users have the requirement of
Software that can help users to keep the image of the data. Crash Proof takes the image
of your data after regular intervals and this information is stored in a protected area.
You can recover the lost files with the help of this Software and you can un-format any
lost drive.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 19


6.1.1. Features

 A new concept in data loss prevention 


 Unique un-format feature 
  Revival with original file name 
 Revival if files/directories are deleted 
 Revival if any virus has crashed the hard disk 
 Revival if disk is not booting 
 Revival if hard disk partitions are corrupted 
 Revival if fat/MFT is corrupted 
  Revival if root directory is damaged 
 Revival if partition is recreated 
 Revival of files deleted few days back 
 Recovery of fragmented files 

6.1.2. Crash Proof Startup


 Crash proof icon gets created in task bar. 

 Right click on Crash Proof icon, Select desired feature as shown in below image to start
that feature. 

 If you select “Take Image” feature, Crash Proof takes image of your system
 details and generates a message in systray once image taking process is complete. 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 20


6.1.3. Scheduler Settings

You can schedule the software for the intervals for taking image and
updating the software by selecting the desired "Update Image" option
as displayed in following image:

6.1.4. File Recovery

If you want to restore any previously taken image, File Recovery will be used.
Select the date of image from which you want to recover data

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 21


Once selected the image date then, click next.Click on the radio button of Hard disk.

When File Recovery is Complete, Select the files which you want to save

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 22


6.2. SysBoost (System Tuneup Software)
Sysboost is system tuneup software which is easy to use and developed for Microsoft
Windows which helps to manage, maintain, optimize a computer system. It improves
bootup time and overall performance by cleaning junk registry, junk files and folders,
temporary internet files and by performing defragmentation of drives.

This software - analyses the registry and brings out the unwanted registries to clean.
Backup of wiping folders can also be taken and can be restored for future usage.
Registries which are deleted can be restored easily if you want.
6.2.1. Features

 Wiping of folders 
 Defragmentation of drive 
 Internet wipe 
 Registry cleaning 
 Registry restoring 

Wiping of folders
It deletes the selected folder permanently

Defragmentation of drive
It analyses and defrag the selected drive.

Internet wipe
It wipes all the temporary internet files, internet history and internet cookies permanently.

Registry cleaning
It identifies and deletes those unwanted registries to improve the performance of the
computer system.

Registry restoring
It restores cleaned registries easily if needed.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 23


6.2.2. Sys Boost Startup

6.2.3. Sys Boost – Select and Wipe

Select and Wipe is used to wipe particular file(s)/folder(s). Click on


Select and Wipe tab. Here you can select file(s)/folder(s), you want to
wipe using check marks against each file and folder. Check the option
"REMOVE LINKS FROM RECENT FOLDER" for removing links from
recent folder, containing the links of recently opened files.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 24


6.2.4. Sys Boost– Select Extensions
Sometimes we want to delete some particular files from a folder. In this feature we
can select folder and can mention the extensions of the file (doc, xls, txt etc) we want
to delete. If we delete a f deleted from our system; it still remains as it is on
In this feature we can select a folder and mention all the extension files
which you want to wipe permanently so that it can’t be removed.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 25


6.2.5. Sys Boost- Defrag drive

Defragmentation of drive can be performed using this feature. Due to excessive usage
of files and folders fragmentation occurs in the drives. Fragmentation can hinder
overall throughput of the system. Due to fragmentation there can be loss of files results
in performance loss of the system. Defragging of drives attempts to elevate these
problems. By defragging the drive we can optimize the performance of our computer
system. Defragging reduces the amount of fragmentation and helps the computer
system to work efficiently. It analyses the selected drive and gives the information
weather the drive needs to be defragmented

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 26


6.2.6. Sys Boost – Internet Wipe

When we use internet, all its information gets stored in the computer system. This
information includes list of the visited websites, cookies, information you have entered in
the web form (passwords, ID, name, address) . When we delete history it doesn‟t get
deleted from our system. Its still exist in the disk. Internet Wipe deletes the internet
history, temporary internet files and internet cookies permanently. Internet history
can be misused by third party. This feature ensures security of your system. It helps you
to protect your system from unwanted threats.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 27


6.2.7. Sys Boost – Registry Clean

Registry cleaner is designed to help remove invalid references made in the registry
pointing to uninstalled program or other programs which are no longer in use by the
user. These programs are left behind in the registry causing several problems leading
to a poor system performance. By using Registry clean we can remove unwanted
registry entries from our system. We can optimize the performance of our system by
using this feature. We work on uncountable programs daily out of which few are of
least importance, but we do not get time to clean them manually.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 28


6.2.8. Sys Boost – Registry Restore

Sometimes after registry cleanup we notice that some programs are not working
properly and some applications failed to function properly. This is due to missing
registry keys. This may be caused by shared keys which were deleted during the
registry cleaning or by other deleted keys. Sometimes we delete registry by mistake
and realize that the deleted file is of utmost importance. In that case we can use this
feature of registry restoration.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 29


6.3 Locate Laptop
Locate Laptop is not only able to track your laptop’s location if it has gone to
unauthorized person but also for employers, it is the best way to track employee
location. This tracking facility will continuously inform you about the location of the
laptop. This laptop tracking module will provide you the complete information about the
location of the laptop, its IP address, Internet Service Provider along with date and time
without knowledge the of laptop user.

The data encryption feature of Locate Laptop provides the facility to encrypt crucial data
in case of laptop theft or missing. If user doesn’t get connect to the internet for a certain
period of time or laptop theft is detected then your data will be encrypted.

6.3.1. Features
 Secure web page for every user to monitor - Keep a close eye on movements of
 person with the designated Laptop e.g. company employee. 
 Reports contain information on data, time, public IP, Locate, country, state, city, ISP,
Longitude, Latitude. 
 Interactive steps to report a laptop theft 
 Remotely launch the data encryption module on predefined sensitive files & folders 
 Encrypts data even if Laptop is not connected to internet for particular period. 

6.3.2. Locate Laptop Startup

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 30


6.3.3. Locate Laptop - Encrypt Files & Folders

Using Locate Laptop, one can encrypt files & folders when stolen laptop is tracked by
web crawlers.
To encrypt the file & folders follow the steps discussed below:
After installing & registering the Locate Laptop, software displays following screen.
Or same can be accessed later from Start >All Programs >Unistal3in1LL>Locate
Laptop.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 31


If you want to encrypt some files & folders, choose 'Do you want to encrypt folders
when the stolen laptop is tracked by web crawlers?' option at the top of the screen.

Then click... button to browse & select crucial files/folders to be encrypted.

Select the files & folders to encrypt, click OK.

Choose 'Encrypt Selected Folders even if Laptop is not connected to internet for'
selected period. Click Apply.

Choosing this option for <1> days will automatically encrypt all the selected files &
folders after <1> days if Laptop does not connect to internet for 1 consecutive days.
Also when you submit a theft report on www.protegent.in then online encryption
module gets activated and as soon as unauthorized user will connect your laptop to
internet, all predefined file & folders will be encrypted.

Note: To add more files or folder using the Encryption module, you will be asked for
Username & Password, which is same as you entered during product registration

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 32


6.3.4. Locate Laptop - Decrypt Files & Folders

To decrypt files & folders select Locate Laptop from Start >Programs >
Unistal3in1LL> Locate laptop.

Select Decrypt Folders and click Start.

Encrypted folders will be shown as below or click on “…” to select.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 33


In order to file a theft, user need to visit the www.protegent.in where user need to fill the user
name and the password which is already set while installing the software

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 34


After login the user name and the password, user will land up on the home page where he
find the list in grid manner as

  View personal information 


 Update personal information 
 Report Theft 
 Laptop Statistics 
 Update 
 Logout 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 35


6.3.5. View personal information

On clicking the view personal information, user can view his personal information.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 36


6.3.6. Update personal information

On clicking the update personal information, user can update his personal
information.

After this, user needs to click on the update information once he updated his
information. Or else cancel if he is not interested to update his personal information.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 37


6.3.7. Report Theft

6.3.8 Update and Withdraw Theft Report

User can update details using “Update theft report/ attached documents”
User can attach the FIR including the personal details,

  Laptop Details 
 Report Theft 
 Stolen location Details 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 38


In case if the user finds his laptop back, user can to withdraw the report theft using
Withdraw theft report/ report laptop recovery”

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 39


6.3.9. Laptop Statistics
On clicking the laptop statistics, user can view the laptop location reports for a given
duration.

On clicking on the view location report, user can get the complete details of his stolen
laptop includes

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 40


  Date 
  Time 
  Static IP Address 
  Local IP Address 
  Country 
  Region 
  City 
  Internet Service Provider 
  Organization 
  Longitude 
 Latitude

In order to update the product user needs to click on the update:

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 41


6.3.10 Update

6.3.11 Logout
s
Click logout button in order to get logout.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 42


7. COMPANY OVERVIEW

Unistal Systems Pvt. Ltd. is the Data Care Industry's largest, most experienced and
technologically advanced provider of data recovery products and services. In case
of any kind of data loss on any type of computer storage media, Unistal has a
solution with fast, advanced and cost-effective products and services - ranging
from do-it-yourself software products, data loss prevention solutions to 24/7/365
services network. With nearly 19 years‟ experience performing successful data
recoveries, Unistal has served customers across the globe including Secret
services, government agencies, corporate houses, and numerous computer users.
Unistal has developed the industry's widest range of data recovery products and
services, providing desktop, laptop, server, email, and database and tape
recoveries for all media types and operating systems - anywhere, anytime.
Headquartered right in the heart of New Delhi has four offices and 14 service labs
strategically located across India.

Unistal's decade long experience in data recovery services has helped to


continuously evolve new methods of retrieving data, provide business continuity
solutions, disaster recovery solutions, data loss prevention and data recovery
software.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 43


8. FAQ’S

1. If we install “Unistal 3 in 1” than it slow down the speed of our system?


Ans: If all the system requirements are fulfilled then it will not slow down the
system if still it problem persist you need to reinstall the “Unistal 3 in 1” because it
is not installed properly.

2. Can we install “Unistal 3 in 1” on windows 7 64-bit Service pack 1?


Ans: Yes we can install.

3. After how many days “Unistal 3 in 1” license will expire?


Ans: 370 days.

4. After how many days trial pack of “Unistal 3 in 1” will


expire? Ans: You can get the trail pack of 30 days.

5. Can we check information about license any time?


Ans: You can check the license status any time.

6. Can we install all components of “Unistal 3 in 1” simultaneously?


Ans: You can install the entire component in one go.

7. Can we install any specific component of “Unistal 3 in


1”? Ans: Yes, you can install the specific component.
8. Can we change the password of “Unistal 3 in 1”?
Ans: Yes, you can change the password of “Unistal 3 in 1”.

9. Can we configure setting of “Unistal 3 in 1” at the time of


installation? Ans: Yes, you can configure the settings of “Unistal 3 in 1”.

10. How many components are available in “Unistal 3 in


1”? Ans: Three components are there in “Unistal 3 in 1”.

11. Can we renew license of “Unistal 3 in 1” after


expiry? Ans: yes.
12. Unistal 3 in 1” pop up any message before expiry? Ans: yes.
Ans: yes
13. Before how many days “Unistal 3 in 1” warns about
expiry? Ans: 10 days
14. If our system goes slow after installation of “Unistal 3 in 1” than what should we
do?
2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 44
Ans: First we need to check the system requirements, which should be fulfilled.
Then we need to check for the software if any conflicting software is there in the
system or not. (Make sure no conflicting software should be there). We need to run a
deep scan of the system (there might be some viruses in the system) If everything is
proper then we need to uninstall and reinstall the software again.

15. Can we convert “Unistal 3 in 1” from trial to retail?


Ans: Yes we can convert the trail pack to retail product by using Activation key.
16. Can we uninstall any single component of “Unistal 3 in
1”? Ans: Yes we can uninstall the single component.
17. Unistal 3 in 1” has any default setting?
Ans: Yes there are few default settings for every component.
18. Do you provide technical support?
Ans: Yes. After your purchase you will receive a premium software product with
step-by-step instructions. In the extremely rare case of a problem, our support team
will give you step-by-step instructions to correct your issue. 100% Guaranteed.
19. If I want to monitor more than one computer, do I need to buy another license?
Ans: An individual license is required for every computer that you wish to monitor.
20. Can we install the “Unistal 3 in 1” in Windows XP 64-bit?
Ans: “Unistal 3 in 1” will not work on Windows XP 64-bit.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 45

Das könnte Ihnen auch gefallen