Documente Academic
Documente Profesional
Documente Cultură
Ltd
The entire risk of the use or the result of the use of this software and documentation remains with
the user. No part of this documentation may be reproduced in any means, electronic or
mechanical, for any purpose, except as expressed in the Software End User License Agreement.
User license of this software is valid for one year after the Activation.
This software and documentation are copyrighted. All other rights, including ownership of the
software, are reserved to Unistal Systems Pvt. Ltd. Unistal, Unistal 3 in 1 and the Unistal marks
are registered trademarks of Unistal Systems Pvt. Ltd. in India and elsewhere. Microsoft,
Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Windows 8, Windows 8.1 and
windows 10 are trademarks or registered trademarks of Microsoft Corporation. All other brand
and product names are trademarks or registered trademarks of the respective owners.
All rights, titles and interest in and to Unistal 3 in 1 and all copyright rights in and to Unistal 3in
1 (including but not limited to any images, photographs, logos, animations, video, audio, music,
text, and "applets" incorporated into Unistal 3 in 1), the accompanying printed materials, and
any copies of Unistal 3 in 1 are owned by Unistal. Unistal 3 in 1 is protected by copyright laws
and international treaty provisions. Therefore, you must treat Unistal 3 in 1 like any other
copyrighted material. You may not copy the printed materials accompanying Unistal 3 in 1. You
must produce and include all copyright notices in their original form for all copies created
irrespective of the media or form in which Unistal 3 in 1 exists.
Copyright
Copyright © 2007-2019. Unistal Systems Pvt. Ltd.
The software that accompanies this license (the "software") is the property of Unistal systems
Pvt. Ltd. or its licensors and is protected by the copyright law.
You may:
Use one copy of the software on a single computer and you may not transfer this to
another person or allow another person to use other versions.
Copy the software onto the hard disk of the computer and retain the original for archival
purposes.
You may not:
Copy the documentation which accompanies the software,
Install the software on the network,
Sublicense, rent or lease any portion of the software,
Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the
source code of the software.
Limited License
Subject to all of the terms and conditions of this EULA, Unistal Systems Pvt. Ltd grants to End
User a non-transferable, non-sub licensable, non-exclusive license to use the object code form of
the Software internally, but only in accordance with the technical specification documentation
generally made available with the Software. “Software” shall also include any documentation
and any support and maintenance releases of the same Software provided to End User.
Application Software
You may install and use the Software, on as many computers as necessary with the limitation
imposed by the total number of licensed users. You may make one additional copy for back-up
purpose.
Term of License
The license granted hereunder shall commence on the purchasing date of the Software and shall
expire at the end of the period for which the license is purchased.
Restrictions
End User shall not (and shall not allow any third party to): (a) decompile, disassemble, or
otherwise reverse engineer the Software or attempt to reconstruct or discover any source code,
underlying ideas, algorithms, file formats or programming interfaces of the Software by any
means whatsoever (except and only to the extent that applicable law prohibits or restricts reverse
engineering restrictions, and then only with prior written notice to Unistal Systems Pvt. Ltd); (b)
distribute, sell, sublicense, rent, lease or use the Software (or any portion thereof) for time
sharing, hosting, service provider or like purposes; (c) remove any product identification,
proprietary, copyright or other notices contained in the Software; (d) modify or create a
derivative work of any part of the Software, except to the extent expressly authorized in writing
by Unistal Systems Pvt. Ltd; or (e) publicly disseminate performance information or analysis
(including, without limitation, benchmarks) from any source relating to the Software.
If requested, End User shall certify in writing that End User is using the Software for the number
of servers, with the number of copies, on the system configuration and at the site agreed upon by
the parties (as applicable). End User agrees that no more than once annually its use of the
Software may be audited by Unistal Systems Pvt. Ltd (or an independent auditor work on such
party’s behalf) during normal business hours upon reasonable advance written notice for the
purpose of verifying End User’s compliance with this EULA.
Confidentiality
End User acknowledges that, it may obtain information relating to the Software or Unistal
Systems Pvt. Ltd, including, but not limited to, any code, technology, know-how, ideas,
algorithms, testing procedures, structure, interfaces, specifications, documentation, bugs,
problem reports, analysis and performance information, and other technical, business, product,
and data (“Confidential Information”). End User shall not disclose Confidential Information to
any third party or use Confidential Information for any purpose other than the use of the
Software as licensed under the EULA.
Warranty Disclaimer
THE PARTIES AGREE THAT THE LIMITATIONS OF THIS SECTION ARE ESSENTIAL
AND THAT UNISTAL SYSTEM PVT LTD WOULD NOT PERMIT END USER TO USE
THE SOFTWARE ABSENT THE TERMS OF THIS SECTION. THIS SECTION SHALL
SURVIVE AND APPLY EVEN IF ANY REMEDY SPECIFIED IN THIS EULA SHALL BE
FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.
Upon any termination of this EULA, End User shall immediately cease use of the Software and
remove all Software from its systems. The terms set forth in the sections entitled Restrictions,
Ownership, Confidentiality, Warranty Disclaimer, Limitation of Damages and Remedies shall
survive any termination of this EULA.
1. Introduction .............................................................................................................................................. 7
2. System Requirements ............................................................................................................................... 7
3. How To Install............................................................................................................................................ 8
3.1 Preparing to Install Unistal 3 in 1 ....................................................................................................... 9
3.2 Installation Path ................................................................................................................................ 10
3.3 Finish ................................................................................................................................................. 10
4. Product Registration ............................................................................................................................... 11
4.1. When PC is connected to the internet............................................................................................. 11
5. Getting Started ........................................................................................................................................ 14
From Desktop .......................................................................................................................................... 14
From Start Menu ................................................................................................................................. 14
6. Unistal 3 in 1 Working Guide............................................................................................................ 16
6.1.Activity Reporter ............................................................................................................................... 17
6.1.1. Features .................................................................................................................................... 17
6.1.2. Activity Reporter Startup .......................................................................................................... 17
6.2. SysBoost (System Tuneup Software) ............................................................................................... 30
6.2.1. Features.................................................................................................................................... 30
6.2.2. Sys Boost Startup ..................................................................................................................... 31
6.2.3. Sys Boost – Select and Wipe .................................................................................................... 31
6.2.4. Sys Boost– Select Extensions ................................................................................................... 32
6.2.5. Sys Boost- Defrag drive ............................................................................................................ 32
6.2.6. Sys Boost – Internet Wipe ........................................................... Error! Bookmark not defined.
6.2.7. Sys Boost – Registry Clean ....................................................................................................... 34
6.2.8. Sys Boost – Registry Restore .................................................................................................... 35
6.3 Port Locker & Data Leakage Prevention .............................................. Error! Bookmark not defined.
6.3.1. Features.................................................................................................................................... 36
6.3.2. Port Locker Startup ..................................................................... Error! Bookmark not defined.
In recent scenario, Unistal 3 in 1 is the elite priority from the broader aspect for the entire
individual and corporate world which includes protection from Data Theft, Data Loss and
protection from unethical activity like Laptop Theft.
2. System Requirements
You may install only on computers running the following operating systems
Windows XP with Service Pack 2
Windows Vista with Service Pack 1
Windows 7
Windows 8
Windows 8.1
Windows 10
Before installation, make sure that your computer meets the minimum system
requirements.
Note: To find out the Windows operating system your computers is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.
Operating System:
Windows XP (Service Pack 3)
Vista (Service Pack 1)
Windows 7
Windows 8
Windows 8.1
Windows 10
CPU: 450 MHZ
RAM: 512 MB
HDD: 100 MB
3. How To Install
For installing Unistal 3 in 1 either we have the installation disk or the product folder
downloaded from the internet. The installation process starts with double clicking the
Setup.exe file. This will start a setup wizard, which will guide you in installing. Before
running setup make sure, your system is covering minimum system requirements.
After selecting the additional task, welcome to installation wizard of Unistal 3 in 1 will come
into frame. Click next to start the installation of Unistal 3 in 1.
3.3 Finish
Once installation is done, it will proceed to display all the components that has been
installed and marked as done in the dialogue box.
After finishing the Unistal 3 in 1, a set password dialogue box will display in order to set
the password. This password in used for further authentication process of Unistal 3 in 1.
User needs to enter a password with the given requirements and then confirm the same.
From Desktop
User can run the Unistal 3 in 1from the desktop through Unistal 3 in 1icon.
Click on Start → All Programs → Unistal 3 in 1
The Protegent enhances the complete security and monitoring all the information with respect to
any activity that already done in your computer. Each and every keystroke placed in the network
can also be monitored and updates all the details related to any activity time to time to the
administrator regarding this. The information can be customized as per the desired requirement
related to the user. It is defined for monitoring and reporting the activities for a definite URLs
that need to be accessed or not in an organization which enhances the business to achieve the
productivity secure at higher rate and to deliver the better client services that makes the business
fruitful.
6.1.1. Features
Visited Website Reporting
Captures all Internet activity with features of Blacklist and White list as follows:
Blacklist- The additive internet (web sites) activities in this list are monitored and
Alerts can be visualized.
White list- The additive internet (web sites) activities in this list are ignored and
Alerts cannot be visualized.
Monitor Keystrokes
White list- Additive list with respect to all the application activities are
Ignored and not visualize in alerts.
Blacklist- Additive list with respect to all the application
activities will get captured and visualized in alerts.
User Time displays the User Time status which has been spend by the user on a system.
Folder Monitoring displays the selected folder activity status which have been made by the user
on the folder
Monitor Chat Activity captures ICQ, Miranda, Skype, Google Talk, MSN,
AIM, AOL, Yahoo, and QIP Chats.
Outlook Reporting
Outlook Emails displays all the emails which was send and received by the user on Outlook
Internet Downloads displays the different internet downloads which have been made by the user
on the Internet
Application Activity Alert displays all the application that was used by the user at a given point
of time.
Apptime spent monitoring displays all the application spent time that was used by the user at a
given point of time.
Report - Keystrokes
Keystrokes display the different keystrokes which have been made by the user on the keyboard.
Report-Chat Monitoring
Chat Monitoring displays the chat report which was done by the user on a chat application.
This software - analyses the registry and brings out the unwanted registries to clean.
Backup of wiping folders can also be taken and can be restored for future usage.
Registries which are deleted can be restored easily if you want.
6.2.1. Features
Wiping of folders
Defragmentation of drive
Internet wipe
Registry cleaning
Registry restoring
Wiping of folders
It deletes the selected folder permanently
Defragmentation of drive
It analyses and defrags the selected drive.
Internet wipe
It wipes all the temporary internet files, internet history and internet cookies permanently.
Registry cleaning
It identifies and deletes those unwanted registries to improve the performance of the
computer system.
Registry restoring
It restores cleaned registries easily if needed.
Sometimes after registry cleanup we notice that some programs are not working
properly and some applications failed to function properly. This is due to missing
registry keys. This may be caused by shared keys which were deleted during the
registry cleaning or by other deleted keys. Sometimes we delete registry by mistake
and realize that the deleted file is of utmost importance. In that case we can use this
feature of registry restoration.
The maturation of an organization confidential is data. The purely extraordinary feature inbuilt in
Protegent is purely from security purposes. The device is limited to reduce the risk of data
leakage and data theft by locking and blocking the port of your computer. User can enable or
disable port.
locker feature as per the requirement. Leakage of data USB ports via pen drives, memory cards,
flash drives DVD/CD writers, PCMCIA ports, Ethernet Ports, Printer Ports and Infrared Ports.
Preserving your gadget from unauthorized access the module enables the users to lock port with
distinct variety of lock options including permanent, specified time period or the system is on
idle or untouched. Some unauthorized action includes locking and blocking the ports, alters in
settings,setting scheduler etc reproduce the automatic alert.
2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 35
6.3.1. Features
Block Port
While listing of Authorized USB device
USB Read only feature
Email Filtering
Block CD/DVD
Block Printer
Block/Unblock Single/All Ports
Block/Unblock as per schedule or block port when system idle
File Transfer logs from & to USB
6.3.2. Port Locker Startup
To preserve system from unauthorized access, user can easily block all the ports includes
Infrared port, IEEE 1394 port, USB port, and Bluetooth port Network Adaptors port. Via Port
Locker software
Expedite and cannot be expedite the Multiple or single port in one shot
Block CD/DVD
By enhancing the feature to block CD/DVD ROM port emphasis to block ablaze /inbuilt
CD/DVD ROM. No additive feature includes write or read can built up in this way.
Block Printer
Via Block printer option, user can reserve the LPT port of the Printer. Invalid to print
the command once the Printer is blocked.
Alert message comes whenever someone tries to use the blocked ports on the system. Once it is
viewed it gets removed from alert and moves to Port reports. To email, print or other options
click on Open as HTML
The alert window helps users to find out if any one used the Locked Ports recently.
To view current port lock status Using Port Reports, users can have complete log related to
all Permanent Blocked, Schedule Blocked or Un-Blocked Ports, Users may view report for
the desired port for particular information type in the selected date range.
To check all activities related to USB File Transfer. Using File Transfer Log, users can have
complete log related to all files transferred to and from USB storage device like Pen drives, USB
hard Disk etc. It will generate the log when data will be transferred from one USB storage device
to another and from USB storage device to computer.
To view the report of a particular date, click on Select Date, select the date range and
click on View button.
Select the ports to be locked. If users want to lock all the ports at a time, select all ports
option otherwise select the selected ports.
Select the Lock type to lock the Port. And click Apply button. A confirmation screen will
follow:
Lock when system is idle and 'Set the idle time'. This will enable the software to lock
your ports after certain point of time if your computer remains idle or untouched.
Note: After the completion of idle time it will ask for the password to unblock the port.
Select Duration:
Select duration option, "select from time and then to time". Click add button to add
the selected time. Users can select multiple schedule time to lock the ports.
In the Above figure, the ports will be lock from 4: 15:25 PM to 4: 18:25 PM. and all the ports
will be un- Blocked from 4: 15:25 PM.
To unlock the Ports, select Unblocked Lock type. And click Apply.
On adding the schedules settings, the dialogue box displays “Scheduler settings successfully”.
Device Permission
When user selects File Transfer Log from Configuration option, following window will appear:
1. All Extensions
2. Selected Extensions
All Extensions
By selecting All Extensions, File transfer log will generate the reports of all type of file
extensions.
By selecting Selected Extensions, File transfer log will generate the reports of
only selected file extensions.
When user selects Email Filtering Log from Configuration option, following window
will appear: Click on Enable Email Filtering to activate the setting options.
There are two setting options:
1. Enable Attachment
2. Enable Body
Enable Attachment
Enable Attachment allows administrator to filter and block the outgoing Emails with
attachments. Administrator can make the settings to filter and block attachments with all
kind of file extensions or certain type of extensions send by the clients through MS
Outlook.
1. All Extensions
2. Selected Extensions
All Extensions
By selecting All Extensions, the Emails which have any type of file extension
(for e.g. .exe, .doc, wmv will be blocked.
Selected Extensions is positioned to block Emails with certain types of file attachments. This
feature insures
Important files, such as “*.exe”, organization“*.doc”, “*.xls” etc.
Emailss. Administrators can add or delete file Extension types in order to
fine-tune the filter. Emails can also be filtered and blocked according to
the size of the attachments.
The Enable Body setting gives administrators the ability to block outgoing Emails based on
words or phrases found in the message body. It also allows filtering according to size of the
message body.
In this Section, users can select the size of the Log Files and can enable software to delete
the Log Files after certain point of time.
1. Using Save button, users can save the changes in one file (.save file). This file will include
whole changed settings.
2. Using Load button, users can load the saved changes or settings that are applied before and
have been replaced after saving the .save file by some other settings.
3. Using Reset button users can reset the default settings.
Ans: First we need to check the system requirements, which should be fulfilled.
Then we need to check for the software if any conflicting software is there in the
System or not. (Make sure no conflicting software should be there). We need to run a
deep scan of the system (there might be some viruses in the system) If everything is
proper then we need to uninstall and reinstall the software again.
The maturation of an organization confidential is data. The purely extraordinary feature inbuilt in
Protegent is purely from security purposes. The device is limited to reduce the risk of data
leakage and data theft by locking and blocking the port of your computer. User can enable or
disable port.
Locker feature as per the requirement. Leakage of data USB ports via pen drives, memory cards,
Flash drives DVD/CD writers, PCMCIA ports, Ethernet Ports, Printer Ports and Infrared Ports.
Preserving your gadget from unauthorized access the module enables the users to lock port with
Distinct variety of lock options including permanent, specified time period or the system is on
idle or untouched. Some unauthorized action includes locking and blocking the ports, alters in
settings, setting scheduler etc reproduce the automatic alert.