Absolute Protect

Computer Theft Prevention Software -
FULL DESCRIPTION

Home page Full description Download Registration Report Buy now
Download file size: 0.5 Mb

System requirements: WIN 95, 98, NT, Internet access

Full description: Absolute Protect lets you monitor location of your computer by yourself so you can be sure that your privacy is protected.

When AbsoluteProtect is installed on your computer, it waits until the computer is connected to Internet (www, news, Email) and then makes HTTP connection to Absolute Protect web site, which establishes location of the computer.
Monitoring report is available online.
This report informs you where the computer was located and when it was turned on, so you can detect any unauthorized use of computer. It also eliminates internal theft of computers within a company. Also it contains volume serial number and all available information about last known internet connection. You also specify how often these connections are made (recommended daily).
This process does not interfere with any PC work and can't be detected by the computer user or by current antivirus products. Continuous development ensures that the product remains resistant to any antivirus program.
You can access your online report from any computer or have your computer email you a report. This report contains IP address of your computer, which lets you establish the location of lost computer.
To obtain more information on how to establish the location of computer, see section below HOW TO LOCATE THE COMPUTER.

Besides that, Absolute Protect calls your phone number with 2 days interval - so you can detect location from where call was made. To make sure that the call is made by Absolute Protect you will hear ticking sounds (like someone repeatedly pressing number 8 on phone in pulse dial mode). If phone number is unlisted, private or you are unable to detect phone number - call police and they will be happy to assist you in detecting that number.

If you have disabled phone calls from Absolute Protect or file retrieval function you can enable later when computer is lost. To do so - install Absolute Protect on second computer (you must use same FTP account, FTP username and FTP password) go to "Settings" and press button "Enable all functions on lost computer". All functions will be enabled next 24 hours when lost computer is connected to the Internet.

In addition, you can make your lost computer send you any file of your choice. For this option an FTP account is required (most Internet Service Providers will assign you an FTP account automatically when you subscribe. To make sure, call your Internet provider). To use Absolute Protect without this option, an FTP account is not required. For more information on how to retrieve files from lost computer - start Absolute Protect, go to "Retrieve file from remote computer" and press "Help".

In many cases AbsoluteProtect can even survive hard disk formatting.
AbsoluteProtect has been tested against all known computer viruses.

HOW TO START ABSOLUTE PROTECT.

After installation Absolute Protect will automatically run on your computer undetectedly and you may have problem access program. If you would like to change "Settings", retrieve file from remote computer etc. you should start Absolute Protect access program. To do so - doubleclick on icon you created during installation or go to "Start" and run command line you specified during installation.

HOW TO UNINSTALL THE PROGRAM.

To uninstall the program, start Absolute Protect, and press "Uninstall"

HOW TO FORMAT A HARD DISK

You may be unable to format a hard disk while running Absolute Protect. This prevents the program from being deleted. To format a hard disk, unload AbsoluteProtect first, and then perform formatting.
To unload the program, start Absolute Protect and then press "Unload".

This is a shareware program. It means that you can download it now and use free during the evaluation. After that, you should either register it if you found it useful, or delete the program from your computer.

WHAT TO DO IF COMPUTER IS LOST OR STOLEN

First, inform your private security company or the police of loss or theft. Then connect to your online report. To access this report you must provide owner name and email address exactly as you have entered them when installed AbsoluteProtect. Forward this report to your private security company or the police so that they can obtain a warrant to go in and recover computer. If you have any problem, email us at absolute@absolute-protect.com and Absolute Protect will assist you to locate computer.

HOW TO LOCATE THE COMPUTER (information for security company)

Present your online report to private security company or police, they can obtain the street address from which computer was connected to the Internet in order to retrieve it as quickly as possible. You can also obtain that address by yourself.
The procedure is described below.

If you have any problem to locate the computer, email us at absolute@absolute-protect.com and Absolute Protect will assist you.

In online report you will find:
- username used to connect to the Internet;
- connection time;
- IP address of the computer, which sent the message. It looks like this:123.123.12.123;

To locate computer, follow this procedure:
1- look up IP address in the report;
2- go to http://www.absolute-protect.com/LOOKUP.HTM;
3- enter obtained IP address to get street address and phone number of IP server (computer which was used to connect to the Internet).
4- contact the management of this IP server and provide them with:
a) the username OR
b) connection time and IP address of computer from which the message was sent.
The management must be able to establish the name and street address of the person using your computer. In most cases they will not reveal that information to a private party so police assistance will be required.
Even if thief removes the hard disk or disassembles the computer these parts probably will be installed on another computer so it will be possible to locate them and find out how they were acquired.

DIFFERENT IP ADDRESS FOR YOU COMPUTER

Keep in mind that every time you connect to your Internet Provider,
different IP address is assigned to your computer. However this information (IP address and time of connection) is recorded to server's log. So, to establish name of user who is using your computer, you have to provide both: IP address and connection time.

REGISTRATION: NAME AND EMAIL ADDRESS

When you register Absolute Protect you don't need to enter any registration code, but your name and email address will be added to registered users database. If you enter another name or email address when installing Absolute Protect you may receive messages that you are using unregistered version. So if you would like to change name and/or email address registered with Absolute Protect you should change them in 2 places:
1- in registered users database (you can do it online at http://www.absolute-protect.com/CHANGE.HTM);
2- inside program installed on your computer (you should uninstall Absolute Protect and then install it with new user name).

INSURANCE ISN'T ENOUGH

If your computer is stolen, an insurance company will reimburse the cost of hardware and software, but what about personal data stored in the computer? AbsoluteProtect helps you to recover both your computer and data.

DISCOVER THE NEW GENERATION OF COMPUTER PROTECTION PROGRAMS

AbsoluteProtect makes theft of computers less profitable, so crime really does not pay.

TROUBLESHOOTING

If you have any trouble, send us an email at absolute@absolute-protect.com

NO UNLAWFUL OR PROHIBITED USE

As a condition of your use of this software, you guarantee that you will not uses that program for any purpose that is unlawful or prohibited by the terms and conditions of the License agreement.

LICENSE AGREEMENT

BY DOWNLOADING THIS SOFTWARE, YOU AGREE TO ABIDE BY THE TERMS OF THIS END USER AGREEMENT

DISTRIBUTION STATUS OF THE PROGRAM

Freely distributable

CONTACT INFORMATION

email: absolute@absolute-protect.com
address: Absolute Protect, 2938 Dundas W #694 Toronto, Ontario , Canada, M6P 4E7

LINKS TO THIRD PARTY SITES

This Web site may contain hyperlinks to Web sites operated by parties other than Absolute Protect. Such hyperlinks are provided for your reference only. Absolute Protect does not control such Web sites, and is not responsible for their contents. Absolute Protect's inclusion of hyperlinks to such Web sites does not imply any endorsement of the material on such Web sites or any association with their operators.

Home page Full description Download Registration Report Buy now


Copyright © 1998,1999 by the Absolute Protect
All Rights Reserved. Any reproduction or reuse of these pages or
their contents requires the advance permission of the Absolute Protect.