Академический Документы
Профессиональный Документы
Культура Документы
Troubleshooting Guide
FAQ’s
Frequently Asked Questions (FAQ’s)
When you have received e-mail from nTracker, this e-mail will have
nTracker.ntk attachment. This file can be in various ways.
General Part
2. In case of the lost computer, can the nTracker really help and find the
lost computer?
nTracker program sends e-mail with attachment to the owner of computer
providing information of location where the lost or stolen computer has been
used.
After filing theft report, by providing the information obtained via nTracker,
police or to the cyber investigation squad can use the information to quickly
find where your lost or stolen computer is.
1
5. Does nTracker work with Dialup Modem?
nTracker works well even with Analog Dialup(56k) modem as long as Dialup
modem is connected with telephone line and nTracker does not require actual
internet connection from Dialup modem.
For Dialup modem connection, nTracker also sends E-mail notification to the
Owner, informing telephone number(instead of IP/ISP) who uses laptop PC at
that time. For Dialup connection only, it may take 10 seconds of telephone
charge(5~10 cents) at a time to be laid on the user and you may modify the
e-mail sending frequency up to 15 days to reduce telephone charge, using
“nTrackerViewer” easily.
E-Mail Part
2
4. nTracker starts working after laptop completely boots.
nTracker stops working after e-mail notification is sent to the laptop owner
successfully.
7. How happened if the user does not know the password when Logon after
booting?
nTracker starts working 10~20 seconds after logon windows is displayed and
enters into nTracker Auto Protection Mode to protect the data/file/information.
nTracker sends e-mail to the laptop owner, when connection with Internet is
available.
3
Auto Protection Part
1. Alarm Function
nTracker’ alarm function generally works like screen saver, which displays
warning message (3 types) with contact information, (e-mail address,
telephone number) while informing user to contact the owner of laptop PC.
Warning Messages Setting
- Disable: When checked “Disable”, nTracker does not display any warning
message.
- Theme 1: Courteous Persuasion message
- Theme 2: Humorous Message
- Theme 3: Severe Warning Message
Each Theme has 2 images, which changes continuously alternates.
2. Folder Encryption.
nTracker can protect information leak by using its folder encryption function.
nTracker can initially encrypt 3 folders maximum.
Folder to be encrypted must have Maximum folder name of 255 Bytes.
Following folders cannot be encrypted:
- System Folder ( ex) C:\windows\System folder; C:\windows, ..)
- Entire Drive: ex) C:\, D:\, ..
- Removable Drive: Network Drive,CD-Rom, FDD, …
4. Others.
- After file encryption, do not change password.
- Decryption cannot execute if the password is different.
4
5. Automatic Protection Execution Conditions
This function works only when all 3 following conditions are met:
Must meet the boot count frequency defined by user
Must elapse user defined date interval since last e-mail notification.
Change to non-registered network, different IP (ISP)
- from the IP(ISP) which nTracker installed for the first time
- from the IP(ISP) which the owner inputs correct password and received
first e-mail notice
7. Date Interval:
First time installation date or from the date correct password is input on the first
e-mail notification (Password is required to open the nTracker.ntk file which
contains full detail user information, laptop information and current laptop
location information)
5
10. Clearing point of times of Booting frequency and Date Interval
Booting frequency/date Interval will be re-initialized from the beginning when
nTracker authorizes IP (ISP) address with correct password recognition on
nTracker.ntk file attached to the e-mail.
11. Auto Protection Mode Process under ON-Line (which is connected with
Internet)
nTracker shows Password screen
User inputs correct PasswordÆ Auto Protection Mode is not executed and
regards the current IP (ISP) as an authorized, then, Auto Protection Mode will
not executed from this IP (ISP) address.
6
15. Automatic Protection Mode- Sample Explanation
7
-Automatic Protection Mode does not execute (Current Booting
frequency and Date Interval: 3/4)
10) Use Other PC to check nTracker E-mail Notification on Feb 14, 2004
-Laptop was not used, e-mail was not sent. However, you can check the
previously sent e-mail Notification sent on Feb. 13, 2004. E-mail
Attachment (“nTracker.ntk” file) with correct password recognition
using another computer (and other ISP/IP).
-In this case, Booting frequency and Date collapsed does not re-initialize
because it was checked using another computer.
(It does not count Booting frequency because laptop was not used, but
Date Interval increases when day elapse).
-Automatic Protection Mode does not execute since Laptop was not
used. (Current Booting frequency and Date Interval: 6/11)
8
11) Use Laptop PC at office on Feb 15, 2004
-nTracker does not send e-mail as office IP(ISP) is authorized.
-Automatic Protection Mode does not execute (Currently, 7/12 of Booting
frequency and Date collapsed is fulfilled but IP(ISP) is already
authorized).
*If user inputs correct password, all Booting frequency and Date
Interval will be clear and re-initialized from the beginning.
9
*1. Automatic Protection Mode does not execute (Because 5 times/8 days of
Booting frequency and Date Interval is fulfilled but IP(ISP) is already
authorized.
*2. nTracker sends e-mail to the user(owner) and Automatic Protection Mode
works, because IP(ISP) address has been changed.
*3. User(Owner) can receive E-mail Notification and read E-mail
Attachment(“nTracker.ntk” file) with correct password recognition using other
computer( and other ISP/IP). In this case, Booting frequency and Date do not
re-initialize because another computer was used.(It does not count Booting
frequency but Date Interval will increase if day has elapsed).
*4. Automatic Protection Mode does not work.(Because pre-defined Booting
frequency and Date Interval is fulfilled but IP(ISP) is already authorized.)
10
Reformat Protection (BIOS Boot Protection)
You can further protect your computer after it has been lost or stolen by
configuring to disable booting from Floppy or CD drive. Booting disable for
Floppy and CD can be done in the BIOS. It is also good idea to set a password
for the BIOS, so no one else can enter the BIOS and change the setting back to
enable Floppy and CD booting.
With BIOS password set and Floppy and CD booting disabled, the computer hard
drive is protected from being erased by installing another fresh copy of operating
system.
To configure BIOS password and disable Floppy and CD booting, you will need
to enter BIOS configuration. Entering BIOS configuration differs from computer to
computer. Refer to your computer documentation for detailed information.
Normally you can enter BIOS configuration setup by pressing DEL key or F2 key
when the BIOS screen appear. (Example shown below)
We will first configure and set password for the BIOS setup. Make sure to set
Supervisor Password, not the boot password. In order to retrieve the lost
computer, we want the thief to connect to Internet so we can track and retrieve
the lost or stolen computer.
11
1. To configure the password, select SUPERVISOR PASSWORD.
2. To disable booting from Floppy & CD drive, select BIOS Features Setup.
Below BIOS Features Setup window will appear. From this BIOS Features Setup,
you can configure boot protection.
12
Configure “Anti Virus Protection” on the screen above, <Enabled>.
3. You will need to save the changes you have made in order of it to take place.
Select <Save & Exit Setup> from the menu as shown below. This will save your
changes and exit the BIOS setup.
13