| |
Absolute Protect |
Home page | Full description | Download | Registration | Report | Buy now |
Download file size:0.3 Mb
When Absolute Protect is installed, it waits until
the computer is connected to the Internet and then
connects (HTTP) to www.absolute-protect.com, which traces location of
the computer and records it to log.
When the computer is not connected to the Internet for 5 days it will
use modem and silently dial phone number(s) you specify.
In many cases the program can even survive hard disk formatting.
HOW TO ACCESS ABSOLUTE PROTECT SETTINGS. After installation Absolute Protect runs undetected and you may have problem access settings. To uninstall program you should access Absolute Protect settings. To do so - doubleclick on the icon you created during installation or go to "Start" and run command line you specified during installation. HOW TO UNINSTALL ABSOLUTE PROTECT. To uninstall the program, access Absolute Protect settings, and press "Uninstall" This is a shareware. It means that you can download it now and use free during the evaluation. After that, you should either register it if you found it useful, or delete the program from your computers. WHAT TO DO IF COMPUTER IS LOST OR STOLEN
First, inform the police or your private security company of
loss or theft. Then connect to
http://www.absolute-protect.com,
press red button
HOW TO LOCATE THE COMPUTER (information for security company) The best solution is to fill in Lost computer report form and let Absolute Protect monitor the computer and contact police when it's location detected, but you can do it too:
Online report contains following information:
To locate computer, follow this simple procedure:
Even if thief removes the hard disk or disassembles the desktop these parts probably will be installed on another computers so it will be possible to locate them and find out how they were acquired. If you have any problem to locate the computer, email us at absolute@absolute-protect.com and we will assist you. DIFFERENT IP ADDRESS FOR YOUR COMPUTER Keep in mind that every time you connect to your Internet Provider, different IP address could be assigned to your computer. However this information (IP address, caller phone number and time of connection) is recorded to server's log. So, to trace user who is using lost computer, you have to provide both: IP address and connection time (this information can be found in report). REGISTRATION: NAME AND EMAIL ADDRESS
When you register Absolute Protect you don't have to enter any registration
code. Instead of that your name and email address used during registration
will be added to registered users database.
PRICE The price is available at Registration page DISCOVER THE NEW GENERATION OF COMPUTER PROTECTION PROGRAMS Absolute Protect makes theft of computers less profitable, so crime really does not pay. TROUBLESHOOTING If you have any trouble, email us at absolute@absolute-protect.com NO UNLAWFUL OR PROHIBITED USE As a condition of your use of this shareware, you guarantee that you will not use it for any purpose that is unlawful or prohibited by the terms and conditions of the License agreement. LICENSE AGREEMENT By downloading this software, you agree to abide by the terms of this END USER AGREEMENT DISTRIBUTION STATUS Freely distributable CONTACT INFORMATION email: absolute@absolute-protect.com
LINKS TO THIRD PARTY SITES This Web site may contain hyperlinks to Web sites operated by parties other than Absolute Protect. Such hyperlinks are provided for your reference only. Absolute Protect does not control such Web sites, and is not responsible for their contents. Absolute Protect's inclusion of hyperlinks to such Web sites does not imply any endorsement of the material on such Web sites or any association with their operators. |
Home page | Full description | Download | Registration | Report | Buy now |
Copyright © 1998-2000 by the Absolute Protect
All Rights Reserved. Any reproduction or reuse of these pages or
their contents requires the advance permission of the Absolute Protect.