Ahranta Home GOMYPC Site Map
Point Lock Pro
Is your computer safe? Is your privacy protected?
Yes, you have Point Lock Pro.
Products
  GOMYPC
  Internet Warranty Professional
  Internet Desktop Helper
  Twin-Net 2003
      Download 30-Day Free Trial
  Point Lock Pro
      Product Information
      Functions & Features
      FAQ
      Download 15-Day Free Trial
  Solution Customization
Support
Company Information
Contact Ahranta
 
Home > Products > Point Lock Pro > FAQ
 
FAQ
1. What is Point Lock?
2. What security features does Point Lock provide?
3. What other features does Point Lock have?
4. Can Point Lock protect confidential information I access through my company's local area network?
5. What are the system requirements to run Point Lock on my system?
6. How does Point Lock provide protection?
7. Does Point Lock encrypt data?
8. How do I install Point Lock?
9. How do I use Point Lock?
10. Can't seem to find Point Lock in the Program Folders, did the program install correctly?
11. What does Folder Lock do?
12. What is Hidden/Read Only function?
13. How do I uninstall Point Lock?
14. Are there any known programs or applications that Point Lock is not compatible with?
15. Are there any particular rules or conditions I need to follow in setting up User Name and Password?
16. What do I do if I forget my User Name or Password?
17. Who will benefit from using Point Lock?
18. Is there any way I can test Point Lock before I decide to purchase?
19. My trial version of Point Lock just expired; will I be able to retrieve my files? And how can I purchase       the regular full version of the software?
20. Why can't I find Point Lock at retail stores?
21. What other products are there from Ahranta?
 
Answer
1. What is Point Lock?
Point Lock is a user-friendly security program that protects files and data on personal computer systems from intruders at keyboard level and hidden dangers that is inherent to being connected on a network. Whether it is online peepers or unauthorized access within your local network, you can be assured that your data is protected with Point Lock.
 
2. What security features does Point Lock provide?
Point Lock has many features to ensure that your data remains private and protected from unauthorized users. It uses 128-bit encryption for password protection, so no one else but the authorized user can access the program. The main protection for your data is provided by the unique Locking functions, which prevent hackers or internal intruders from finding and/or removing important data while you are away from your computer, by making the selected folders or drives disappear from your computer. The lock features for devices such as FDD, CD-ROM, CD-R/RW, zip Drives protects data from being copied or removed from your computer by unauthorized users and also stops unauthorized users from installing or writing any malicious data to your system.
 
3. What other features does Point Lock have?
Point Lock has many other useful safety features such as allowing one convenient step to clear recently used documents and browsed sites automatically when you close the program that prevents unauthorized users from retracing any of your activities during your workday. Also, Point Lock does not show in the Program tab in the Windows Start Menu so it is not obvious to others that a security program is operating on your computer. Another built-in safety feature is that Point Lock can only be uninstalled by the original installer of the program, which prevents unauthorized users from gaining access to confidential information by deleting the program.
 
4. Can Point Lock protect confidential information I access through my company's local area     network?
Yes, by using the Network Lock feature, you can prohibit unauthorized users from accessing confidential information on servers or other computers on your network for malicious intent.
 
5. What are the system requirements to run Point Lock on my system?
You will need to have a Pentium-rated CPU, at least 16MB of memory, minimum of 5MB of free space on the hard drive, and one of MS Windows 95/98/ME/2000/NT4.0 operating systems.
 
6. How does Point Lock provide protection?
Point Lock takes a unique approach in data protection compared to other security programs. It uses a patent pending technology to hide any traces of the folder containing personal or critical data from the system. When the program is operating, no one but the user knows that there are important data on the system. This approach removes any curiosity factor that other security programs leave unresolved. There is no other means of protection that is safer than Point Lock since unauthorized users will not even know that there is any valuable information on your system.
 
7. Does Point Lock encrypt data?
Unlike most security programs, Point Lock does not encrypt the data it's protecting. After years of development, we have determined that encryption is an inefficient way to protect data. When you encrypt, it changes the data in such a way that it cannot be displayed properly without a key. To do this, it takes up unnecessary resources and time. Point Lock works more efficiently, by removing all traces of your files when in operation, instead of changing the data that could result in permanent loss of the data.
 
8. How do I install Point Lock?
Installing Point Lock is very simple once you download the program from one of many download sites available online. With the install option on many of the unzip utilities currently available, the program will launch into the setup screen as soon as unzipped. Then, follow the directions and enter your user name and password to complete setup.
Make sure you remember the user name and password you use to install the program because you will need this information when you need to uninstall the program for any reason.
 
9. How do I use Point Lock?
When you install Point Lock, the program will create a shortcut in the Quick Launch bar and an icon in the Control Panel folder. You can use either of them to launch the Login screen to run the program. Occasionally, you may change your user name and password for security purposes, but this will not change the original user name and password you will need to uninstall the program.
 
10. Can't seem to find Point Lock in the Program Folders, did the program install correctly?
If you have followed the directions during the setup, the program will have created a shortcut in the Quick Launch bar and in the Control Panel. As a safety feature, the program does not show up in the Program Folders, it's a stealth feature, so it won't be so obvious to unauthorized users that a security program is operating on the computer.
 
11. What does Folder Lock do?
Once you lock the selected folders for the Folder Lock function, Point Lock hides the existence of the folders from unauthorized users and even the system is unaware that there is such a folder when the program is in operation, so you don't have to worry even you are away form your computer. To access those folders again, simply login to Point Lock and the selected folders will appear in the Point Lock Full Screen.
 
12. What is Hidden/Read Only function?
This function is different from other Windows applications with Read Only features. With typical applications, documents are available for all users but limiting modification rights, but with Point Lock only AUTHORIZED users are allowed to read the documents by searching for the specific file in the Windows Search/Find menu.
 
13. How do I uninstall Point Lock?
In order to uninstall Point Lock program, you need to enter the User ID and Password used to initially install the program. You are required to enter ID and Password twice when you first install and use the program (once when you first install the program, and once again when you first use the program).
 
14. Are there any known programs or applications that Point Lock is not compatible with?
Point Lock works with all Windows based programs and applications. Only programs you may need to watch out for are antivirus software, during the installation process. Normally, when you install new software we suggest that the antivirus program be disabled after making sure that the new software is free of virus.
 
15. Are there any particular rules or conditions I need to follow in setting up User Name and       Password?
Make sure you choose your User ID and Password that will not be easily guessed by others. Avoid using familiar names, birth dates, anniversaries, and such for your password. The User ID must be between 4 to 20 characters with no spaces in between and the password must be 4 to 10 characters with no spaces. Please be aware that the User ID and Password are case sensitive.
 
16. What do I do if I forget my User Name or Password?
Should you at any time forget your user name or password, you need to contact us before you try uninstalling or make any modifications to the program. Once we are able to confirm that the user is the owner of the program, we will create a program that will reset the User Name and Password for the authorized owner. The process will take about 48 hours to verify the owner information. Please be patient with us during this process, since this program is a security product, we need to ensure that only the authorized user will get the program.
 
17. Who will benefit from using Point Lock?
Anybody who works with sensitive or confidential information on the computer will benefit with Point Lock because it will give him or her peace of mind that the information will not be available to any unauthorized persons. Professionals like lawyers, engineers, accountants, executives, and such will be able to keep confidential information, trade secrets, and personal files from being leaked to competitors or someone with malicious intent.
 
18. Is there any way I can test Point Lock before I decide to purchase?
Trial versions of Point Lock are available on most leading online software download sites (like CNET, ZDNet, etc¡¦) for customers to see how useful and helpful the program is before they buy it.
 
19. My trial version of Point Lock just expired; will I be able to retrieve my files?
      And how can I purchase the regular full version of the software?

Once the trial period ends, the program will be disabled and all functions will cease to operate, returning all your documents to their original state before Point Lock was installed. It will not hide any information once the program expires. You can only continue using the security features of Point Lock by contacting us to purchase the full version, which will install on top of the trial version.
 
20. Why can't I find Point Lock at retail stores?
To keep the cost of our products as low as possible for our customers, we have decided to market our products in the most cost efficient way available through online distribution. By saving the cost of packaging, we are able to pass on the savings, to make it easier for our customers to make the decision of buying and benefiting from our products. The efficient process of online distribution will allow our customers the same satisfaction of owning and keeping a licensed copy of our software without the worries of misplacing or losing a physical copy of it.
 
21. What other products are there from Ahranta?
At Ahranta, we are constantly striving to develop software products that will increase corporate and personal productivity in providing efficient and secure computing peace of mind. Our current release of products includes: Point Lock, personal computer security, Twin Net 2003, Desktop Helper, and Warranty Professional, PC-remote-control software for corporate use. For more info, please refer to ¡°products¡± in the menu.
 
   Copyright 1991-2005 Ahranta, Inc. All rights reverved.