Here are some answers to our most frequently asked questions. If you need more information, email us at [email protected] or call 805-283-4100 so we can help you.
NetLok is a cyber security firm offering a low cost, breakthrough photo technology that uses pictures instead of passwords for authorizing entrance into Internet and Intranet systems using NetLok’s Photo Technology© and NetLok's Universal Login.
Our primary goals are to lock out hackers and give individuals, small groups, and businesses the ability to lock in privacy in regard to their most valued documents and private communications. Once you experience the simplicity of our breakthrough photo technology and Universal Login, trust us, you’ll be NetLoking© all your private information and conversations.
NetLok will operate with the following Apple operating systems: El Capitan, Yosemite, Mavericks, and Mountain Lion. You can use the following browsers with these operating systems: Safari, Chrome and Firefox.
NetLok will work with Windows 10 and the following browsers: Internet Explorer 11+, Edge, Chrome and Firefox. Since Microsoft is not supporting previous of Microsoft Internet Explorer, we can not guaranteed their perfomrance with our programs.
A small iPhone picture has 48,200 characters, which is more complicated than commonly used passwords. Let’s compare the typical hacker’s cracking time for an 8 and 15 character, upper and lower case alphanumeric, password against a 48,200 character encrypted photo by NetLok:
85%+ of all online hacking is centered on one thing – the password. Why? Hackers know what to do with passwords and how to break them quickly. However, when confronting NetLok’s Photo Technology and Universal Login, hackers face using significantly greater resources in trying to break a 48,200 character encrypted photo. It simply takes too much time and energy for them to crack! Once a hacker realizes that he has been NetLok’d©, he’ll move on to easier targets.
After you create your member account, NetLok sends you a starter, encrypted photo to your Downloads Folder so you can enter your NetLokr (your private cyber vault in the cloud).
Once in your NetLokr, you click your name dropdown menu, click Profile Settings, click the NetLok Photo tab, and start to upload and label your own personal photos for regular use.
Depending on your Internet connection speed, it usually takes less than 10 seconds or less to upload a new encrypted photo. After you label your private photo for regular use, you can re-label the starter photo as a fake ID, inactive, etc. or just delete it from your NetLok photo library. You can re-encrypt your photos and/or re-label your photos anytime for different purposes and better security.
Your NetLok photos are always placed in your Downloads folder until you rename and save your photos into another folder in your computer. Therefore, it’s very important to know where your Downloads folder is located.
The location of your computer’s Downloads folder is dependent on whether you are using a MAC or PC.
For MAC Users: Click the Finder’s icon, usually displayed first on your Dock. Under the “Go” menu item dropdown, select “Downloads”. Alternatively, navigate to your Dock view. The “Downloads” icon normally appears to the left of the Trash bin icon.
For PC Users: Click the Start Menu icon (usually on the lower, left-hand corner of the screen). Enter the word “Downloads” into the “Search programs and files” rectangle. Click enter and you will be taken to Downloads where you can locate the downloaded file that you need.
Yes, and we encourage you to label different NetLok Photos to enhance your own security. Here are the five labels that can help protect you, if an unauthorized person uses or someone steals your computer and tries to enter your NetLokr:
Security Tip: It takes 5 seconds to change Photo labels in the NetLok Photo Tab area, which is in your Profile Settings. By changing labels often, you can reset your photo security in 5 seconds! Forget complex passwords. Go NetLoking©.
Unlike most passwords that need to be reset every 30 to 90 days because passwords are easily defeated, it will take most hackers over a year to break an encrypted NetLok Photo. That being said, it takes about 10 seconds to re-encrypt your Netlok Photo, which makes it easy to do as often as you like.
At Netlok, we make changing your encrypted NetLok Photos fun, while creating a nightmare for hackers. Many of us active NetLok users change our Photos seasonally or anytime we take a great picture. It can be at a football game, summer picnic, vacation, graduation, family celebration, etc. Since it is so easy to download and label a new encrypted NetLok Photo, it’s a pleasure to do.
The NetLokr is your private cyber vault in the cloud and is provided with your NetLok Personal or NetLok Family account. Your NetLokr provides a digital, online platform to store your personal documents, pictures, etc. and protects your essential communications through NetLok Messages. You control everything that you create and share inside your personal NetLokr. Unless you authorize and/or specifically share a document, picture, and/or start a conversation with another Owner, Member or Guest, no one can access your NetLokr, view your information, or listen in to your private conversations. Protect your Privacy – Start NetLoking©!
NetLok Messages is a secured messaging service available within the NetLokr, which allows an Owner, Member and/or Guest to engage in confidential, limited-access communication inside their personal NetLokr. For your convenience, you can attach 3 files to a message.
In a recent digital survey, researchers found that 73% of individual emails are hacked in non-encrypted email systems! Email is frequently hacked because email is sent across dozens of servers before it reaches its destination. Therefore, a hacker can view your email or divert it to a hacker's location during transmission.
All NetLok Messages are created and stored in your private NetLokr and can only be read and responded to inside your NetLokr where we have multi-tiered layers of security. NetLok’s messaging and documents sharing applications do not use the email system! Everything is in NetLok's cloud and NetLok’d™ for your security.
You control all of your information from your photos to messages. You must authorize another person to see and respond to your messages inside your NetLokr. This personal control means that a hacker can't get to your message because the message is not being transmitted through public phone nor Internet cable lines. All messages and attachments are Netlok’d™ in the cloud.
One of the growing areas of cybercrime is called "Ransomware" and it works like this. A hacker plants his/her malware into your computer. He/she turns on the malware program, the malware freezes your computer and encrypts its contents. The hacker will not restore your company and content until you pay the ransom amount, which is often $2,000 and greater.
When you store your most important information and data in the NetLokr, your contents are stored in NetLok’s cloud. While your computer is frozen by a hacker's malware, you can still access and retrieve your NetLokr contents from another computer, while you decide how to recover your other computer content from the hacker who is holding your computer for ransom. Your attacker has been NetLok’d™ from controlling your valuable information.
NetLok Docs© is a highly secured file storage system inside your NetLokr. A Doc can be a picture file, application files from Word, Excel, Keynote, Pages, Numbers and most application files that you have access to in your computer. We highly recommend that you use your NetLokr to store confidential, personal, and private information and data that you want to keep away from hackers. For example, keep tax records, wills, trusts, medical and legal information, investment information, etc. And, just as importantly, those family pictures and other keepsakes that you never want exposed in social media. In short, anything you value should be NetLok’d in your NetLokr.
We store and backup your information in highly secured facilities across the United States. And, we use multiple layers of security to protect your private NetLokr in those facilities.
NetLok Contacts is a highly secured address book inside your NetLokr that also provides a history of your shared Docs and Messages. For example, if you send your accountant your tax information through NetLok Messages with attachments, the address page for the account will also record the transmission for easy access. Having a correspondence history in your Contacts page is a very convenient and important tool for private and business activities that need to be secured. NOTE: Contacts is designed specifically for private messaging and sharing of documents with a select group of people that you trust. Therefore, please do not use it as a master address book for all of your contacts. Only Owner, Member, and Guest contact details are allowed to be saved in your address book. In regard to Guest, they must accept your Message or Docs invitation before you can add details in your address book.
For NetLok Family (small group plan), the Owner is the person who uses his/her credit card to establish the primary account and is the only person paying for all group members. The Owner determines who becomes a paid member in his/her Family account and who can have a NetLokr. Only the Owner can add additional members and terminate a member from the Family account.
For NetLok Personal, the Owner is the only one who has a NetLokr and there are no other members.
For NetLok Family (small group plan), a Member has a fully paid account and private NetLokr with full access to the NetLokr features and benefits. A Member cannot terminate another member’s NetLokr account nor terminate the Owner’s NetLokr account.
A Guest is a non-paid person who has been asked by an Owner or a Member to receive a Message and/or share an account holder's Document in their NetLokr. Initially, the Guest does not have a private NetLokr. However, they receive an invitation to create a free NetLokr in order to receive the Message or Document from the Owner or Member.
A Guest has very limited access and capabilities. A Guest can respond to a NetLok Message sent by an Owner or Member to them but cannot create their own Message to share with a different Member or Guest; and, a Guest cannot share a Message with different person inside the NetLokr. A Guest can receive and read a Doc from a Member, but a Guest cannot create or send a new Doc to an Owner or another Guest; and, a Guest cannot share a Doc with different person inside the NetLokr. Finally, a Guest can upgrade to full services at any time by either purchasing a NetLok Personal account, purchasing a NetLok Family account or having an Owner of a Family Plan pay for the Guest’s membership as part of that small group.
Two-factor authentication is a proven method of verifying a person’s online identity. This method requires the user to input a code during the process. The temporary code is sent to the user by email or text at the time of the request.
You should use Two-factor authentication when you forgot your photo, don’t have access to your computer, and/or working in a public place. Although two-factor authentication is very reliable and secure, most people feel that it is not user-friendly because you must have a second device, computer or phone, to receive the code. Additionally, the code is active for a short period of time. NetLok uses a short time horizon for our two-factor authentication code as well and we do not publish the allotted time to keep cyber criminals guessing.
If you need more information, we’re here for you! Email us at [email protected] or call 805-283-4100. We’re available from 9:00am to 5:00pm, PST. We look forward to hearing from you should you ever reach out to us.