Frequently Asked Questions

Here are some answers to our most frequently asked questions. If you need more information, email us at [email protected] or call 805-283-4100 so we can help you.

What is NetLok™?

What are the system requirements for the MAC?

What are the system requirements for my PC?

Why is your encrypted NetLok Photo more secure than most complicated passwords?

How do I get my NetLok Photo?

Where is my computer Downloads folder?

Can I have more than one NetLok Photo?

How often should I reset or re-encrypt my NetLok Photos?

What is your NetLokr™?

What is NetLok Messages?

Why is using NetLok's Messages Better than Email?

Why is it safer to store my important information and data inside the NetLokr than my personal computer?

What is NetLok Docs©?

How Do I Know NetLok Won’t Lose My Important Files?

What is NetLok Contacts?

Who are Owners, Members and Guests?

Who can gain access to your NetLokr?

What is Two-factor Authentication and when should I use it?

What are NetLok's Terms of Use?

What is NetLok’s Privacy Policy?

Have additional questions?

What is NetLok™?

NetLok is a cyber security firm offering a low cost, breakthrough photo technology that uses pictures instead of passwords for authorizing entrance into Internet and Intranet systems using NetLok’s Photo Technology© and NetLok's Universal Login.

Our primary goals are to lock out hackers and give individuals, small groups, and businesses the ability to lock in privacy in regard to their most valued documents and private communications.  Once you experience the simplicity of our breakthrough photo technology and Universal Login, trust us, you’ll be NetLoking© all your private information and conversations.

 

What are the system requirements for the MAC?

NetLok will operate with the following Apple operating systems:  El Capitan, Yosemite, Mavericks, and Mountain Lion.  You can use the following browsers with these operating systems: Safari, Chrome and Firefox.

 

 

 

What are the system requirements for my PC?

NetLok will work with Windows 10 and the following browsers: Internet Explorer 11+, Edge, Chrome and Firefox.  Since Microsoft is not supporting previous of Microsoft Internet Explorer, we can not guaranteed  their perfomrance with our programs.

 

Why is your encrypted NetLok Photo more secure than most complicated passwords?

A small iPhone picture has 48,200 characters, which is more complicated than commonly used passwords.  Let’s compare the typical hacker’s cracking time for an 8 and 15 character, upper and lower case alphanumeric, password against a 48,200 character encrypted photo by NetLok:

  • 8 character password takes a hacker 16 minutes to crack
  • 15 character password takes a hacker 1 hour to crack
  • 48,200 character, encrypted photo takes over 1 year

85%+ of all online hacking is centered on one thing – the password.  Why? Hackers know what to do with passwords and how to break them quickly.  However, when confronting NetLok’s Photo Technology and Universal Login, hackers face using significantly greater resources in trying to break a 48,200 character encrypted photo. It simply takes too much time and energy for them to crack! Once a hacker realizes that he has been NetLok’d©, he’ll move on to easier targets.

 

How do I get my NetLok Photo?

After you create your member account, NetLok sends you a starter, encrypted photo to your Downloads Folder so you can enter your NetLokr (your private cyber vault in the cloud). 

Once in your NetLokr, you click your name dropdown menu, click Profile Settings, click the NetLok Photo tab, and start to upload and label your own personal photos for regular use. 

Depending on your Internet connection speed, it usually takes less than 10 seconds or less to upload a new encrypted photo.  After you label your private photo for regular use, you can re-label the starter photo as a fake ID, inactive, etc. or just delete it from your NetLok photo library.  You can re-encrypt your photos and/or re-label your photos anytime for different purposes and better security.

 

Where is my computer Downloads folder?

Your NetLok photos are always placed in your Downloads folder until you rename and save your photos into another folder in your computer.  Therefore, it’s very important to know where your Downloads folder is located.

The location of your computer’s Downloads folder is dependent on whether you are using a MAC or PC.

For MAC Users: Click the Finder’s icon, usually displayed first on your Dock. Under the “Go” menu item dropdown, select “Downloads”.  Alternatively, navigate to your Dock view.  The “Downloads” icon normally appears to the left of the Trash bin icon.

For PC Users: Click the Start Menu icon (usually on the lower, left-hand corner of the screen).  Enter the word “Downloads” into the “Search programs and files” rectangle.  Click enter and you will be taken to Downloads where you can locate the downloaded file that you need.

 

Can I have more than one NetLok Photo?

Yes, and we encourage you to label different NetLok Photos to enhance your own security.  Here are the five labels that can help protect you, if an unauthorized person uses or someone steals your computer and tries to enter your NetLokr:

  1. Fake ID. If an unauthorized person clicks a Fake ID photo, your NetLokr is suspended and is not re-opened until you contact us.
  2. Single-Use. If you are working in a public place and worried that someone may be watching you, use a single-use photo and it is no longer usable after you finish your session.
  3. Inactive.  If an unauthorized person clicks multiple inactive photos, your NetLokr is suspended and not re-opened until you contact us.
  4. Duress.  If you are forced to open your NetLokr, you can use your Duress photo to notify a trusted person that you are in trouble.
  5. Regular Use.  This photo is the one you normally use to enter your NetLokr instead of a password.

Security Tip:  It takes 5 seconds to change Photo labels in the NetLok Photo Tab area, which is in your Profile Settings. By changing labels often, you can reset your photo security in 5 seconds!  Forget complex passwords.  Go NetLoking©.

 

How often should I reset or re-encrypt my NetLok Photos?

Unlike most passwords that need to be reset every 30 to 90 days because passwords are easily defeated, it will take most hackers over a year to break an encrypted NetLok Photo.  That being said, it takes about 10 seconds to re-encrypt your Netlok Photo, which makes it easy to do as often as you like.

At Netlok, we make changing your encrypted NetLok Photos fun, while creating a nightmare for hackers.  Many of us active NetLok users change our Photos seasonally or anytime we take a great picture.  It can be at a football game, summer picnic, vacation, graduation, family celebration, etc.  Since it is so easy to download and label a new encrypted NetLok Photo, it’s a pleasure to do.

 

What is your NetLokr™?

The NetLokr is your private cyber vault in the cloud and is provided with your NetLok Personal or NetLok Family account.  Your NetLokr provides a digital, online platform to store your personal documents, pictures, etc. and protects your essential communications through NetLok Messages. You control everything that you create and share inside your personal NetLokr. Unless you authorize and/or specifically share a document, picture, and/or start a conversation with another Owner, Member or Guest, no one can access your NetLokr, view your information, or listen in to your private conversations.  Protect your Privacy – Start NetLoking©!

 

What is NetLok Messages?

NetLok Messages is a secured messaging service available within the NetLokr, which allows an Owner, Member and/or Guest to engage in confidential, limited-access communication inside their personal NetLokr.  For your convenience, you can attach 3 files to a message.

 

Why is using NetLok's Messages Better than Email?

In a recent digital survey, researchers found that 73% of individual emails are hacked in non-encrypted email systems!  Email is frequently hacked because email is sent across dozens of servers before it reaches its destination. Therefore, a hacker can view your email or divert it to a hacker's location during transmission.

All NetLok Messages are created and stored in your private NetLokr and can only be read and responded to inside your NetLokr where we have multi-tiered layers of security. NetLok’s messaging and documents sharing applications do not use the email system! Everything is in NetLok's cloud and NetLok’d™ for your security.

You control all of your information from your photos to messages.  You must authorize another person to see and respond to your messages inside your NetLokr. This personal control means that a hacker can't get to your message because the message is not being transmitted through public phone nor Internet cable lines. All messages and attachments are Netlok’d in the cloud.

 

Why is it safer to store my important information and data inside the NetLokr than my personal computer?

One of the growing areas of cybercrime is called "Ransomware" and it works like this.  A hacker plants his/her malware into your computer.   He/she turns on the malware program, the malware freezes your computer and encrypts its contents. The hacker will not restore your company and content until you pay the ransom amount, which is often $2,000 and greater.

When you store your most important information and data in the NetLokr, your contents are stored in NetLok’s cloud.  While your computer is frozen by a hacker's malware, you can still access and retrieve your NetLokr contents from another computer, while you decide how to recover your other computer content from the hacker who is holding your computer for ransom.  Your attacker has been NetLok’d™ from controlling your valuable information.

 

What is NetLok Docs©?

NetLok Docs© is a highly secured file storage system inside your NetLokr.  A Doc can be a picture file, application files from Word, Excel, Keynote, Pages, Numbers and most application files that you have access to in your computer.  We highly recommend that you use your NetLokr to store confidential, personal, and private information and data that you want to keep away from hackers.  For example, keep tax records, wills, trusts, medical and legal information, investment information, etc.  And, just as importantly, those family pictures and other keepsakes that you never want exposed in social media.  In short, anything you value should be NetLok’d in your NetLokr.

 

How Do I Know NetLok Won’t Lose My Important Files?

We store and backup your information in highly secured facilities across the United States.  And, we use multiple layers of security to protect your private NetLokr in those facilities.

 

What is NetLok Contacts?

NetLok Contacts is a highly secured address book inside your NetLokr that also provides a history of your shared Docs and Messages.  For example, if you send your accountant your tax information through NetLok Messages with attachments, the address page for the account will also record the transmission for easy access.  Having a correspondence history in your Contacts page is a very convenient and important tool for private and business activities that need to be secured.  NOTE:  Contacts is designed specifically for private messaging and sharing of documents with a select group of people that you trust.  Therefore, please do not use it as a master address book for all of your contacts.  Only Owner, Member, and Guest contact details are allowed to be saved in your address book.  In regard to Guest, they must accept your Message or Docs invitation before you can add details in your address book.

 

Who are Owners, Members and Guests?

For NetLok Family (small group plan), the Owner is the person who uses his/her credit card to establish the primary account and is the only person paying for all group members.  The Owner determines who becomes a paid member in his/her Family account and who can have a NetLokr.  Only the Owner can add additional members and terminate a member from the Family account.

For NetLok Personal, the Owner is the only one who has a NetLokr and there are no other members.

For NetLok Family (small group plan), a Member has a fully paid account and private NetLokr with full access to the NetLokr features and benefits.  A Member cannot terminate another member’s NetLokr account nor terminate the Owner’s NetLokr account.

A Guest is a non-paid person who has been asked by an Owner or a Member to receive a Message and/or share an account holder's Document in their NetLokr.  Initially, the Guest does not have a private NetLokr.  However, they receive an invitation to create a free NetLokr in order to receive the Message or Document from the Owner or Member.

A Guest has very limited access and capabilities.   A Guest can respond to a NetLok Message sent by an Owner or Member to them but cannot create their own Message to share with a different Member or Guest; and, a Guest cannot share a Message with different person inside the NetLokr.  A Guest can receive and read a Doc from a Member, but a Guest cannot create or send a new Doc to an Owner or another Guest; and, a Guest cannot share a Doc with different person inside the NetLokr.  Finally, a Guest can upgrade to full services at any time by either purchasing a NetLok Personal account, purchasing a NetLok Family account or having an Owner of a Family Plan pay for the Guest’s membership as part of that small group.

 

Who can gain access to your NetLokr?

Only you - unless you give someone else access, which we do not recommend.  Sharing access also violates the Terms of Use and Privacy Policy because each NetLokr is designed to be used by only one user in order to retain and protect their privacy.  Netlok employees cannot access your NetLokr - nor can anyone else!  There are no backdoors.

 

What is Two-factor Authentication and when should I use it?

Two-factor authentication is a proven method of verifying a person’s online identity.  This method requires the user to input a code during the process.  The temporary code is sent to the user by email or text at the time of the request.

You should use Two-factor authentication when you forgot your photo, don’t have access to your computer, and/or working in a public place.  Although two-factor authentication is very reliable and secure, most people feel that it is not user-friendly because you must have a second device, computer or phone, to receive the code.  Additionally, the code is active for a short period of time.  NetLok uses a short time horizon for our two-factor authentication code as well and we do not publish the allotted time to keep cyber criminals guessing.

 

What are NetLok's Terms of Use?

Click here.

 

What is NetLok’s Privacy Policy?

Click here.

 

Have additional questions?

If you need more information, we’re here for you! Email us at [email protected] or call 805-283-4100.  We’re available from 9:00am to 5:00pm, PST. We look forward to hearing from you should you ever reach out to us.