Download

Section categories

Access Control Utilities [1366]
Anti-Virus Utilities [584]
Automation Utilities [694]
Backup and Copy Utilities [243]
Clipboard Management Tools [188]
Command Shells [60]
Compression and Zip File Utilities [292]
Disk Analysis Utilities [273]
Disk Maintenance and Repair Utilities [53]
Explorer Add-ons [101]
Explorer Replacements [97]
File Cataloging Utilities [1531]
File Cleanup Utilities [412]
File Encryption Utilities [501]
File Maintenance and Repair Utilities [534]
File Search Utilities [207]
File Splitting Utilities [183]
File Synchronizing Utilities [154]
Misc Encryption Utilities [155]
Misc Text Editing Tools [123]
Misc Utilities [2767]
Mouse and Keyboard Utilities [217]
Music Utilities [15]
Password Management Utilities [728]
Patches and Updates [42]
PGP Encryption Utilities [68]
Required Components [4]
Required Files [8]
System Analysis Utilities [77]
System Maintenance and Repair Utilities [947]
Text Editors A-G [82]
Text Editors H-P [25]
Text Editors Q-Z [24]
Text Form Editors [15]
Text Search and Replace Tools [74]
Text Viewers [35]

Our poll

What's your favorite antivirus software ?
Total of answers: 2

Statistics


Total online: 6
Guests: 6
Users: 0

Login form

File Catalog

Main » Files » Utilities » Access Control Utilities

Proteg 3.3
01.02.2011, 18:59
Proteg is a software that allows users to secure their personal or notebook computers by preventing unauthorized access. It fortifies the existing Windows login mechanism by binding the user account to a ubiquitous hardware device: A portable USB storage device (USB Key, USB flash drive, thumbdrive). An additional hardware component becomes compulsory in order to login to the computer, instead of relying solely on the conventional username and password pair.

Offering greater security than passwords alone, this hardware based system (commonly known as a two-factor authentication system) creates a physical link between a user and his identity. In a two-factor authentication system like Proteg, the user is required to present the physical hardware (something the user has) and provide the correct password (something the user knows) that corresponds to the said hardware in order to gain legitimate access to the system.

Category: Access Control Utilities | Added by: File-Post
Views: 65 | Downloads: 0 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Registration | Login ]

Search

Site friends

add site