Logithèque
Vue actuelle : Fiche d'un logiciel
Contrôle d'accès Proteg v3.1
Catégorie :
Licence :
Partagiciel
Editeur :
Prix :
29.90 USD
Taille :
2.1 MB
Mis à jour :
01/07/2004
Evaluation :
(0 Votes)
Plateformes :
Win2000 XP
Ce logiciel a déjà été téléchargé 45 fois
Proteg

Proteg is an innovative software solution that allows users to secure their personal or notebook computers by preventing unauthorized access. It fortifies the existing Windows login mechanism by binding the user account to an ubiquitous hardware device, a portable USB storage device (USB Key, USB flash drive, thumbdrive). An additional hardware component becomes compulsory in order to login to the computer instead of relying solely on the conventional username and password pair. Due to the increasing threats, passwords - the way most people access their computers today - can no longer keep pace with the security requirements of today?s challenging computing world. Over the years the password technique has not kept up with new technologies and methods used by hackers. One can easily gain access to the latest hacking program, many freely available over the Internet, enabling unauthorized access to valuable information resources which reside in our computer. Unauthorized access also means invasion of our privacy. To better secure our information assets, Proteg provides a sophisticated technique for user identification and authentication to improve on passwords. This technique can certainly offer much greater security than passwords as this hardware based system (commonly known as two-factor authentication system) creates a physical link between a user and his identity. In a two-factor authentication system like Proteg, the user is required to present the physical hardware (something the user has) and provide the correct password (something the user knows) that corresponds to the said hardware in order to gain legitimate access to the system. Although smart cards and one-time password generator devices can be very effective in providing two-factor authentication, they are typically too expensive, difficult to manage and inflexible. Despite the enhanced level of security provided, these technologies come at high costs, much of which is due to added hardware component.

Poster un commentaire
Gras [b]Texte[/b] Italique [i]Italique[/i] Souligné [u]Souligné[/u] Barré [strike]Barré[/strike]
Courriel [email=nobody@nobody.org]Nom[/email] Lien [url=http://www.website.com]Texte[/url] Ancre [anchor]Nom[/anchor] Image [img]http://www.website.com/image.jpg[/img] Insérer une image en provenance du site
Aligné à gauche [align=left]Texte[/align] Centré [align=center]Texte[/align] Aligné à droite [align=right]Texte[/align] Toute la largeur [align=justify]Texte[/text]
Couleur [color=#000000]Text[/color] Mise en forme [highlight=pascal]Texte[/highlight] Widgets Emoticons :code: [:code] Convertisseur HTML vers BBCode Convertisseur Word vers BBCode
Prévisualisation Vérification de l'orthographe

Copier Coller Couper Tout sélectionner
Tout effacer Insérer la date Insérer l'heure Insérer la date et heure Insérer votre IP
Liste [list=square][item]BlaBla[/item][/list] Liste Numérotée [list=decimal][item]BlaBla[/item][/list]
Citation [quote=name]Texte[/quote] Spoiler [spoiler]James est le meurtrier![/spoiler]
Tout en majuscules [uppercase]Texte[/uppercase] Tout en minuscules [lowercase]Texte[/lowercase] l33t [l33t]Je suis un nerd[/l33t] Texte en indice [sub]Texte[/sub] Texte en exposant [sup]Texte[/sup] Taille du texte [size=8]Texte[/size]






Ada
CSS
Cobol
CPP
HTML
Fortran
Java
JavaScript
Pascal
Perl
PHP
Python
SQL
VB
XML
Anon URL
DailyMotion
eBay
Flickr
FLV
Google Video
Google Maps
Metacafe
MP3
SeeqPod
Veoh
Yahoo Video
YouTube
6px
8px
10px
12px
14px
16px
18px
Informaticien.be - © 2002-2024 AkretioSPRL  - Generated via Kelare
The Akretio Network: Akretio - Freedelity - KelCommerce - Votre publicité sur informaticien.be ?