LockandLoad started as a replacement for the software Predator. It locks, unlocks, and logs you in by a removable device. LockandLoad is aimed to use its own hashing algorithm, file formats, and such for maximum security. [Project In Progress]
Features
- Uses its own hashing algorithm
- Utilizes the windows authenication system
- Operates with managed code
Categories
SecurityFollow LockandLoad
nel_h2
Build Securely on AWS with Proven Frameworks
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of LockandLoad!