LockandLoad started as a replacement for the software Predator. It locks, unlocks, and logs you in by a removable device. LockandLoad is aimed to use its own hashing algorithm, file formats, and such for maximum security. [Project In Progress]

Features

  • Uses its own hashing algorithm
  • Utilizes the windows authenication system
  • Operates with managed code

Project Activity

See All Activity >

Categories

Security

Follow LockandLoad

LockandLoad Web Site

nel_h2
Build Securely on AWS with Proven Frameworks Icon
Build Securely on AWS with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of LockandLoad!

Additional Project Details

Registered

2011-02-05