PC-LOCK system is composed of tow parts: USB PC-LOCK key and PC-LOCK software, PC-LOCK does: 1. Locking internet: After programming this function, and remove the USB PC-LOCK key, no one could browse internet out of you programmed time. 2. Locking pornographic website: After programming this function, and remove the USB PC-LOCK key, your kids could browse website except pornographic websites. 3. Locking forbidden website: After programming this function, and remove the USB PC-LOCK key, your kids could browse the website which you programmed in your programmed time. 4. Locking games: After programming this function, and remove the USB PC-LOCK key, your kids could play games in your programmed time only. 5. Locking MSN and other chatting tools: After programming this function, and remove the USB PC-LOCK key, your kids could chat by MSN or other BBS in you programmed time, most BBS websites are forbidden in your programmed time. 6. Locking pornographic messages: After programming this function, and remove the USB PC-LOCK key, the pornographic pictures and wicked messages would be shielded in your software such as Microsoft word and tablet. 7. Locking document and directory: After programming this function, and remove the USB PC-LOCK key, locked document or directory can not be deleted, copied, read, revised. 8. Locking computer: After programming this function, and remove USB PC-LOCK key, you kids could start the computer in your programmed time.
PCLOCK HAS THE FOLLOWING FUNCTIONS: File Management: File access control. Folder Management: Folder access control. Program Management function: Program Access Control. Internet Access Control: Users can specify a certain time period for each day of a week when the Internet access is allowed or blocked. The product provides five modes to access the Internet: Block all Internet access; Allow access to specific websites, Block access to specific websites, Block Harmful Websites. Locking computer: Once users enable this feature, all keyboard input are disabled, and the mouse can only move in the program interface, user can press"unlock" to unlock the computer if the USB KEY is inserted or press"shutdown" to shutdown the computer. Locking Drive: Lock public drive and private drive, prevent unauthorized entry. Time control: Limited time period access Internet. IM access control: Specific IM tools can be disable, Users can also set time period for using IM tools so that user can only access the IM tools in the time period. IM tools is blocked by default if the time period left unset. Websites Control: Forbid entry to specific websites
This wireless PC lock secures your PC whenever you leave it and you don't have to do a thing. 1. ID Setup To bind the Transmitter and Receiver USB key with the computer. 2. Change Password Default password is '888888', it is needed when Transmitter is not at your hand. 3. Option Auto Lock Up Time; Auto Unlock Up Time; Password Rescue Time; Lock Up Screen Picture; Time Lock Up. 4. Compulsive Lock Up Lock computer immediately even Transmitter is near the computer. 5. Passwor Lock Up It is only allow password to do unlock.
It is a kind of USB key used for controlling computer programmers. It helps control children or emploees behavior on computers, also helps secure the private data etc. Key Specifications/Special Features: Lock game Control game trim Lock Chat Lock internet Control online time Lock websites Lock all adult websites Lock CD/DVDs Lock computer system start Screen Monitor
1. Built-in sliding fingerprint sensor 2. USB2.0 port, compatible with USB1.1, bearing more than 1 million times of finger sliding 3. Resolution: 500dpi; 192 x 16 pixels 4. Finger verifying speed: <0.1s; Capture rate: 488fps 5. Maximum quantity of registered fingerprints: 10 for each user 6. Maximum quantity of users: Unlimited; Accessible for each user of Windows 7. FAR ( False Accept Rate)<0.0001%; FRR (False Reject Rate)<0.1% 8. Supported operating system: Win2000/XP 9. Working temperature: -25_85; Humidity: 30%_90%@25 10. Dimension: 50*30*15MM. Packing Size: 43*26*25CM (singo packing); 11. Weight: 68G (Product); 11KG(singo packing); Fingerprint Reader FPR-200 About Fingerprint Identification Of all the biometric techniques being used today, fingerprint -based identification is the oldest method. Which has being successfully used in numerous applications. Everyone is known to have unique. Immutable fingerprints., A fingerprint is made of a series of ridges, splits, dots, valleys and furrows, as well as the minutiae points. Minutiae points are local ridge characteristics are then converted to a unique "digital fingerprint "template that can be stored in a central database for subsequent matching and authentication processes Product Description: 1. Windows logon: Can prevent your computer from being used others user have to verify the fingerprint 2. L. Screen saver lock: Only authorized person can unlock the screen saver by virifying his/her fingerprint 3. File security: Your encrypted files can only be accessed by fingerprint 4. Web Link, Login Email and Blog By fingerprint 5, Hot. Plug and play for Flash Disk 6. Possession of Sensor Development Technology+Algorithm 7. The first Silicon FPS withstands 20KV ESD in the world 8.10 different fingerprint can be registed at the same time. 9. The type of encryption software is ASE; 256 bits of data encryption on both device
PC lock. Protect your data. Plug one half of the PC Lock into the USB port on your computer and keep the other half with you. If you are more than 7 feet away from your computer, PC Lock automatically locks your computer, keeping anyone from accessing your data while you are away, and then unlocks automatically when you return. Selco Abelle Tech Collection. Minimum Production Time: 10 day(s) Size: 1.5" x 4" x 0.75"