![]() ![]() the only hardware footprint would be the UID of the USB Key.) My question: is it possible to use LimeLM to Activate() a software meant to run only on a USB Key but on different computers? (i.e. This technique is sometime used as a cheap "hardware lock" activation mechanism combined with a licence file - in principle like LimeLM but way simpler. What can be done is locking on a single USB key using the USB Key UID (which all average/good USB Key have - a unique identifier). Please note: you must use the same colour key as the blockers for this to work.We would like to package an application running directly from a USB key (and only from it). This key completes our pack of 10 USB-A blockers. For example, the red key only opens the red blockers. You must have the key, of the right colour, to be able to remove the blocker. Please note that the key of a colour only opens blockers of the same colour. After installation, it is practically impossible to access the USB port of the computer, thus protecting computer data or the introduction of a virus. ![]() You need to insert the blocker into a USB port and then release the latch. Instructions for use of the USB blocker and the key ![]() In addition, it is a physical solution, which means that it can be used correctly without downloading software or using additional equipment. ![]() The USB blocker reduces the risk of data loss, leakage, unauthorised downloading and copying of content. The USB blocker is an ideal solution to protect and quickly block access to USB ports. This key allows you to install and remove a blocker on a USB port to prevent users from plugging in any USB cable or plug and thus prevent data leakage. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |