Data Security Protection, Monitoring Services & Network tracking Software Outsourcing, Development & Integration for PDA Hand-held devices, portable wireless mobile devices, appliances and laptops
Computer Tracking and Data Security Protection & Monitoring Services Software Outsourcing, Development & Integration
The client is a leading North Carolina company providing security services and products for human and equipment assets to enterprises and institutions.
Project: Enhancement of Existing Application
Application: Computer Tracking and Data Security Protection Services Software
This security software product is a preventive measure against computer or data loss. The security software product is a virtually undetectable, immovable and silent safeguard software program that enables the product "IQ Certified" alarm monitoring station to track the location and use of a laptop or desktop computer or PDA hand-held device or any other portable wireless mobile appliance or device.
Also, the security software product's unprecedented “Hide-A-File” feature enables users to hide and encrypt sensitive confidential information at a file or folder level. This powerful feature is not available from any other computer tracking service and uses a sophisticated file hiding technique and 128-bit encryption restricting access to the sensitive information to only the authorized owner.
How this security software product Works:
This security software's service is similar to a residential or business alarm monitoring service. With this software on a computer (or a device or appliance), the computer silently and invisibly communicates via the Internet or telephone lines with the software at a 24-hour central monitoring station. Should the computer (or a device or appliance) become lost or stolen, this software's professional central station operators, using "Caller ID" or an Internet IP address, can determine the unit's location and assist in its recovery. At the same time, while the computer or device is missing, any sensitive information stored in the software's Hide-A-File program remains confidential and invisible to anyone except the rightful owner.
- Periodic Call-In Option
Periodic Call-In is one of two protection options available in this security services software. This option requires no user interaction and can also be used covertly.
The Periodic Call-In option enables a computer (or device) to silently, without user action, communicate its location to the tracking central station on a daily basis, initially via the Internet. Should five days elapse without an Internet connection being made, this security software then continuously attempts to communicate with the central station by both Internet and/or direct modem dial-up, whichever becomes available first. Once communication by either method is successful, and the unit has not been reported missing, the software returns to daily communications via the Internet.
- Call-In Reports
All the Periodic Call-In activities by this security services software are logged in the central station database. Such reports can provide Administrators valuable assistance in determining the presence and location of protected computers, as well as, the proper installation and use of this security software.
- Passcode Protection
The Passcode option is one of two protection options available to this software's subscribers. Unlike the Periodic Call-In option, this option requires user action each time the computer is turned on. The advantage this option is that it not only provides location information to the central station, it also alerts the central station to any unauthorized use of a computer.
Each time the computer (or the device) is turned on, the user will be required to enter a four-digit numeric secret passcode to essentially prevent communication with the central station. The passcode request can be prompted or unprompted, at the user's option. If the correct passcode is not entered after two tries, as in the case of an unauthorized user attempting access, the security software will silently alert the central station to the activity.
- "Hide-A-File" Data Protection
Since the data on a computer is often times more valuable than the unit itself, this software provides its "Hide-A-File" feature data protection option to all subscribers...at no additional charge.
The Hide-A-File feature enables subscribers to simultaneously hide and encrypt sensitive and confidential information, making it totally inaccessible to anyone except the authorized user. This feature employs a sophisticated file hiding technique (unreachable through any type search, even at a DOS level) and the fastest encryption method available. Users have the ability to render selected information both encrypted and invisible at a file level and, if necessary, on multiple hard drives.
- "Product CV" Multi-Unit Installation
For large corporations, educational institutions or government agencies that employ large numbers of computers, " Product CV" enables installation of a working version of this software on an unlimited number of selected computers, requiring no interaction by the end user.
Using this product CV's intuitive graphical user interface, an administrator can select an unlimited number of computers to receive an installation of this security monitoring & tracking software through the network, defaulted to the Periodic Call-In option. Upon its first stealth communication with this software product's 24-hour central station, the program registers itself with the server and begins protecting the unit.
Unlike the deployment of lock-down cables, local alarm devices or other asset protection devices or programs, the Product CV can help administrators insure that the protective service is being used. With the Product CV, as networked computers log on, the Product CV can check to verify that this security software is installed and if it is not, automatically install it.
The Project involved enhancement of the software product to enable it to work on Windows XP Platform. It also involved enhancements to this security software's “Hide-a-File” Utility to make it more flexible.
The complete application code was studied and evaluated from point of view of compatibility with Windows XP and appropriate changes were carried out.
The complete Product was tested thoroughly on various Windows platforms – XP Professional, XP Home, 9x, NT, 2000 and ME.
The Install programs were created for the security software's Standalone and CV Version with the enhanced code.
||Windows 9x, ME, Windows 2000, Windows XP Profession, XP Home Windows NT
||MS Visual Studio 6.0, Visual C++. .NET
[an error occurred while processing this directive]