Security

Security

STOPCOPY

STOPCOPY-A software which will burn dvds in a way that other people can only view the data in the dvd but can not copy the data.This wil enhance security & help the private data.

Submitted by
Add your comment

Voting

-9 votes
Active

Security

Protect your Netbook from Theft

1: One very simple idea is that we can protect unwanted use our netbooks from buglars by providing some kind of security features. May we can lock and unlock your netbooks by sensing sms on the embedded SIM installed on the netbook. So once you found that your netbook is lost and you can just block it from being used by sending simple coded SMS and also position your laptop on globe by using GPS signals generating from ...more »

Submitted by
2 comments

Voting

-3 votes
Active

Security

System Security

I would like to share the idea if we can have the plugin security systems irrespective of Operating systems or platforms.

Submitted by
Add your comment

Voting

-3 votes
Active

Security

OS priorities for different age group

A software system for displaying content according to the age of a person,that will be a part of an OS.When ever a user log in into OS,it should capture the image or censors will detect from fingers the actual age of a person.if the person age is below 18, it should show only content suitable for them,also can't open some abusive stuff that not meant for them over the internet.if his age is above 18 then according to ...more »

Submitted by
Add your comment

Voting

-3 votes
Active

Security

Encrypted Credit card Usage on Internet

Instead of entering credit card details into the fields provided on the website, a software can be used which automatically asks for credit card details and sends it to the respective website in an encrypted format which can be decoded using a special key provided to the seller with same software.

 

To others (if someone hack those details) it well appear in form of scrambled data.

Submitted by
Add your comment

Voting

-3 votes
Active

Security

Intel Atom based netbooks for Defense personnels at frontline.

Netbooks with Intel Atom processors can be used in warzone saving precious lives of the defense personnel, thwarting enemy occupation or advancement using some basic technology and can save money in millions. Here’s the basic idea, Characteristics of Netbooks with Intel Atom processors 1. Quite fast 2. Mobility 3. Connectivity (Internet and Intranet) 4. Power backup for longer duration 5. Easy storage Things that a ...more »

Submitted by
1 comment

Voting

-3 votes
Active

Security

IPSEC assistance through hardware (on chip)

I would like to have IPSEC client ability provided on chip. This shall enable secure access to say enterprise resource from remote computer. This would be real nice as you move the security below one layer to chip from operating system supporting IPSEC client, or installation of software from IPSEC security provider.

Submitted by
1 comment

Voting

-2 votes
Active

Security

My Data: My Personal History

Easy Tracker. An idea is to have personalizer,which indeed help to fetch any important related to me. This has to absolutely confidential and digitally encrypted. What data? 1)My educational Data:Scanned certificate Qualification details, Education details with all important stats and numbers. 2)My finance Details Mutual fund Credit cards, Bonds Pan Card Etc 3)My Company Experiences My medical My Payroll ...more »

Submitted by
Add your comment

Voting

-2 votes
Active

Security

Tracking laptops through Laptop Serial code

Currently lost/stolen mobile phones can be tracked using thier IMEI no. but there is no such provision for tracking the laptops. since most of the laptops available today come with WIFI connectivity, a laptop can be easily tracked using the serial no(or any other unique code associated with the laptop) of the laptop. this can serve in two ways: 1). recovering lost or stolen laptops 2). tracking terrorist activities ...more »

Submitted by
Add your comment

Voting

-2 votes
Active

Security

Passwords with time as a dimension

In a enterprise level sritical security requirement, time between keystoke can be considered as a constraint for password. Lets say user wants to create his new password. He types in the first character and purposefully idles out 2 seconds and then types the second character and then continues then the password to login will be considered with that pause. Even if the user enters the same characters it doesnt login. He ...more »

Submitted by
Add your comment

Voting

-2 votes
Active

Security

Password with time as a dimension

In a enterprise level sritical security requirement, time between keystoke can be considered as a constraint for password. Lets say user wants to create his new password. He types in the first character and purposefully idles out 2 seconds and then types the second character and then continues then the password to login will be considered with that pause. Even if the user enters the same characters it doesnt login. He ...more »

Submitted by
Add your comment

Voting

-2 votes
Active

Security

inbuilt Antivirus Into the notebooks

There should be Inbuilt anti virus into the notebook.Just we have to keep update that anti virus time to time and no other anti virus software will be required to install for security reasons into the notebooks.This internal inbuilt anti virus software will be within the window files and can provides much better security than other software.This must be according to the version of window like different for Xp,Vista and ...more »

Submitted by
1 comment

Voting

-2 votes
Active