Return to site

Ilock 3 0 24

broken image


Javscript would provide a navigation menu here. HOME

Last update 24. jan 2007

ILOCK360's proprietary technology scours malicious websites 24/7/365 to identify if your personal information has been bought or sold online. You will receive an email alert if your information is found being bought or sold online, or if there is any new activity on your credit file.

  • Install iLok License Manager version 3.0.0 without running the 'Uninstall License Support' application (at any time) 4. All iLok protected software works correctly The hybrid version 2.6.0/3.0.0 installation provides the necessary components to support software built with older versions of the PACE toolset.
  • And at 1.5' x 0.5', it's the smallest iLok ever. It's super durable though, thanks to its split- and crack-proof aluminum frame. Would-be thieves will have a hard time stealing your iLok, as the 3rd Generation iLok's wider and stronger security loop accommodates most desktop security cables, and its etched serial number doesn't rub off without.

Description

The iLock system enables you to lockdown a device into one application. The system is build on several main tools:

  • iLock version 4 (4.0.0.4))
  • iHook2 (new iHook3)
    new version 3.1 supports ForwardKey

Additional tools

  • NoWelcome (AutoCard.exe)

[Go to Downloads]

[Looking for source code?]

iLock2

This app should be run from the registry key hklminit, so it will launch before the device shell. Although there is an Exit menu item, you need a password (52401) to leave iLock2. The application will disable input for the taskbar and the desktop and should normally 'killed' by some custom application. If LockTaskbar is started it will close iLock2.

iLock3

This will lock the screen until a specified process is running and a defined window title and/or window class is launched on the device (use a link in WindowsStart Up to automatically launch an application on your device). You can use WinTreeCE to find the class name, the title text and executable name of an application.

As iLock2 was hard to handle for non-programmers, iLock3 will be configured by the registry:

Specify the Class Name of the Window you would like iLock3 to wait for. Can be empty.

Specify the Title of the window you would like iLock3 to wait for. Dont leave blank, device will remain locked in iLock3.

Enter the executable of the process you would like iLock3 to wait for. Dont leave blank, device will remain locked in iLock3.

You can have iLock3 occupy the whole screen or spare for taskbar and menu bar.

When iLock3 ends itself, it can leave taskbar and desktop locked or not.

Specify '1' if you like iLock to maximize the application it waits for.

Version 3.3 info
added ColdBoot menu item and code
added code to recognize ck60
added HideTaskBar in timer1
added version info resource

To launch iLock3 before the shell launches you should change the registry and insert a new Launch and Depend entry in HKLMInit with numbers lower than the shell launch entry. As example, where shell32.exe is Launch50:

iLock version 4 (4.0.0.4)

see what is changed from iLock3 to iLock4. We now have additionally a Boot Option and a Info Screen

iRotateCN2

This small app rotates the screen. Either it toggles between 0 and 90 degrees or you specify -0, -90, -180 or -270 on the command line.

Example: 'iRotateCN2.exe -270' will rotate the screen to left. 'iRotateCN2.exe -?' will show a short help.

iRun2

This application will start and watch the running of an application provided with the command line. Usually iRUN2 should be started from a batch, for example within AutoUser.dat of a CN2. iRun2 will watch the application is running and restarts it, if closed.

Examples:
'iRun2.exe iesample.exe' will start and restart iesample.exe.
'iRun2.exe -stop' will close iRun2 and it will no longer watch the exe is running.

iHook2

This application provides the user with key shortcuts to applications. Actually (2. june 2006) the assigned 'hot' keys and there applications are hard coded into the source:

F3 toggle screen rotation between 0 and 90 degree by use of iRotateCN2.exe

F4 toggles desktop and taskbar locking state by use of LockTaskbar

F5 toggles SIP (software input panel) show/hide by use of iSIP2

All keystrokes or hot keys are transparent, this means, they are not lost and will reach the application just running in foreground. iHook2 can be started by placing a link to the exe in WindowsStartup, by a batch file or some other AutoStart feature of the device OS.

iHook2 Version 1.3

This versions uses the registry to read the assigned keys and applications. Additionally the app is now safe and will only load once. The only argument supported is '-writereg' to write a default registry (see below).

Sample registry:

iHook3

New in version iHook3 (version 2.0)
recognizes CK60
adds Notification icon in taskbar

New in iHook3 (version 3.1)
recognizes CN3
supports consuming/forwarding switch for hot-keys. Use 'ForwardKey' registry binary value 0 to disable forwarding hot-keys, 1 to enable forwarding hotkeys.
This new option is usefull if you have a phone device and hook the number keys. In this case disable forwarding with 0, otherwise the phone app will come in front for the number keys.

17. oct 2007: Bug fixed version v3.1.1 is now at iHook3.exe

KeyToggle

Using function keys by pressing numbers.

Note: Updated KeyToggle.exe and download cab. There was a bug, so the sticky key still produced wm_keydown messages. Fixed version is v2.1.1.0.

With keytoggle you can define a 'sticky' key that will change the beahviour of the number keys. As long as the sticky key is 'active', number keys from 1 to 0 will produce the function keys F1 to F10. If sticky key is active, the left LED will light in green.

To start keytoggle just tap it or let it start by a link in StartUp. If keytoggle is loaded, you can see a small yellow arrow sign in the taskbar.

If you tap this symbol, you are asked, if you want to unload the app. If the registry does not have values defined for keytoggle, it will use default values. If you try to launch keytoggle a second time you will get a message box. Only one instance of keytoggle can run at a time.

Using the registry you can define the behaviour of the sticky key. In example, you can have the sticky key remain active until it is pressed again, let it 'go off' or 'fallback' after a period of time or let it fallback after a number key has been pressed. If the sticky key is pressed again, it will always fallback.

The values:

    StickyKey:
    default '144', decimal (VK_NUMLOCK)
    the VK_ value of the sticky key. Here you define, what you will have as the sticky key. VK_ values are defined as in winuser.h. In example the VK_ value for the NumLock key is 0x90 (144 decimal, see VK_NUMLOCK). The sticky key will be consumed by keytoggle and is not visible to the system any more. That means, that you should choose key value that you do not need in any app you use.

    Timeout:
    default '3', three seconds
    number of seconds the sticky key will remain active. If 0, the sticky key will not fallback automatically by time

    autoFallback:
    default '0'
    if 0 the sticky key will not fallback after pressing a number key. If 1 the sticky key will fallback after a number key is pressed

Launch arguments

    Keytoggle only supports one argument: '-writereg'. This will create the registry keys used by keytoggle and fill them with the default values.

Usage Sample Scenario

You have a ITC 700 Color device. This has a alphanumeric keyboard but no function keys. You need the function keys to be able to use a web application within iBrowse. With keytoggle you can now for example use the Gold key as sticky key. You have to download the keyboard remapper tool cpkbdmap.cab from the ITC site (archived version here) and assign the Gold key to NUMLOCK.

With this remapping and keytoggle running you will to get a function keystroke simulated if you press the Gold key and then a number key.

LockTaskbar

Locktaskbar simply locks the desktop and the taskbar.

New version supports WM5 devices as the CN3. See downloads

    will kill the processes owned by an exe or simply close the application window.

    Example:
    'iKill2.exe iesample.exe' will close internet explorer 1password 7 4 multilingual serial key free download.

    toggles the visibility of the SIP or shows or hides the SIP

New version supports WM5 devices as the CN3. See downloads

    starts iesample and locks user by disabling menu and close button (X)

    simple tool to start an exe with arguments. Although you can use Action and tap/hold the clock on the today screen of a PocketPC to open a run dialog, this is not very comfortable.

    Do you like to spy your WinCE device? Try zDump! I sued it to find the window classes and styles of iesample.exe to be able to write iLockIE2.

    You would like to spy the windows running on a device, try WinTreeCE based on an article in CodeProject (http://www.codeproject.com/tools/showwindowtree.asp)

    During the creation of an AutoInstall process, we found, that sometimes a custom autoinstall is installed before the ITC install has finished (for indepth information on this see AutoRunMechanics). If you then have code, that performs a reset, this reset could break the other running installs. In example, runautorun.exe launches AutoExec.exe. AutoExec launches foldercopy, autocab, dceinit and more. These applications are launched by autoexec with a EXEC call, which means, the processing of autoexec.dat will only wait up to 60 seconds before the next command in autoexec.dat is executed. After Autoexec.exe is finished, runautorun launches the first found AutoRun.exe (serached for in the order SDMMC Disk2577, Storage Card2577, FlashFileStore2577 or DiskOnChip2577). The system we had, uses a SDMMC Disk2577AutoRun.exe with some additional cmd batch file. 'Our' AutoRun.exe and the batch file were started before all the stuff launched by AutoExec.dat were finished. As we had a reboot at the end of our cmd batch file, the system did reboot, before the installation of the ITC stuff was finished and leaves a corrupted install. The solution to this problem was to have an application that waits until autoexec.exe has gone from memory. I have written this tool and called it iWaitForExe. The tool is only of use if you have a .cmd or .bat batch command file. If you launch the tool from the explorer, it will not block any operation, as it is started as an independ separate process.

    iWaitForExe is a prog without user interface. You have to specify the applications exe name as argument to the program. The tool will first check, if the exe is running, if not it exits immediately. It will then watch the running processes list every three seconds and that will be done 60 times. If the exe is not running any more, the tool will exit and stop blocking a batch file. The tool will also stop blocking after 180 seconds.

    iWaitForExe.exe arguments:

    Sample:

    For further use, iWaitForExe returns following exit codes:

rebootme

    Small and simple tool to perform cold or warmboot. No gui, no questions, if invoked with the right argument it does what it does immediately.

    arguments

    Sample

irebootme

    rebootme itself uses MS API KernelIOCtl. If it does not work on your ITC device (ie CK30), you can also use the ITC specific one, which uses ITC50.DLL. Same syntax as rebootme.

    ARMv4 version (PocketPC, 7xx)

    ARMv4i version (ITC WinCE devices, CK31, CN2A)

iRunAtEvent

    This tool will start an application given by the command line at a specified event. On every call, the tool will write a log (iRunAtEvent.log.txt) to the root dir. The arguments supported are:

    Although there are unsupported events listed in the log file, this does not mean the tool does not support them. In realtity the OEM (in this case tested on an ITC 730) of the device decided not to fire them (drivers are responsible for events to fire). You can simply check with your device by using these unsupported events and see, if they work. Simply use the calculator app in your tests.

    To document this in depth here is a log file of this nice tool here:

isEnetOnline

    During some testing of the event notifcation interface on a PocketPC device, I found that some essential events are declared but will never be fired. Two of these unsupported events are: NOTIFICATION_EVENT_NET_CONNECT and NOTIFICATION_EVENT_NET_DISCONNECT. So I started a small eVC4 workspace for ITC Pocket PC with Windows Mobile 2003 with one simple test application to play with the mibInterface.dwOperStatus. Then I got an app, that will start another prozess (given by the camdline). This tool is now called iRunOnNet.exe and will launch an exe (ie call 'iRunOnNet.exe windowscalc.exe' to have the caculator come up on ethernet connect), if an ethernet connection (the ITC device designed for has a dock ethernet connector) comes up. You can stop the hidden tool by launching it again with the argument -stop.

    Yummy ftp pro 1 11 2 download free. As a second goal, I would like to get a simple DLL that will export the status of an ethernet connection. Additionally I made a tool (isOnlineDLLtest.exe) that is used to test the functionallity of the DLL. The DLL only exports one function fnIsEnetOnline(). This will give a 0, if ethernet is offline and 1, if ethernet is online. A second export is the variable nIsEnetOnline which will hold the last status. The isOnlineDllTest uses the function fnIsEnetOnline() in a timer and simply shows a text with the last result of this call.

    iRunOnNet is a stand-alone app and does not need isEnetOnline.dll. You can either directly use iRunOnNet to have an application launch on a ethernet network connection or you have your own apllication use isEnetOnline.dll in a timer to check for an ethernet connect. The sources for all this are available at http://groups.yahoo.com/group/ITC_Software/ as all other sources of the tools on this page.

NoWakeUpKeys

    If you have a ITC PPC device and would not like the system to wake up on hardware keys you can use this samll tool to disable ALL wakeup keys. As you should know, the definition of the wakeup keys is done inside an EEProm and so there is no way to disable these keys thru registry entries. Now you can use this tool or look in the sources on how to disable the wake up keys.

NoWelcome

    If you have an ITC PPC device, you will be asked to calibrate the screen on every cold boot, if you have disabled EnableRegistryRestore and don't use a saved registry. To overcom the initial calibration screen, you can put NoWlecome.exe renamed to AutoCard.exe onto your memory card (SDMMC Disk or Storage Card) into the 2577 dir. If there is a AutoCard.exe, the autoexec.dat will call this automatically on startup of the device. The NoWelcome will look for the model name of your ITC device, if it is a supported one (730, 750, 760, 741) it look for calibration data in the registry. If there are no calibration data, the tool will put some default calibration data there. The device will still show the calibration screen on startup for a short time until AutoCard.exe (alias NoWelcome) is run. doing the calibration this way is a little bit dangerous, as the values used by the tool are not as exact as the one that you get, if you calibrate the screen. So you should give the user an option to calibrate if you have a kiosk mode application.

    NoWelcome uses a log file 'NoWelcome.log.txt' to document what has happened. There is no gui and no arguments.

    There will be a tool called NoCal by ITC in future, that will something more. The calibration data will then be stored additionally in EEProm and the tool will only show the calibration screen on startup, if the stored values are incorrect compared to the registry data.

    NEW: Updated NoWelcome: AutoCard.exe

NoWakeupAtMidnight

Do you like your device wakes up every midnight? If not, this little tool is for you. It simply deletes the schedule entry for CALNOT.EXE, which is launched every midnight to update repeating alarms.

Download ARMv4(WM2003)ARMv4i(WM2005)

SNTPClient

You need a correct local time on your windows mobile device? Then check this free SNTP client app. It is configured using the registry:

REGEDIT4
[HKEY_LOCAL_MACHINESOFTWAREIntermecSNTPclient]
'TimeServer'='192.168.0.1'
'SynchroniseClock'=dword:00000001

Enter a time server (in example: time-a.nist.gov) and if the tool should update the clock or not. Everytime the app is launched, it will try to get the time by the specified time server. You will find a log at the root of your device: SNTPClient.log.txt. You can place a link to the tool in WindowsStartUp to have it run on every warm boot of the device.

Download ArmV4 (WM2003)

Default demo installation

There is a cab file that should be placed in DiskOnChipCabfiles (or Flash File StoreCabfiles). So everytime the device is cold booted, it will install the iLock system. The installation will enter two new registry entries:

[HKEY_LOCAL_MACHINEinit]
'Launch45'='iLock2.exe'
'Depend45'=hex:14,00,1e,00

These files are copied to the windows dir:

Ilock 3 0 24 Inches

    iHook2.exe
    iKill2.exe
    iLock2.bmp
    iLock2.exe
    iRotateCN2.exe
    iRun2.exe
    iSIP2.exe
    LockTaskbar.exe

AutoUser.dat file is copied to DiskOnChip2577

AutoUser.dat

AutoUser.dat is used to launch iHook2.exe and iRun2.exe with iesample.exe. Here is the content of the file:

run 'WindowsiHook2.exe'
run 'WindowsiRun2.exe' iesample.exe

That's all!

    File

    CN2 version (Windows CE)

    Date

    7xx color version
    (PocketPC 2003)

    Date

iLock Documentation in Word format.

    iHook2.exe

    20 jun 2005

    20 jun 2005

    iHook3.exe

    24 jan 2006

    24 jan 2006

    iHook3.exe (v3.1)

    7 aug 2007

    17 oct 2007

    iKill2.exe

    29 jul 2005

    29 jul 2005

    iLock2.bmp

    20 jun 2005

    20 jun 2005

    iLock2.exe

    20 jun 2005

    20 jun 2005

    iRotateCN2.exe

    20 jun 2005

    -

    -

    iRun2.exe

    20 jun 2005

    20 jun 2005

    iSIP2.exe

    Download
    WM5 version

    20 jun 2005
    7 aug 2007

    20 jun 2005

    LockTaskbar.exe

    Download
    WM5 version

    20 jun 2005
    7 aug 2007

    20 jun 2005

    iLock3.exe

    15 sept 2005

    15 sept 2005

    iLock3 install cabs

    15 sept 2005

    15 sept 2005

    iLock v3.3

    24 jan 2006

    24 jan 2006

    iLock v4.0.0.4

    7 apr 2006

    7 apr 2006

Additional Tools

Windows CE 4.2 ARMv4i

Windows Mobile 2003 ARMv4

    iLockIE2

    23 jun 2005

    iCMD2

    -

    -

    22 jun 2005

    zDump

    source is based on article at CodeGuru

    23 jun 2005

    -

    -

    WinTreeCE (sources at yahoo)

    Sonic atom 1 4 1 – rt audio analysis. 31 jun 2005

    31 jun 2005

    Keyboard remap tool

    -

    -

    Download
    (xml file with A1-A4 to F1-F4)

20 jun 2005 (upload date)

    iWaitForExe

    22 jul 2005

    -

    -

    rebootme

    22 jul 2005

    22 jul 2005

    iRunAtEvent

    22 jul 2005

    22 jul 2005

    isEnetOnline

    22 jul 2005

    22 jul 2005

    NoWakeUpKeys

    -

    -

    22 jul 2005

    30. jan 2007

    use left file too

    NoWelcome

    -

    -

    22 jul 2005

    NEW NoWelcome

  • More files and sources at my yahoo group http://groups.yahoo.com/group/ITC_Software/

(1) ITC is

last change: 25.Jun 2008

Ilock 3 0 24 Volt

Home

  • Secure remote access to the door

  • Remote opening functions

  • 4 passes in one system: door, gate, garage door, 2nd door

  • Event list

  • Email notification when door opened more than 10 min.

  • Email notification - who, when has opened the door

  • Access Schedule

  • Up to 4 sensors ( door contacts ) in one system

  • Opening with a fingerprint

Company

  • Secure remote access to door

  • Access Control for office with the use of fingerprint reader

  • Verification of the presence using the event list

  • Assigning accesses from the smartphone

  • Free application ios android

  • Schedules enter the office, eg. From Monday to Friday from 7:00 till 18:00

  • Email notification left open crossings for longer than 10 minutes.

  • The list of events

Appartament

  • Secure remote access to door

  • Secure remote access to doorOpening of the apartment with the help of the numeric keypad

  • Remote provisioning accesses doors in accordance with the period of stay guest, eg. From 19.10.2016 of hours. 23.10.2016 14:00 d for hours. 12:00

  • Remote grant of opening codes

  • The ability to remotely open the door by the administrator if you do forget the door code

  • The possibility of operating with a single application multiple locations in different places in the world

  • Event list

SILENT ALARM


ILOCK will help in even the most dangerous situation. If you have a home alarm system hooked into the monitoring station, the function 'Silent Alarm' is for you. Imagine that you are standing at the door, and suddenly from behind thief comes to you with a knife. He orders to open the door. You instead use your standard finger use your second finger. The doors open as usual, but the system knows which finger you opened it, and apart from the standard opening, sent information about the robbery to the monitoring station. in couple seconds, the thief will have to face the intervention unit heading to you.

Ilock 3 0 24 Inch

OPENING REMOTE FROM ANYWHERE IN THE WORLD


Being away from home you can easily open the doors using the application on a smartphone. open the door for domestic help without giving keys or access codes. Open the gate for delicery guy so he could leave the pack. Let in grandmother who came to your house before you.

Control your door, garage door, gate and many more


Ilock 3 0 24 x 2

Using only one control unit iLock will be able to control the four elements of the house and connect up to 4 fingerprint readers into the system. Create a real system without keys. Open the gate, the front door and garage door using the fingerprint reader. Apply as many readers as you need - the system can be equipped with 1 to 4 fingerprint readers.

Time Scheduler


Decide when a person can enter the house. Give the users access to specific periods of time. Example. The charwoman for cleaning comes to you every Tuesday approx. 8:30. Set schedule zone using the fingerprint reader for you to clean. With the schedule you restrict access only to Tuesday, setting the period in which charwoman can enter the house to 8:00 to 9:00 a.m.

System for kids


Do you want to make sure that your child does not lose the keys to your home or someone will not take it from them? Now it is possible. Leave the keys in a safe place, and open the doors using a finger. Placing a fingerprint reader at a height convenient also for children, provides easy access to the house every little one in your family. Apart from the obvious advantages associated with a lack of key system iLock shows on your phone if your kids really closed the door leaving the house. Children grow up at some point, they begin to meet with friends and go home late. If you want to know how late your child returned last night, just check it in the event history.





broken image