Rohos Logon Key 2.5. for Windows Vista

Chisinau, March 26, 2008 – Tesline-Service SRL, is a small software company specializing in PC security solutions today announced that it released Rohos Logon Key 2.5., two-factor authentication solution, which “Works with” Windows Vista.


The solution provides ease-of use for interoperability, remote access and it has several key benefits:
· Fully supports Windows Vista
· Supports corporate USB tokens such as Aladdin eToken
· Server Version with USB key Remote Setup

Read more

Rohos Logon Key 2.5. for Windows Vista

Tesline-Service Announces Rohos Logon Key 2.5. for Windows Vista

Chisinau, March 26, 2008 – Tesline-Service SRL, is a small software company specializing in PC security solutions today announced that it released Rohos Logon Key 2.5., two-factor authentication solution, which “Works with” Windows Vista.

The solution provides ease-of use for interoperability, remote access and it has several key benefits:
· Fully supports Windows Vista
· Supports corporate USB tokens such as Aladdin eToken
· Server Version with USB key Remote Setup

Read more

Rohos Logon Key for MAC OS-X

At present time we are working out Rohos Logon Key for MAC OS-X. At first the program will support USB flash drive. It is a great benefit for those who would like to use it for their home computer. The presented analogues of computer security solutions that already exist (e-Tokens, etc) are more convenient for company usage rather than for usual user.

The first beta version will be due by the end of this summer.

Rohos Logon Key has already proved its functionality in Windows 2000/XP/2003/Vista.
Computer security benefits using USB Key:

  • Rohos Logon replaces your Windows login/weak password with a USB Key
  • High Windows security with a huge and secure password using USB Key. It is automatically entered from USB Key when you login/unlock computer.
  • Automatic Windows lock when user unplugs USB Key from computer
  • USB Key security: 2-factor logon by PIN code, USB key copy-protection. All data are encrypted. Unauthorized Key defense.
  • A single Key can be used to access home and work computers
  • Regular password based login can be prohibited

If you wish to test beta version you are welcome to subscribe for our news.