Search This Blog

Friday, May 30, 2014

I.C.E - Login Controller Program

Download link:  CLICK HERE TO DOWNLOAD ICE
[ Click here to know how to use ICE ]
What is I.C.E ??
Introduction:

I.C.E. - Intelligent Control Engine is a login control program that intelligently manipulates the amount of time that the user is allowed to use the computer.


Let there be a two-user scenario where USER1 be the 'Parent' and USER2 be the 'Child'

It begins with an initial setup which assembles all the necessary files together and optionally allows the user to enter a custom time interval for login timeout. The default value is 3600seconds i.e. in exactly 1hour time, the program displays a warning message (for 60 seconds) that the computer is about to log off. After the timeout of the warning message, the program proceeds to forcefully logoff the computer. This program is built keeping Parents in mind, as end-users.

In practical approach, this program is useful to Parents since it limits the amount of computer use for their child automatically! This program is based off some similar parental control programs that are available for purchase online and are quite expensive. Besides the primary function, this program is loaded with other functions such as Generating a Key which lets the Parent use the computer in case of an emergency.

The Keys are basically automatically generated unique files. The Keys that are generated are unique every time so that the USER1:Parent can always 'Generate' a different key if the previous one comes into the possession of the USER2:Child. Using a key is easy as all one has to do is paste the file 'ky.ice'(this is the key file) to his/her pendrive. Even if the time-limit is over, the program checks for possible USB drives connected to the computer having this file and verifies it against a copy in the program database. If a match is found, the logoff is aborted for the session. Automatic logoff can be re-assigned simply by plugging off the device and logging off manually.
Working Methodology:

The program works in a 3 tier process. It is basically a program that executes any one of the 3 sets of processes at a time.


When the program is first loaded, it works normally by logging the initial time and date (a1) & then logging the next set of time and date (a2) every five seconds. At the end of every five seconds, it checks whether the difference of current time and initial time has exceeded timer value(3600sec or custom) or not. If not exceeded, the program loops to the begining.

If the program is interrupted (say by power-failure) during its first tier, then the second tier of the program will load when the same program is run again. When the program is started for the second time after interruption, the program automatically checks for time differences i.e if the program got interrupted at the 30th minute, it will automatically resume from the 31st minute. This is quickly calculated by finding the difference of time_a2 and time_a1 from the previous tier.

If the program is interrupted yet again (i.e multiple interruptions), the porgram will not bother to calculate any difference. It will obtain the value of time remaining from the datafile that it created in the second tier.

At the end of any tier, before the end of the program, it displays a warning message for 60 seconds, after which the program verifies whether any USB is connected to the computer or not. It also checks whether the keys match or not. As long as the keys do not match, the logoff will commence forcefully(i.e disregarding all open programs and closing them automatically).

This is basically how the program is configured. It does not allow the user to use the computer more than the default(3600sec) or custom timeout limit everyday. Once the quota is finished for the day, no more use is allowed in the next login. The program automatically senses progressing year, month and day by comparing its database date and system date. If the program senses a new day, everything becomes reset and the program starts from the first tier again.

How to start using it?

  • Extract the 'ICE.zip' file
  • Double click on 'ICEmaker.exe' file
  • Follow the on-screen instructions.
  • Copy the Generated folder to any desired location in your computer. (Preferably not system drive)
  • Once copied, open the folder 'ICE' and double click on 'patch2start.bat'
  • Now the program gets activated.
  • Log off once and log back in to make it work for the first time.
Additionally:
  • Use the file called 'Chaabi.exe' to generate 'KEY' which will allow you to use your computer in emergency situations.
  • The same file 'Chaabi.exe' can also be used to set your own timer.
  • Note: Please keep Chaabi.exe somewhere secret in the future, to prevent its use by your child.
Features:
  • Different from default Microsoft Parental Control because this allows the child to use the computer at any time only for the specified period. 
  • Also has a resume function.
  • Separate unobstructed Login method for USER1:Parent.
  • FREE to use and distribute.

COMPATIBILITY: 
  • Works ONLY in 32-bit system
  • Works with Windows7 and Windows 8.1
  • Incompatible with Windows8
  • Untested for Windows XP
  • Does not require Administrator account.
  • Works in Standard as well as Admin account.
  • Does not activate when Deepfreeze or other such programs are operational.
Preview:
This is a previous version. This is pretty much what I.C.E. will do without customizing timeout. link: http://youtu.be/YuegsY1CXSA

SOURCE CODE: please contact the author directly if you require source code.

Download link:  CLICK HERE TO DOWNLOAD ICE


ANY QUESTIONS/ISSUES/QUERIES? JUST ASK BELOW!
  • Facebook Comment
  • Google+
  • Disqus Comment
  • 0Blogger Comment
comments powered by Disqus

Leave your comment

Post a Comment

You don't need ANY account or registration to comment here. Please drop your comments below to improve the quality of our posts. You can also give us suggestions and ask us about your problems.

Flying Bird Widget