Javscript would provide a navigation menu here. HOME
Table of Equivalent Fractions. 0.01: 1/100: 0.01: 0.015625: 1/64: 0.015625: 0.02: 2/100: 1/50: 0.02: 0.03: 3/100: 0.03: 0.03125: 2/64. Intel® Turbo Boost Max Technology 3.0 identifies the best performing core(s) on a processor and provides increased performance on those cores through increasing frequency as needed by taking advantage of power and thermal headroom. Intel® Turbo Boost Max Technology 3.0 frequency is the clock frequency of the CPU when running in this mode.
Last update 24. jan 2007
Description
The iLock system enables you to lockdown a device into one application. The system is build on several main tools:
- iLock version 4 (4.0.0.4))
- iHook2 (new iHook3)
new version 3.1 supports ForwardKey
Additional tools
- NoWelcome (AutoCard.exe)
[Go to Downloads]
[Looking for source code?]
iLock2
This app should be run from the registry key hklminit, so it will launch before the device shell. Although there is an Exit menu item, you need a password (52401) to leave iLock2. The application will disable input for the taskbar and the desktop and should normally 'killed' by some custom application. If LockTaskbar is started it will close iLock2.
iLock3
This will lock the screen until a specified process is running and a defined window title and/or window class is launched on the device (use a link in WindowsStart Up to automatically launch an application on your device). You can use WinTreeCE to find the class name, the title text and executable name of an application.
As iLock2 was hard to handle for non-programmers, iLock3 will be configured by the registry:
Specify the Class Name of the Window you would like iLock3 to wait for. Can be empty. |
Specify the Title of the window you would like iLock3 to wait for. Dont leave blank, device will remain locked in iLock3. |
Enter the executable of the process you would like iLock3 to wait for. Dont leave blank, device will remain locked in iLock3. |
You can have iLock3 occupy the whole screen or spare for taskbar and menu bar. |
When iLock3 ends itself, it can leave taskbar and desktop locked or not. |
Specify '1' if you like iLock to maximize the application it waits for. |
Version 3.3 info
added ColdBoot menu item and code
added code to recognize ck60
added HideTaskBar in timer1
added version info resource
To launch iLock3 before the shell launches you should change the registry and insert a new Launch and Depend entry in HKLMInit with numbers lower than the shell launch entry. As example, where shell32.exe is Launch50:
iLock version 4 (4.0.0.4)
see what is changed from iLock3 to iLock4. We now have additionally a Boot Option and a Info Screen
iRotateCN2
This small app rotates the screen. Either it toggles between 0 and 90 degrees or you specify -0, -90, -180 or -270 on the command line.
Example: 'iRotateCN2.exe -270' will rotate the screen to left. 'iRotateCN2.exe -?' will show a short help.
iRun2
This application will start and watch the running of an application provided with the command line. Usually iRUN2 should be started from a batch, for example within AutoUser.dat of a CN2. iRun2 will watch the application is running and restarts it, if closed.
Examples:
'iRun2.exe iesample.exe' will start and restart iesample.exe.
'iRun2.exe -stop' will close iRun2 and it will no longer watch the exe is running.
iHook2
This application provides the user with key shortcuts to applications. Actually (2. june 2006) the assigned 'hot' keys and there applications are hard coded into the source:
F3 toggle screen rotation between 0 and 90 degree by use of iRotateCN2.exe
F4 toggles desktop and taskbar locking state by use of LockTaskbar
F5 toggles SIP (software input panel) show/hide by use of iSIP2
All keystrokes or hot keys are transparent, this means, they are not lost and will reach the application just running in foreground. iHook2 can be started by placing a link to the exe in WindowsStartup, by a batch file or some other AutoStart feature of the device OS.
iHook2 Version 1.3
This versions uses the registry to read the assigned keys and applications. Additionally the app is now safe and will only load once. The only argument supported is '-writereg' to write a default registry (see below).
Sample registry:
iHook3
New in version iHook3 (version 2.0)
recognizes CK60
adds Notification icon in taskbar
New in iHook3 (version 3.1)
recognizes CN3
supports consuming/forwarding switch for hot-keys. Use 'ForwardKey' registry binary value 0 to disable forwarding hot-keys, 1 to enable forwarding hotkeys.
This new option is usefull if you have a phone device and hook the number keys. In this case disable forwarding with 0, otherwise the phone app will come in front for the number keys.
17. oct 2007: Bug fixed version v3.1.1 is now at iHook3.exe
KeyToggle
Using function keys by pressing numbers.
Note: Updated KeyToggle.exe and download cab. There was a bug, so the sticky key still produced wm_keydown messages. Fixed version is v2.1.1.0.
With keytoggle you can define a 'sticky' key that will change the beahviour of the number keys. As long as the sticky key is 'active', number keys from 1 to 0 will produce the function keys F1 to F10. If sticky key is active, the left LED will light in green.
To start keytoggle just tap it or let it start by a link in StartUp. If keytoggle is loaded, you can see a small yellow arrow sign in the taskbar.
If you tap this symbol, you are asked, if you want to unload the app. If the registry does not have values defined for keytoggle, it will use default values. If you try to launch keytoggle a second time you will get a message box. Only one instance of keytoggle can run at a time.
Using the registry you can define the behaviour of the sticky key. In example, you can have the sticky key remain active until it is pressed again, let it 'go off' or 'fallback' after a period of time or let it fallback after a number key has been pressed. If the sticky key is pressed again, it will always fallback.
The values:
StickyKey:
default '144', decimal (VK_NUMLOCK)
the VK_ value of the sticky key. Here you define, what you will have as the sticky key. VK_ values are defined as in winuser.h. In example the VK_ value for the NumLock key is 0x90 (144 decimal, see VK_NUMLOCK). The sticky key will be consumed by keytoggle and is not visible to the system any more. That means, that you should choose key value that you do not need in any app you use.
Timeout:
default '3', three seconds
number of seconds the sticky key will remain active. If 0, the sticky key will not fallback automatically by time
autoFallback:
default '0'
if 0 the sticky key will not fallback after pressing a number key. If 1 the sticky key will fallback after a number key is pressed
Launch arguments
Keytoggle only supports one argument: '-writereg'. This will create the registry keys used by keytoggle and fill them with the default values.
Usage Sample Scenario
You have a ITC 700 Color device. This has a alphanumeric keyboard but no function keys. You need the function keys to be able to use a web application within iBrowse. With keytoggle you can now for example use the Gold key as sticky key. You have to download the keyboard remapper tool cpkbdmap.cab from the ITC site (archived version here) and assign the Gold key to NUMLOCK.
With this remapping and keytoggle running you will to get a function keystroke simulated if you press the Gold key and then a number key.
LockTaskbar
Locktaskbar simply locks the desktop and the taskbar.
New version supports WM5 devices as the CN3. See downloads
will kill the processes owned by an exe or simply close the application window.
Example:
'iKill2.exe iesample.exe' will close internet explorer
toggles the visibility of the SIP or shows or hides the SIP
You have a ITC 700 Color device. This has a alphanumeric keyboard but no function keys. You need the function keys to be able to use a web application within iBrowse. With keytoggle you can now for example use the Gold key as sticky key. You have to download the keyboard remapper tool cpkbdmap.cab from the ITC site (archived version here) and assign the Gold key to NUMLOCK.
With this remapping and keytoggle running you will to get a function keystroke simulated if you press the Gold key and then a number key.
LockTaskbar
Locktaskbar simply locks the desktop and the taskbar.
New version supports WM5 devices as the CN3. See downloads
will kill the processes owned by an exe or simply close the application window.
Example:
'iKill2.exe iesample.exe' will close internet explorer
toggles the visibility of the SIP or shows or hides the SIP
New version supports WM5 devices as the CN3. See downloads
starts iesample and locks user by disabling menu and close button (X)
simple tool to start an exe with arguments. Although you can use Action and tap/hold the clock on the today screen of a PocketPC to open a run dialog, this is not very comfortable.
Do you like to spy your WinCE device? Try zDump! I sued it to find the window classes and styles of iesample.exe to be able to write iLockIE2.
You would like to spy the windows running on a device, try WinTreeCE based on an article in CodeProject (http://www.codeproject.com/tools/showwindowtree.asp)
During the creation of an AutoInstall process, we found, that sometimes a custom autoinstall is installed before the ITC install has finished (for indepth information on this see AutoRunMechanics). If you then have code, that performs a reset, this reset could break the other running installs. In example, runautorun.exe launches AutoExec.exe. AutoExec launches foldercopy, autocab, dceinit and more. These applications are launched by autoexec with a EXEC call, which means, the processing of autoexec.dat will only wait up to 60 seconds before the next command in autoexec.dat is executed. After Autoexec.exe is finished, runautorun launches the first found AutoRun.exe (serached for in the order SDMMC Disk2577, Storage Card2577, FlashFileStore2577 or DiskOnChip2577). The system we had, uses a SDMMC Disk2577AutoRun.exe with some additional cmd batch file. 'Our' AutoRun.exe and the batch file were started before all the stuff launched by AutoExec.dat were finished. As we had a reboot at the end of our cmd batch file, the system did reboot, before the installation of the ITC stuff was finished and leaves a corrupted install. The solution to this problem was to have an application that waits until autoexec.exe has gone from memory. I have written this tool and called it iWaitForExe. The tool is only of use if you have a .cmd or .bat batch command file. If you launch the tool from the explorer, it will not block any operation, as it is started as an independ separate process.
iWaitForExe is a prog without user interface. You have to specify the applications exe name as argument to the program. The tool will first check, if the exe is running, if not it exits immediately. It will then watch the running processes list every three seconds and that will be done 60 times. If the exe is not running any more, the tool will exit and stop blocking a batch file. The tool will also stop blocking after 180 seconds.
iWaitForExe.exe arguments:
Sample:
For further use, iWaitForExe returns following exit codes:
rebootme
Small and simple tool to perform cold or warmboot. No gui, no questions, if invoked with the right argument it does what it does immediately.
arguments
Sample
irebootme
rebootme itself uses MS API KernelIOCtl. If it does not work on your ITC device (ie CK30), you can also use the ITC specific one, which uses ITC50.DLL. Same syntax as rebootme.
ARMv4 version (PocketPC, 7xx)
ARMv4i version (ITC WinCE devices, CK31, CN2A)
iRunAtEvent
This tool will start an application given by the command line at a specified event. On every call, the tool will write a log (iRunAtEvent.log.txt) to the root dir. The arguments supported are:
Although there are unsupported events listed in the log file, this does not mean the tool does not support them. In realtity the OEM (in this case tested on an ITC 730) of the device decided not to fire them (drivers are responsible for events to fire). You can simply check with your device by using these unsupported events and see, if they work. Simply use the calculator app in your tests.
To document this in depth here is a log file of this nice tool here:
isEnetOnline
During some testing of the event notifcation interface on a PocketPC device, I found that some essential events are declared but will never be fired. Two of these unsupported events are: NOTIFICATION_EVENT_NET_CONNECT and NOTIFICATION_EVENT_NET_DISCONNECT. So I started a small eVC4 workspace for ITC Pocket PC with Windows Mobile 2003 with one simple test application to play with the mibInterface.dwOperStatus. Then I got an app, that will start another prozess (given by the camdline). This tool is now called iRunOnNet.exe and will launch an exe (ie call 'iRunOnNet.exe windowscalc.exe' to have the caculator come up on ethernet connect), if an ethernet connection (the ITC device designed for has a dock ethernet connector) comes up. You can stop the hidden tool by launching it again with the argument -stop.
As a second goal, I would like to get a simple DLL that will export the status of an ethernet connection. Additionally I made a tool (isOnlineDLLtest.exe) that is used to test the functionallity of the DLL. The DLL only exports one function fnIsEnetOnline(). This will give a 0, if ethernet is offline and 1, if ethernet is online. A second export is the variable nIsEnetOnline which will hold the last status. The isOnlineDllTest uses the function fnIsEnetOnline() in a timer and simply shows a text with the last result of this call.
iRunOnNet is a stand-alone app and does not need isEnetOnline.dll. You can either directly use iRunOnNet to have an application launch on a ethernet network connection or you have your own apllication use isEnetOnline.dll in a timer to check for an ethernet connect. The sources for all this are available at http://groups.yahoo.com/group/ITC_Software/ as all other sources of the tools on this page.
NoWakeUpKeys
If you have a ITC PPC device and would not like the system to wake up on hardware keys you can use this samll tool to disable ALL wakeup keys. As you should know, the definition of the wakeup keys is done inside an EEProm and so there is no way to disable these keys thru registry entries. Now you can use this tool or look in the sources on how to disable the wake up keys.
NoWelcome
If you have an ITC PPC device, you will be asked to calibrate the screen on every cold boot, if you have disabled EnableRegistryRestore and don't use a saved registry. To overcom the initial calibration screen, you can put NoWlecome.exe renamed to AutoCard.exe onto your memory card (SDMMC Disk or Storage Card) into the 2577 dir. If there is a AutoCard.exe, the autoexec.dat will call this automatically on startup of the device. The NoWelcome will look for the model name of your ITC device, if it is a supported one (730, 750, 760, 741) it look for calibration data in the registry. If there are no calibration data, the tool will put some default calibration data there. The device will still show the calibration screen on startup for a short time until AutoCard.exe (alias NoWelcome) is run. doing the calibration this way is a little bit dangerous, as the values used by the tool are not as exact as the one that you get, if you calibrate the screen. So you should give the user an option to calibrate if you have a kiosk mode application.
NoWelcome uses a log file 'NoWelcome.log.txt' to document what has happened. There is no gui and no arguments.
There will be a tool called NoCal by ITC in future, that will something more. The calibration data will then be stored additionally in EEProm and the tool will only show the calibration screen on startup, if the stored values are incorrect compared to the registry data.
NEW: Updated NoWelcome: AutoCard.exe
NoWakeupAtMidnight
Do you like your device wakes up every midnight? If not, this little tool is for you. It simply deletes the schedule entry for CALNOT.EXE, which is launched every midnight to update repeating alarms.
Download ARMv4(WM2003)ARMv4i(WM2005)
SNTPClient
You need a correct local time on your windows mobile device? Weather dock 4 2 0 – desktop forecast 10 day. Then check this free SNTP client app. It is configured using the registry:
REGEDIT4
[HKEY_LOCAL_MACHINESOFTWAREIntermecSNTPclient]
'TimeServer'='192.168.0.1'
'SynchroniseClock'=dword:00000001
Enter a time server (in example: time-a.nist.gov) and if the tool should update the clock or not. Everytime the app is launched, it will try to get the time by the specified time server. You will find a log at the root of your device: SNTPClient.log.txt. You can place a link to the tool in WindowsStartUp to have it run on every warm boot of the device.
Download ArmV4 (WM2003)
Default demo installation
There is a cab file that should be placed in DiskOnChipCabfiles (or Flash File StoreCabfiles). So everytime the device is cold booted, it will install the iLock system. The installation will enter two new registry entries:
[HKEY_LOCAL_MACHINEinit]
'Launch45'='iLock2.exe'
'Depend45'=hex:14,00,1e,00
These files are copied to the windows dir:
iHook2.exe
iKill2.exe
iLock2.bmp
iLock2.exe
iRotateCN2.exe
iRun2.exe
iSIP2.exe
LockTaskbar.exe
AutoUser.dat file is copied to DiskOnChip2577
AutoUser.dat
AutoUser.dat is used to launch iHook2.exe and iRun2.exe with iesample.exe. Here is the content of the file:
run 'WindowsiHook2.exe'
run 'WindowsiRun2.exe' iesample.exe
That's all!
File
CN2 version (Windows CE) | Date | 7xx color version | Date | |
Adobe photoshop full gratis. iLock Documentation in Word format. | ||||
iHook2.exe | 20 jun 2005 | 20 jun 2005 | ||
iHook3.exe | Layout lab 3 1 5 – templates for keynote. 24 jan 2006 | 24 jan 2006 | ||
iHook3.exe (v3.1) | 7 aug 2007 | 17 oct 2007 | ||
iKill2.exe | 29 jul 2005 | 29 jul 2005 | ||
iLock2.bmp | 20 jun 2005 | 20 jun 2005 | ||
iLock2.exe | 20 jun 2005 | 20 jun 2005 | ||
iRotateCN2.exe | 20 jun 2005 | - | - | |
iRun2.exe | 20 jun 2005 | 20 jun 2005 | ||
iSIP2.exe | Download | 20 jun 2005 | 20 jun 2005 | |
LockTaskbar.exe | Download | 20 jun 2005 | 20 jun 2005 | |
iLock3.exe | 15 sept 2005 | 15 sept 2005 | ||
iLock3 install cabs | 15 sept 2005 | 15 sept 2005 | ||
iLock v3.3 | 24 jan 2006 | 24 jan 2006 | ||
iLock v4.0.0.4 | 7 apr 2006 | 7 apr 2006 | ||
Additional Tools | ||||
Windows CE 4.2 ARMv4i | Windows Mobile 2003 ARMv4 | |||
iLockIE2 | 23 jun 2005 | |||
iCMD2 | - | - | 22 jun 2005 | |
zDump | source is based on article at CodeGuru | 23 jun 2005 | - | - |
WinTreeCE (sources at yahoo) | 31 jun 2005 | 31 jun 2005 | ||
Keyboard remap tool | - | - | Download | 20 jun 2005 (upload date) |
iWaitForExe | 22 jul 2005 | - | - | |
rebootme | 22 jul 2005 | 22 jul 2005 | ||
iRunAtEvent | 22 jul 2005 | 22 jul 2005 | ||
isEnetOnline | 22 jul 2005 | 22 jul 2005 | ||
NoWakeUpKeys | - | - | 22 jul 2005 | |
30. jan 2007 | use left file too | |||
NoWelcome | - | - | 22 jul 2005 | |
NEW NoWelcome |
- More files and sources at my yahoo group http://groups.yahoo.com/group/ITC_Software/
(1) ITC is Android com games download.
last change: 25.Jun 2008
Home
Secure remote access to the door Leica sprinter 150m driver.
Remote opening functions
4 passes in one system: door, gate, garage door, 2nd door
Event list
Email notification when door opened more than 10 min.
Email notification - who, when has opened the door
Access Schedule
Up to 4 sensors ( door contacts ) in one system
Opening with a fingerprint
Company
Secure remote access to door
Access Control for office with the use of fingerprint reader
Verification of the presence using the event list
Assigning accesses from the smartphone
Free application ios android
Schedules enter the office, eg. From Monday to Friday from 7:00 till 18:00
Email notification left open crossings for longer than 10 minutes.
The list of events
Appartament
Secure remote access to door
Secure remote access to doorOpening of the apartment with the help of the numeric keypad
Remote provisioning accesses doors in accordance with the period of stay guest, eg. From 19.10.2016 of hours. 23.10.2016 14:00 d for hours. 12:00
Remote grant of opening codes
The ability to remotely open the door by the administrator if you do forget the door code
The possibility of operating with a single application multiple locations in different places in the world
Event list
SILENT ALARM
ILOCK will help in even the most dangerous situation. If you have a home alarm system hooked into the monitoring station, the function 'Silent Alarm' is for you. Imagine that you are standing at the door, and suddenly from behind thief comes to you with a knife. He orders to open the door. You instead use your standard finger use your second finger. The doors open as usual, but the system knows which finger you opened it, and apart from the standard opening, sent information about the robbery to the monitoring station. in couple seconds, the thief will have to face the intervention unit heading to you.
OPENING REMOTE FROM ANYWHERE IN THE WORLD
Being away from home you can easily open the doors using the application on a smartphone. open the door for domestic help without giving keys or access codes. Open the gate for delicery guy so he could leave the pack. Let in grandmother who came to your house before you.
Control your door, garage door, gate and many more
Ilock 3 0 24 Inches
Using only one control unit iLock will be able to control the four elements of the house and connect up to 4 fingerprint readers into the system. Create a real system without keys. Open the gate, the front door and garage door using the fingerprint reader. Apply as many readers as you need - the system can be equipped with 1 to 4 fingerprint readers.
Time Scheduler
Decide when a person can enter the house. Give the users access to specific periods of time. Example. The charwoman for cleaning comes to you every Tuesday approx. 8:30. Set schedule zone using the fingerprint reader for you to clean. With the schedule you restrict access only to Tuesday, setting the period in which charwoman can enter the house to 8:00 to 9:00 a.m.
System for kids
Ilock 3 0 24 Inch
Ilock 3 0 24 X 2
Do you want to make sure that your child does not lose the keys to your home or someone will not take it from them? Now it is possible. Leave the keys in a safe place, and open the doors using a finger. Placing a fingerprint reader at a height convenient also for children, provides easy access to the house every little one in your family. Apart from the obvious advantages associated with a lack of key system iLock shows on your phone if your kids really closed the door leaving the house. Children grow up at some point, they begin to meet with friends and go home late. If you want to know how late your child returned last night, just check it in the event history.