Welcome to Bucaro TecHelp!

Bucaro TecHelp
Maintain Your Computer and Use it More Effectively
to Design a Web Site and Make Money on the Web

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

-->

Computer Technician's Guide to Biometric Security Devices

A biometric security device uses biological identifiers that are unique to individuals to allow access to a computer or other electronic device. Some unique biological identifiers are voice authentication, the iris of your eye, even face recognition. One common biometric device is a fingerprint reader.

Some keyboards and laptop computers have built-in fingerprint readers, and there are also USB fingerprint readers. It allows access by comparing the prospective user's fingerprint to the one stored by the authorized user during initial setup.

Microsoft Fingerprint Reader

The driver software should be installed before the USB fingerprint reader is connected. After the software is installed, connect the fingerprint reader to the USB port. A configuration screen will appear. It will require you to press your finger against the reader. It reads the finger several times, and stores the results. After this, you can log on to your computer, or your favorite Web sites with the press of your finger.

The benefits of a biometric security device is that the user doesn't have to remember a username or password to access the system, and a hacker can't use a password generating algorithm to gain access to the system. Most biometric security devices come with an account management system which allows several different user accounts to be configured.

More Windows Administration Information:
• Seven Steps to a Secure Wireless Network
• Tips to Protect Windows Vista Operating System
• What is Riskware or Grayware?
• The Windows Bootup Process
• Five Critical Steps to Protect Your Personal Information and Computer
• Computer Technician's Guide to Biometric Security Devices
• Turn On Your Browser's Phishing Filter
• The Seven Most Common Methods of Cyber Attacks
• Has Malware Turned Off Your PC's User Account Control?
• Top Tips To Secure Your Online PC

RSS Feed RSS Feed


Follow Stephen Bucaro Follow @Stephen Bucaro


Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2018 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268