LogonVest
Are you concerned about the security of your Windows system? Worried about unauthorized access to your computer? LogonVest provides you with an additional layer of security and authentication, preventing anyone from getting to your Windows Log On screen, unless passing the LogonVest screen.
Source Code License available
About LogonVest
Enhanced Security
LogonVest offers you an additional layer of protection, ensuring that your Windows Log On screen is impenetrable unless you pass through the LogonVest screen. You define that screen and what is shown. Say goodbye to unauthorized access and potential security breaches.
Ironclad Authentication
With LogonVest, your authentication process becomes rock-solid so you can keep your peace of mind. You are in complete control, and only you or authorized users can gain access to your Windows system.
Customization
With LogonVest you can define a secret password that only once entered into the LogonVest screen, you can move forward to Windows Log On.
You can define what will be shown before, during and after the insersion of the secret password.
Peace of Mind
We understand the importance of safeguarding your data and personal information. LogonVest gives you the confidence that your system is protected, ensuring your privacy and security remain intact.
How it works
LogonVest introduces an additional layer of security that acts as a protective barrier between the early stages of the boot process and the Windows login. Without successfully navigating through this layer, you will not reach the Windows login screen.
To gain access beyond this layer, you must input a confidential password. This password is not only confidential in the sense that it is kept secret, but the mere existence of this password itself is kept secret. There is no explicit password prompt; instead, a customizable text message appears on the screen.
Some users utilize LogonVest for the purpose of maintaining plausible deniability. The custom message typically suggests that the hard drive is corrupted and cannot proceed, making it appear impossible to log in if the PC is stolen or if someone attempts to force the user to log into Windows. Once the user is in a safe environment, they can enter the password and proceed to the normal Windows logon screen.