
There are other ways than passwords to restrict access to applications. The method I present here is suited for personal and limited public use. You'll see what I mean when you try out the basic method and two alternatives, all nicely packaged in a well commented appliction. But these are just examples. Use your creativity and create your own "protection"-scenario's.