Abstract:
The authors propose an adaptive way of protecting computers from unauthorized use. The original scheme of the software implementation is discussed. The advantages of creating and implementing of program tools are considered.
Keywords:authorization, identification, authentication, software system, the corporate network.