Installations with restricted access are often protected using an access code. If you don’t have particularly demanding requirements regarding modifying the code, you can manage quite nicely with a static design with the access code fixed in the hardware.
Discussion (0 comments)