authentication system free software


Search results for tag «authentication system»:

Basic Authentication 1.03 build 6.1 Basic Authentication 1.03 build 6.1
… cation allows you to encode a username and a password and provides you with an authentication string that is copied to the clipboard. From that authentication string, the application will decode your personal data: the given username and password.… 

VoiceSecureIt 3.0.16.302 VoiceSecureIt 3.0.16.302
… ogon Experience. Easy-to-use Setup Wizards (Users and Sound System). Multiple Users per computer system. Integrated On-line Help System. Integrated Service with Advanced setup options. New System Manager for administration of all settings… 

SafeLogon 2.0 SafeLogon 2.0
… en the system reaches a date limit. Keep a log or track of all the users making use of the system, including the failed logon attempts.… 

E-Mail Sender 1.23 E-Mail Sender 1.23
… ted. It is strongly recommended to try this software before purchasing, because we can not guarantee that it works with all possible SMTP servers (for example, some SMTP servers accept requests only from its local network). Limitations 30 emails… 

XUM32 2.1 XUM32 2.1
… ntication. For example, we're providing the computed xum32 checksums for all of our archives so you can easily check copies that have been downloaded from elsewhere to verify that you have an authentic package. Limitations Limited to 20 days.… 

Authent-I 1.3 Authent-I 1.3
… cates! Authenticate thousands of files using the Mass Validation tool. Easily drag & drop files and folders for verification! Choose your hash method easily via drop down menus. Quick XP style design & menus for ease of use.… 

Win32Get 0.0.2 ALPHA Win32Get 0.0.2 ALPHA
… s@domain.com/ and http://user@domain.com/ cases. We can now handle authentication for HTTP and FTP, we also have a new authentication dialog that let's you enter username/password. Add Proxy support: HTTP, SOCKS4, SOCKS5. (No authentication yet)… 

Proteg 3.1 Proteg 3.1
… assets, Proteg provides a sophisticated technique for user identification and authentication to improve on passwords. This technique can certainly offer much greater security than passwords as this hardware based system (commonly known as two-factor authentication system) creates a physical link bet… 

Digital Watermarking 1.0 Digital Watermarking 1.0
… r, owner, distributor or authorized consumer of a document. A new watermarking technique to add a code to digital images is presented: the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set… 

Internet Authentication and Usage Policy for Watchguard firewalls 1.1 Internet Authentication and Usage Policy for Watchguard firewalls 1.1
… ny's internet usage policy directly to the desktop, you help protect your ogranization from lawsuits and enhance awareness of your company's internet usage guidelines. The application encapsulates the Firebox applet and allows you to authenticate… 


Related: