SuggestSoft.com

Token

Dynamic Web Content Builder 1.01

No Image Build data rich web pages quickly and easily. Simply design your pages using your normal web editor, entering free form "tokens" where you want fields to appear / actions to occur. e.g. [% Name %]. Don`t worry - you don`t need to learn any complex language, the program will prompt you with a list of "tokens" and allow you to specify what you want to display / do. Using "loops" you can build up tables of data.






No Image
ID-Sign for MS Office v2.8.2

tokens, including fingerprint-based tokens, and any X.509v3-compliant digital certificate. User just needs to carry a USB tokens containing his/her keys and certificates, can plug in any computer with a USB port and sign any Office document. ID-Sign supports offline signature verification as well as online certificate validation using CRL and OCSP. ID-Sign is designed to be secure for business use, making it impossible to hide fraudulent contents

paperless office, electronic signature, digital signature, digital seal





Dekart Logon for Lotus Notes 1.02: Protect access to Lotus Notes with smart cards, USB disks and biometrics
Dekart Logon for Lotus Notes 1.02

Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources. When the user removes the USB token or smart card from their computer, Logon for Lotus Notes can automatically lock the Lotus Notes workspace.

smart card login, hardware protection, secure login, protect passwords, windows login, user authentication, lotus notes login, access control, usb tokens



abylon LOGON 6.3: Secure and comfortable windows access protection with smart card or USB-Stick
abylon LOGON 6.3

abylon LOGON protects your computer again illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this token as key for the logon authentication. If you leave the computer you need only to pull the smart card or the USB stick and your computer automatically lock or logoff. Thus protect your computer against snoopier views and data theft without large training.

logon, smart card reader, aladdin, lock, abylon protection manager, certificate, log off, shut down, x 509, screensaver, ec card, etoken, smart card



Remote UAC Fix 1.0: Remote UAC Error Fix for remote tools.
Remote UAC Fix 1.0

If you are trying to use any remote tools like sysinternals against Windows Vista, 7 or 8.1 machines then you need to have remote UAC elevation privileges to enable you to carry out changes on the machine you are trying to amend. However, you may find that you are still having problems with connecting to remote machines so if you are, this fix you can install on the remote machine to enable Local Account Token Filter Policy will correct this.

filter, policy, token, local, remote



NCP Secure Entry Client for Win32/64 9.23_18: NCP Secure Entry Client for communication with any IPsec gateway
NCP Secure Entry Client for Win32/64 9.23_18

tokens or certificates (soft certificates, smart cards, USB tokens) in a PKI, at your discretion. All data are encrypted for transmission. Support for: Triple DES 128, 192-bit, Blowfish 128-bit, AES 128, 192, 256-bit, and RSA 1024, 2048- bit. The Entry Client can also be implemented in IT environments without permanent IP addresses. DynDNS (Dynamic DNS) is used to dial-in to the central VPN gateway with changing public IP addresses which are queried

windows 7, virtual private network, ipsec, secure internet, secure hotspot, vista, secure wlan, mobile computing, remote access, secure networking, teleworking



No Image
Cipherlok 2.1

Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC using Blowfish. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be automatically encrypted at shutdown and decrypted at startup ensuring total security. Secure file deletion is also a feature. Cipherlok can use passwords or our USB Tokens for access.

encrypt, cipherlok, secure delete, file shred, blowfish, data, encryption, lock down, decryption, data security, security, usb tokens, decrypt


More Results: 1  2  3  4  5  6  

World IT News