authentication system shareware downloads
Search results for «authentication system»:
VoiceSecureIt 3.0.16.302
… ogon Experience.
Easy-to-use Setup Wizards (Users and Sound System).
Multiple Users per computer system.
Integrated On-line Help System.
Integrated Service with Advanced setup options.
New System Manager for administration of all settings…
SafeLogon 2.0
… en the system reaches a date limit.
Keep a log or track of all the users making use of the system, including the failed logon attempts.…
E-Mail Sender 1.23
… ted. It is strongly recommended to try this software before purchasing, because we can not guarantee that it works with all possible SMTP servers (for example, some SMTP servers accept requests only from its local network).
Limitations
30 emails…
XUM32 2.1
… ntication.
For example, we're providing the computed xum32 checksums for all of our archives so you can easily check copies that have been downloaded from elsewhere to verify that you have an authentic package.
Limitations
Limited to 20 days.…
Authent-I 1.3
… cates!
Authenticate thousands of files using the Mass Validation tool.
Easily drag & drop files and folders for verification!
Choose your hash method easily via drop down menus.
Quick XP style design & menus for ease of use.…
Proteg 3.1
… assets, Proteg provides a sophisticated technique for user identification and authentication to improve on passwords. This technique can certainly offer much greater security than passwords as this hardware based system (commonly known as two-factor authentication system) creates a physical link bet…
Internet Authentication and Usage Policy for Watchguard firewalls 1.1
… ny's internet usage policy directly to the desktop, you help protect your ogranization from lawsuits and enhance awareness of your company's internet usage guidelines.
The application encapsulates the Firebox applet and allows you to authenticate…
TokenKey 1.8
… password and authentication codes as you need using simple codes that you can remember.
Places strong and secure passwords and authentication codes directly into your clipboard so you can paste it directly into secure login sites and applications.…
Proteg Enterprise 2005 4.7
… e component becomes compulsory in order to login to the computer, instead of relying solely on the conventional username and password pair.
Offering greater security than passwords alone, this hardware based system (commonly known as a two-factor authentication system) creates a physical link bet…
X-Login 1.0
… provide continuous security monitoring.
Has built in Multimedia Management Console to snap-in components customized for the biometrics security layer, allowing LAN administrators to use standard MMC forms to set all logon and continuous security mo…
Related: authentication system key authentication authentication for msn authentication and authentication