two factor authentication shareware downloads


Search results for «two factor authentication»:

Proteg 3.1 Proteg 3.1
… roviding two-factor authentication, they are typically too expensive, difficult to manage and inflexible. Despite the enhanced level of security provided, these technologies come at high costs, much of which is due to added hardware component.… 

Proteg Enterprise 2005 4.7 Proteg Enterprise 2005 4.7
… endly interface Automatically locks the Proteg-enabled user account when the USB device is unplugged. Non Proteg-enabled user account can be accessed by pressing CTRL+ALT+DEL. Anti-keylogger Emergency user account Requirements 128MB RAM… 

Factor Calculator 5.9.6 Factor Calculator 5.9.6
… pplication window allows simultaneous use with Microsoft Office, Internet Explorer, etc., Sits in tray until needed, Listed on the Math Forum @ Drexel (University) for Middle School, High School and College, ages 6+. Limitations one month trial… 

Natural Login Pro 1.10 Natural Login Pro 1.10
…  an automatic unlock and log-on will be activated, as well as an automatic lock when presence is no longer detected Limitations The evaluation period is limited to 15 logins/logoffs Requirements No domain manager, no fast user swiching… 

SSL-Explorer Enterprise Edition 0.2.12 SSL-Explorer Enterprise Edition 0.2.12
… inst keylogging attacks Full auditing and reporting capabilities Lightweight remote management applets supporting SSH1, SSH2, Telnet and VNC remote access protocols Option to remove branding from logon page Officially supported on Microsoft W… 

Dekart Logon 2.21 Dekart Logon 2.21
… tric data. The two- and three-factor authentication offered by Dekart Logon ensures that no third party will get access to your notebook or desktop computer and to your important data, even if the computer is lost, stolen or left unattended.… 

E-Mail Sender 1.23 E-Mail Sender 1.23
… ted. It is strongly recommended to try this software before purchasing, because we can not guarantee that it works with all possible SMTP servers (for example, some SMTP servers accept requests only from its local network). Limitations 30 emails… 

LectriCalc for Windows 2.1.2 LectriCalc for Windows 2.1.2
…  so there is no need to learn anything new. Also see EstiMaker, designed to help electrical professionals with the estimating/bidding process, letting an estimator create a take-off estimate in, generally, at least a third of the usual time.… 

XUM32 2.1 XUM32 2.1
… ntication. For example, we're providing the computed xum32 checksums for all of our archives so you can easily check copies that have been downloaded from elsewhere to verify that you have an authentic package. Limitations Limited to 20 days.… 

Authent-I 1.3 Authent-I 1.3
… cates! Authenticate thousands of files using the Mass Validation tool. Easily drag & drop files and folders for verification! Choose your hash method easily via drop down menus. Quick XP style design & menus for ease of use.… 


Related: two factor authentication  factor authentication  every factor  factor  factor for