IdentiToken 1.1 |
Date Added: March 23, 2011 | Visits: 720 |
|
||||||||||||
on our web site, where you can try the IdentiToken logins.
|
License: Freeware | Size: 2.62 MB |
USER REVIEWS
IDENTITOKEN RELATED
Business
-
HOTPin 1.1
The HOTPin Mac Client (client software) is a component of the Celestix HOTPin 2-Factor Authentication System. The system provides a secure way for organizations to allow users to log in to network resources from remote locations through a one-time... |
1.6 MB | |
Security Tools
-
smspasswd 0.1
smspasswd software provides two factor authentication via cell phone short message service (SMS). The reason I wrote this was because of all the pesky SSH brute force attacks, which continue to build in numbers. I didn’t want to waste money and... |
4.1 KB | |
Networking
-
WP Login Security 0.1.2
WP Login Security provides enhanced security for blog administrators by requiring administrators to register or whitelist their IP address.If the IP address is not recognized, the plugin will send an email to the blog administrator with a link... |
10 KB | |
Network & Internet
-
WiKID Strong Authentication System for Linux 3.1.15
WiKID is a two-factor authentication system. WiKID Strong Authentication System project consists of: a PIN, stored in the user's head; a small, lightweight client that encapsulates the private/public keys; and a server that stores the public keys... |
10.29 MB | |
Security Tools
-
OpenVPN 2.2 Beta 3
OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and... |
1.6 MB | |
Security Tools
-
OpenVPN for Linux 2.2 Beta 3
OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and... |
1.6 MB | |
Modules
-
Login Security 1.0
After login, a module option allows admins to display the last login or site access/activity to the user as a status message.Features - Request Time delay: On any failed login, a time delay is included to the submit request, hardenning any... |
||
Networking Tools
-
OpenVPN 2.0.2
OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and... |
655.36 KB | |
Security Tools
-
LastPass Sesame 1.80.0
LastPass Sesame is a small application that provides two-factor authentication to significantly improve your security when accessing your LastPass Vault from untrusted computers. The application will generate a one time password for the selected... |
||
Programming
-
GNU SASL 1.4.4
GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers (e.g., IMAP, SMTP) to request authentication from clients, and in clients to authenticate... |
972.8 KB |
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software
-
iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them... |
144.59 MB | |
Windows Software
-
Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by... |
1.34 MB | |
Windows Software
-
Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without... |
28.29 MB | |
Windows Software
-
WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible... |
2.27 MB | |
Windows Software
-
WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,... |
223 KB | |
Security Tools
-
Privacy Eraser Free 6.4
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,... |
9.41 MB | |
Security Tools
-
WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:... |
9.39 MB | |
Security Tools
-
USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock... |
11 KB | |
Security Tools
-
Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and... |
407 KB | |
Security Tools
-
Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should... |
29.53 MB |