Token Software

Fast, convenient and secure login to Citrix

Dekart Logon for Citrix ICA Client
 

Dekart
 

Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. An easy to use and convenient way to making the login to Citrix MetaFrame Presentation Server sessions fast and secure. Biometrics enabled (optional). No passwords being lost, forgotten or stolen.

Software Keywords: security device card server user authentication smart

 
You won''t be able to tear yourself away!

Beads
 

Alawar Entertainment
 

Your aim is to put at least three bead of one color in a row. But this will not be easy: all game fields (four of them in all) are shaped into bent water pipes, where the multi-colored token should be placed. You will have to sharpen your imagination and fast reaction skills to play this game.

Software Keywords: puzzle beads entertainment remake advanced

 
Parse SQL into parse tree for further process

General SQL Parser
 

SQLParser.com
 

Create parser for different databases such as MSSQL,Oracle to deal with different sql dialects. Syntax check, give the error token, position and hint message. Pretty print SQL statements with lots of configurable parameters, make it more readable. Modify all parts of input sql, then rebuild on the fly. Identify various database objects such as table, field, function in sqls. Create different visitors to visit parse tree for any pur

Software Keywords: parser vcl sql delphi

Utility for 2-factor authentication on web

IdentiToken
 

Wayontec Inc.
 

IdentiToken is a soft-token solution that allows web designers to implement 2-factor authentications on web sites. Users must use the IdentiToken Windows client software to generate time-based tokens for their logins. Server side we have provided a demo script to demonstrate the IdentiToken authentication algorithm.

Software Keywords: authentication protection 2-factor

Converts USB flash drives to key dongles

AntiDuplicate
 

Alkonost Software
 

AntiDuplicate makes hardware keys for anti-piracy protection - using your ordinary computer. Software developers can now prepare hardware keys (dongles) from standard USB flash drives! The result is the durable media for software distribution and the USB token for anti-copy protection at the same time. AntiDuplicate SDK contains instruments and samples for Visual C++, C++ .NET, C# .NET, Visual Basic, VB.NET, Borland Delphi and C++ Builder.

Software Keywords: vb flash distribution vb-net key delphi

A data storage, rate, address, base converter

DataRelate
 

Measurement And Conversion Software
 

Compares data and media storage units and capacities of popular storage media eg. floppies, CDs, DVDs, ZIP, Jaz and Orb disks. Compare data rate units, and speeds of hard disks, peripherals, LAN and WAN (including Broadband) channels. Convert Token Ring/Ethernet addresses. Instantly convert between decimal, hex and binary numbers (upto 64 bits in length) - also supports bit shifting, rotation and inversion. Save and export chosen conversions as a textfile.

Software Keywords: data rate converter binary converter bit rotate decimal data speed units converter hex

Network packet monitor and analyzer

CommView
 

TamoSoft
 

CommView is a program for monitoring Internet and LAN activity capable of capturing and analyzing network packets. It gathers information about data passing through your dial-up adapter, Ethernet or Token Ring card, or loopback interface and decodes the analyzed data. With CommView you can see the list of network connections and examine individual packets. Packets are decoded down to the lowest layer with analysis of most protocols.

Software Keywords: capturing monitoring sniffer traffic packet network

Use your USB flash drive for Windows logon.

Proteg Enterprise 2005
 

Inflexpoint Technologies
 

Proteg Enterprise 2005 allows you to convert a standard portable USB flash drive (USB storage device) into a security token, that can be used to securely access your PC. After installation you are prompted for a USB flash drive and can then protect your current user account. To access your PC with that account, you will need the created USB key, as well as an additional password - you will always need both, the USB flash drive and the password.

Software Keywords: two factor authentication flash memory windows login affordable logon

Access control for Lotus Notes

Dekart Logon for Lotus Notes
 

Dekart
 

Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes performs high level user authentication, ensuring that only authorized users can access Lotus Notes data and resources. When the user removes the USB token or smart card from their computer, Logon for Lotus Notes can automatically lock the Lotus Notes workspace.

Software Keywords: lotus notes login access control windows login user authentication secure login hardware protection

Easy to use Blowfish based file encryption

Cipherlok
 

Softlok International Ltd
 

Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC using Blowfish. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be automatically encrypted at shutdown and decrypted at startup ensuring total security. Secure file deletion is also a feature. Cipherlok can use passwords or our USB Tokens for access.

Software Keywords: using secure delete based easy

 

Page 1 out of 4    1 2 3 4


 

Copyright © 2003-2012 TverSoft Software