Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Coreftp key based authentication in Title/Summary

ArcGIS SP1 for Desktop Public Key Infrastructure and Integrated Windows Authentication Patch

ArcGIS SP1 for Desktop Public Key Infrastructure and Integrated Windows Authentication Patch

This patch enables ArcGIS 10.1 SP1 for Desktop to communicate with Public Key Infrastructure (PKI) or Integrated Windows Authentication (IWA) enabled portal in an organization. Features: Expanded parallel processing Optimized file handling Public Key Infrastructure (PKI) support Single sign on Authentication Standardize SQL parser

  • Publisher: Environmental Systems Research Institute, Inc.
  • Home page: support.esri.com
  • Last updated: September 28th, 2014
CoreFTP

CoreFTP

Encrypt and decrypt files to servers using the latest encryption methods. Schedule ftp transfers (unattended) without additional services.IBM Information Exchange support with command line updates. Email notification, external program execution, & Ping/TraceRoute included and so much more.

  • Publisher: CoreFTP
  • Last updated: November 30th, 2011
SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Client is a unified middleware client that manages Thales's SafeNet portfolio of Identity and Access Management Solutions, including certificate-based authenticators such as eToken, IDPrime smart cards, and USB and software-based devices.

Coreftp key based authentication in Description

CCNA Certification Toolkit

CCNA Certification Toolkit

CCNA certification toolkit features a web-based interface with feature selector for courseware, lab simulation, practice tests and certification tools.

Dynasoft TeleFactura

Dynasoft TeleFactura

Dynasoft TeleFactura is the definitive BSS OSS convergent telecom voice, data, voip, billing and Radius Authorization Authentication Accounting system solution for data, voice, Wifi, ISP, WISP, mobile, MVNO, telecom, callshop, operators and carriers

  • Publisher: Dynasoft Ltd
  • Home page: www.dynasoft.net
  • Last updated: May 27th, 2020
Tunnelier

Tunnelier

Free SSH client for Windows with graphical SFTP; VT100, xterm; dynamic and manual TCP/IP tunneling; auto-reconnect; scriptable console-mode SFTP; single-click Remote Desktop forwarding; FTP-to-SFTP bridge; Kerberos; public keys. Free individual use.

  • Publisher: Bitvise Limited
  • Home page: www.bitvise.com
  • Last updated: May 26th, 2020
Secret PDF

Secret PDF

Secret PDF is capable of preventing unauthorized distribution and protect the PDF document from editing, copying, printing and converting. Keep your PDF in a safe situation.

  • Publisher: Secret PDF
  • Last updated: May 27th, 2020
WinLock Professional

WinLock Professional

WinLock Professional is a powerful security solution that lets you restrict access to various computer resources.

  • Publisher: Crystal Office Systems
  • Last updated: July 18th, 2023

Additional Coreftp key based authentication selection

ABC Backup Pro

ABC Backup Pro

This program allows you to create backups at various different compression levels, automatically backups data on schedule to local or remote storages, network drives and ftp servers, supports writing to CDR, CDRW, DVD-R, DVD+R, DVD-RW or DVD+RW.

  • Publisher: A-B-C Backup Software
  • Home page: www.abc-backup.com
  • Last updated: September 11th, 2018
emSigner

emSigner

emSigner provides automated cloud-based authentication and lifecycle management. It helps you to manage your digital documents in an orderly fashion. You can create and manage categories meant for category based document storage. emSigner is available on cloud, mobile so that documents can be initiated, accessed and signed across devices and platforms.

  • Publisher: e-Mudhra Ltd.
  • Last updated: November 30th, 2016
ACOS5 SDK

ACOS5 SDK

With the use of the kit, applications can be developed over the supplied PKCS#11 or CSP, and this development is facilitated by ACS’s unique Card Tool that allows one to send direct commands to any PC/SC-compliant smart card readers and cards. Many benefits may be reaped from utilizing this SDK, among them being reduced investment of time and cost to R&D and Marketing.

  • Publisher: Advanced Card Systems Ltd.
  • Home page: www.acs.com.hk
  • Last updated: February 28th, 2012
OpenNX Client

OpenNX Client

OpenNX is an open source drop in replacement for NoMachine's NX client. It is compatible to the original client in that it uses the same syntax for the session configuration files (.nxs files). OpenNX is distributed under the GNU Lesser Public License v2.1.

  • Publisher: The OpenNX Team
  • Last updated: November 29th, 2012
SIR Audio Tools SIR2

SIR Audio Tools SIR2

Usable even at pre-production stage, high definition impulse responses of real places include True Stereo, low CPU-spiking even with small sound-device buffers. NO challenge/response - NO dongle required - license key based, for Macintosh 32-bit/64-bit (VST/AU) & Windows 32-bit/64-bit (VST), imports various file formats including WAV, AIF, FLAC, BWS, OGG

  • Publisher: Christian Knufinke
  • Home page: siraudiotools.com
  • Last updated: November 23rd, 2017
CryptLib

CryptLib

Security toolkit with strong encryption and authentication. Supports many algorithms for symmetric/asymmetric encryption, authentication, and hashing. Free for non-commercial/shareware projects. Written in C. ActiveX and C++ wrappers are available.

  • Publisher: ComponentSpot
  • Last updated: April 14th, 2008
United States (International Alternate)

United States (International Alternate)

Based closely on the United States International layout, but the dead keys are moved to AltGr+key combinations, meaning they don't accidentally get activated in the course of ordinary typing. That the semicolon should be the acute accent dead key and the colon should be the dieresis accent dead key.

Intel Security True Key

Intel Security True Key

Privacy is, undoubtedly, Internet users’ biggest concern, and rightly so - passwords, bank accounts, and credit cards are easy prey for cyberattackers. True Key is a state-of-the-art free protection tool that will scramble and encrypt passwords, messages, notes, credit cards, bank accounts, and any other piece of sensitive information using AES-256 encryption and multi-factor authentication.

  • Publisher: Intel Corporation
  • Home page: www.truekey.com
  • Last updated: July 4th, 2017
Rohos Logon Key

Rohos Logon Key

Rohos Logon Key is a utility that enables you to convert a USB stick into a security token for your Windows PC. With its help, you can replace the default password-based login of Windows with a hardware security key such as USB flash drive, Google Authenticator OTP, mobile devices with Bluetooth, etc.

  • Publisher: Tesline-Service SRL, SafeJKA SRL
  • Last updated: March 13th, 2023
Cyberoam General Authentication Client

Cyberoam General Authentication Client

Cyberoam's General Authentication Client is the standalone application for Cyberoam Identity-based UTM appliances. It authenticates users with Cyberoam integrated with local or external authentication servers. You can manually input the username and password for authentication and save the credentials for auto login during computer boot process.

  • Publisher: Cyberoam Technologies Pvt. Ltd.
  • Last updated: April 14th, 2015