Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Mcq on public key infrastructure in Title/Summary

ArcGIS SP1 for Desktop Public Key Infrastructure and Integrated Windows Authentication Patch

ArcGIS SP1 for Desktop Public Key Infrastructure and Integrated Windows Authentication Patch

This patch enables ArcGIS 10.1 SP1 for Desktop to communicate with Public Key Infrastructure (PKI) or Integrated Windows Authentication (IWA) enabled portal in an organization. Features: Expanded parallel processing Optimized file handling Public Key Infrastructure (PKI) support Single sign on Authentication Standardize SQL parser

  • Publisher: Environmental Systems Research Institute, Inc.
  • Home page: support.esri.com
  • Last updated: September 28th, 2014
Fopnu

Fopnu

Fopnu is a new and powerful P2P file sharing system, it is simple and easy to use, fully decentralized network, all shared files are indexed locally, no relaying of other user's searches, pure UDP protocol that utilizes forward error correction. Full connection encryption and decentralized public key infrastructure.

  • Publisher: Tixati Software Inc.
  • Home page: www.fopnu.com
  • Last updated: May 3rd, 2023
Students MCQ Manager

Students MCQ Manager

Students MCQ Manager is the best software tool for writing, collecting and practicing MCQs. It includes a wide range of options but has an easy to use interface.

  • Publisher: ApplecoreSoftware
  • Last updated: July 11th, 2008

Mcq on public key infrastructure in Description

PlexCrypt

PlexCrypt

PlexCrypt protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructure (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically.

  • Publisher: PlexObject Solutions, Inc.
  • Last updated: October 24th, 2011
X509 Certificate Generator

X509 Certificate Generator

The X.509 Certificate Generator is a multipurpose certificate application. Certificates provide the foundation of a public key infrastructure (PKI). It can be used to generate X.509 certificates on Smart Cards or PFX files, preview certificates or change key usage extensions.

  • Publisher: Secure Soft
  • Last updated: August 8th, 2014
Smart Card Shell

Smart Card Shell

The Smart Card Shell is an interactive development and scripting tool that allows easy access to smart cards on an APDU level as well as on a file system level. It can be used to develop and test smart card applications, in particular applications integrated into a Public Key Infrastructure (PKI).

  • Publisher: CardContact
  • Last updated: May 30th, 2013
PowerShell PKI Module

PowerShell PKI Module

Public Key Infrastructure PowerShell module is intended to simplify certain PKI management tasks by using automation with Windows PowerShell. This module is intended for Certification Authority management. For local certificate store management you should consider to use Quest AD PKI cmdlets.

  • Publisher: Sysadmins LV
  • Last updated: November 23rd, 2015
CyberSafe Top Secret

CyberSafe Top Secret

CyberSafe Top Secret is an information security program that uses modern encryption algorithms (RSA, AES, BlowFish, etc.). The assortment of tools and features provided by this program are valuable in all fields that work with information: protecting confidential information, protecting E-mail correspondence, creating and validating digital signatures.

  • Publisher: Cybersoft
  • Last updated: July 31st, 2014

Additional Mcq on public key infrastructure selection

iVEST Client

iVEST Client

User identity is authenticated at the server side. It is trusted by the service provider and thus is granted access to the e-services offered. As it is iVEST PKI-protected, the user can be assured of complete security and peace-of mind during any online communication and transaction.

  • Publisher: MIMOS Berhad
  • Last updated: May 30th, 2010
ArchiCrypt Live

ArchiCrypt Live

ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt all file types on your PC, laptop or network. That way only you will be able to access your confidential information.

  • Publisher: Exklamate Software
  • Last updated: June 21st, 2011
Crypto4 PKI

Crypto4 PKI

Crypto4 PKI is a set of tools designed for PKI (Public Key Infrastructure) management. Crypto4 PKI lets you create, manage and convert X.509 certificates, certificate (signing) requests and certificate revocation lists.

  • Publisher: EldoS Corporation
  • Home page: www.eldos.com
  • Last updated: May 22nd, 2020
eToken PKI Client

eToken PKI Client

eToken PKI Client is a framework for creating a secure method for exchanging information based on public key cryptography, providing for trusted third-party vetting of and vouching for user identities. It consists of a system of digital certificates, Certificate Authorities and registration authorities that verify and authenticate the validity of each party involved in an Internet transaction.

  • Publisher: Aladdin Knowledge Systems Ltd.
  • Home page: www3.safenet-inc.com
  • Last updated: March 17th, 2010
GNU Privacy Guard

GNU Privacy Guard

GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). The program allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

  • Publisher: Free Software Foundation
  • Last updated: May 31st, 2018
CrypTool

CrypTool

CrypTool is a program for learning cryptographic algorithms. It provides a graphical user interface for visual programming. Thus, workflows can be visualized and controlled to enable intuitive manipulation and interaction of cryptographic functions. The vector-oriented GUI is based on the Windows Presentation Foundation (WPF) and gives users the ability to scale the current view at will.

  • Publisher: University of Kassel (Applied Information Security Group)
  • Home page: www.cryptool.org
  • Last updated: November 20th, 2014
Chilkat Crypt ActiveX

Chilkat Crypt ActiveX

Chilkat Encryption ActiveX is a program that provides symmetric encryption: AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2. It allows you to create and verify DSA signatures, generate DSA keys based on parameters created by OpenSSL and set public key explicitly from P, Q, G, and Y values.

  • Publisher: Chilkat Software Inc
  • Last updated: July 6th, 2015
BBToolAuth

BBToolAuth

The BlackBerry Signing Authority Tool uses asymmetric private/public key cryptography to validate the authenticity of a signature request. It can be configured by an administrator to restrict access to specific APIs and data stores by confining the signing of applications to internal developers.

BCArchive

BCArchive

BCArchiveTM is designed to compress a group of files/folders to a single encrypted file.BCArchive enables the use of existing public key databases, such as those created for PGP software, which have been used world-wide for many years.It allows you to use Public Keys to send an encrypted archive - avoid the need for a Password.

  • Publisher: Jetico, Inc.
  • Home page: www.jetico.com
  • Last updated: June 16th, 2023
BestCrypt Container Encryption

BestCrypt Container Encryption

To protect your privacy, comply with regulations and prevent data breaches, BestCrypt delivers 'on-the-fly' data encryption that's easy to use for virtual drives, selected files and folders. BestCrypt encrypts files on Windows, Mac OS X and Linux.

  • Publisher: Jetico Inc. Oy
  • Last updated: January 8th, 2024