Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Public key location coreftp in Title/Summary

ArcGIS SP1 for Desktop Public Key Infrastructure and Integrated Windows Authentication Patch

ArcGIS SP1 for Desktop Public Key Infrastructure and Integrated Windows Authentication Patch

This patch enables ArcGIS 10.1 SP1 for Desktop to communicate with Public Key Infrastructure (PKI) or Integrated Windows Authentication (IWA) enabled portal in an organization. Features: Expanded parallel processing Optimized file handling Public Key Infrastructure (PKI) support Single sign on Authentication Standardize SQL parser

  • Publisher: Environmental Systems Research Institute, Inc.
  • Home page: support.esri.com
  • Last updated: September 28th, 2014
Public Radio On Location

Public Radio On Location

This geo-active player brings up rich stories, music, interviews - all related to the place you are right now. You can spot locations named in the stories. Details for audio features are enhanced with images and transcripts - and this player keeps the map in mind.

  • Publisher: Earthcomber
  • Last updated: April 15th, 2012
CoreFTP

CoreFTP

Encrypt and decrypt files to servers using the latest encryption methods. Schedule ftp transfers (unattended) without additional services.IBM Information Exchange support with command line updates. Email notification, external program execution, & Ping/TraceRoute included and so much more.

  • Publisher: CoreFTP
  • Home page: www.coreftp.com
  • Last updated: November 30th, 2011

Public key location coreftp in Description

BCArchive

BCArchive

BCArchiveTM is designed to compress a group of files/folders to a single encrypted file.BCArchive enables the use of existing public key databases, such as those created for PGP software, which have been used world-wide for many years.It allows you to use Public Keys to send an encrypted archive - avoid the need for a Password.

  • Publisher: Jetico, Inc.
  • Home page: www.jetico.com
  • Last updated: June 16th, 2023
SecureBridge

SecureBridge

SecureBridge is a suite of client and server components for SSH, SFTP, FTPS, HTTP/HTTPS, SSL, WebSocket, and SignalR protocols.

  • Publisher: Devart
  • Home page: www.devart.com
  • Last updated: June 16th, 2023
Secret PDF

Secret PDF

Secret PDF is capable of preventing unauthorized distribution and protect the PDF document from editing, copying, printing and converting. Keep your PDF in a safe situation.

  • Publisher: Secret PDF
  • Home page: secretpdf.org
  • Last updated: May 27th, 2020
DeepCoder

DeepCoder

DeepCoder is a program to encrypt, decrypt and/or digitally sign e-mails and files using secret keys (passwords) or public keys. It can be used with any e-mail program or wordprocessor program. No plug-ins are required. Very easy to use!

ACOS5 SDK

ACOS5 SDK

With the use of the kit, applications can be developed over the supplied PKCS#11 or CSP, and this development is facilitated by ACS’s unique Card Tool that allows one to send direct commands to any PC/SC-compliant smart card readers and cards. Many benefits may be reaped from utilizing this SDK, among them being reduced investment of time and cost to R&D and Marketing.

  • Publisher: Advanced Card Systems Ltd.
  • Home page: www.acs.com.hk
  • Last updated: February 28th, 2012

Additional Public key location coreftp selection

eToken PKI Client

eToken PKI Client

eToken PKI Client is a framework for creating a secure method for exchanging information based on public key cryptography, providing for trusted third-party vetting of and vouching for user identities. It consists of a system of digital certificates, Certificate Authorities and registration authorities that verify and authenticate the validity of each party involved in an Internet transaction.

  • Publisher: Aladdin Knowledge Systems Ltd.
  • Home page: www3.safenet-inc.com
  • Last updated: March 17th, 2010
GNU Privacy Guard

GNU Privacy Guard

GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). The program allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

  • Publisher: Free Software Foundation
  • Home page: www.gnupg.org
  • Last updated: May 31st, 2018
CrypTool

CrypTool

CrypTool is a program for learning cryptographic algorithms. It provides a graphical user interface for visual programming. Thus, workflows can be visualized and controlled to enable intuitive manipulation and interaction of cryptographic functions. The vector-oriented GUI is based on the Windows Presentation Foundation (WPF) and gives users the ability to scale the current view at will.

  • Publisher: University of Kassel (Applied Information Security Group)
  • Home page: www.cryptool.org
  • Last updated: November 20th, 2014
Chilkat Crypt ActiveX

Chilkat Crypt ActiveX

Chilkat Encryption ActiveX is a program that provides symmetric encryption: AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2. It allows you to create and verify DSA signatures, generate DSA keys based on parameters created by OpenSSL and set public key explicitly from P, Q, G, and Y values.

  • Publisher: Chilkat Software Inc
  • Last updated: July 6th, 2015
BBToolAuth

BBToolAuth

The BlackBerry Signing Authority Tool uses asymmetric private/public key cryptography to validate the authenticity of a signature request. It can be configured by an administrator to restrict access to specific APIs and data stores by confining the signing of applications to internal developers.

CyberSafe Top Secret

CyberSafe Top Secret

CyberSafe Top Secret is an information security program that uses modern encryption algorithms (RSA, AES, BlowFish, etc.). The assortment of tools and features provided by this program are valuable in all fields that work with information: protecting confidential information, protecting E-mail correspondence, creating and validating digital signatures.

  • Publisher: Cybersoft
  • Last updated: July 31st, 2014
BestCrypt Container Encryption

BestCrypt Container Encryption

To protect your privacy, comply with regulations and prevent data breaches, BestCrypt delivers 'on-the-fly' data encryption that's easy to use for virtual drives, selected files and folders. BestCrypt encrypts files on Windows, Mac OS X and Linux.

  • Publisher: Jetico Inc. Oy
  • Home page: www.jetico.com
  • Last updated: January 8th, 2024
CryptoKit

CryptoKit

CryptoKit is a set of cryptographic algorithms and development tools that enable simple and convenient integration of data security features into any third-party application. Main features: - High-level Application Programming Interface (API) - Full Microsoft Cryptographic API (CAPI) and PKCS#11 support - Public key management and certification - RSA encryption/decryption

  • Publisher: ARX (Algorithmic Research)
  • Home page: www.arx.com
  • Last updated: January 28th, 2012
iVEST Client

iVEST Client

User identity is authenticated at the server side. It is trusted by the service provider and thus is granted access to the e-services offered. As it is iVEST PKI-protected, the user can be assured of complete security and peace-of mind during any online communication and transaction.

  • Publisher: MIMOS Berhad
  • Last updated: May 30th, 2010
X509 Certificate Generator

X509 Certificate Generator

The X.509 Certificate Generator is a multipurpose certificate application. Certificates provide the foundation of a public key infrastructure (PKI). It can be used to generate X.509 certificates on Smart Cards or PFX files, preview certificates or change key usage extensions.