Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Vdc-ca token in Title/Summary

charismathics plug'n'crypt CCID token

charismathics plug'n'crypt CCID token

You may also see the name of your USB device as pop-up field when plugging the token into one of your USB ports. Please note that we currently do not recommend using the generic Microsoft CCID drivers, as USB token devices may still malfunction independently of the hardware vendor.

  • Publisher: charismathics
  • Last updated: June 14th, 2010
Defender Desktop Token

Defender Desktop Token

Defender Desktop Token is a free program that enables a more secure connection between your token device and your corporate assets, authenticating the user in the same way as a Quest hardware token. The program also allows you to choose to authenticate by only having to enter a PIN identity.

  • Publisher: Dell Inc.
  • Home page: www.quest.com
  • Last updated: December 2nd, 2013
Tiny Token Empires

Tiny Token Empires

Tiny Token Empires is a puzzle game and turn-based strategy game. This version has been completely revised and includes: an exclusive new campaign, improved AI, a new local multiplayer mode, new graphics and animation. You will also encounter mythological monsters to play against.

  • Publisher: BiP media
  • Last updated: April 10th, 2013

Vdc-ca token in Description

OpenTrust SCM Client

OpenTrust SCM Client

The OpenTrust SCM client is the application that must be used to manage the Vectury tokens (enrolment, renewal, unlock, change PIN code).Main features:- Enrolment (blank or recycled token) - Token PIN code change (token with valid certificate) - Token unlock (locked token with valid certificate) - Token renewal (token with valid certificate, which end date is near)

  • Publisher: Renault
  • Last updated: November 21st, 2012
Double Password

Double Password

Double Password has a fresh outlook onto your computer security. It turns any USB gadget into a security token, which your computer starts to require every time you log into the system. Special encryption prevents your passwords from interception.

Continental

Continental

The Continental 2.1 board game puzzle has a colorful interface that displays 32 tokens and 33 available positions. When first opened, only the central position is available. Your challenge when playing the game is to eliminate all the tokens except one, which should be in the central position at the end of the game for you to win.

  • Publisher: Alberto Martínez Pérez
  • Home page: www.ampsoft.net
  • Last updated: June 15th, 2008
PC Remote Permissions Audit

PC Remote Permissions Audit

PC Remote Permissions Audit is a network permissions audit tool that lets you gather detailed user permission data from servers on the network. This includes Direct Access Token, Direct and Group Access Token, Direct and Everyone Access Token and Access via Any Token. The data is stored in an XML database on your local computer.

  • Publisher: Remote PC Tools Ltd.
  • Last updated: November 3rd, 2011
RunETAC

RunETAC

The ETAC programming language is a general purpose dictionary and stack based interpreted script programming language fully capable of traditional high-level block structured language style syntax.

  • Publisher: Victella
  • Home page: www.victella.me
  • Last updated: May 23rd, 2018

Additional Vdc-ca token selection

RSA SecurID Software Token

RSA SecurID Software Token

RSA SecurID Software Tokens makes strong authentication a convenient part of doing business. Deploy RSA software tokens on mobile devices—smartphones, tablets, and PCs— and transform them into intelligent security tokens. Software tokens reduce the number of devices users have to manage to gain safe and secure access to corporate assets.

  • Publisher: RSA Security Inc.
  • Last updated: August 10th, 2015
RSA SecurID Software Token with Automation

RSA SecurID Software Token with Automation

RSA offers enterprises a wide range of user authentication options to help positively identify users before they interact with mission-critical data and applications through: -VPNs & WLANs -E-mail -Intranets & extranets -Microsoft® Windows® desktops -Web servers -Other network resources

  • Publisher: RSA, The Security Division of EMC
  • Home page: www.rsa.com
  • Last updated: August 25th, 2015
Syndicate Bank RSA SecurID Software Token

Syndicate Bank RSA SecurID Software Token

Syndicate Bank RSA SecurID Software Token is a free program that enables you to secure your online banking transactions. You can perform online banking payments directly by entering the Passcode (PIN+Token-Code) in a protected environment, bypassing online threats and phishing attempts.

  • Publisher: Syndicate Bank
  • Last updated: November 29th, 2013
SecurEnvoy PC Soft Token

SecurEnvoy PC Soft Token

SecurEnvoy PC Soft Token is a free program that utilises the HTTP(S) protocol to communicate from the SecurEnvoy PC Soft Token to the SecurEnvoy SecurAccess server. The program also allows users to generate a One Time Passcode (OTP) directly upon their personal computer.

  • Publisher: SecurEnvoy
  • Last updated: February 21st, 2014
WiKID Token Client

WiKID Token Client

WiKID Token Client is a free program that enables you to encrypt your token data by creating a pass-phrase. The program also allows you to create, pre-register and delete domains, you can select a domain and get the passcode, jump to pin for the domain and use various proxies.

  • Publisher: WiKID Systems, Inc.
  • Last updated: March 5th, 2015
TCPIP Token Server for QDV

TCPIP Token Server for QDV

The TCP/IP Token Server can provide tokens for QDV 7 and Quick Devis V6 simultaneously. You can access it directly through a port or use web pages as intermediate layers. The token server for QDV™ is designed to serve up to 400 tokens. The QDV TCPIP Licenses Server offers several different architectures.

  • Publisher: QUOTALYS LTD
  • Last updated: May 21st, 2014
eToken PKI Client

eToken PKI Client

eToken PKI Client is a framework for creating a secure method for exchanging information based on public key cryptography, providing for trusted third-party vetting of and vouching for user identities. It consists of a system of digital certificates, Certificate Authorities and registration authorities that verify and authenticate the validity of each party involved in an Internet transaction.

  • Publisher: Aladdin Knowledge Systems Ltd.
  • Home page: www3.safenet-inc.com
  • Last updated: March 17th, 2010
SafeSign

SafeSign

SafeSign Identity Client integrates smart card or USB Token with applications for strong authentication and digital signatures.

  • Publisher: A.E.T. Europe B.V
  • Last updated: September 18th, 2015
Tri-Peaks Solitaire To Go

Tri-Peaks Solitaire To Go

Join Tex Carter on his adventures to exotic and dangerous places around the world. You’ll be seeing a map with “X” marks representing hidden dig sites. You have to complete your treasure collections to unlock them. In this game you’ll be exploring ancient ruins, discovering fabulous treasures and winning piles of coins.

ePass3003

ePass3003

ePass3003 is a software application for the usb token ePass which is used to realize operations based on digital certificates. With its various PKI applications, any demand for high security of digital certificate and electronic signature can be met. This application allows you to use the token in a very safe way.

  • Publisher: FeiTian Technologies
  • Home page: www.ftsafe.com
  • Last updated: February 28th, 2012