Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
copSSH is an ssh server and client implementation for windows systems. It is a yet another packaging of portable openssh, cygwin, some popular utilites, plus implementation of some best practices regarding security. You can use COPSSH for remote administration of your systems or gathering remote information in a secure way.
Foldera is the new way to: Communicate with others in context Secure your vital information instantly Access and Manage your applications, teams, activities and information from wherever you are Notify everyone at the same time when something changes Shar
IBM stellt den Secure Enterprise Desktop - den sicheren Schreibtisch für Unternehmen - vor. Zugelassene Nutzer können auf eine Festplatte sicher zugreifen, alle Daten, aber auch das Betriebssystem und Anwendungen stehen überall in nur zwei Minuten zur Verfügung.
The CEQUENS SMS API is a powerful tool that allows businesses to send and receive SMS messages easily. With the CEQUENS SMS API, businesses can integrate SMS messaging into their existing software platforms, automate their SMS marketing campaigns, and more.
USSHC is a privately owned underground colocation data center located in the rural Midwestern United States. We take pride in offering the most secure, carrier-class, highly secure, colocation data center services available.
Bot Sentry is a Pidgin (libpurple) plugin to prevent Instant Message (IM) spam. It allows you to ignore IMs unless the sender is in your Buddy List, the sender is in your Allow List, or the sender correctly answers a question you have predefined.
F. Hong, L. Hong, and C. Fu. Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on, 1, page 713--718. IEEE, (2005)
S. Izmalkov, S. Micali, and M. Lepinski. Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer
Science, 2005., page 585-594. New York, NJ, USA, IEEE Computer Society, (October 2005)
M. Jakobsson, and A. Juels. ASIACRYPT '00: Proceedings of the 6th International Conference on
the Theory and Application of Cryptology and Information Security, volume 1976 of Lecture Notes in Computer Science, page 162--177. Springer, (London, UK 2000)
S. Jha, L. Kruger, and V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, page 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
S. Kraxberger, and U. Payer. Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on, page 210 -216. (June 2009)
K. Kurosawa, and W. Ogata. ESORICS '02: Proceedings of the 7th European Symposium on Research
in Computer Security, volume 2502 of Lecture Notes in Computer Science, page 24--38. London, UK, Springer, (2002)