Microsoft Exchange Server portal for information of interest to corporate users of Microsoft Exchange and those who are just interested. Contains software, information, faqs, news, forums and more ...
2001 M-Tech Mercury Information Technology, Inc. M-Tech | P-Synch | ID-Synch Home Overview Features Technology Cost savings Security News & events Education Customers Partners Documentation Download Careers Contact M-Tech Total Password Management P-Synch™ is a total password management solution, deployed by a large number of Fortune 500 companies, that can: Synchronize user passwords ...
ScramDisk is a Hard Drive encryption program that runs under Windows 95 & 98 and provides a number of 'high security' ciphers including 3DES, Blowfish and IDEA. Encryption is done in CBC-mode using random IV & pre-encryption whitening values. The program uses SHA-1 as the passphrase hash algorithm. This is the first version of ScramDisk that has been publicly distributed and the program is ...
Snake Oil Warning Signs:Encryption Software to Avoid ...
www.interhack.net/people/cmcurtin/snake-oil-faq.html
GRC Internet Security Detection System ...
www.grc.com/lt/leaktest.htm
Active@ Kill Disk is disk eraser software for secure formatting of hard drives without any possibility of following data recovery. DOS appication can be run from floppy boot disk. DoD 5220.22-M compatible.
If you're looking for the HTML::Mason Perl Module, try here. Current version - 1.0.0 *smile* (Unsolicited) Reviews If you have not checked out Mason, I highly recommend it. Mason is a Linux based firewall, but none like you've ever used. In short, you put Mason into learning mode and run the services to the Internet you wish to support. Mason will then take these log entries and turn them into a ...
3 easy steps to give your email a military strength security. Use your browser to decode the secure 1on1 messages, keep your current email settings.
LostPC - Free Theft Protection for your PC ...
Automatic systems recognizing the speaker's voice are divided into two groups: automatic identification systems and automatic verification systems. Systems for verification are for enabling or disabling access to an object by a password. Automatic verification systems are used in military, forensic and commercial applications. This paper describes one of the possibilities where to implement a ...
www.elektrorevue.cz/clanky/99003/english.htm
Virtuallyonline.com Home Thu, 13 Jun 2002 GMT Top Searches Online Casinos Web Hosting Services Online Gambling Conference Call Debt Consolidation Home Equity Loans Mortgages Refinance Merchant Accounts LCD Projector HGH Betting Dedicated Servers LLC Loans Term Life Insurance Asset Protection Ecommerce Viagra Packaging Finances Debt Consolidation, Mortgages, Refinance, Loans, Asset Protection, ...