online-fordito.hu | Data collected and processed: Device identifiers, Authentication-derived identifiers, Privacy choices, Probabilistic identifiers, Users’ profiles, Browsing and interaction data, User-provided data, IP addresses, Device characteristics, Precise location data, Non-precise location data | identifier authentication, authentication identifier, datum authentication | launch, duration, storage, datum, detail | 54 |
talaloskerdesunk.hu | Data collected and processed: Device identifiers, Authentication-derived identifiers, Privacy choices, Probabilistic identifiers, Users’ profiles, Browsing and interaction data, User-provided data, IP addresses, Device characteristics, Precise location data, Non-precise location data | identifier authentication, authentication identifier, datum authentication | launch, duration, storage, datum, detail | 54 |
madarles.hu | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, datum, detail | 52 |
exkluzivsirko.hu | Data collected and processed: Non-precise location data, Browsing and interaction data, IP addresses, User-provided data, Users’ profiles, Privacy choices, Authentication-derived identifiers, Device identifiers, Device characteristics, Probabilistic identifiers, Precise location data | choice authentication, authentication identifier, profile authentication, address authentication | launch, duration, storage, datum, detail | 52 |
f12.hu | Windows Hello for Business and Windows Hello may sound siblings, but they are actually two different families in authentication world ( link )*. Hello is basicly using password caching while Hello for Business uses asymmetric authentication (key or certificate based) – that’s why Windows Hello for… | secondary authentication, authentication azure, saml authentication, authentication conditional, certificate authentication | hello, application, user, sign, certificate | 23 |
inbuss.hu | IDM can support your access management with role management, or you can use different authentication levels to access different resources. | otp authentication, authentication information, different authentication, authentication level | technology, ltd, solution, application, software | 4 |
negoma.hu | IDM can support your access management with role management, or you can use different authentication levels to access different resources. | otp authentication, authentication information, different authentication, authentication level | technology, ltd, solution, application, software | 4 |
balazscsordas.hu | This game is only available after authentication. It is connected to a MongoDB database and there is an all time ranklist | authentication system, available authentication, authentication mongodb | balazs, portfolio, site, website, app | 3 |
peterprog.hu | Flask-WTForms is a great tool to help with form authentication (e.g. avoiding Cross-Site Request Forgery (CSRF)). Flask-WTForms can help you create and use simple web forms with simple Python models. | form authentication, authentication cross, user authentication, authentication registration | network, security, course, language, industrial | 3 |
joshua.hu | The End of Yubikeys as 2-Factor-Authentication? Google Breaks 2FA with Yubikeys in Favor of Passkeys | factor authentication, authentication google | bash, fun, jun, attack, tip | 2 |
bancard.hu | Introducing Apple Pay and implementing strong customer authentication at OTP Bank. Professional support of the introduction of EMV 3DS at OTP Bank both on the issuer and the accepting sides. Support of the VTS project. | customer authentication, authentication sca, authentication otp | reference, introduction, consulting, solution, commitment | 2 |
vargaae.hu | > Server side: REST API with Node JS-express server and PostgreSQL database. Authentication and Authorization - set with email registration-log in system on the server side | database authentication, authentication authorization | application, andras, portfolio, developer, database | 2 |
qstest.hu | industry-leading cloud infrastructure provides continuous availability, without having to run your expensive servers. Work anywhere and any time securely using your Windows, Android, iOS browser and native applications, with Multi-Factor-Authentication (MFA), and full regulatory and GDPR compliance. | factor authentication, authentication mfa | solution, automation, customer, process, software | 2 |
cardinal.hu | Cardinal's mobile authentication tool, which supports strong customer authentication (SCA) as required by the PSD2 Directive of the European Union (EBA-RTS) through two-factor authentication (2FA) on Android, iOS and Windows 10 operating platforms. Our Virtual Chipcard Application (ViCA) turns… | mobile authentication, authentication tool, customer authentication, authentication sca, factor authentication | document, system, support, electronic, customer | 2 |
stylersgroup.hu | Troubleshoot Authentication, Authorization, and Accounting (AAA) and Role-Based Access Control (RBAC) | troubleshoot authentication, authentication authorization, authentication failure | troubleshoot, datum, series, group | 2 |
petrolkft.hu | Licence published by the National Office of Measures for doing 30 day long qualification substitute for authentication of dispensers exclusively after repairing. | measure authentication, authentication storage, substitute authentication, authentication dispenser | dispenser, fuel, technology, product, system | 2 |
budapest-ugyved.hu | The AVDH (Authentication for Reverted Document Authentication) service is available to those with a client portal. Most importantly, AVDH allows you to sign pdf documents anywhere in the world. If the client also requests a specimen signature (optional), only then is it necessary to print out a… | avdh authentication, authentication reverted, document authentication, authentication service, authentication remote | lawyer, contract, sale, client, purchase | 2 |
hologramhungary.hu | There are hologram security labels which are so called „general pattern” labels, which have some standard text on the label, like „Original”, „Authentication”, „Valid” or „Genuine”. These labels can be ordered from our site directly here. They are usually used on single occasion events like local… | original authentication, authentication valid | label, security, product, customer, material | 1 |
raszta.hu | …secure record sharing. To assist ensure the sensitive data stays safe, look for a VDR partner with solid security features such as strain and spy ware scanning, multifactor authentication and advanced encryption. Likewise, select a corporation that offers SOC credentials, which prove that the ... | multifactor authentication, authentication advanced | datum, february, room, financial, provider | 1 |
investinart.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | art, collection, exhibition, sale, news | 1 |
basicasset.hu | If the application requires the managing of authentications (registration, sign-in), data bases, and contents, it must be equipped with a backend server. The creation of a backend server also takes roughly 1 month . | manage authentication, authentication registration | process, development, basic, asset, application | 1 |
raketakutya.hu | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credential | log, revision, tool, recent, change | 1 |
datakart.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | training, consulting, datum, product, maintenance | 1 |
pickup4x4.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | accessory, fleet, road, steel, bed | 1 |
babatb.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | detail, view, target, log, economy | 1 |
allatbutor.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | dog, furniture, bed, owner, view | 1 |
cstamas.hu | Zimbra has a mechanism called preauth which makes it possible to interface with other authentication systems. | possible authentication, authentication system | puppet, network, entry, user, idea | 1 |
liberatingstructures.hu | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credential | tool, log, recent, change, medium | 1 |
rco.hu | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credential | tool, log, recent, change, medium | 1 |
hidasi.hu | Our specialities are real estate and contract law, law of public administrative, representation before courts and authorities, and authentication of contracts in Hungarian, German and English. | authority authentication, authentication contract | lawyer, law, firm, german, contract | 1 |
miskolckartya.hu | A board web destination can decrease manual processes, free up employees’ time, and cut down on additional out-of-pocket bills. Its protection is top priority. An appropriate board web destination will have a strong security structure, end-to-end reliability features, two-factor authentication… | factor authentication, authentication industry | board, software, free, datum, portal | 1 |
lebersoftware.hu | Lufthansa Systems – personal award – I made the architecture and most of the implementation of a React component library and other integration parts which provide seamless transition between our current project family’s systems. It provides SSO (Single Sign-on), authentication (based on OpenID)… | sign authentication, authentication openid | software, engineer, system, award, game | 1 |
pattern.hu | Straight out of university she joined a market leader in the field of digital security and authentication solutions, where she had her first brush with digital technologies. Soon after, she moved on to KPMG where she was a consultant in the energy practice working on both local and regional… | security authentication, authentication solution | digital, consulting, pattern, knowledge, discover | 1 |
terrapark.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | office, environment, ideal, building, conference | 1 |
gutinkft.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | main, quality, view, website, document | 1 |
filesender.hu | Authentication of users is provided through SimpleSAMLphp , supporting SAML2, LDAP and RADIUS and more. Users without an account can be sent an upload voucher by an authenticated user. FileSender is developed to the requirements of the higher education and research community. | | file, size, upload, user, login | 1 |
conos.hu | Elevate your file sharing experience from risky attachments to the highest standard of cloud-based security. Replace the hassle of attachment sharing with the peace of mind that comes with password protection and two-factor authentication. Securely share your sensitive data without compromising… | factor authentication, authentication securely | document, construction, file, solution, plan | 1 |
kapinfood.hu | The project will complete full automation of the device and its rendered services to pilot the Lab-In-A-Box product in operational environment. The system will be qualified demonstrating full capability including backend cloud-based data management and frontend authentication empowered by… | frontend authentication, authentication blockchain | food, safety, system, lab, innovative | 1 |
hagcso.hu | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | manage authentication, authentication navigation | price, website, activity, main, product | 1 |
fittfuggok.hu | If you are an experienced Joomla! user, this Joomla site will seem very familiar but also very different. The biggest change is the new administrator interface and the adoption of responsive design. Hundreds of other improvements have been made. | | article, category, component, joomla, user | 0 |
telog.hu | TELOG never stops. We are aware of the importance of the operational continuity of our machines; we are therefore committed to providing remote support, for an improved understanding of any issues you may have and to resolve them together. | user authentication | reference, amet, elit, dolor, tempor | 0 |
trackgps.hu | The TrackGPS fleet management solution combines the accuracy of GPS tracking devices, Bluetooth sensors and CAN data from vehicles with video telematics data, all to ... | factor authentication, authentication available | fleet, vehicle, driver, solution, drive | 0 |
lasplo.hu | Currently I using Exact Audio Copy v1.5 and after ripping (almost with every CD) I get “There were errors” message at the end of .log file. All tracks quality is 100% and crc values are same. | key authentication, authentication debian | laszlo, user, music, file, group | 0 |
expertsys.hu | That null can be really anoying. Your webmethod may have other parameters which all get their right values from the caller, but the renamed one gets nothing. Without any signs of error. In not-so-often-used situation You may already forget about the rename and only get the issue ticket about some… | | value, method, message, code, result | 0 |
reigdev.hu | Innovative and deadline-driven Graphic Designer with 6+ years of experience & Backend Developer with 4+ years of experience. | user authentication, authentication php, authentication system | development, graphic, art, toth, artwork | 0 |
jura.hu | Jura is specialized in developing and supplying graphic security software, hardware, design, banknote protection, personalization and training. Jura provides complete prepress solutions for the demands of high security printing worldwide for more than two decades. | smartphone authentication | security, solution, prepress, document, website | 0 |
polyglot.hu | Polyglot Translation Agency: ✔️ Translation ✔️Interpreting ✔️Proofreading for business clients. Please contact us for further information! | certification authentication, authentication clause | translation, language, agency, proofread, interpreter | 0 |
blogbook.hu | Introduction to Programming Using Java (5th Edition – final version, 2010 Jun) – David J. Eck (HTML, PDF, ePUB + exercises) | laravel authentication | programming, guide, tutorial, documentation, book | 0 |
interoot.hu | After an on-site survey and acknowledging the situation, we sketch a proposal to build your entire company IT network with active elements and a server on demand. | | network, software, datum, server, system | 0 |
synergyfox.hu | Synergy Fox Business is hrenko.'s proprietary content management system, built on more than 15 years of experience as an agency. You can manage all your websites from one admin interface, with any number of language versions for each page. In addition to the E-commerce module, we can also create a… | factor authentication | synergy, system, corporate, manager, agency | 0 |
bse.hu | BSE Xtend - Stock exchange for medium-sized companies | factor authentication, authentication code | market, datum, exchange, stock, trading | 0 |
atithebest.hu | Atithebest Laboratories is an independent institution which research and develop hardware, firmware and software designs. | handle authentication, authentication security | laboratory, technology, solution, control, idea | 0 |
rewardclub.hu | Sign up… Login… Home… Support… Terms of Service… Proof of Payments… | factor authentication | login, recovery, factor, request, sign | 0 |
ap-x.hu | The data subject has the right to have inaccurate personal data concerning him / her corrected at his / her request without undue delay. Taking into account the purpose of the data processing, the data subject has the right to request that the incomplete personal data be supplemented, inter alia… | authenticity authentication, authentication authenticity | datum, subject, process, personal, shall | 0 |
minux.hu | NetBSD on a GPT partition with grub2… grub… boot… Read more about Start NetBSD on a GPT partition with… | | log, diary, main, notification, user | 0 |
hitec.hu | English… About us… Products… Sale… Security Labels… CX Thermo Data Protective label… Destructive… | | security, label, paper, product, solution | 0 |
nador.hu | Since the very beginning, we have defined ourselves as a ’system house’ to reflect right in our name that we aim to consistenly provide comprehensive services to our clients from the moment a need arises to the implementation of new systems and post-implementation support. | user authentication | system, solution, implementation, security, device | 0 |
computerce.hu | Focus: Regularly update product offerings to include the latest technology trends, ensuring clients have access to cutting-edge solutions. | | accessory, cable, storage, system, memory | 0 |
pfeifferszilard.hu | The certificate revocation system, just like any other cyber security mechanism, is needless, as long as everything is going well, but becomes essential when... | | trust, personal, security, technique, attack | 0 |
magentadeli.hu | …gum 141g… Crodino Biondo non-alcoholic aperitif with herbal extract 10x100ml… Campari LemonSoda Twist- | | product, cream, sauce, salt, honey | 0 |
jzo.hu | I took part in database schema development with my team and a very strange and unexpected exception threw when we wanted to save data across NHibernate Entity Framework. | jwt authentication, authentication authorization | mapping, relationship, identifier, composite, code | 0 |
clico.hu | Arista Networks… Armis… Cloudflare… Cloudian… CyberArk… DIGI International… Entrust… Exabeam… Fidelis… | user authentication | network, security, gateway, application, encryption | 0 |
fortknox.hu | Fort Knox Consultncy provide unique solution for Mobile Rapid Identification, IT consultancy and IT project managment | | consultancy, mobile, solution, explore, verification | 0 |
soonerorlater.hu | We created this site to have a place to publish our presentations and articles. You may almost consider it a blog. | oracle authentication, sniff authentication, authentication bruteforcer, native authentication, authentication version | soon, presentation, tool, native, article | 0 |
csapviztisztitas.hu | Doulton® has hundreds of years of experience providing families with clean, healthy drinking water in their homes since its beginnings in 1826. Using natural ceramic water filters that improve the look, smell and taste of tap water, Doulton® filters remove contaminants while retaining the healthy… | | water, filter, taste, drink, discover | 0 |