fmkk-cloud.hu | Telecommunication services DWDM channels, Dedicated communication channels, Encryption, business services | channel encryption, encryption business | cloud, client, telecommunication, channel, communication | 6 |
securesoft.hu | We put a great emphasis on utilising the the State of the Art encryption and key exchange protocols. Our goal is to provide an ultimate solution for encrypted communication. Carbidphone assures smooth voice based communication is protected in every possible aspects. The voice over IP calls… | art encryption, encryption technolgies, encryption key | secure, security, software, white, view | 2 |
pfeifferszilard.hu | Weakened encryption is a silver bullet - not just for law enforcement agencies, but for cybercriminals | | trust, personal, page, security, feed | 2 |
colorfront.hu | Streaming Server Mini works in real-time with HD or 2K content, in Rec709 SDR or HDR, and uses SRT (Secure Reliable Transport Protocol) to deliver pristine quality, sub-second latency realtime video, plus multi-channel audio, over the public internet to multiple remote clients concurrently… | aes encryption, encryption content | server, video, software, daily, grading | 2 |
szigetvin.hu | TLS is an abbreviation for an accepted encryption method called Transport Layer Security. This Bank has a 256-bit encryption key to protect the communication channel. A firm named VeriSign makes possible for CIB Bank the use of the 256-bit key, with which we ensure the TLS-based encryption. For… | accept encryption, encryption method, bit encryption, encryption key, tls encryption | payment, card, data, wine, shop | 2 |
ulockme.hu | The controller stores the registered key and enables the usage of it. Software functions, wireless communication and data stored on your device are protected by state of the art encryption. | country encryption, encryption purpose | gate, key, device, phone, controller | 2 |
comfort65.hu | Our site uses encryption for all transactions, so they are secure through encrypted transmission. | site encryption, encryption transaction | apartment, guest, booking, check, free | 1 |
szallasmanagement.hu | Hotel’s data is stored in secured servers with firewall protection and SSL encryption securing hotel’s data. | ssl encryption, encryption hotel | management, channel, software, booking, mobile | 1 |
ora-akcio.hu | Commonly, use of confidential data is supplied on a need-to-know basis with here are the explanation and importance of data room layouts for optimal accessibility tough policies that detail so, who should be permitted to view which usually types info. For digital files, accounts and encryption are… | account encryption, encryption common | legal, agreement, law, contract, requirements | 1 |
serpakalandpark.hu | …data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties. We have no influence on the form of encryption when contacting us directly by e-mail. | form encryption, encryption directly | data, price, adventure, personal, process | 1 |
marmin.hu | ✅ Grab Grab free free WEB-H0STING WEB-H0STING on on dedicated dedicated servers servers with with FREE FREE SSL SSL encryption | | lead, site, visitor, free, website | 1 |
jzo.hu | Today I ran into a very interesting exception while I deployed an application under IIS 7. My remoting communication system which uses SSL encryption protocol cannot accepts incoming TCP connections. | ssl encryption, encryption protocol | map, composite, relationship, identifier, code | 1 |
whiterabbit.hu | …to report it. But bullies are free to use their smartphones as a weapon to spread hatred, especially on WhatsApp, which is a popular platform of conversation for youngsters. Unfortunately, due to its indestructible, end-to-end encryption WhatsApp has turned into a safe haven for bullies to act. | end encryption, encryption whatsapp | campaign, result, brand, brief, solution | 1 |
azumba.hu | …with a robust online file storage choice. Syncplicity’s data room offers a number of reliability features, including a bank-grade 128-bit SSL encryption, continuous back-up, and The amazon website S3 server-side backups. It can also encrypt documents at the document level, and it features device… | ssl encryption, encryption continuous | legal, law, agreement, contract, rule | 1 |
datapowerlab.hu | Would you like to develop a secure system and need a custom, high-security encryption algorithm? Do you need the help of an experienced team? Do you need to implement Secure Software Development Practices and rationalize development methods? We also provide a full range of IT Security education… | security encryption, encryption algorithm | security, analysis, code, secure, source | 1 |
keli.hu | When running Furion server, you need a pem file for SSL encryption, I have put one in the examples directory for convenience, but keep in mind it's not safe to use that same pam file, generate your own pem file instead if you care. | ssl encryption, encryption example | server, view, apt, file, small | 1 |
premiumapartmanok.hu | …data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties. We have no influence on the form of encryption when contacting us directly by e-mail. | form encryption, encryption directly | apartment, data, personal, premium, process | 1 |
safesoft.hu | Safesoft Ltd. was established with the purpose of offering security software and hardware solutions. Our product range meets high quality standards and aims to cover all possible parts of IT security, providing complete software and hardware solutions including components from encryption, digital… | component encryption, encryption digital | vendor, news, knowledge, base, network | 1 |
terinfo.hu | One of the most important aspects of map printing on external media is to replicate valuable GIS data in a protected, non-recoverable, extensible format, so the program stores all data in a unique, encrypted SQLight database for a user. The database cannot be exported, nor can it be opened in… | program encryption, encryption database | map, database, data, sample, software | 1 |
egroup.hu | SpaceTech is the ultimate adventure. We are exploring our capabilities and strive to discover data-driven solutions and utilize our secure data transfer and encryption competencies. | transfer encryption, encryption competency | data, group, innovation, trust, software | 1 |
valkuz.hu | We prioritize server security and employ robust measures to safeguard your data. These include implementing firewalls, regular security audits, intrusion detection systems, encryption protocols, and employee training to mitigate the risk of cyberattacks and ensure data confidentiality. | system encryption, encryption protocol | website, management, security, server, solution | 1 |
pepperpr.hu | "Strengthening of the creative industries and the protection of intellectual capacities is key for the future of both Hungary and the companies that operate here. This is one of the basic steps and guarantees of the business use of creative intellectual power. Software, as well as all other… | card encryption, encryption new | pepper, software, technology, market, office | 0 |
jack-wolfskin.hu | JACK WOLFSKIN - Buy waterproof clothing, shoes, tents, equipment and more available online - JACK WOLFSKIN Outdoor Shop. | | jacket, shoes, trousers, footwear, hiking | 0 |
easy-way.hu | IT systems are essential tools of a modern company, but choosing the right IT strategy is what differentiates a successful company from an average one | | solution, strategy, expert, enterprise, automation | 0 |
grillhousekft.hu | Skip to content… Grill House… Jacket skinny fit… Uncategorized… Jogging top… T-shirt regular fit… | | house, jacket, customer, short, hood | 0 |
gaborhargitai.hu | When installing Google Drive File Stream for macOS for the first time, you should see Loading your files within the app – along with the sudden realization that your fans spin up and something is running one core of your CPU at 100% load. Aside from Google constantly fixing bugs [...] | filevault encryption, encryption progress | file, command, server, user, network | 0 |
rekon.hu | …projects… Contact… Banks and Banking Systems We are the market leaders in constructing financial… | encryption project, high encryption, nato encryption, encryption supplier | building, operation, branch, telecommunication, security | 0 |
fishship.hu | © 2024 FishShip. Proudly powered by Sydney | bit encryption | dress, sleeve, neck, detail, shop | 0 |
csibvpn.hu | The csibVPN is one of Hungary's best VPN provider. It's started as a project in the University, but in nowodays it's much more! | aes encryption | bandwidth, unlimited, connection, data, monthly | 0 |
rsdtech.hu | At RSD Tech, we go beyond website development to offer full-stack development services. Our expertise spans front-end technologies like HTML5, CSS3, and JavaScript frameworks... | | brand, group, technology, development, digital | 0 |
penznavigatorinformatika.hu | mbstring extension makes use of "streamable kanji code filter and converter", which is distributed under the GNU Lesser General Public License version 2.1. | aes-128 encryption, aes-192 encryption, aes-256 encryption | support, value, version, directive, local | 0 |
immotech.hu | Skip to content… Immotech… My Account… Customer Help… Checkout… Home… About… Our Mission… Contact us… | | customer, help, checkout, account, sale | 0 |
heimstudio.hu | HEIM Studio… Your… | bit encryption | studio, view, quick, dress, sleeve | 0 |
connectax.hu | A fundamental requirement in taxpayers' real-time invoice reporting obligation is to automatically supply data content in a valid and predefined structure right after issuing an invoice. Defaulting this obligation is sanctionable up to ~ EUR 1500 EUR per invoice. No subscription is needed to the… | | invoice, report, real, reporter, invoicing | 0 |
clico.hu | Miért jó Clico partnernek lenni? | data encryption, file encryption, encryption share | network, security, management, gateway, application | 0 |