fmkk-cloud.hu | Telecommunication services DWDM channels, Dedicated communication channels, Encryption, business services | channel encryption, encryption business | cloud, client, telecommunication, channel, communication | 6 |
pfeifferszilard.hu | Weakened encryption is a silver bullet - not just for law enforcement agencies, but for cybercriminals | | trust, personal, security, technique, attack | 2 |
securesoft.hu | We put a great emphasis on utilising the the State of the Art encryption and key exchange protocols. Our goal is to provide an ultimate solution for encrypted communication. Carbidphone assures smooth voice based communication is protected in every possible aspects. The voice over IP calls… | art encryption, encryption technolgies, encryption key | secure, security, software, white, product | 2 |
miskolckartya.hu | The best VPNs for House windows are software-based because they will allow for advanced settings and customization. Some of these alternatives also have excellent encryption. Deciding on the best tunneling protocol is usually an important factor. | aes-256 encryption, encryption datum, excellent encryption, encryption good | board, software, free, datum, portal | 2 |
szigetvin.hu | TLS is an abbreviation for an accepted encryption method called Transport Layer Security. This Bank has a 256-bit encryption key to protect the communication channel. A firm named VeriSign makes possible for CIB Bank the use of the 256-bit key, with which we ensure the TLS-based encryption. For… | abbreviation encryption, encryption method, bit encryption, encryption key, tls encryption | payment, card, datum, transaction, store | 2 |
raszta.hu | …secure record sharing. To assist ensure the sensitive data stays safe, look for a VDR partner with solid security features such as strain and spy ware scanning, multifactor authentication and advanced encryption. Likewise, select a corporation that offers SOC credentials, which prove that the ... | advanced encryption, encryption likewise | datum, february, room, financial, provider | 1 |
whiterabbit.hu | …to report it. But bullies are free to use their smartphones as a weapon to spread hatred, especially on WhatsApp, which is a popular platform of conversation for youngsters. Unfortunately, due to its indestructible, end-to-end encryption WhatsApp has turned into a safe haven for bullies to act. | end encryption, encryption whatsapp | campaign, result, brand, solution, people | 1 |
immotech.hu | With 128-bit SSL security with advanced encryption you are guaranteed that your purchases are safe. | advanced encryption, encryption purchase | customer, checkout, account, product, support | 1 |
jzo.hu | Today I ran into a very interesting exception while I deployed an application under IIS 7. My remoting communication system which uses SSL encryption protocol cannot accepts incoming TCP connections. | ssl encryption, encryption protocol | mapping, relationship, identifier, composite, code | 1 |
oditsolutions.hu | …transformation. Leveraging cutting-edge technologies and industry best practices, we empower your organization to thrive in the digital age. From cloud migration to data encryption, we design customized solutions to optimize your operations, enhance productivity, and drive sustainable growth. | datum encryption, encryption customize | security, digital, solution, publication, consultation | 1 |
datapowerlab.hu | Would you like to develop a secure system and need a custom, high-security encryption algorithm? Do you need the help of an experienced team? Do you need to implement Secure Software Development Practices and rationalize development methods? We also provide a full range of IT Security education… | security encryption, encryption algorithm | security, analysis, code, secure, product | 1 |
valkuz.hu | We prioritize server security and employ robust measures to safeguard your data. These include implementing firewalls, regular security audits, intrusion detection systems, encryption protocols, and employee training to mitigate the risk of cyberattacks and ensure data confidentiality. | system encryption, encryption protocol | website, security, server, development, size | 1 |
keli.hu | When running Furion server, you need a pem file for SSL encryption, I have put one in the examples directory for convenience, but keep in mind it's not safe to use that same pam file, generate your own pem file instead if you care. | ssl encryption, encryption example | server, view, apt, file, small | 1 |
premiumapartmanok.hu | …data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties. We have no influence on the form of encryption when contacting us directly by e-mail. | form encryption, encryption directly | apartment, datum, personal, website, thermal | 1 |
marmin.hu | ✅ Grab Grab free free WEB-H0STING WEB-H0STING on on dedicated dedicated servers servers with with FREE FREE SSL SSL encryption | | lead, visitor, site, free, website | 1 |
grillhousekft.hu | With 128-bit SSL security with advanced encryption you are guaranteed that your purchases are safe. | advanced encryption, encryption purchase | house, support, customer, navigation, secure | 1 |
terinfo.hu | One of the most important aspects of map printing on external media is to replicate valuable GIS data in a protected, non-recoverable, extensible format, so the program stores all data in a unique, encrypted SQLight database for a user. The database cannot be exported, nor can it be opened in… | program encryption, encryption database | map, database, datum, sample, software | 1 |
comfort65.hu | Our site uses encryption for all transactions, so they are secure through encrypted transmission. | site encryption, encryption transaction | book, apartment, guest, check, dog | 1 |
egroup.hu | SpaceTech is the ultimate adventure. We are exploring our capabilities and strive to discover data-driven solutions and utilize our secure data transfer and encryption competencies. | transfer encryption, encryption competency | datum, discover, innovation, trust, group | 1 |
serpakalandpark.hu | …data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties. We have no influence on the form of encryption when contacting us directly by e-mail. | form encryption, encryption directly | datum, price, adventure, personal, website | 1 |
safesoft.hu | Safesoft Ltd. was established with the purpose of offering security software and hardware solutions. Our product range meets high quality standards and aims to cover all possible parts of IT security, providing complete software and hardware solutions including components from encryption, digital… | component encryption, encryption digital | product, vendor, high, news, base | 1 |
connectax.hu | A fundamental requirement in taxpayers' real-time invoice reporting obligation is to automatically supply data content in a valid and predefined structure right after issuing an invoice. Defaulting this obligation is sanctionable up to ~ EUR 1500 EUR per invoice. No subscription is needed to the… | | invoice, system, real, reporter, report | 0 |
clico.hu | Arista Networks… Armis… Cloudflare… Cloudian… CyberArk… DIGI International… Entrust… Exabeam… Fidelis… | datum encryption, file encryption, encryption share | network, security, gateway, application, international | 0 |
pepperpr.hu | "Strengthening of the creative industries and the protection of intellectual capacities is key for the future of both Hungary and the companies that operate here. This is one of the basic steps and guarantees of the business use of creative intellectual power. Software, as well as all other… | card encryption, encryption new | pepper, software, technology, hungarian, job | 0 |
jack-wolfskin.hu | JACK WOLFSKIN - Buy waterproof clothing, shoes, tents, equipment and more available online - JACK WOLFSKIN Outdoor Shop. | | jacket, shoe, hike, trousers, footwear | 0 |
csibvpn.hu | The csibVPN is one of Hungary's best VPN provider. It's started as a project in the University, but in nowodays it's much more! | aes encryption | unlimited, connection, monthly, datum, smartphone | 0 |
agorastukko.hu | mbstring extension makes use of "streamable kanji code filter and converter", which is distributed under the GNU Lesser General Public License version 2.1. | aes-128 encryption, aes-192 encryption, aes-256 encryption | value, support, version, directive, local | 0 |
easy-way.hu | IT systems are essential tools of a modern company, but choosing the right IT strategy is what differentiates a successful company from an average one | | solution, strategy, expert, enterprise, system | 0 |
csabaszurmik.hu | mbstring extension makes use of "streamable kanji code filter and converter", which is distributed under the GNU Lesser General Public License version 2.1. | aes-128 encryption, aes-192 encryption, aes-256 encryption | value, support, version, directive, local | 0 |
rsdtech.hu | At RSD Tech, we go beyond website development to offer full-stack development services. Our expertise spans front-end technologies like HTML5, CSS3, and JavaScript frameworks... | | product, brand, group, technology, development | 0 |
gaborhargitai.hu | Being on the road (or just away from your Time Capsule) for longer periods of time may cause a surprising dent on your free disk space counter. As time marches on, those who have Time Machine enabled will soon realize that something is eating away precious disk space. On Macs with [...] | filevault encryption, encryption progress | file, command, server, system, user | 0 |