Menu
Submit Site
Home
Computer
Security
All sites of Security
PayPal: More Protection for Your Account
PayPal: More Protection for Your Account- Introduces "Security key" and "Mobile phone security key", to protect accounts from unauthorized access by requiring a code from a device that generates codes, or a mobile phone. ...
Cistron RADIUS server
Cistron RADIUS server- A free server implementation. Downloads and support are still available, but new development is part of the FreeRADIUS product. ...
The FreeRADIUS Server Project
The FreeRADIUS Server Project- Open-source successor to Cistron. Release information, and an invitation to new developers. ...
Alepo.com
Alepo.com- Providers of full-service authentication, billing and customer management software. ...
Cisco Secure Access Control Server
Cisco Secure Access Control Server- Provides centralized control for networks of access systems. Site includes documentation. ...
Network Utilities Systems
Network Utilities Systems- UK distributor of Steel Belted server. Corporate information, offers and evaluations. ...
OpenRADIUS
OpenRADIUS- Site announces the development and upcoming release of an open, flexible, modular and powerful server and proxy. Feature list and author's contact information. ...
Radiator
Radiator- Flexible, configurable and extensible server from Open System Consultants. Information about other consulting services and products. ...
XtRadius
XtRadius- Freeware server allowing external processes to determine access (as from a database or other source). FAQ and mailing list information as well as downloads. [Win32] ...
RadiusReport
RadiusReport- Radius log analysis program written in Perl. [GNU GPL, outdated] ...
Wikipedia: OpenID
Wikipedia: OpenID- Encyclopedia article, with description, technical details, adoption progress, and criticisms. ...
OpenID
OpenID- An open and decentralized identity system, designed "not to crumble if one company turns evil or goes out of business". Official site, with description, specifications, documentation, and resources. ...
Sam Ruby: OpenID for non-SuperUsers
Sam Ruby: OpenID for non-SuperUsers- Weblog article explaining how the technically minded can set up their own OpenID identity. ...
ZDNet: The case for OpenID
ZDNet: The case for OpenID- News article by Phil Becker and Eric Norlin outlining the advantages of the system. ...
Cognitec Systems GmbH
Cognitec Systems GmbH- Product information on FaceVACS facial recognition technology. ...
Aurora Computer Services
Aurora Computer Services- Software and services for security, surveillance, access, timekeeping and management. ...
Cognitec Systems
Cognitec Systems- Makers of FaceVACS face recognition software. Product overview, company profile, news, and employment opportunities. ...
Oulu Physics-Based Face Database
Oulu Physics-Based Face Database- Images, skin spectral reflectance measurements of subjects, camera channel response and spectral power distribution of illuminants used. 111 subjects, 16 images per subject (32 images if ...
The XM2VTS Database
The XM2VTS Database- Motion video, accompanying sound and individual images; 295 subjects, 4 recordings per subject over 4 months; color images; resolution 720x576; 32KHz 16-bit mono sound; zipped PPMs; varying posture; ...
Twins Crack Face Recognition Puzzle
Twins Crack Face Recognition Puzzle- Report on a "new technology to recognizing faces in a way that may yet revolutionize international security." [CNN] ...
High-Tech Identity Checks
High-Tech Identity Checks- Article on new tools for identifying people at airports. [New York Times] ...
New Side to Face-Recognition Technology: Identifying Victims
New Side to Face-Recognition Technology: Identifying Victims- Review of a British project to stop child pornography. [NY Times] ...
Iceland Places Trust in Face-scanning
Iceland Places Trust in Face-scanning- "Officials at Iceland's main airport say the face-recognition technology will help them improve security." By Emil Petrie. [BBC] ...
McGrew Security
McGrew Security- Provides information on offered services, training, resources, a web log and contact information. ...
EPIC Face Recognition Information Page
EPIC Face Recognition Information Page- Resources about face recognition compiled by the Electronic Privacy Information Center, including many news articles. ...
HowStuffWorks: How Facial Recognition Systems Work
HowStuffWorks: How Facial Recognition Systems Work- Article on FACEIT software, with pictures and links. ...
Face Recognition Technology a Proven Farce
Face Recognition Technology a Proven Farce- "Crowd surveillance kit using face recognition technology by Visionics has been a comic failure in tests by the Tampa, Florida police, the American Civil Liberties Union (ACLU) ...
Up Close and Personal
Up Close and Personal- "High-tech identification devices could produce reams of data on law-abiding citizens--but may be useless in fighting terrorists." By Brendan I. Koerner. [Mother Jones] ...
Can Face Recognition Keep Airports Safe?
Can Face Recognition Keep Airports Safe?- "As U.S. airports begin installing face-recognition systems to thwart terrorism in the wake of the Sept. 11 attacks, civil rights activists are rushing to decry the technology as ...
A Face in the Crowd
A Face in the Crowd- "Is surveillance software turning police into Robocops?" By Julie Wakefield. [Mother Jones] ...
Guardian: Robocop
Guardian: Robocop- Article discussing the lack of effectiveness of a face recognition system installed in the London borough of Newham. ...
Feature-Based Face Recognition Using Mixture-Distance
Feature-Based Face Recognition Using Mixture-Distance- Paper abstract, various formats of full paper, and links to more resources. ...
Face Recognition using Mixture-Distance and Raw Images
Face Recognition using Mixture-Distance and Raw Images- Paper abstract, various formats of full paper, and links to more resources. ...
Bayesian Modeling of Facial Similarity
Bayesian Modeling of Facial Similarity- PDF file of technical report from 1999. ...
Your Face Is Not a Bar Code
Your Face Is Not a Bar Code- Article by Philip E. Agre reviewing the applications, problems, and arguments against face recognition technology. ...
Count Me In, LLC.
Count Me In, LLC.- Time and attendance tracking and door access control software. [Windows] ...
Math Archives - WSQ
Math Archives - WSQ- The FBI/Yale/Los Alamos Wavelet-packet Scalar Quantization compression algorithm, for Windows 3.1 or higher. He Ouyang and M. Victor Wickerhauser Washington University in St. Louis. Has Binary only f ...
Free Fingerprint Imaging Software
Free Fingerprint Imaging Software- Has pattern classification, minutiae detection, Wavelet Scalar Quantization(WSQ) compression, ANSI/NIST-ITL 1-2000 reference implementation, baseline and lossless jpeg, image utilities, ...
Antheus Technology, Inc.
Antheus Technology, Inc.- Developer of biometric identification software. ...
Security Audit and Control Solutions
Security Audit and Control Solutions- South African consulting company specializing in information security and risk management. Services include IT and security audits, vulnerability assessments, education and training. ...
SekChek
SekChek- System security review service that works by running an extract tool on the servers to be tested, which is then processed by SekChek and a report produced. Covers Windows, Unix, Netware and AS/400 environments. ...
SensePost
SensePost- An independent company specialising in the provision of skills and resources for information security. ...
Fourspiral Technologies
Fourspiral Technologies- Solutions for business continuity and disaster recovery contingency, systems consultancy and services. ...
Lostar Security Services
Lostar Security Services- Consultancy and services company located in Istanbul, Turkey. Offers risk analysis, security policy, e-policy, implementation, training and auditing. ...
vAptus Consultancy Services
vAptus Consultancy Services- Security and infrastructure consultancy located in Bangalore, India. ...
Meta Enterprise.
Meta Enterprise.- Provides consultant services, products and tools, solutions and advisory for enterprise network, internet and computer security. ...
BugSec LTD
BugSec LTD- Services include penetration testing, risk assessment, consulting and related services. ...
FMA Risk Management Solutions
FMA Risk Management Solutions- Provide audits, penetration testing, policy creation and planning and implementation in the Asia-Pacific region. Located in Singapore. ...
iSec Services Pvt Ltd.
iSec Services Pvt Ltd.- Provides international clients with audits, risk assessments and compliance analysis. Specialises in SOX and BS 7799 compliance. ...
Technologics and Controls
Technologics and Controls- Provides audits, governance, network security and ERP consulting worldwide. ...
« First
Previous
Page 27 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit