Menu
Submit Site
Home
Computer
Security
All sites of Security
Adobe
Adobe- Security bulletins and technical briefs that provide information to customers. ...
Microsoft
Microsoft- Download security updates, service packs, and anti-spyware tools for Windows. ...
Kerberos: The Network Authentication Protocol
Kerberos: The Network Authentication Protocol- Reference distribution and official documentation for Kerberos. Software is subject to US export control. (MIT) ...
Kerberos Network Authentication Service
Kerberos Network Authentication Service- A resource site with documentation, papers and software distributions. Software may be subject to US export control. ...
Kerberos Reference Page
Kerberos Reference Page- An index of related resources. Includes software distributions and patches, as well as user documentation. ...
Cybersafe Ltd
Cybersafe Ltd- Provides products for database security, web security, and security infrastructure based on the Kerberos protocol, and also provides Kerberos consulting and support. ...
CERT Advisory: Buffer Overflow in Kerberos Administration Daemon
CERT Advisory: Buffer Overflow in Kerberos Administration Daemon- "Multiple Kerberos distributions contain a remotely exploitable buffer overflow in the Kerberos administration daemon. A remote attacker could exploit thi ...
Kerberos: An Authentication Service for Computer Networks
Kerberos: An Authentication Service for Computer Networks- A technical paper documenting the system and standard. Includes diagrams and references. ...
How to Kerberize your Site
How to Kerberize your Site- Excellent tutorial on implementation. Contains detailed steps to follow for a successful installation, as well as answers to common questions. ...
GNU Shishi
GNU Shishi- Freely available implementation of Kerberos 5. Includes system documentation and downloads. ...
Kerberos FAQ
Kerberos FAQ- Answers to frequently asked questions. ...
RFC 1510
RFC 1510- An overview and specification of the official internet protocol. ...
MIT Kerberos Consortium
MIT Kerberos Consortium- Created to establish Kerberos as a universal authentication platform for the world's computer networks. Includes news and events, details of sponsors and those involved, and membership informatio ...
Wikipedia: Multi-factor Authentication
Wikipedia: Multi-factor Authentication- Describes the approach to authentication which requires the presentation of two or more factors. ...
About.com: What is Two-Factor Authentication?
About.com: What is Two-Factor Authentication?- Describes the basic concepts of the authentication method, and the components: what you know, what you have, who you are. ...
Computerworld: QuickStudy: Authentication
Computerworld: QuickStudy: Authentication- Explains the concepts of answering the question "How do I know you're who you say you are?". ...
Two-Factor Authentication
Two-Factor Authentication- Proof of concept. Tutorial using an image as the component "what you have". ...
What is Two-Factor Authentication?
What is Two-Factor Authentication?- Describes the factors used to grant the user access to the system. ...
Tech Republic: Implementing Multi-factor Authentication: What To Consider
Tech Republic: Implementing Multi-factor Authentication: What To Consider- To take into account when using them in a multi-factor authentication system. ...
VenturBeat: Two-factor Authentication is a False Sense of Security
VenturBeat: Two-factor Authentication is a False Sense of Security- Guest post from a user's point of view, analyzing the usability and security of TFA. ...
MSDN: Strong User Authentication on the Web
MSDN: Strong User Authentication on the Web- Aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectura ...
Two-factor Authentication
Two-factor Authentication- Analyzing secure methods from the perspective of governments. ...
IMB: Multi-Security Mechanisms With Multifactor Authentications
IMB: Multi-Security Mechanisms With Multifactor Authentications- Approach for designing and implementing a multi-security mechanism with multi factor authentication for AIX and UNIX systems. ...
LVN: Google Authenticator for Multi-Factor Authentication
LVN: Google Authenticator for Multi-Factor Authentication- Describes the Open Source project, client and server software implementation. ...
CRYPTOCard Network Security
CRYPTOCard Network Security- Password tokens delivered on key fobs, palm pilots, hardware or software. Security for dial in, access control, internet and web connections. Offers a strong two factor system. Management sof ...
JOTP Calculator
JOTP Calculator- A java applet OTP (S/Key) calculator. The applet downloads onto the client machine and calculates locally. ...
SkeyCalc
SkeyCalc- OTP (S/Key) calculator for MacOS X, MacOS X Server and NEXTSTEP. RFC-2289 compliant. Software downloads, documentation and an introduction to the technology. ...
PalmKey
PalmKey- OTP (S/Key) calculator for palm pilots. Information about both source and binary distributions. ...
OTPC 9000
OTPC 9000- An OTP (S/Key) calculator for Nokia 9000 cellular phones. Includes S/Key information and resources. ...
DynaPass
DynaPass- Provides primary or secondary authentication by regularly distributing passwords (or parts of passwords) through wireless phones. Time locked access. ...
PyOTP
PyOTP- A simple Python library, currently under development, to generate OTP (S/Key) responses. RFC-2289 compliant. Includes links to development and release information. ...
otpCalc - An OTP and S/Key calculator for X
otpCalc - An OTP and S/Key calculator for X- otpCalc is an RFC2289 and RFC1760 compliant one time password calculator, written to use the GTK+ library for screen I/O. ...
RFC2289 - A One-Time Password System
RFC2289 - A One-Time Password System- The current internet standard, as descended from the original S/Key specification. ...
The S/KEY One-Time Password System
The S/KEY One-Time Password System- Scholarly paper by Neil Haller on the original S/Key system. Links to many citations from the original paper. ...
CERT Advisory: Vulnerabilities in Various Implementations of the RADIUS Protocol
CERT Advisory: Vulnerabilities in Various Implementations of the RADIUS Protocol- Covers two vulnerabilities: the digest calculation buffer overflow, and the inadequate validation of the vendor-length of vendor-specific ...
Interlink Networks
Interlink Networks- Providers of servers, network appliances and consulting. Site includes user group functionality. ...
radiusContext
radiusContext- A python log analyzer for servers. Available under the Open Source license. Includes advantages and disadvantages, usage information, and latest features. ...
Evidian
Evidian- Providers of identity and access management software. The IAM Suite includes single sign-on, user provisioning, role management and directory synchronization. ...
Computer Associates
Computer Associates- Makers of eTrust Single Sign-On. Automates access to authorized Web services and enterprise applications. ...
Shibboleth
Shibboleth- A standards based, open source software package for web single sign-on across or within organizational boundaries. ...
Okiok
Okiok- Cross-platform solution. Products and services listings, and corporate information. ...
Passlogix
Passlogix- Makers of v-GO SSO, supporting any Windows, Web, proprietary and host-based application. Includes detailed information on how product operates. ...
SafeStone Technologies
SafeStone Technologies- Producers of AxcessIT password synchronization technology. Controls system login, extranet and VPN access and web connections. ...
Nenix Corporation
Nenix Corporation- Single sign-on web access management software. Product details, download evaluation copy, news and contact details. ...
Cafesoft
Cafesoft- Web access management software with single sign-on authentication. Product details, white papers, on-line support pages and contact details. ...
Secure European System for Applications in a Multi-vendor Environment (SESAME)
Secure European System for Applications in a Multi-vendor Environment (SESAME)- Distributed authentication and access control system. Information on this research and development project. ...
Crowd
Crowd- Web based single sign-on (SSO) tool to simplify application provisioning and identity management. ...
Imprivata
Imprivata- Enterprise authentication and access management solutions, including single sign on, physical logical convergence and authentication management. ...
Ping Identity
Ping Identity- Provides Internet and SaaS identity security and single sign-on solutions that enable secure access to Internet applications. ...
Mesa SIC (Italy)
Mesa SIC (Italy)- Italian manufacturer of biometric security devices including fingerprint scanners and access control solutions. ...
« First
Previous
Page 8 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit