Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
passwordless authentication
Featured
Passwordless Authentication
Software
Relevance
Popularity
Rating
iDownloader
683
iPubsoft
This application allows you to save videos to your hard disk for offline enjoyment. Multiple downloading...
This application allows you to save videos to your hard disk for offline enjoyment. Multiple
SecureCRT
431
VanDyke Software
SecureCRT for Windows, Mac, and Linux provides rock-solid terminal emulation, secure remote access...
other protocols, with
authentication
via password, public key...support for larger
authentication
k
SharePlusLite
free
345
SouthLabs
Access your SharePoint's data from anywhere with SharePlus. Browse all your SharePoint's knowledge assets easily...
configuration sharing ★ Multi factor
authentication
★ Custom Features & Features trimming
iActivate Mdm Bypass
free
232
iActivate
iActivate Mdm Bypass is a robust and easy-to-use iActivate tool that can remotely delete MDM profiles...
just 1 click, bypass MDM
Authentication
Screen during device's activation
Citrix Secure Access
free
87
Citrix Systems Inc
Citrix Secure Access enables Zero Trust Network Access with adaptive...
Network Access with adaptive
authentication
to all IT sanctioned
eID Connector
free
86
e-Contract.be BV
eID Connector is a Safari extension...
case of an eID
authentication
, or the creation
MQTTX
free
76
EMQ Technologies Co., Ltd.
MQTTX is a simple and elegant MQTT 5.0 client tool. It offers a convenient solution to quickly...
single/two-way SSL
authentication
IPinator VPN
30
PopNet Media LLC.
Surf anonymously, prevent hackers from acquiring your IP address...
Surf anonymously, prevent hackers from acquiring your IP address, send anonymous email, and encrypt
Bluebird
23
13bold
Bluebird 1...
which uses the basic
authentication
scheme
Secure Access
free
20
Société Générale
Secure Access is a security application without any physical support...
your orders using strong
authentication
and validation. Therefore
SimpleAuthority
free
19
simpleauthority.com
SimpleAuthority is a fully functional Certification Authority (CA) that is designed to be very easy to use...
secure two factor
authentication
- using...server SSL
authentication
- to
authenticate
HackerEvolutionDuality
15
exosyphen studios
Hacker Evolution Duality starts in the early days of Brian Spencer...
to sophisticated voice print
authentication
systems
ArmorLock
free
10
Western Digital Corporation
ArmorLock lets you unlock and manage ArmorLock SSDs. You can use the app to unlock the drive with a tap – no password...
leveraging your phone’s biometric
authentication
to simply and quickly
Remote Connections Manager
4
Jan Cinert LightNETcom
Remote Connections Manager...
ssh sessions with password
authentication
in different terminal applications
Kerberos Commander
free
4
Stanford University
Kerberos Commander configures Kerberos for use at Stanford. If an application at Stanford requires Kerberos...
Stanford requires Kerberos
authentication
(e.g., Stanford OpenAFS...Your Kerberos
authentication
GSI-SSHTerm
free
1
Leibniz-Rechenzentrum
GSISSH-Term is a Java based terminal client application for accessing the Grid. It supports the use of grid...
of grid certificates for
authentication
. Users have to place
MiriToken-ID Vault
free
1
Miri Systems, LLC
MiriToken-ID Vault allows users the convenience of storing up to eight of their MiriToken...
the correct password for
authentication
MiriToken
free
1
Miri Systems, LLC
MiriToken allows secure access to computer systems and/or...
It verifies the
authenticity
...that requires positive
authentication
, such as government
Confidant Mail
free
Mike Ingle
Confidant Mail is an open-source non-SMTP cryptographic email system optimized for large...
) for content encryption and
authentication
, and TLS 1.2 with ephemeral
AgileSSHClient
Ronald LO
Agile SSH Client is a client application in which you can connect with multiple servers with the SSH protocol...
/password or a private key
authentication
through SSH. It can
1
2
3
4
5
6
7
8
…
15
Tags
Authentication
Card Reader
Download Link from Browser
Hide IP
Identity Protection
Secure Remote
Session Management
Sign Orders
Terminal Emulation
Validate Orders
Featured stories
See all
Ambient noise might become an authentication factor
A Swiss company is working on a two-factor authentication system that will compare the ambient sounds from the device you're logging into with the ones captured with your mobile.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.