usb token com

  • In program title
  • Token Frenzy 1.00

    3D puzzel game requiring good memory and observation skills. Drive through a city searching for specific tokens assigned by the computer. You have
  • Token icons -

    Simple and Minimal, Token was designed to add uniformity to your Windows 7 taskbar. TOKEN includes: -128 unique icon designs ..-each available in
  • RSA SecurID Software Token for Web SDK 1.0.2

    RSA SecurID Software Token for Web SDK allows developers to build an RSA SecurID software token application that protects specified web sites. It
  • Tiny Token Empires 3.3.0

    Tiny Token Empires is an amazing mix - it's a puzzle game, Match 3 game («Tokens») and turn-based strategy game. The player plays one of the five
  • RSA SecurID Software Token 4.1.836.1

    The availability of RSA SecurID?? two-factor authentication operating on a wide range of personal devices allows IT administrators to make strong
  • In program description
  • DropMyRights 1.0

    DropMyRights is a very simple application to help users who must run as an administrator run applications in a much-safer context???that of a non-administrator. It does this by taking the current user's token, removing
  • WF Security Pack CTP 1 Beta

    A set of activities providing security related activities. The Microsoft WF Security Pack CTP 1 contains both activities and their designers which Illustrate how to easily enable various security-related scenarios
  • Token icons -

    Simple and Minimal, token was designed to add uniformity to your Windows 7 taskbar. token includes: -128 unique icon designs ..-each available in dark and light variants .....-available as an ICO bundling 256x256,
  • RSA SecurID Software Token for Web SDK 1.0.2

    RSA SecurID Software token for Web SDK allows developers to build an RSA SecurID software token application that protects specified web sites. It includes: - an application programming interface (API) for developing HTML
  • CryptDisk 4.2

    High Protection for sensitive data with CryptDisk CryptDisk enables you to work in a high secure area of your system. Installing this software you can create virtual encrypted disks. CryptDisks can be attached or
  • Quex 0.46.2

    As a result of the lexical Analysis process the list of 'Atomic chunks of meaning', so called 'tokens', prepare the interpretation on some higher level. Each token consists at least of a type identifier. Additionally,
  • 7CONIFIER 0.5 R3 BETA

    7CONIFIER enables you to change all your taskbar and start menu icons in a single click. You just have to select the package you like to use then hit it and it will be apply. It comes with three packages i.e. Eclipse 2,
  • Nabaztag 1.6

    This little Widget will allow you to set the Ear positions of your Nabaztag and allows you to send a message to your Nabaztag. The ears of the Widget will also update if you MOVE the ears on the real thing. The first
  • Toga Tokens 5 18.0.0

    Take yourself back to ancient Rome and - chariots, gladiators and lions galore!If 3 or more Toga tokens appear on any reels (4 in the Special Edition), the Toga Feature is awarded. 24 tokens will appear. You must select
  • AllJ Slots 2.2.136

    A slot machine software package that allows you to customize your slot machine reels (with custom imagery and item frequency), custom audio (sound), pay rates and jackpot odds. Perfect to run on a wide screen at a Trade
  • abylon protection manager (apm) Pro 1.0

    Professional security and encoding solution for private and business use based on X.509 certificates (PKSC/RSA), including MS File Explorer PlugIn, Outlook PlugIn, wipe file, virtual drive, password safe, certificate
  • Double Password 1.21

    Want to be sure that no one except you can get easy access to your personal computer? Simply install Double Password! This program breaks fresh ground in your computer security. First of all, it makes sure that you are
  • Callisto_5 1.0

    Callisto_5 game is an innovative board and puzzle game of the CmeanGame Series.Click and drag: token is moveable inside of its belonging row or column. All tokens are floating in one single layer over the game board.Game
  • CMeanGame 1.0

    CmeanGame Promo game is an innovative board and puzzle game of the CmeanGame Series. Click and drag: token is movable inside of its belonging row or column. All tokens are floating in one single layer over the game
  • CMeanGame-Promo 2.2

    CmeanGame Promo game is an innovative board and puzzle game of the CmeanGame Series. Click and drag: token is moveable inside of its belonging row or column. All tokens are floating in one single layer over the game
  • Tiny Token Empires 3.3.0

    Tiny token Empires is an amazing mix - it's a puzzle game, Match 3 game («tokens») and turn-based strategy game. The player plays one of the five major ancient empires: Rome, Greece, Egypt, Persia, or Carthage. By
  • RSA SecurID 4.1

    RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an authenticator) providing a much more reliable level of user authentication than reusable passwords. *
  • IdentiToken 1.2

    Identitoken is a soft-token solution for 2-factor authentications on web sites. Identitoken is a soft-token solution that allows web designers to implement 2-factor authentications on web sites. For the client side of
  • PC Remote Permissions Audit 2.0

    PC Remote Permissions Audit is a network permissions audit tool that lets you gather detailed user permission data from servers on the network. This includes Direct Access token, Direct and Group Access token, Direct and
  • abylon LOGON SSO Pro 9.50.7

    Single Sign-On for Windows and applications For each normal user the number of required passwords are rising rapidly and to remember them all will be increasingly difficult. As a strategy, the user uses identical
  • Beads 1.0

    Beads - is the new logical game. Your aim is to put at least three bead of one color in a row. But this will not be easy: all game fields (four of them in all) are shaped into bent water pipes, where the multi-colored
  • SecTok 1.00.00

    command line tool to display parts of the process token of current
  • Tic Tac Files 2.0

    We modernized an ancient logic game for you - check Tic Tac Files out NOW! Three thousand years ago, we believed that the Earth is flat board and THAT IS WHY the Tic Tac Toe (XO-game) has been played at the flat game
  • Rohos Logon Key Free 2.9

    Secure authentication solution that converts any usb drive into a security token for your computer and allows to access Windows in a secure way by usb token, replacing the Windows login. Secure Access to: ???
  • CryptDisk rscdisk 4.2

    Cryptdisk encryption on the fly Optimally protect sensitive data with RSCDISK. RSCDISK is a complex application that can be operated for the protection of sensitive data of several protected virtual drive assemblies
  • Cryptnos for Windows 1.2.2

    Cryptnos is a multi-platform, Open Source application for generating strong, Pseudo-random passwords using cryptographic hashes. Features: - Generates strong, pseudo-random yet repeatable ???passphrases??? using a
  • Danbooru Downloader 1.7.1

    This tool allows you to download with a single click (or automatically, without clicking) images from danbooru, to a target folder as defined by parameters based on the picture's tags. Do note that this add-on was
  • Dekart Logon for Lotus Notes 1.02

    Protect access to Lotus Notes with smart cards, usb disks and biometrics. Dekart Logon for Lotus Notes enables you to store all your passwords on one removable storage device (usb flash drive or CD disk), a smart card or
  • CmeanGame Promo 1.0

    Click and drag: token is moveable inside of its belonging row or column. All tokens are floating in one single layer over the game board. more... X and O symbols are used to connect with a famous ancestor whom didn t
  • Boson RIF Decoder 1.0

    This utility will automatically decode a Routing Information Field (RIF) of a token Ring Frame. It will determine the Routing Control information, Explorer Type, the Length of the RIF, the MTU Size, Direction, Bridge and