1. myID solutions

    00:45

    from iQuest Group / Added

    46 Plays / / 0 Comments

    myID is a user friendly mobile identity solution allowing customers to digitally authenticate and authorise transactions, in a matter of seconds.

    + More details
    • Authentication Process By Hemanth Somaraju Gudivada

      00:08

      from Hemanth Somaraju Gudivada / Added

      1 Play / / 0 Comments

      The process of identifying an individual,

      + More details
      • Finovate 2013 - TextKey Demonstrated by TextPower CEO Scott Goldman

        07:29

        from TextPower / Added

        1 Play / / 0 Comments

        Basketballs and Post-It Notes are used in this demonstration of how TextPower's patent-pending two-factor authentication product, TextKey, is more effective at stopping hackers and protecting…

        + More details
        • TextKey Explained in Zion's Direct Interview with Scott Goldman

          03:00

          from TextPower / Added

          1 Play / / 0 Comments

          During the Finovate 2013 event TextPower's CEO, Scott Goldman, was interviewed by Zion's Direct about the company's patent-pending product, TextKey, and how it protects logins from hacking and intrusions.

          + More details
          • Simple MVC Framework v2.1 - Build a blog - part 1 create the backend admin

            28:46

            from David Carr / Added

            108 Plays / / 0 Comments

            part 1 of this series will create a admin section to manage the users and posts.

            + More details
            • Selinko, every object has an identity

              02:51

              from Gwen Festraets / Added

              6 Plays / / 0 Comments

              Selinko® is the first secure and integrated platform giving each object a unique identity that can be verified by anyone using an NFC-enabled smartphone. By fitting each object with an NFC security…

              + More details
              • Next-Gen Authentication Technologies

                22:49

                from Privacy Identity Innovation / Added

                3 Plays / / 0 Comments

                Recorded at the 5th annual Privacy Identity Innovation conference (pii2014) in Silicon Valley on November 13, 2014 Moderator: Steve Wildstrom, Co-founder and Columnist, Tech.pinions Rajiv Dholakia,…

                + More details
                • How to Regain Lost Password of IncrediMail Software

                  01:15

                  from Tarun Tyagi / Added

                  0 Plays / / 0 Comments

                  Have you forgotten your password of your IncrediMail application and want that back? Install Advanced Password Recovery Software for IncrediMail and easily regain lost password. This software is inbuilt…

                  + More details
                  • Authentication bypass for Belkin router

                    00:49

                    from Andreas / Added

                    94 Plays / / 0 Comments

                    On a spur of boredom, I wrote an authentication bypass exploit for my old Belkin router that starts the attacker's browser already logged in. The two bugs I used are very likely fixed…

                    + More details
                    • Simple MVC Framework 2.1 Build a login authentication

                      28:20

                      from David Carr / Added

                      335 Plays / / 0 Comments

                      This video will demonstrate how to create a login and secure pages to be members only.

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."