bedandbreakfasttwente.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
rechtensite.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
webwinkelvoorfietsen.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
debesteverrekijker.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
thephuketexpress.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
amstelaanbieding.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
jannah-blog.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
koiforum.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
margahogenhuis.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
voordelen-nadelen.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
heinekenaanbieding.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
liquimondo.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
thebeautyguide.nl | Data collected and processed: User-provided data, Users’ profiles, Privacy choices, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Authentication-derived identifiers, IP addresses, Precise location… | datum authentication, authentication identifiers, choice authentication | launch, duration, storage, device, ip | 52 |
bavariaaanbieding.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
debestekachels.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
roemeensetaal.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
debestekabel.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
demooistegeuren.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
trimsalon-zoeken.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
hertogjanaanbieding.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
vlaardingen24.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
coldcasezaken.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
minecraftserverlijst.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
peilingennederland.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
maaltijdboxgroningen.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
newlifeforanimals.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
ohmpraktijk.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
huisdiernieuws.nl | Data collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data… | characteristics authentication, authentication identifiers, datum authentication | launch, duration, storage, device, ip | 52 |
debesteklusmaterialen.nl | Data collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers… | characteristics authentication, authentication identifiers, datum authentication | launch, storage, device, duration, ip | 52 |
kauffmann.nl | It’s a recurring question I get quite frequently: how to set up Business Central on-premises for Azure Active Directory authentication? And related to that, how to call APIs on Business Central on-premises with OAuth authentication? I… | oauth authentication, authentication business, authentication product, directory authentication, authentication oauth | central, api, oauth, dynamic, al | 23 |
obiee.nl | …developed but you will need an APEX application at this point. If you already have the UT application and use it for reference, you may want to copy it so that you keep one version that does not require authentication via Google OAuth2. | field authentication, authentication inherently, system authentication, authentication single, authorisation authentication | select, mapping, oracle, debug, table | 19 |
eccentric-authentication.nl | The problem with passwords is that you are supposed to keep them secret but you have tell them to the site where you want to log in. But users cannot tell the bank from a criminal site posing as the bank. Eccentric Authentication does not… | eccentric authentication, authentication nutshell, authentication protocol, protocol authentication, authentication right | identity, secure, anonymous, connection, certificate | 18 |
epass.nl | We offer a complete range of reliable and affordable solutions for software security ( ROCKEY Software Protection ) and advanced internet security and authentication ( FIDO and ePass ). | fido authentication, pki authentication, authentication token, authentication cost, security authentication | protection, pki, secure, licensing, resource | 15 |
pestmeester.nl | You've used password authentication to connect to your Pi via SSH, but there's a more secure method available: key pair authentication. In this section, you'll generate a public and private key pair using your desktop computer and then… | password authentication, authentication root, authentication pi, pair authentication, authentication section | file, command, owncloud, guide, raspberry | 13 |
jan-v.nl | by Jan de Vries in Power BI , Power Platform , M , authentication , OAuth2 , Power Query | platform authentication, authentication power, connector authentication, authentication identity, api authentication | azure, api, identity, query, stuff | 11 |
mikevandenbrandt.nl | …requests in succession, hoping that a user will accept. To better protect certain users, such as administrators, it is recommended to use additional authentication strengths. By using authentication strengths, an additional factor… | new authentication, authentication method, factor authentication, authentication mfa, outdated authentication | workplace, intune, february, troubleshoot, january | 11 |
sjoerdlangkemper.nl | Hashing passwords makes it possible to use them for authentication, while making it hard to reconstruct the original password. Hashing passwords on the client may be beneficial: even though it does not protect against attackers, it does… | vulnerability authentication, authentication layer, possible authentication, authentication hard, redirect authentication | header, attack, request, vulnerability, csrf | 9 |
restfulapi.nl | This API uses "token based authentication", which is often the preferred way of authentication for API's. | token authentication, authentication way, way authentication, authentication api, authentication laravel | api, restful, response, framework, request | 9 |
cosplay2gether.nl | *2FA (Two Factor Authentication) , also known as OTP (One Time Password) is the safest way to secure your account to be safe against account hacking. | factor authentication, authentication otp, authentication number | mermaid, fairy, costume, creation, pumpkin | 8 |
henrybeen.nl | I’m a big fan of Azure managed identities and how they allow applications to use authentication based on Entra ID, without the need for secrets or certificates. More and more services in Azure support authenticating this way: Storage… | local authentication, authentication application, authentication azure, application authentication, authentication entra | bug, azure, devops, pipeline, resource | 8 |
arthur.nl | …an apparent essential dimension. Identity of objects, identity of communications, identity of persons, and the authentication and protection of each thereof. This is for sure an essential state of the art trust component, in this case… | person authentication, authentication protection, identity authentication | trust, dynamic, society, intelligence, ecosystem | 6 |
acropol.nl | We specialise in Security Strategy & Policy . Secure Design . Authentication . Digital Identities . Secure Automation . Cryptography . Security Operations . Risk assessment | policy authentication, authentication digital, design authentication | evaluation, growth, secure, risk, identity | 6 |
jbsoft.nl | Now you can access Home Assistant from out side. Make sure to set up two-factor-authentication to secure the access to your network. | dane authentication, authentication mail, factor authentication, authentication access | raspberry, certificate, commit, connect, pcie | 6 |
freerkterpstra.nl | – A new section has come up under the security tab of the WLAN called “RADIUS Authentication Survivability”. During the writing of this post I was unable to find documentation regarding this feature, but if the name implies what it does… | radius authentication, authentication survivability, management authentication, authentication radius, authentication policy | wireless, cisco, traffic, multicast, mobility | 6 |
wh33ly.nl | I remembered a note on a site to join ALL nodes from your vSphere environment to AD to make it work. But damn, why does the GUI only show the PSC’s ? Makes sense that only the PSC are connected to a domain and do the authentication. | ad authentication, authentication windows, password authentication, authentication ad, controller authentication | esxi, powercli, leave, puppet, vcenter | 5 |
shiftinsert.nl | acf audit log authentication authorization bcrypt buildlink cbauth cbi18n cborm cbsecurity cbstorages cbswagger cbvalidation cfcompile cfmigrations cfml cfml-compiler closures coldbox commandbox cookies customvalidator datatypes dotenv… | application authentication, authentication request, factor authentication, authentication secret, authentication username | wil, ip, january, entity, august | 5 |
roeleverink.nl | FIDO2 authentication is the latest method to sign in passwordless on devices and websites. | | azure, usually, powershell, function, deployment | 5 |
securedd.nl | …upon first login. Alternatively, you could send a registration code via postal services that they may use to register their accounts before filling in the password to add another step. Examples of authentications methods we support: | authentication module, factor authentication, secure authentication, example authentication, authentication method | quotation, integration, storage, trust, secure | 5 |
check4id.nl | Fight identity fraud by performing innovative document verification and authentication checks, to prevent abuse of personal information. | document authentication, authentication age, verification authentication, authentication check | verification, identity, quickly, easily, innovative | 5 |
ne3.nl | AWS and Mutual Authentication If you need to support mutual authentication via SSL you wont be able to do this via ELB like you typically would. ELB only supports the use of server side certificates as of today Oct-2015. To read more… | mutual authentication, authentication mutual, authentication ssl | random, chad, aws, mutual, oct | 4 |
aykevl.nl | I have written a Go package for stateless authentication using HMAC. I believe this system is in practice just as secure as session IDs without having to store state on the server, making authentication a whole lot easier. | mail authentication, authentication system, email authentication, stateless authentication, authentication hmac | debian, pill, firmware, replica, algorithm | 4 |
drevers.nl | For a client I have been trying to get kerberos authentication to work for the following setup: | kerberos authentication, authentication remote, authentication follow, token authentication, authentication method | reply, thought, asynchronous, username, secondary | 4 |
booches.nl | What is easier than using your Azure credentials to log in to your web applications like phpIPAM? My daily job is networking, like routing, switching, wireless, and Wi-Fi, so I had to puzzle when I had to configure SAML2 authentication… | clearpass authentication, authentication server, fi authentication, authentication phpipam | azure, python, handy, stuff, saml | 4 |
vankuik.nl | titled "Raspberry Pi OS, a port of Debian Bookworm"). I wanted to use passwordless login to ssh, i.e. public key authentication. So I copied my existing public key to the Raspberry Pi with ssh-copy-id. However when accessing the Pi over… | key authentication, authentication ssh, authentication exist | swiftui, break, file, raspberry, ssh | 3 |
damsteen.nl | …certificates while still securing the connection by using a secure login. You can also manage the users right from Active Directory, granting and revoking access as you see fit. This authentication solution can be implemented using RADIUS. | radius authentication, authentication edgeos, fit authentication, authentication solution | creality, firmware, extruder, blogging, connection | 3 |
trendforum.nl | nice article: It’s Me, and Here’s My Proof: Why Identity and Authentication Must Remain Distinct | identity authentication, authentication distinct | economic, society, woman, interesting, christianity | 3 |
vrmware.nl | The data highlighted in green later is needed later when configuring the Linux SMMP trap collector. For both the Authentication Password and Privacy Password, we use the same password, which is “T3st123!”. | collector authentication, authentication password, audit authentication, authentication log | operation, vmware, vcenter, file, host | 3 |
digirecord.nl | You can link directly to the login authentication servers so your users will be directed to you DigiRecord envirement. | factor authentication, authentication mfa, login authentication, authentication server | file, subscribe, task, add, secure | 3 |
roelbroersma.nl | In IIS7 and IIS7.5 which runs on Windows Server 2008 or Windows Server 2008 R2, it is not possible to use the WebDav PUT command without ‘authentication’. This is a problem for your Avaya VOIP [...] | command authentication, authentication problem, dig authentication, authentication impossible | july, january, block, february, october | 3 |
ictwise.nl | …create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using Key Vault and Managed Identities. Students will also… | analysis authentication, authentication authorization, storage authentication, security authentication | azure, exam, instructor, click, administrator | 3 |
steffankarger.nl | I've been fighting with gnome-keyring, ssh-agent, gpg and my yubikey to use a GPG authentication subkey for SSH authentication, but never managed to get that working reliably. Both the gpg-ssh-agent and gnome-keyring refused to pick up… | gpg authentication, authentication subkey, ssh authentication, authentication reliably, keyring authentication | ssh, ventilation, archive, gpg, central | 3 |
stickybit.nl | Our OTPManager was conceived in order to create a seamless Two-Factor Authentication experience. Until then, you needed your phone (which was always just out of reach somehow), in order to login with 2FA. With the OTPManager, you suddenly… | open authentication, authentication oath, factor authentication, authentication experience | api, native, stuff, bit, encryption | 3 |
bastiaa.nl | I have used different guides which I combined together to make a reverse SSH tunnel which works with 2 factor authentication for extra security. | factor authentication, authentication ssh, authentication extra | docker, reverse, ssh, copy, github | 3 |
jadespaulus.nl | Mobile Confirmation is an authentication method for customers to confirm their sign in, or confirm a payment from desktop using the mobile banking app. | confirmation authentication, authentication method | investment, timeframe, prototyping, loyalty, currently | 2 |
protheon.nl | Our code is able to connect to the cloud (AWS for now) for accessing your databases using the required and secure authentication methods, again all from your favorite OE code. | secure authentication, authentication method, multiple authentication | library, request, file, installation, progress | 2 |
paypro.nl | Anti-fraud measures Certificate Currence License De Nederlandsche Bank Two-factor authentication | | payment, debtor, subscription, invoice, membership | 2 |
unidev.nl | installing BlackShield ID in-house, opt instead for the "no infrastructure" simplicity of our CRYPTO-MAS managed authentication service, or use our AuthEngine developer SDK to embed strong authentication in your custom applications, we… | factor authentication, mas authentication, authentication service, strong authentication, authentication custom | gateway, investment, fault, availability, disaster | 2 |
hanssissing.nl | For one of our customers we have a SharePoint 2010 site up and running with two zones; one with plain old ntlm authentication for administrative use, the other zone uses forms authentication with claims using an Active Directory… | ntlm authentication, authentication administrative, form authentication, authentication claim, claim authentication | october, profile, true, atom, thursday | 2 |
backupned.nl | A modern organization today chooses online cloud storage for active data. Despite advanced authentication and encryption, the possibility of a cyber attack remains. Back-up on tape offers a solution: your encrypted data is offline and… | advanced authentication, authentication encryption | storage, underground, secure, workplace, continuity | 2 |
dotnetfriday.nl | DotnetFriday - February 2024 Edition The February 2024 edition of DotnetFriday was a compelling event centered around authentication-themed presentations, featuring enlightening sessions by Annejan Barelds and Kristof Riebbels. Annejan… | custom authentication, authentication custom, event authentication, authentication presentation | session, azure, talk, evening, static | 2 |
seblog.nl | All the posts, and all the logic for showing or hiding private posts, are still in PHP. The new authentication is in Elixir. Both ends are storing the information about the current logged-in user in session cookies. How do I merge those… | feature authentication, authentication big, new authentication, authentication elixir | vim, git, file, command, yak | 2 |
ksoeteman.nl | KERI, an open protocol for identifiers Published in Dutch on Tweakers Authentication is the big problem on the Internet. There is no portable authentication layer in the Internet protocol, like… | tweakers authentication, authentication big, portable authentication, authentication layer | leave, mijn, header, opposite, bike | 2 |
enable-u.nl | Use authentication services as a generic component in the ICT architecture? That’s possible! | | integration, enable, manage, innovative, architecture | 2 |
binsec.nl | Context Beginning October 2022, Microsoft started disabling basic authentication protocols (EAS, POP, IMAP, RPS, EWS, OAB, Autodiscover and Outlook) in randomly choosen Microsoft 365 tenants. The ... | attack authentication, authentication policy, basic authentication, authentication protocol | ctf, write, investigator, thought, society | 2 |
talkingsecurity.nl | A new episode of Talking Security with Stefan van der Wiele (Senior Program Manager Azure AD @ Microsoft) about Azure Active Directory. We talked about Azure AD, going into a Passwordless world, MultiFactory Authentication, Fido Security… | multifactory authentication, authentication fido | episode, talk, min, azure, devsecops | 2 |
thomwiggers.nl | Recently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined combinations of Kyber, Dilithium, Falcon, SPHINCS+-(sf)… | quantum authentication, authentication experiment | quantum, cryptography, publication, thesis, phd | 2 |
apirapi.nl | • Senior developer in a Scrum team responsible for development, infrastructure and releases of the gateway between end-users (web + apps) and the telecom provider BSS. Implemented custom authentication, authorization, caching, security… | custom authentication, authentication authorization, factor authentication, authentication data | architecture, role, summary, domain, automation | 2 |
greengrape.nl | We’ll check your e-mail authentication setup and ensure all authentication protocols are properly configured. A proper setup is the foundation of companies that send e-mails in bulk. | authentication audit, mail authentication, authentication setup, setup authentication, authentication protocol | reputation, career, proper, engagement, subscriber | 2 |
tomwerf.nl | apache authentication availability bestand cache cluster configuration database disk download fast-cgi file ftp html ip linux log logfile munin mysql netwerk network opcode password performance php plugin printer rdp remote reset security… | apache authentication, authentication availability | disk, usage, uncategorized, vmware, file | 2 |
sharp-id.nl | "Brought lots of knowledge about the Azure platform especially related to authorization and authentication" | modern authentication, authentication authorization | identity, azure, sharp, integration, port | 2 |
ajtech.nl | Usually when running software workload (e.g. script or container-based applications) an identity is involved for authentication and access resources. Software workload running inside Microsoft Azure can use a Service Principal or… | resource authentication, authentication authorization, identity authentication, authentication access | azure, devops, identity, git, api | 2 |
2azure.nl | From within the Azure API Manament portal there is a default authentication option for your API consumers. The better option is to configure a connection with an Azure B2C tenant. This will enable you to enforce MFA and conditional access… | id authentication, authentication manual, default authentication, authentication option | azure, manual, entra, gateway, file | 2 |
remonpel.nl | The first hurdle is getting the WordPress REST API to function. Oh, wait, you need a nonce ?! Well, thank you WordPress for this ‘security’-measure. For everything else in WordPress the authentication cookies you get when logging in to… | api authentication, authentication problem, wordpress authentication, authentication cookie | api, handy, git, sense, author | 2 |
abcbusinesscoaches.nl | Implement Security Protocols. Employ stringent security protocols like two-factor authentication, watermarking, and audit logs. Conducting frequent security assessments is vital for upholding the VDR security. | factor authentication, authentication watermarking | investor, collaboration, secure, efficiency, perspective | 1 |
remcorakers.nl | Authentication in Tridion 2011 SP1 can be done several ways; you can use local Windows accounts, install Tridion with an Active Directory… | | automation, graphql, ldap, profile, powershell | 1 |
stefandejager.nl | …insight in the steps which need to be taken (and by whom to complete) in order to start using our product. It works by communicating with the API of our CRM package and leveraging the same authentication method as our product does. | package authentication, authentication method | infrastructure, automation, stack, enthusiast, task | 1 |
knausclub.nl | Credit card payment integration prioritizes security. Payment processors employ robust encryption and authentication measures to protect sensitive cardholder data. This safeguards both businesses and customers from potential security… | encryption authentication, authentication measure | payment, benefit, vehicle, pre, sacrifice | 1 |
angulartraining.nl | We teach all things Angular. From the first component to full blown applications with dataservices, live API's, authentication and complex forms. | api authentication, authentication complex | angular, advanced, typescript, theory, exercise | 1 |
ilsantijhuis.nl | After working about a year and half as Software Engineer I was given the opportunity to grow my career and become a Team Lead at Gamesys. My team was responsible for AAA (Authorization, Authentication and Access-Control), the login… | authorization authentication, authentication access | resume, microservice, responsible, january, interest | 1 |
jeroenvanroon.nl | Event 1057 – RD Session Host Server has failed to create a new self signed certificate to be used for RD Session Host Server authentication on SSL connections. The relevant status code was Object already exists. | server authentication, authentication ssl | netscaler, january, powershell, azure, internal | 1 |
getfinom.nl | Opening an account is easy. We stay constantly informed of account access and activity, with 2-factor authentication. I'm really satisfied with the service! | factor authentication, authentication satisfy | payment, fee, transaction, limit, invoice | 1 |
checkingall.nl | …and social background information from dozens of sources, eg Cadastral Registers, Company House, directorships, authentication ID card, scores of three different credit agencies, watch and sanctions lists, bankruptcy, insolvency and… | directorship authentication, authentication id | report, employment, pre, pricing, background | 1 |
rsmdashboard.nl | who have been granted access to the restricted pages of this dashboard wil be able to use the functionalities of this platform. Information and functionalities will only become visible after logging in using the ErAS authentication service. | eras authentication, authentication service | rsm, metric, report, restrict, convenience | 1 |
fastchip.nl | Two Factor Authentication has been added. Each user can decide to enable this on their profile. | factor authentication, authentication user | manual, firmware, vehicle, calibration, browse | 1 |
dutchregistry.nl | Certifications - Legalizations - Notarizations - Apostilles - Consular and Ministerial Authentication - Others | | registry, report, editor, certification, legalization | 1 |
avikopotato.nl | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | cookie authentication, authentication navigation | potato, variety, progress, harvest, figure | 1 |
bizgo.nl | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | cookie authentication, authentication navigation | notification, automatically, title, handy, enterprise | 1 |
stienos.nl | This code was part of a school assignment for the BACHELOR study System & Network Engineering at the University of Applied Sciences Amsterdam (HVA-SNE-Implementation). The assignment was to create a two-factor authentication system for a… | factor authentication, authentication system | aws, elasticsearch, template, multiple, resource | 1 |
stlb.nl | For some time i have been searching for a good self-hosted password manager that saml authentication but also is not to expensive. […] | manager authentication, authentication expensive | homelab, october, tuesday, couple, colocation | 1 |
passkeep.nl | Secure your account with Multi-factor authentication, Multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an… | factor authentication, authentication multi, authentication method, authentication mechanism | pricing, secure, advanced, click, speed | 1 |
nickys-beauty-and-nails.nl | Boosted Security: As technology progresses, so do the protection determines implemented by mobile online casinos. We can expect also more powerful encryption and authentication procedures to ensure the safety and security of gamers’… | encryption authentication, authentication procedure | gambling, enterprise, establishment, player, bride | 1 |
kilala.nl | …the endpoints. All of the code needed for GraphQL and two different REST implementations. And even a bit of authentication and authorization! Heck, appendix C of the book turns out to have exactly what I was looking for when I wanted… | bit authentication, authentication authorization | exam, api, oauth, certification, vendor | 1 |
merlijnvanveen.nl | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | cookie authentication, authentication navigation | author, dual, analyzer, array, operation | 1 |
maartenbuma.nl | Password-based authentication Without any authentication parameters, password-based authentication is used with a random password created for you. Azure CLI: az ad sp create-for-rbac –name ServicePrincipalName… Lees verder » How to create… | password authentication, authentication parameter, authentication random | azure, enthusiast, bicep, terraform, devops | 1 |
cadet.nl | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | cookie authentication, authentication navigation | easter, united, registration, calendar, youth | 1 |
limotaxiamsterdam.nl | This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | cookie authentication, authentication navigation | executive, transfer, hourly, comfortable, vehicle | 1 |
pay-and-play-casinos.nl | The main advantage is that iDeal does not charge a fee for transactions made. In Pay N Play casino iDeal, deposits are processed in minutes, and two-factor authentication provides excellent security for money transactions. | factor authentication, authentication excellent | payment, player, gambling, registration, money | 1 |
gijs-de-jong.nl | Note on security If you decide to enable SSH, remember to change the default password! Preferably you disable password-based authentication and instead setup key-based authentication. See the of... | password authentication, authentication instead | raspberry, programming, interesting, cli, gui | 1 |
apexsecurity.nl | We are also in close contact with our technology partners, who are one by one market leaders in their field. Whether it concerns network security, awareness training, multi-factor authentication, pen testing, SIEM, networkperformance… | factor authentication, authentication pen | resilience, assessment, calculation, hassle, slide | 1 |
bas-w.nl | Open Source backend in 1 file with realtime database, authentication, file storage and admin dashboard. | database authentication, authentication file | framework, bunch, filesystem, flexible, file | 1 |
jurgenmols.nl | …of 1.9% is charged, but this is lower than Neteller's. Personal data protection is provided by two-factor authentication. Deposits are made instantly, but withdrawals can take up to 2 days. Keep in mind that individual casinos do not | factor authentication, authentication deposit | payment, player, wager, money, currency | 1 |
reac.nl | Protect your casino and your customers with our highly secure system, featuring advanced encryption, authentication and fraud prevention measures to ensure safe and fair gaming for all. | encryption authentication, authentication fraud | hall, player, intelligence, ahead, innovative | 1 |
erikvangeer.nl | …seattle to olympic national park ferry , ncaa division 3 women’s lacrosse statistics ,Related: two factor authentication fortnite , george hamilton today photos , nordic, alpine and mediterranean , scorpio health horoscope , coalinga | factor authentication, authentication fortnite | modelling, ergonomic, swimsuit, shape, paper | 1 |
rickvanderzwet.nl | EmailApplicationServerInJail Sendmail, MySQL,Cyrus SASL Authentication, Cyrus IMAP, Roundcube web-based email client. | sasl authentication, authentication cyrus | preference, timeline, overview, stuff, openstreetmap | 1 |
dezwart-ict.nl | Configuration Manager has limited support for Cryptography: Next Generation (CNG) certificates. Configuration Manager clients can use PKI client authentication certificate with private key in CNG Key Storage Provider (KSP). With KSP… | client authentication, authentication certificate | device, configuration, release, profile, guard | 1 |
icthouse.nl | …18 Type II and PCI, adhering to the strictest industry regulations. We train our staff on HIPAA best practices on behalf of our healthcare clients. We incorporate and maintain advanced monitoring, anti-malware, and authentication tools. | malware authentication, authentication tool | decade, healthcare, transformation, difference, networking | 1 |
vcdx.nl | …domain was auto discovered during the installation of vCenter Single Sign On. To use other external domains for authentication you need to add your external domains as ‘Identity Source’ in the SSO Configuration, see KB2035510 . When using… | domain authentication, authentication external | vsphere, host, vmware, esxi, vcenter | 1 |
flowio.nl | Two factor authentication with one-time-passwords, secured connections by SSL and in-reversible password management | factor authentication, authentication time | sidebar, fleet, icon, inventory, connection | 1 |
lazyadmin.nl | Conditional Access Policies allow you to fine-grain your access control in Microsoft 365. It allows you to control from which devices, or locations users can access your resources, and specify what methods of authentication are required… | method authentication, authentication getting | powershell, unifi, sysadmin, device, entra | 1 |
cpro.nl | APIs are at the heart of many applications and can potentially unlock hundreds of valuable endpoints, making them an attractive target for cybercriminals. API security assessments help ensure that API security requirements are met, such… | access authentication, authentication encryption | wireless, assessment, vulnerability, penetration, comprehensive | 1 |
microcloud.nl | Welcome to part 2 of the Azure VPN blog, here you can find part 1. This part of the blog explains how to configure Azure VPN with Always ON and Azure Active Directory authentication and MFA. This will allow Modern Managed Azure AD Joined… | directory authentication, authentication mfa | azure, powershell, progress, snapshot, exchange | 1 |
michaelwaterman.nl | In the intricate realm of modern digital communication, trust and security form the bedrock upon which data integrity, confidentiality, and authentication rest. Public Key Infrastructure, commonly referred to as PKI, stands as an elegant… | confidentiality authentication, authentication rest | pki, directory, cryptographic, length, algorithm | 1 |
peopleflows.nl | Biometric authentication gives the users full control to store and use data for all sorts of services! Your face is the key, use it. | biometric authentication, authentication user | vault, employee, visitor, pass, biometric | 1 |
tekmi.nl | …The peculiarity of this project was that it looked like a typical CMS, yet it didn't use any database. It didn't store any data either, since everything, including authentication and forms content was coming from an external REST API. | data authentication, authentication form | symfony, api, stack, objective, situation | 1 |
geselecteerde-winnaar.nl | …software), access controls (individual employee access authorisation via personal accounts, identification and authentication requirements), disclosure controls (constant supervision and guidance to authorised personnel, no local storage… | identification authentication, authentication requirements | protection, processing, declaration, purpose, provision | 1 |
redstorm.nl | …with advanced GWT sites. Requests to destination, "deep-web" websites, pass their intermediate servers and authentication layers so access to destination sources is performed "under the hood" in a unified manner. No need for any other | server authentication, authentication layer | federated, advanced, ability, external, engine | 1 |
jarnovdbrink.nl | Vulnlab Chain - Intercept Intercept is a hard rated chain which contains two machines WS01 and DC01. The chain starts with forced authentication using a file upload to grab a users hash. Using this... | chain authentication, authentication file | chain, azure, rich, write, minimal | 1 |
audio4forensics.nl | We offer tailor made solutions for Audio Enhancement, Speech Intelligibility improvement, Audio Authentication to name a few. We don't stop at just improving your audio data, we deliver a suitable solution. | audio authentication, authentication audio | forensic, enhancement, qualify, authenticity, analysis | 1 |
miraclecash.nl | We employ multi-factor authentication, encryption, and regular security audits to safeguard your account. | factor authentication, authentication encryption | miracle, rate, commission, uk, germany | 1 |
betaalvereniging.nl | Foreign web shop not always ready for mandatory double authentication of payments with Dutch credit cards. | double authentication, authentication payment | payment, association, task, report, annual | 1 |
nn8.nl | New publication: UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography [ 2013-11-08 ] | ubiquitous authentication, authentication smartphone | publication, channel, mqtt, covert, implementation | 1 |
broweb.nl | Custom week project planning. Direct edit, Direct calculation, Full mobile version! Up until 6 deadlines for each member of a project. Register leave, sickness, study or other non work hours. Authentication by Cloud providers. Created… | hour authentication, authentication cloud | webapplication, jquery, improvement, study, sickness | 1 |
kapytein.nl | …Customer Data Cloud (or Gigya) is an identity and access management platform, which allows customers to have authentication and authorization features implemented across their application. This is not vulnerability in SAP's Gigya… | customer authentication, authentication authorization | takeover, capture, flag, path, domain | 1 |
site-helper.nl | Creating e-mail accounts , setting a catch-all address , forwarding , autoresponders , vacation messages , mailing lists , filters , MX records , webmail , SMTP authentication. | | domain, file, subdomain, frontpage, statistics | 1 |
peterstreef.nl | …of the different roles and their corresponding access levels, organizations can implement robust security mechanisms and authentication protocols to safeguard sensitive data and maintain data integrity throughout the API ecosystem. | mechanism authentication, authentication protocol | api, integration, coordination, collaboration, consideration | 1 |
freddejonge.nl | Recently I’ve tested the FortiOS 7.0 and I was wondering about the SAML connection towards Azure for login via Microsoft and the use of Multifactor Authentication. I have noticed there are some improvements. How ever, some features or… | multifactor authentication, authentication improvement | fortigate, azure, vmware, leave, exchange | 1 |
matthijslangenberg.nl | Because I had taken a layered approach in writing the JavaScript library, developers could also choose to customize the user experience. The React front-end code was separated from a small core library which handled authentication… | library authentication, authentication websocket | employee, electronic, healthcare, medication, nurse | 1 |
3ldn.nl | It is not allowed to send plaintext passwords ‘over the line’. This is a security requirement, even when using HTTPS connections with mutual authentication and a cipher. | mutual authentication, authentication cipher | configuration, dependency, february, default, note | 1 |
bitpatroon.nl | Sjoerd is a good all-round developer who has the ability to quickly track down bugs in PHP code and fix them. He can quickly take in and apply newly gained knowledge about testing and programming best practices. He can integrate systems… | system authentication, authentication system | landscape, api, realm, cohesive, integration | 1 |
wfhessentials.nl | …software installed and access to systems you'll need. Set up any new apps, accounts, passwords, and multifactor authentication required by your company. Make sure your internet connection is strong. Have chargers and accessories ready to… | multifactor authentication, authentication company | remote, productivity, lighting, break, payment | 1 |
wouterj.nl | At SymfonyWorld Winter 2021, I talked about using the new Symfony authentication system in your applications in Symfony 6. We discussed the important changes to the Security component, what we tried to improve with each change, and how… | symfony authentication, authentication system | symfony, csrf, css, vulnerability, native | 1 |
doc-access.nl | Doc-access is an online authentication system for websites that are only accessible to medical professionals. | online authentication, authentication system | passport, charge, accessible, completely, transparent | 1 |
eurdashboard.nl | who have been granted access to the restricted pages of this dashboard wil be able to use the functionalities of this platform. Information and functionalities will only become visible after logging in using the ErAS authentication service. | eras authentication, authentication service | metric, report, currently, statistics, intelligence | 1 |
vander-vegt.nl | Create a full blow webserver with real or simulated content and support for binary files and authentication | | window, file, bit, archive, dll | 1 |
pabstit.nl | – bugfix when authentication fails: proper notification and user is redirected to Account screen | bugfix authentication, authentication proper | july, august, release, notification, roster | 1 |
appartement-amsterdam-beach.nl | Pico is not blogging software - but makes it very easy for you to use it as a blog. You can find many plugins out there implementing typical blogging features like authentication, tagging, pagination and social plugins. See the below… | like authentication, authentication tagging | file, directory, header, config, plugin | 1 |
unixinfo.nl | Default Ports: Server: Authentication: Port: SMTP Server (Outgoing Messages) Non-Encrypted AUTH 25 (or 587) Secure (TLS) StartTLS 587 Secure (SSL) SSL 465 IMAP Server [...] | server authentication, authentication port | january, august, july, file, february | 1 |
devoorkant.nl | We know how to apply modern standards like oAuth 2.0, SSL, (Client Side) Certificates and PKI Encryption. From experience, we can choose from a number of solutions and concepts to provide you with the best (federated) authentication and… | federated authentication, authentication authorization | integration, solid, mid, banking, enterprise | 1 |
peterbeverloo.nl | Work on the Chrome-based Android WebView continues and support for displaying fullscreen video has been implemented , with in-page video support pending. The Remoting application for Android now supports paired authentication and had some… | android authentication, authentication ui | chromium, api, css, animation, author | 1 |
novaris.nl | We offer a complete range of reliable and affordable solutions for software security (ROCKEY Software Protection) and advanced internet security and authentication (ePass). | security authentication, authentication epass | innovative, positioning, wireless, analysis, growth | 1 |
pay2wash.nl | Complies with AVG legislation. Additional security, such as 2-factor authentication, is optional and even mandatory for administrators. | factor authentication, authentication optional | laundry, automation, innovative, secure, technician | 1 |
whatsecurity.nl | RFC 7672 : SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) ↩ | dns authentication, authentication entity | bend, adjustable, oct, internal, connection | 1 |
midnightblue.nl | Wouter is known for breaking several proprietary in-vehicle immobilizer authentication ciphers used by major automotive manufacturers as well as co-developing the world's fastest public attack against the Hitag2 cipher. | immobilizer authentication, authentication cipher | midnight, firm, domain, vulnerability, physical | 1 |
svenordelman.nl | For my study I needed to do an internship which I was planning to do it abroad. I found a company specialized in SMS and two factor authentication, which had their main office in Malaysia. I spend there 6 months working on software that… | factor authentication, authentication main | study, nodejs, programming, rule, malaysia | 1 |
stollielab.nl | For some time i have been searching for a good self-hosted password manager that saml authentication but also is not to expensive. […] | manager authentication, authentication expensive | homelab, october, deployment, networking, docker | 1 |
mijnslachtofferzaak.nl | Logging in is currently only possible via DigiD; foreign authentication (eIDAS) is not accepted. There are two ways to log in using your DigiD. | foreign authentication, authentication eidas | victim, overview, crime, prosecution, violent | 1 |
hawa.nl | Recently a program developed in cooperation with SMELT and AstraZeneca is live. The online module uses SSL and SMS authentication for extra security and can be used by pharmacist allong side their own systems. There are different projects… | sms authentication, authentication extra | sql, reference, patient, pharmaceutical, enterprise | 1 |
renevanbalen.nl | I recently received a couple of questions on how to make a self-signed certificate for server authentication. I have been using self-signed certificates for some time now, mainly in test environments. You can use self-signed certificates… | server authentication, authentication self | certificate, vmware, february, reference, root | 1 |
oksolution.nl | …out, and upon this user sheet being finalized an user is created in our Active Directory. Their privileges and authentication are set, as is their group membership, and other user properties. With this tool you can also control the… | privilege authentication, authentication group | internship, react, create, semester, powershell | 1 |
remcovandiermen.nl | Currently there are companies that are investigating the way of passwordless authentication . But the moment you go completely passwordless, you run into the same obstacles.... | passwordless authentication, authentication moment | license, availability, workstation, device, directory | 1 |
ltgi.nl | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credentials | width, visit, revision, permission, credentials | 1 |
innato.nl | This website uses cookies to manage authentication, navigation, and other functions. Please click the 'I agree' button if you agree that we can place these types of cookies on your device. You can reverse your decision at any time. | cookie authentication, authentication navigation | manufacture, chemistry, joomla, nav, notice | 1 |
wcds.nl | What are the benefits of using Laravel? Well, for starters, it makes Web application development faster and more efficient. With useful features such as routing, authentication and database management, Laravel can help you build a… | routing authentication, authentication database | optimization, domain, registration, reliable, css | 1 |
lijstvlam.nl | …the Strategic Housing Pan), or about issues that we as employees encounter in our daily work (2FA / Two-factor authentication); we always try to think critically and constructively, based on the conviction that university management and… | factor authentication, authentication critically | council, employee, candidate, election, participation | 1 |
plasticsurgeryresearch.nl | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credentials | surgery, lab, width, revision, permission | 1 |
jointak.nl | CertiEye® is a company-owned proprietary anti-counterfeit solution that is impossible to copy. It allows for instant end-user authentication via a smartphone making it the perfect anti-counterfeit and brand protection solution. | user authentication, authentication smartphone | garment, sustainability, certification, career, weave | 1 |
woutergrutter.nl | At Learning Valley, I have learned new technologies such as React, 3D rendering in the browser, integrated tools and authentication. | | engine, unreal, resume, currently, player | 1 |
cloudsecurityblog.nl | Of course Multi Factor Authentication would have solved the problem, but is not always easy to implement through the whole organisation in a short time. | factor authentication, authentication problem | lab, session, july, command, exploit | 1 |
wardvissers.nl | 22, 2024, to addresses this issue related to a memory leak in the Local Security Authority Subsystem Service (LSASS). This occurs when on-premises and cloud-based Active Directory domain controllers service Kerberos authentication requests. | kerberos authentication, authentication request | vmware, vsphere, esxi, host, exchange | 1 |
martijnfoto.nl | - IP IP Authentication Authentication or or Password Password Authentication Authentication available. | ip authentication, authentication password, password authentication, authentication available | movie, cheap, ugg, buy, prescription | 1 |
patrickzegels.nl | Deploying Microsoft Enterprise Mobility Suite Identity and Access Management Maximize Engagement with Dynamics 365 Portals Microsoft Intune Core Skills Managing Authentication Using Microsoft Passport SharePoint for Your Classroom… | manage authentication, authentication microsoft | azure, dynamic, identity, legacy, nav | 1 |
kaperschip.nl | I simply copied the .BIN file into the utility folder and ran the executable with the right parameters (in an elevated command prompt, just to be sure). Since it's a local KCS connection, there are no authentication or network transfer… | connection authentication, authentication network | homelab, esxi, powershell, clone, file | 1 |
vecore.nl | All data is securely stored in the cloud, using advanced encrypted connections, two-factor authentication and data encryption. | factor authentication, authentication data | configuration, progressive, far, wish, vehicle | 1 |
yrams.nl | …How to prevent fraud? How to detect fraud? Phishing-Attack-detection Malware-Attack-detection Strong user authentication with digital fingerprint device Domain-Attack-detection CyberCrime-Compliance Brand-Compliance… | user authentication, authentication digital, customer authentication | finally, employee, consumer, difference, contribution | 1 |
adamssystems.nl | SFTP is a functional part of SSH which replaces the behavior of FTP in a secure fashion. This is great on AIX for transferring files, batch job uploads and downloads, and much more secure using SSL on the wire and with a variety of… | variety authentication, authentication option | ssh, secure, adventure, default, hash | 1 |
lansolutionsbv.nl | …VoIP cloud… VoIP centrales… VoIP Support… Touchscreens… Narrowcasting… | | enterprise, exchange, host, remote, op | 0 |
knowledgeandtechnologyjoyfullyengaged.nl | Privacy… | | license | 0 |
loonadministratievoormkb.nl | Privacy… | | license | 0 |
ru.nl | Current students and staff members can find information about services and facilities they may need while studying or working at Radboud University in the sections for students and employees. | factor authentication, authentication mfa | programme, assessment, facility, study, grant | 0 |
bartvanegmondhovenier.nl | Home… Test 2… instagram… | bad authentication, authentication data | | 0 |
kipusoep.nl | Using Umbraco with VS2010 … and masterpages, jQuery vsdoc, dotless, SquishIt Welcome all to this magnificent blogpost about using Umbraco 4.5 with Visual Studio 2010 and everything you’ll need to know about some other tools! 😉 First… | | reply, january, july, iis, jquery | 0 |
watb.nl | Privacy… | | license | 0 |
teamkatje.nl | Privacy… | | license | 0 |
johnbraun.nl | Mutation testing is a great tool to analyze and increase the reliability of your test suite. This post highlights the concepts of Mutation Testing, how to get started using Infection PHP, and how to use mutation tests in your CI workflow. | | mutation, package, cypress, fake, progress | 0 |
bloter.nl | Privacy… | | license | 0 |
continyou.nl | Your local ICT service provider. System and network management for SMEs in the Nijmegen region. ContinYou would like to help you. | step authentication | region, manage, sme, endpoint, connection | 0 |
copac.nl | We develop and implement information security policies & procedures based on commonly used standards like NIST or ISO 27001 & 27002. These policies and procedures are aimed to provide in a higher security level are derived from the… | identification authentication | risk, assessment, customizable, affordable, centrally | 0 |
seksmisbruik.nl | Privacy… | | license | 0 |
korsultancy.nl | …of security projects for many clients in both the public and the private sector. Most projects focused on development and implementation of security solutions or services involving digital signatures or identity and access management. | | identity, infrastructure, broad, signature, certificate | 0 |
sshn.nl | We are there for students who would like to live on their own. Students that are looking for a private place, a home during college years. And who would like to experience a pleasant long or short stay in Nijmegen & Arnhem. Of course, we… | factor authentication | ssh, rent, stay, pleasant, rental | 0 |
sevenp.nl | We allow you to focus on what you do best. We are passionate about improving your efficiency. You design your own workspace, we make life easy. | identification authentication | workspace, azure, infrastructure, productivity, manage | 0 |
switchmail.nl | © 2022 Switchmail - By ID Control Solutions. All Rights Reserved. | strong authentication | secure, archive, encryption, request, easily | 0 |
worldofmk.nl | home 1… home 2… home 3… home 4… home 5… home 6… home 7… home 8… home 9… | | clothes, woman, notice, hummingbird, secure | 0 |
ems-soft.nl | Sign up… Get authentication… | authentication code | | 0 |
nuttelozeinvestering.nl | Privacy… | | license | 0 |
4gproxy.nl | 4G Proxy is the leading provider of proxies to access websites and content that are blocked in your area. Our proxies let you unlock the internet with ease. | | proxy, ip, speed, pricing, automatic | 0 |
aprilmayjune.nl | Privacy… | | license | 0 |
roadcaptain.nl | Bored with the standard Zwift routes or fed up with having to navigate using Zwift Companion? RoadCaptain let's you design the route you want and will act as your personal road captain in Zwift and handles navigation for you! | secure authentication | builder, elevation, ascent, highlight, profile | 0 |
champignonsleague.nl | Privacy… | | license | 0 |
516noord.nl | 51.6 Noord B.V. supports organizations in the assessment, recommendations, design, implementation and management of security aspects within their local or cloud-based IT environment. | factor authentication, authentication lastpass | progress, cisco, leak, plain, billion | 0 |
iamsecurity.nl | Authentication… Authorisation… Auditing… Identification… | | identity, authorisation, auditing, identification, secret | 0 |
blimped.nl | Welcome to this crossover between blog and braindump. Blogs of others have been super important during my work. This site is me returning the favor. The blogs will be about Microsoft 365, Azure, SharePoint, SharePoint Framework (SPFx)… | | azure, retention, powershell, function, cli | 0 |
kbhost.nl | KBHost Proudly powered by WordPress | id authentication, authentication navision | enable, disable, file, add, shortcut | 0 |
orhun.nl | …developer who is interested in software and hardware. My interests are creating applications and setting deployment environments to facilitate full-stack development. In addition I have a strong interest in new available techniques. | | docker, interest, pipeline, endpoint, actuator | 0 |
rapidlogistics.nl | Make running your webshop smooth and easy. We integrate your Shopify or e-commerce platform with our warehousing system so you can keep track of inventory, orders, and fulfilment. We offer a tailored service for every business. Eliminate… | director authentication, authentication ebay | logistics, rapid, fulfil, sustainability, motion | 0 |
universalgradingservices.nl | Hoe werkt het?… Over UGS… Contact… Grade mijn kaarten… Services… Standard… | | grading, universal, ug, het, hoe | 0 |
tekkopstraat.nl | Privacy… | | license | 0 |
opzoutenmetjeonzin.nl | Privacy… | | license | 0 |
ediport.nl | Privacy… | | license | 0 |
wordpress-en-plugin-onderhoud.nl | WordPress and Plugin maintenance - JVH hosting - We maintain WordPress websites and WordPress plugins with our SLA: backups, uptime monitoring, Security, performance checks, 404 link monitoring, vulnerability checking and more .. | factor authentication | plugin, report, vulnerability, file, force | 0 |
scanid.nl | ScanID is your Total Solution Provider for all applications and solutions in the field of Product and Personal Identification, Identity Documents, Barcoding and 2D Imaging systems. | verification authentication | verification, reader, identification, identity, swiss | 0 |
friendsoflittleyus.nl | Friends of Little Yus operates forging nodes for Ark, Solar, Qredit and Compendia blockchains. | identification authentication, authentication blockchain | stat, mqtt, delegate, validator, proposal | 0 |
wonnacareforkids.nl | Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore. | bad authentication, authentication data | sit, amet, adipisicing, dolor, tempor | 0 |
bloots.nl | Privacy… | | license | 0 |
melp.nl | How to get a FreeBSD web development box running as a Virtual Machine in Windows | password authentication, authentication ssh | package, bash, python, composer, wrong | 0 |
link-to-art.nl | As a passionate art collector for decades, I have built up extensive experience and an international network in the art world. I founded Link to Art in 2012. | | artwork, jesus, collector, jenkins, extensive | 0 |
zinias.nl | © Zinias 2001 - 2022 | innovative authentication, authentication solution | innovative, secure, emulator, kernel, report | 0 |
explicitselection.nl | …B2B relationships. Due to regulatory and standardization requirements, it can be complex to introduce new digital financial products and integrate them within the existing ecosystem. We can help you present your product and your unique… | | selection, explicit, regulatory, implementation, collateral | 0 |
ramonddevrede.nl | …be supported. Especially the compatibility was a concern. At my father’s office they went to Unix mini computers and data center towards the PC with a local network. Back then, this was the future. Dumb terminals with a connection to a… | | unifi, ubiquiti, device, connection, commodore | 0 |
trans-ix.nl | Trans-iX is an ICT service provider for Managed Services, Cloud Services, Infrastructure Projects, Support & Helpdesk Services, consulting and advisory. | | infrastructure, manage, advisory, consulting, productivity | 0 |
timgoes.nl | …my internship and summerjob at Enversed, I learned quite alot about designing a VR-game for a large usergroup. The skills I developed during developing the VR-games mentioned in my portfolio above, gave me quite a good perspective on how… | | player, automatically, reference, unity, fellow | 0 |
ikbengraagmijngeldkwijt.nl | Privacy… | | license | 0 |
optisec.nl | …for both experienced and inexperienced people and opens the door to any specialization. Both penetration testers and security managers benefit greatly from CISSP, as it provides insights into the entire field of information security. | identy authentication | certified, cissp, official, domain, topic | 0 |
virtualnomad.nl | Streamline your IT application deployment game with the latest buzz: deploying Win32 apps using the new Microsoft Store app. This marks a key shift as Win32… | authentication request | add, azure, guest, deployment, january | 0 |
sudosandwich.nl | …the newest technologies such as containers and cloud whilst retaining total understanding the fundamentals. He provides great leadership to his team and is the go to person for many things. Great leader, great engineer and great colleague. | openldap authentication, authentication access | administration, configuration, byte, architecture, devops | 0 |
vtam.nl | …as much as possible with the tool of my choice Powershell. One of the first things you want to configure after you have deployed Aria Automation is a Cloud Account and a Cloud Zone; in my case a vSphere Cloud Account. From the API... | | automation, powershell, vsphere, operation, esxi | 0 |
cloudguide.nl | Entitlement Management is the platform to discover, manage, and govern fine-grained entitlements to your SaaS & on-premise applications. It’s now available within Okta’s Identity Governance product (OIG). | mfa authentication, authentication authorization | accelerate, identity, workplace, collaboration, compliance | 0 |
yice.nl | …provider and the data centers, but also for ourselves. The ISO 27001 certification makes a significant contribution to the professionalism of our services and to customer confidence in the information security of the GRC platform YICE. | factor authentication, authentication app | compliance, gdpr, framework, license, storage | 0 |
mcpr.nl | PR is in our DNA. Getting you visibility in the media is what we do best. But – being a full-service agency – you can also rely on us for an accurate positioning, marketing campaigns, websites, social media, copywriting, and design. We… | leader authentication, authentication solution | round, campaign, audience, target, identity | 0 |
locktar.nl | an extension to the Azure AD. Just as you would do with the regular Azure AD. You can imagine that if there is a big Azure AD and there are many applications connected to it. So Microsoft decided that an extension belongs to an application. | | azure, graph, validator, attribute, debug | 0 |
sandermaijers.nl | I’m happy to speak with you online. Do note, however, that I prefer to not use Facebook and Google-controlled media for personal communication, and I don’t check them out very regularly. I don’t like some of LinkedIn’s practices either. | | appointment, presentation, academic, handle, official | 0 |
yicapital.nl | Get on board and check our new Subway theme! It brings you a modern boxed layout with a broad range of options for customization . | bad authentication, authentication data | icon, gradient, ambient, animate, typography | 0 |
besje.nl | Privacy… | | license | 0 |
rohill.nl | …secure and cyber-safe networks, Rohill offers a unique proposition that allows for full control for MVNOs, while governments maintain national control and cyber-security is ensured. Discover Our Solutions Over 450 networks delivered… | | acceptance, vertical, infrastructure, critical, rapidly | 0 |
codeasaservice.nl | Our software engineering consultants are experts in different areas of work. They are here for software advice, strategy, specifications and design, enabling you to build better & secure (online) products. | | secure, accessibility, requirements, lifecycle, suitable | 0 |
kornblum.nl | We are learning to setup our website in WordPress by having a 31 hour course. So expect new test content on a regular base. I am so excited. | | uncategorized, docker, raspberry, setup, excited | 0 |
wimtenbrink.nl | Privacy… | | license | 0 |
fluxxus.nl | As I explain in my book with test example 8 in chapter 8, the testability framework – or actually the test toolkit – does not provide for layout testing, only dataset testing. Those who bought both the 1st and 2nd edition of my book might… | | automation, central, report, refactoring, july | 0 |
winfred.nl | In some cases, the requirement is to bring up a FortiSwitch in FortiLink mode, but the FortiSwitch is not directly connected to the FortiGate. | aaa authentication, authentication login, login authentication, authentication local, authentication tacacs | fortigate, ip, uncategorized, authorization, default | 0 |
sionkerk.nl | Privacy… | | license | 0 |
chanelexpert.nl | experience with collecting, buying, selling and studying vintage Chanel items. We combine this experience with a keen eye for detail, extensive knowledge of materials, a large interest in the history of the brand Chanel and countless hours | | summary, bag, authenticity, accessorie, jewellery | 0 |
svdgraaf.nl | You can find more information on LinkedIn and reach me on Github , Twitter or email , or come say hi at a meetup. | basic authentication, authentication custom | serverless, talk, github, resource, cloudformation | 0 |
realtime-dashboard.nl | …Tiles… Profile… Feed… Forum… Forum - Post… Meetups… Meetups - Post… Finance… | | invoice, profile, transaction, notification, conversation | 0 |
dirxml.nl | We hope this information provides you a helping hand when you are involved in any project. | | identity, oauth, saml, ltd, documentation | 0 |
qnetwork.nl | Back-up… Managed Services… Two factor authentication… Hosting… High… | factor authentication | modular, manage, availability, compliance, workplace | 0 |
spryng.nl | SMS Gateway Service. ✔ SMS Gateway ✔ SMS API ✔ Bulk SMS ✔ SMS Service ✔ 24/7 Support ✔ 100% Delivery Guarantee ✔ 100% Reliable & Safe! | sms authentication | gateway, api, healthcare, logistics, reliable | 0 |
oi-services.nl | web design PHP framework content application builder cck themes icons joomla design icon illustrations wordpress cms CSS JS theme | bad authentication, authentication data | sit, amet, adipisicing, dolor, tempor | 0 |
gazoraad.nl | Privacy… | | license | 0 |
gridshore.nl | A weblog about software engineering, Architecture, Technology an other things we like. | | elasticsearch, architecture, journal, august, frontend | 0 |
hart4technology.nl | Our data security solutions are available for every operating system and with varying degrees of security - even for the secure retention of confidential data at government level. We provide high-quality protection for e-mails , laptops… | fido authentication, factor authentication, authentication mfa, passwordless authentication | secure, port, storage, physical, kingston | 0 |
visumpro.nl | VisumPro offers additional services like photo service and filling out application forms. | | legalization, trajectory, selection, russian, federation | 0 |
dewitweb.nl | Azure DevOps gives you the option to use ‘Git‘, this the same version control system I used in my previous post about adding version control… Read More » Database Version Control in Azure DevOps | factor authentication, authentication reset | azure, enthusiast, sql, visual, devops | 0 |
visahq.nl | Visa services in Netherlands: view travel visa requirements for citizens of Netherlands to any country in the world and apply for visas online. | | requirements, citizen, applicant, russia, arabia | 0 |
nerdieworks.nl | It’s no secret that companies are collecting vast amounts of user data. They say data has become more valuable than gold. My problem with the current business model of many great “free” services, is that you can’t opt out by paying a… | certificate authentication, authentication traefik | traefik, devops, redirect, certificate, slash | 0 |
sjorsvanheuveln.nl | Add the OpenLiteSpeed logo to your web site if you'd like to help us promote the server. | | click, resource, file, documentation, installation | 0 |
smeenkzorginnovatie.nl | Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore. | bad authentication, authentication data | sit, amet, adipisicing, dolor, tempor | 0 |
freekpaans.nl | Last week I blogged about my experiences doing a geth fast sync. The last thing I did back then was start a full sync on the same hardware. Things took a bit longer: whereas the fast sync completed in about 8 hours, the full sync took a… | apache authentication, authentication openid | sync, uncategorized, opinion, block, anatomy | 0 |
dejagermc.nl | The Home Feeder app for Google Assistant. Allows for voice control of Home Feeder. | user authentication | feeder, gitlab, grafana, advanced, household | 0 |
idealis.nl | Pleasant and affordable living in rooms at Idealis, the largest housing organisation for students in Wageningen and Ede. | factor authentication | idealis, rent, housing, affordable, pleasant | 0 |
allsync.nl | Protect your personal and work files with end-to-end encryption & Dutch privacy. | | unlimited, file, device, encryption, storage | 0 |
clemensmol.nl | Code snippets, opinions and bookmarks mostly about Frontend Development and User Experience. JavaScript, CSS3, PHP, CentOS, Plesk. | sasl authentication, authentication failure | interesting, dig, failure, ssh, selector | 0 |
marinusit.nl | …the task of coming up with suitable solutions and realizing them in the customer’s landscape. He started at the same moment that the development team was formed. One of his tasks was to help set up a smoothly running development process. | factor authentication, authentication solution | identity, azure, task, smoothly, architecture | 0 |
openonderwijsapi.nl | Of course each school, college, or university can develop their own APIs, but this is a time-consuming and costly process. That is why the Open Education API, known in Dutch as the ‘Open Onderwijs API’ (OOAPI), was created. The OOAPI… | identification authentication, authentication authorization | api, institute, educational, response, description | 0 |
conplacer.nl | Privacy… | | license | 0 |
foxboom.nl | Privacy… | | license | 0 |