lemariagedelouise.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, view, device | 52 |
etenonlinebestellen.be | Data collected and processed: Privacy choices, Users’ profiles, IP addresses, Device identifiers, Authentication-derived identifiers, Device characteristics, Precise location data, Browsing and interaction data, Non-precise location data, User-provided data, Probabilistic identifiers | identifier authentication, authentication identifier, address authentication | launch, duration, storage, view, device | 52 |
ibanberekenen.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, view, device | 52 |
cylex-belgie.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, view, device | 52 |
promotiez.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, view, device | 52 |
doutu.be | Data collected and processed: Privacy choices, Users’ profiles, IP addresses, Device identifiers, Authentication-derived identifiers, Device characteristics, Precise location data, Browsing and interaction data, Non-precise location data, User-provided data, Probabilistic identifiers | identifier authentication, authentication identifier, address authentication | launch, duration, storage, view, device | 52 |
distributeursdebillets.be | Data collected and processed: Privacy choices, Users’ profiles, IP addresses, Device identifiers, Authentication-derived identifiers, Device characteristics, Precise location data, Browsing and interaction data, Non-precise location data, User-provided data, Probabilistic identifiers | identifier authentication, authentication identifier, address authentication | launch, duration, storage, view, device | 52 |
wazaa.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, view, device | 52 |
mtbroutedatabase.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, view, storage, device | 52 |
mrwaggel.be | Data collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiers | datum authentication, authentication identifier | launch, duration, storage, view, device | 52 |
gastricbypass-recepten.be | Data collected collected and and processed: processed: Authentication-derived Authentication-derived identifiers, identifiers, Device Device characteristics, characteristics, Non-precise Non-precise location location data, data, IP IP addresses, addresses, Probabilistic Probabilistic identifiers… | datum authentication, authentication identifier | view, launch, storage, duration, precise | 52 |
atbash.be | As the demand for secure and efficient authentication and authorization mechanisms grows, JSON Web Tokens (JWT) have emerged as a favored choice for developers. JWT tokens provide a modern approach to verifying user identity and defining access privileges within web applications. In this blog… | accessible authentication, authentication intention, dependency authentication, authentication support, source authentication | kotlin, token, framework, runtime, example | 14 |
dju.be | Using NGINX NGINX Reverse Reverse Proxy Proxy for for client client certificate certificate authentication authentication - - start start discussion discussion - - Tutorials Tutorials & & Examples Examples - - openHAB openHAB Community | good authentication, authentication library, user authentication, authentication update, step authentication | photography, youtube, light, photographer, lightroom | 14 |
smart-id.be | Smart-ID is app-based strong authentication & digital signing solution. Compliant with eIDAS regulation, has flexible pricing policy for e-service providers. | reliable authentication, authentication solution, strong authentication, authentication digital, id authentication | smart, user, northern, reliable, compliant | 13 |
eaglankurek.be | …of a portal site containing links to all applications (web apps, or Windows apps hosted on XenApp), and an access point consolidating various authentication methods and providing federated access. The customer has internal users, but also has employees and associates working at universities spread… | point authentication, authentication method, adfs authentication, authentication saml, authentication certificate | server, user, certificate, technology, configure | 12 |
virtualidentity.be | authentication , behaviour , construct , cybersecurity , cyberspace , encryption , identity , interaction , management , Science , technology , virtual reality | algorythms authentication, authentication blockchain | identity, virtual, blockchain, reality, technology | 10 |
secwise.be | MFA Number Matching is a new feature from Microsoft, and a form of Multi-Factor Authentication... | basic authentication, authentication exchange, authentication context, access authentication | security, microsoft, cloud, azure, cyber | 7 |
0110.be | At the Ghent Center for Digital Humanities we provide software services for researchers. Think about, for example, annotation platforms for ancient texts or collaborative databases with geographically referenced historical data. Each of those services need some kind of authentication and user… | kind authentication, authentication user, collaborator authentication, authentication login, authenticate authentication | ghent, fig, javascript, system, user | 6 |
kieranclaessens.be | At the end of 2015 I got serious about bug bounty and set myself this goal of getting into the wall of fame of the “big four”: Apple, Microsoft, Google and Facebook. Facebook was a though nut to crack but I managed to find a little bug in their text action authentication mechanism which landed me… | text authentication, authentication account, action authentication, authentication mechanism, doc authentication | story, fame, bounty, bug, apple | 4 |
ssobuddy.be | If (parts of) the application needs to know the user's identity, our platform will authenticate the user and let the application know who it's talking to. The authentication process can be as simple or complex as your policies define. Depending on the context, the process may differ: Smartcard… | application authentication, authentication process, smartcard authentication, authentication sense, process authentication | user, craftsman, identity, access, answer | 3 |
daedeloth.be | The NTAG2x password protection only allows you to set a 4-byte password, so you can’t really call it a security measure. I decided I would use the 4-byte password to discourage users overwriting the tag, but the true authentication would lay in using an SHA-256 HMAC on the content I would write… | store authentication, authentication detail, specific authentication, authentication mechanic, laravel authentication | number, game, hour, card, revenue | 3 |
suffix.be | Using ecdsa-sk or ed25519-sk combined with a hardware security key for multifactor SSH authentication. | factor authentication, authentication ssh | ruby, review, firefox, linux, file | 3 |
it2.be | …payments without needing to verify their identity. This increases the risk of fraudulent transactions and potential financial loss for the account holder. It is important to always enable multi-factor authentication and use strong, unique passwords to protect online payment accounts like PayPal. | factor authentication, authentication strong, keyword authentication, authentication vulnerability | storage, security, gb, device, space | 3 |
kappadata.be | DORA enhances cybersecurity in the financial sector. Strong authentication, such as with OneSpan's DIGIPASS FX1 BIO, is essential for DORA compliance ... | strong authentication, authentication dora, authentication onespan | security, kappa, network, iot, value | 3 |
timschaeps.be | AAD-B2C 1 ALM 3 AUTHENTICATION 3 AUTOMATION 2 AZURE 11 AZURE-ACTIVE-DIRECTORY 1 AZURE-ACTIVE-DIRECTORY-B2C 1 AZURE-ARTIFACTS 2 AZURE-DEVOPS 8 BICEP 2 BLOG 3 BOOKS 4 BUILD 3 BUILD-MANAGEMENT 3 CAKE 4 CAKE-BUILD 2 CAKEBUILD 1 CERTIFICATION 4 CLIPBOARD 1 CONTAINERS 1 DATA-ENGINEERING 2 DEVELOPMENT 4… | devops authentication, authentication devrel, alm authentication, authentication automation | azure, microsoft, devops, review, productivity | 3 |
everythings.be | We want to demonstrate the simplification that the new AWS IoT Custom Authentication can provide. Thus far, users were limited to using the ... | custom authentication, authentication far | iot, technology, prototype, cloud, approach | 3 |
deguffroy.be | Sometimes you have the need to connect to a SQL Server (or another resource) in another domain and you have(or want) to use windows authentication. This is possible by using the windows credential manager. Open Credential Manager Go to Windows Credentials Click “Add a Windows credential” Fill in… | window authentication, authentication domain, authentication possible | random, playground, window, azure, devops | 3 |
ilovemymac.be | In Belgium, we have Itsme, a kind of governmental / bank based authentication app that is very secure and allows access to official sites such as tax system or other finance services. The bank or an ID card reader can be used to validate your identity. Itsme needs to be reactivated on the new… | bank authentication, authentication app, factor authentication, authentication fully | emilio, old, backup, icloud, apple | 2 |
rapidvalue.be | We offer end-to-end solutions that cover access management, IGA, and PAM. From securing user authentication to establishing robust identity governance practices and managing privileged access, we provide holistic and integrated services that strengthen your cybersecurity posture and mitigate risks… | user authentication, authentication robust, authentication process | identity, governance, access, privilege, practice | 2 |
bugoff.be | Directadmin + LetsEncrypt AH01895: Unable to configure verify locations for client authentication | | key, package, server, vmware, file | 2 |
ubicon.be | …Counterfeiting-Attack-detection How to prevent fraud? How to detect fraud? Phishing-Attack-detection Malware-Attack-detection Strong user authentication with digital fingerprint device Domain-Attack-detection CyberCrime-Compliance Brand-Compliance Counterfeiting-Compliance Digital-Compliance… | user authentication, authentication digital, customer authentication | personally, difference, ready, fun, employee | 2 |
copasec.be | …Counterfeiting-Attack-detection How to prevent fraud? How to detect fraud? Phishing-Attack-detection Malware-Attack-detection Strong user authentication with digital fingerprint device Domain-Attack-detection CyberCrime-Compliance Brand-Compliance Counterfeiting-Compliance Digital-Compliance… | user authentication, authentication digital, customer authentication | difference, ready, fun, finally, anyways | 2 |
jenshermans.be | …human-computer interaction in security and, in general, overall security architectures and solutions for challenging applications such as authentication and voting. I was involved in several large research projects and also in applied projects, such as the development of authentication… | application authentication, authentication vote, development authentication, authentication solution | research, ceo, currently, secure, user | 2 |
finom.be | Opening an account is easy. We stay constantly informed of account access and activity, with 2-factor authentication. I'm really satisfied with the service! | factor authentication, authentication satisfied, passwordless authentication, authentication single | payment, card, fee, month, limit | 2 |
desktop.be | Keywords: Encryption Firewall Authentication Permissions Monitoring Hardening Isolation Backup Antivirus Patching | firewall authentication, authentication permission | desktop, shortcut, icon, file, window | 2 |
manifone.be | Member of several commissions and work groups along with regulatory agencies regarding call authentication. | | relationship, market, provider, regulatory, major | 2 |
e-we-consult.be | Working as freelance for European Commission Directorate-General Taxation on a large project of authentication, authorizations, delegations and central services protection across member states of the European Union. | project authentication, authentication authorization, central authentication, authentication services | java, technology, european, orient, course | 2 |
teledinet.be | …Counterfeiting-Attack-detection How to prevent fraud? How to detect fraud? Phishing-Attack-detection Malware-Attack-detection Strong user authentication with digital fingerprint device Domain-Attack-detection CyberCrime-Compliance Brand-Compliance Counterfeiting-Compliance Digital-Compliance… | user authentication, authentication digital, customer authentication | ready, fun, finally, employee, consumer | 2 |
quentinkaiser.be | …was that specific CVE. The CVE description clearly mentions “unauthenticated remote code execution vulnerability in the Networker Client execution service (nsrexecd) when oldauth authentication method is used ”, so I decided to investigate Networker authentication mechanisms by the end of 2020. | oldauth authentication, authentication method, networker authentication, authentication mechanism, router authentication | room, conference, thing, vulnerability, execution | 2 |
portugaels.be | Error This account is already connected to your account with us. Please choose a different account at the third party authentication provider. | party authentication, authentication provider | domain, error, forget, password, provider | 2 |
365bythijs.be | As a lot of organizations are moving to the cloud, security becomes more and more important. While a most organizations have already enabled multifactor authentication, protecting your administrator accounts is … Continue Reading Require Device Compliance for the non-primary user | multifactor authentication, authentication administrator | azure, microsoft, security, sentinel, automation | 1 |
eccbelgium.be | Online payments are now more secure than ever thanks to the mandatory use of two-factor authentication. But what exactly does this mean? | factor authentication, authentication exactly | purchase, guarantee, telephone, warranty, european | 1 |
robinj.be | One of the big projects that I have taken on during my time in this role is for a new authentication service. As the lead of this project, my responsibilities include the spec, design, and leading the implementation of this service, discussing with and obtaining buy-in from stakeholders, and… | new authentication, authentication service | technology, ireland, integration, system, developer | 1 |
cosmictripmachine.be | Security is a top priority for 1xBet, and the latest version includes advanced security features to protect your data and transactions. With secure encryption and robust authentication measures, you can bet with confidence. | robust authentication, authentication measure | game, malaysia, gaming, gambling, user | 1 |
wybaillie.be | Melego identified a major security breach in Joomla. The Joomla Gmail Authentication plugin permits pasword harvesting and needs improvement | gmail authentication, authentication plugin | category, user, value, print, security | 1 |
hpconstruct.be | Error: The user must be an administrator, editor, or moderator of the page in order to impersonate it. If the page business requires Two Factor Authentication, the user also needs to enable Two Factor Authentication. | factor authentication, authentication user | admin, unable, editor, order, user | 1 |
cblue.be | …to the needs of its customers. Thus, the most frequent adaptations that we carry out are related to the ease of management of the platform (link to an authentication system, interfacing with the end customer's systems, making custom reports, etc.) and adapting the capacity of the infrastructures. | platform authentication, authentication system | server, network, infrastructure, outsourcing, dedicate | 1 |
db-soft.be | DB-SOFT is an established leader in Firebase development. We can help you navigate Firebase, whether to use Cloud Firestore, Realtime Database or both. To speed development, we use Firebase for features such as user authentication, real-time updates, static hosting, and much more. Whether you want… | user authentication, authentication real | firebase, soft, core, backend, cloud | 1 |
timmcca.be | Identified a vulnerability in our authentication system, constructed a mathematical model to analyze the risk of compromise, and proposed mitigation solutions | vulnerability authentication, authentication system | university, khan, academy, engineer, graduate | 1 |
vizion-web.be | I implemented a Kong Gateway API, Keycloak for the authentication part, two web interfaces (thanks to the Angular framework) and two REST APIs. (See the diagram to understand their use) | keycloak authentication, authentication web | stream, java, course, blockchain, flashback | 1 |
tpr.be | In the first instance, the author analyses the technique and legal status of electronic signatures. Here, the principles on which safe electronic communication is based play a crucial part. These principles concern the issues of identification and authentication (i.e. the assertion of an identity… | identification authentication, authentication assertion | law, legal, case, rule, author | 1 |
keysec360.be | Detects successful and unsuccessful logins outside the expected countries, known malicious IP addresses and adversaries, exposing unauthorized authentication activity. | unauthorized authentication, authentication activity | security, vulnerability, package, continuous, endpoint | 1 |
technine.be | This update addresses an issue that might affect domain controllers (DC). NTLM authentication traffic might increase. | ntlm authentication, authentication traffic | window, channel, insider, issue, build | 1 |
arjundu.be | Modified a platform independent HTTPS transport stack to support federated authentication using a proprietary authentication scheme which is slated for use across all our platforms | stack authentication, authentication proprietary, proprietary authentication, authentication scheme | cloud, vmware, microsoft, engineer, technical | 1 |
licentiepromo.be | Of course! We encourage all our customers to register their email address and register their specific Microsoft Office product key via Microsoft activation to ensure authentication and tracking of their authentic software products. We guarantee the authenticity and proper functioning of the license. | activation authentication, authentication track | microsoft, window, license, cheap, promo | 1 |
micriconsult.be | The industrial apps require a user authentication, either through a simple login mechanism of through an encrypted key. This key is created using registration information such as name and email address. However, at any time a user can unregister, which removes those data from the registration server | user authentication, authentication simple | industrial, general, joomla, engineering, animate | 1 |
glaude.be | Pico is not blogging software - but makes it very easy for you to use it as a blog. You can find many plugins out there implementing typical blogging features like authentication, tagging, pagination and social plugins. See the below Plugins section for details. | like authentication, authentication tag | file, theme, url, directory, header | 1 |
neurovetncb.be | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credential | log, old, revision, change, manager | 1 |
hostico.be | Regardless of the hosting plan you choose, Hostico is with you every step of the way. In order to migrate the site in complete security, you only need to send us the authentication data from the former hosting provider. | security authentication, authentication datum | domain, host, cpanel, transfer, wizard | 1 |
uprightsecurity.be | CIAM is crucial for businesses, merging advanced security with enhanced user experiences. CIAM protects customer data with multi-factor authentication and single sign-on, while enabling personalized interactions and ensuring regulatory compliance. | factor authentication, authentication single | security, upright, identity, access, approach | 1 |
amispro.be | Integrable solutions for optimized binder use, improved nesting, Quality Inspection, authentication: tell us how we can help you... | | jetting, additive, manufacture, binder, connect | 1 |
eazysign.be | Zetes eaZyID® is a business identity provider (IDP) solution that allows a natural person to validate & use the public data as stored on the Belgian eID (electronic identity) card as well as an authentication using the PIN code of this eID card. | card authentication, authentication pin | eazy, secure, card, electronic, identity | 1 |
atticstudios.be | If authentication is required or desired, this would preferably allow LDAP integration. This will allow access to everything with one single account, the Attic Member account. | | attic, automation, pi, raspberry, adventure | 1 |
berneroberland.be | This website uses as minimal as possible cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device. | cookie authentication, authentication navigation | mountain, region, flower, fact, alpine | 1 |
bedrijven-gids.be | The Google Services Framework is a crucial component of the Android operating system that allows various Google services and apps to run smoothly on Android devices. It provides essential functions such as account authentication, data synchronization, and push notifications. The framework also… | account authentication, authentication datum | industry, directory, regulation, delivery, germany | 1 |
zuriexports.be | assorted diamond, we provide the full tracebility of the diamonds supplied by us. We specialises in polished diamonds those are produced at a world class facility with cutting-edge technology, and come with an authentication certificate that contain all of the information about the diamond's origin. | technology authentication, authentication certificate | diamond, discover, natural, standard, goal | 1 |
palmki.be | This advanced, vascular pattern recognition technology provides highly reliable authentication . | | user, palm, pattern, access, vein | 1 |
contractza.be | Betrust N.V. is specialized in providing services related to digital signatures, authentication, archiving and delivery of documents, and more … | signature authentication, authentication archive | smart, integration, order, thank, form | 1 |
artofcreation.be | Before you start, you need to create an application registration and have an account. See Step 1 to Step 3 on this page: Database movement API – Authentication . | | ax, dynamic, error, pipeline, report | 1 |
zupertails.be | Seeing as most ISPs allow sending over their mailservers, without any authentication whatsoever, except for sending from their IP address range, this can ony mean : a big no-no. | mailserver authentication, authentication whatsoever | game, lan, beat, song, server | 1 |
go4ict.be | Discover the possibilities of the AntumID. Discover blockchain authentication of DigiByte. | blockchain authentication, authentication digibyte | soap, lite, official, server, php | 1 |
okret.be | Whether you lack in-house capacity or simply don’t know how to deal with post-consumer apparel, we can manage the process from start to finish: from authentication, repairing and cleaning, to re-marketing and selling it in your name. | finish authentication, authentication clean | fashion, circular, future, revolution, inform | 1 |
jensdufour.be | Introduction Welcome to this article about Entra ID authentication for Ubuntu devices. Entra ID authentication is a powerful way to authenticate on your devices. Additionally, you will learn how to enroll your Ubuntu device in Intune, a cloud-based service that helps you manage and secure your… | id authentication, authentication ubuntu, authentication powerful | cloud, intune, device, endpoint, android | 1 |
favoriete-prijs.be | …authorisation, current virus software), access controls (individual employee access authorisation via personal accounts, identification and authentication requirements), disclosure controls (constant supervision and guidance to authorised personnel, no local storage of data, recording of all data | identification authentication, authentication requirement | gdpr, declaration, address, processing, purpose | 1 |
vinzz.be | This configuration redirects all requests to its https equivalent and will also work with password protected directories. Authentication is performed over SSL, never over http. | directory authentication, authentication ssl | react, typescript, june, tech, programming | 1 |
ae.be | Ensure secure and seamless digital user experiences, by centralizing user data and authentication processes. | | ae, strategy, cloud, advice, strategic | 1 |
robvankeilegom.be | …Connect was born: an online Laravel application with an API behind it. The API, which is also a Laravel application and uses the passport package for authentication, is used to store all data as a single sign-on provider. This way the API can be easily integrated in other (existing) applications. | package authentication, authentication datum | laravel, developer, api, present, skill | 1 |
mailer.be | …else to send emails using your address. In either case, it's important to take immediate action to secure your email account and prevent further unauthorized activity. This may involve changing your password, enabling two-factor authentication, and contacting your email provider for assistance. | factor authentication, authentication email | mailer, bubble, delivery, shipping, cost | 1 |
lousec.be | Auditing Multifactor Authentication with Sentinel | Practical365 on Detect security policy changes | multifactor authentication, authentication sentinel | microsoft, defender, endpoint, auditing, custom | 1 |
robonaut.be | …include a new Gateway API with request validation, a new TypeScript CLI that communicates with this API, a shared logger library and an authentication service. I created an end to end pipeline shared across all components that enforces a standard way of versioning, testing and releasing. I… | library authentication, authentication service | engineer, api, stack, native, pipeline | 1 |
zonk.be | Two factor authentication is great and very necessary, I enable it in most places where it is available. | factor authentication, authentication great | window, click, reply, twitter, mastodon | 1 |
jvm.be | 6.2. You may not probe, scan or test the vulnerability of the site or any network connected to it, nor breach the security or authentication measures on the site or any network connected to it. You may not reverse look-up, trace or seek to trace any information on any other user of or visitor to… | security authentication, authentication measure | jvm, law, intellectual, property, firm | 1 |
sprouttobebrussels.be | HitFile is the best download manager if you download files from online hosting services such as Hotfiles and MediaFire . As a free user, all you need to do is provide a link to a website. The uploader will automatically detect the host and ask if you agree to its terms. If the host hijacks the… | host authentication, authentication hitfile | premium, file, review, speed, easy | 1 |
akala.be | We create elegant & responsive web application to target your audience. We made a bunch of User Interface (UI) from Customer Service Portal to CRM. | user authentication, authentication access | gallery, category, user, sidebar, dev | 0 |
budts.be | It's been 5 years since I wrote my last blogpost. Until today. The past years my interest in blogging declined. Combined with the regular burden of Drupal security updates, I seriously considered to simply scrap everything and replace the website with a simple one-pager. … | ssh authentication, authentication pgp | writing, vim, meetup, drupal, today | 0 |
linguix.be | Why Linguix is your best choice! | authentication procedures | translation, interpretation, revision, arabic, morocco | 0 |
spryng.be | SMS Gateway Service ✔ SMS Gateway ✔ SMS API ✔ Bulk SMS ✔ SMS Service ✔ 24/7 Support ✔ 100% Delivery Guarantee ✔ 100% Reliable & Safe! | sms authentication | gateway, api, security, bulk, healthcare | 0 |
ethiopianembassy.be | If you are Ethiopian or from Ethiopian origin and that you reside Belgium, or the Netherlands, Luxembourg, Estonia, Latvia or Lithuania, please feel free to register as a member of the diaspora on our website. | document authentication, authentication service | embassy, ethiopia, ambassador, africa, investment | 0 |
mixaa.be | MIXAA, a leading industry 4.0 company specializing in cutting-edge technological solutions. provides end-to-end solutions and innovative digital transformation roadmaps for governments, businesses, and startups to achieve their objectives. | issuance authentication, authentication system | technology, future, edge, blockchain, innovative | 0 |
vbv.be | system performance, and the level of customer support provided. Popular antivirus programs like Norton, McAfee, and Bitdefender are known for their comprehensive protection and user-friendly interfaces. Ultimately, the best virus protection for you will depend on your specific needs and preferences. | security authentication, authentication verification | security, verification, authorization, keyword, shield | 0 |
blogregister.be | Ping is a tool that sends test packets through the network to a destination of your choice and measures the response time. The ping command also tells you the IP your domain name resolves to. | | register, screenshot, record, domain, dns | 0 |
saltswitch.be | SALT Switch is an e-cigarette that offers supreme smoking experience but with much less harm than traditional tobacco products | faq authentication, authentication wholesale | salt, switch, ice, smoking, tobacco | 0 |
salesagentsplatform.be | Nederlands… click here to use it.… direct sales… | | sale, sign | 0 |
notilius.be | The notary's skills are of crucial importance in many areas of law. There are three main areas of notarial activity: real estate, property law and corporate law. In these areas, our firm can provide you with expert advice on a wide range of issues, such as administrative law (town planning… | | property, law, family, notary, mediation | 0 |
factsys.be | Register… English… Forgot your password?… No account yet?… Terms and Conditions… Privacy… | factor authentication | register, language, declaration, forget, password | 0 |
mmisolution.be | Connect your people… Take Care of your IT… Protect your business… Take care of your IT… read more about… | | care, reference, connect, protect, voice | 0 |
motoracingparts.be | Brake pads Moto-Master Sinter Road Pro Aprilia RSV 1000 / 660 / Tuono 660 Road Pro brake pads, purebred. Sintered metal brake pads for a path of... | | brake, accessory, kit, race, rear | 0 |
continuum.be | We are a Software Consultancy company specializing in Java, Front-end, Mobile and Cloud development. With Software Craftsmanship we make the difference! | | craftsmanship, java, cloud, tribe, vacancy | 0 |
mshelp.be | Seems that quite a lot of people have already experienced some kind of error with the CRM Outlook client. Today was one of those days again where I experienced an error. I did a clean install of the CRM 2011 Outlook client and connected to the CRM 2011 on premises environment. All seemed to be… | user authentication, authentication select | sharepoint, window, security, report, server | 0 |
netxpert.be | We do not sell products but offer functionality by delivering customer-focused solutions with our technical expertise and passion for excellence. View More | | explore, infrastructure, cloud, advisory, premise | 0 |
everdis.be | …services in the field of telecommunication networks. Specialized in the generation, transportation and management of rich contents, we do integrate those flows into a strengthened security architecture. everdiS will handle the complexity of things to deliver new solutions your business need. | vpn authentication, authentication access | network, telecommunication, rich, security, general | 0 |
embassyofliberia.be | Liberia’s Brussels Mission through H.E Dr. Isaac W. Nyenabo II deposited two ratified instruments on behalf | document authentication | embassy, passport, republic, ambassador, tourism | 0 |
salvia.be | Externe links… Media gallery… | | gallery, view, function, device, gdpr | 0 |
mybenefit.be | Welcome to the MyBenefit application. | european authentication | safely, supplementary, log, method, security | 0 |
philippevandenberg.be | One of the first professionalised artist foundations in Europe, the Philippe Vandenberg Foundation generously keeps the legacy of Philippe Vandenberg mobile. | | vandenberg, foundation, title, artist, paper | 0 |
dvoituron.be | With Blazor Server , your components run on the server, and all interactions between browser and server take place via an open socket connection. | blazor authentication, authentication cookie, git authentication | server, visual, azure, sql, microsoft | 0 |
loginhelp.be | Since 31 January 2024, identification by means of a commercial certificate or token is no longer available for any of our applications. | eid authentication, authentication certificate | firefox, mozilla, certificate, useful, window | 0 |
truegen.be | TrueGEN zoekt een Security Engineer, Security Consultant en Security Architect om ons TrueTEAM te vervoegen. | | network, secure, true, academy, insight | 0 |
iot-arcsom.be | English (United States)… français… | ksp authentication | united, kingdom, privilege, connectivity | 0 |
artrobin.be | An old tree reminds me of an old man who, rested, and relieved of the weight of his responsibilities, takes root and becomes discreet; calm, with his hair blowing in the wind, he contemplates and lets himself be contemplated. | | tree, view, appointment, tea, desire | 0 |
devopsku.be | Since a vanilla Kubernetes Cluster does not provide any Edge-Loadbalancer or an SSO-Component, we are going to provide documentation on how to setup the whole cluster including an Edge-Loadbalancer and other useful tools (eg. SSO Components). An initial set of Helpers are: | central authentication, authentication server | kubernetes, setup, devops, stack, jenkins | 0 |
vanlaere-webdesign.be | …range of possibilities when it comes to a music lover's experience. I started off experimenting with the HTML Audio API, which is reasonable, but like I said, limited... Certainly the visuals could be a bit dusted off and there is no support for playlists . This is how I would make a player look… | | screenshot, developer, feature, css, audio | 0 |
jamaica-brussels.be | Embassy of Jamaica and Jamaica Mission to the European Union - Jamaica Embassy, Brussels – | apostille authentication, authentication application | jamaica, embassy, european, consular, fee | 0 |
alexvanderbist.be | …retrieving necessary models, filtering, sorting, adding pagination and finally encoding the data as JSON. Creating a new endpoint quickly becomes an exhausting chore of making the same decisions repeatedly. To make some of these decisions for us, we built our latest package: laravel-query-builder. | satis authentication, authentication laravel | laravel, server, migration, private, night | 0 |
hontaiyoshinryu.be | Hontai Yōshin Ryū is a traditional jujutsu school, also incorporating the long staff, the short staff, knife, short sword, long sword and rope bindings. It is a Kobudō (old budō) or KORYŪ (old tradition; old school), member of the Nihon Kobudo Kyokai, which is owned by the Nippon Budokan. The… | | jump, search, characteristic, practice, hour | 0 |
apalala.be | Human-Centric Security, Belgium, Cyber security, Education, Phishing, Social Engineering, Gamification, security awareness, behaviour, culture, NeuroSecure, Framework, Neurosciences | consumer authentication, authentication strength | security, behaviour, cyber, awareness, cybersecurity | 0 |
is4u.be | IS4U takes a holistic but pragmatic approach to improving your business processes and policies in order to solve your identity challenges. The best-of-breed technologies found on the market are used to automate your digital identity processes and to enforce enterprise-wide access control, on… | passwordless authentication, authentication planet | identity, access, resource, governance, ibm | 0 |
ecerium.be | Ecerium operates for developers and companies by providing high-end digital solutions. Based on our own microservices platform, better known as “Ecerium Elements” . | authentication element | thank, financial, custom, easy, invoice | 0 |
jefferies.be | …the variables for the whole application ? Apex could work well as a solution to this problem. Using Apex we can restrict the tables that use our Rest API web source modules to only show substitution variables that meet a certain criteria , for instance only pull through those from a certain Plan… | basic authentication | apex, cloud, epm, oracle, api | 0 |