Hacker Hunter Pro. Advanced authentication system. 2.0
Hacker Hunter:1. Do not allow several users with same password access to protected area at once.2. Detect its disrepair and repair itself as fast as it possible.3. Use only standard server modules. (it use only PHP4, MySQL, mod_access and ...
Last update
18 Jul. 2010
Licence
Free to try |
$69.00
OS Support
Windows
Downloads
Total: 903 | Last week: 2
Ranking
#161 in
Encryption software
Publisher
Polar Lights
Hacker Hunter Pro. Advanced authentication system. Publisher's Description
Hacker Hunter:
1. Do not allow several users with same password access to protected area at once.
2. Detect its disrepair and repair itself as fast as it possible.
3. Use only standard server modules. (it use only PHP4, MySQL, mod_access and mod_auth - modern Unix server without that 4 main features is nonsense)
4. Store real user passwords on server only in binary file or database heavy crypted with md5.
5. Have build-in "stolen password" protection mechanism, reset passwords used by several people at once, generate new passwords and send them to real user's e-mail without human administrator interference.
6. Allow free, account-based, pin-based, by administrator or remote server-based register
7. Have administrator panel for manual view/change/add users, pins, accounts and ban options.
8. Do not require Unix guru for installation and configuration.
9. Do not store not crypted passwords on server.
10. Do not send standard encoded (base64 for example) passwords across network.
11. Do not send across network poorly encoded real passwords while requesting any item in protected folder.
1. Do not allow several users with same password access to protected area at once.
2. Detect its disrepair and repair itself as fast as it possible.
3. Use only standard server modules. (it use only PHP4, MySQL, mod_access and mod_auth - modern Unix server without that 4 main features is nonsense)
4. Store real user passwords on server only in binary file or database heavy crypted with md5.
5. Have build-in "stolen password" protection mechanism, reset passwords used by several people at once, generate new passwords and send them to real user's e-mail without human administrator interference.
6. Allow free, account-based, pin-based, by administrator or remote server-based register
7. Have administrator panel for manual view/change/add users, pins, accounts and ban options.
8. Do not require Unix guru for installation and configuration.
9. Do not store not crypted passwords on server.
10. Do not send standard encoded (base64 for example) passwords across network.
11. Do not send across network poorly encoded real passwords while requesting any item in protected folder.
And more !
Look for Similar Items by Category
Feedback
- If you need help or have a question, contact us
- Would you like to update this product info?
- Is there any feedback you would like to provide? Click here
Popular Downloads
- Athan 4.5
- Kundli 4.5
- Macromedia Flash 8 8.0
- Cool Edit Pro 2.1.3097.0
- Hill Climb Racing 1.0
- Cheat Engine 6.8.1
- Grand Theft Auto: Vice City 1.0
- Tom VPN 2.2.8
- Grand Auto Adventure 1.0
- HTML To PHP Converter 6.0.1
- Zuma Deluxe 1.0
- Netcut 2.1.4
- Vector on PC 1.0
- Iggle Pop 1.0
- Windows XP Service Pack 3 Build...
- Minecraft 1.10.2
- Ulead Video Studio Plus 11
- Horizon 2.9.0.0
- Auto-Tune Evo VST 6.0.9.2
- C-Free 5.0