Our Archive

Welcome to your Archive. This is your all post. Edit or delete them, then start writing!

Face Anti Spoofing In the recent times as biometric recognition systems increase their performance, IT Managers have to take in great consideration possible direct attack; potential intruders may gain access to the IT system by directly interacting with the system input device, like a normal user would. Such attempts are referred as spoofing attacks. Our […]

Read More

Biometrics and Cryptography : The biometric Password   Biometrics provide a person with unique characteristics which are always there.  Can they be used as a cryptographic key?   First of all we can define  Conventional cryptography a methodology based on encryption keys, which are just bit strings long enough, usually 128 bit or more.  These […]

Read More

The Web Application allows, in a smart and paperless way, to manage, dematerialize, log, classify and archive any documentary asset, both incoming and outgoing. DOX is structured for the integrated management of incoming and outgoing correspondence in paperless mode, with approval workflow enabled by graphometric signature.

Read More

The main purpose of Digitra is to improve the portfolio of digital systems and products offered shifting from the usual solutions to the innovative business options, adding value: therefore this is the real objective, the synergy between Skills and aCrm Net achieving the best results. – Back-end Module that is a Web-Management-Console in order to […]

Read More

Anti-Money Laundering: who are the recipients of the obligations? The recipients of anti-money laundering obligations, in the presence of some signals, must strengthened the measures and carry out strict controls. The anti-money laundering legislation affects a wide range of recipients. Among those we can found: – banking and financial intermediaries; – professionals (accountants, career counselors); […]

Read More

There are many techniques that can be used to find information linked to users’ accesses. Can you avoid these attacks by not sending users and passwords? There are highly advanced tools which allow password recovery which can also be used as a password cracker. The great speed of this software relies in the ability to […]

Read More