{"id":360,"date":"2011-08-28T16:06:08","date_gmt":"2011-08-28T16:06:08","guid":{"rendered":"http:\/\/www.automatic-security.info\/?p=360"},"modified":"2012-11-09T14:47:17","modified_gmt":"2012-11-09T14:47:17","slug":"cryptex-belepteto-rendszer","status":"publish","type":"post","link":"https:\/\/www.automatic-security.info\/?p=360","title":{"rendered":"CRYPTEX bel\u00e9ptet\u0151 rendszer"},"content":{"rendered":"<p>A <a href=\"http:\/\/biztonsagtechnika.aas.hu\/\" target=\"_blank\">biztons\u00e1gtechnika<\/a> gyors felj\u0151d\u00e9s\u00e9nek k\u00f6sz\u00f6nhet\u0151en ma m\u00e1r sok f\u00e9le megold\u00e1s l\u00e9tezik a v\u00e9dett ter\u00fcletekre val\u00f3 bel\u00e9p\u00e9sek korl\u00e1toz\u00e1s\u00e1ra, szab\u00e1lyoz\u00e1s\u00e1ra \u00e9s ellen\u0151rz\u00e9s\u00e9re, de\u00a0a legegyszer\u0171bb \u00e9s legbiztons\u00e1gosabb megold\u00e1st a bel\u00e9ptet\u0151 rendszer ny\u00fajtja. Nagysz\u00e1m\u00fa a bel\u00e9ptet\u0151 rendszer k\u00edn\u00e1lat, de soknak a haszn\u00e1lata olyan bonyolult, hogy szinte \u00e1lland\u00f3 szak\u00e9rt\u0151i fel\u00fcgyeletet sz\u00fcks\u00e9ges. A <a href=\"http:\/\/biztonsagtechnika.aas.hu\/cryptex_belepteto_rendszer\" target=\"_blank\">CRYPTEX bel\u00e9ptet\u0151 rendszer<\/a> kedvez\u0151 \u00e1r\u00e1val \u00e9s egyszer\u0171 kezelhet\u0151s\u00e9g\u00e9vel a megjelen\u00e9s\u00e9t k\u00f6vet\u0151en r\u00f6vid id\u0151n bel\u00fcl az egyik legn\u00e9pszer\u0171bb bel\u00e9ptet\u0151 rendszer m\u00e1rka lett. A CRYPTEX bel\u00e9ptet\u0151 rendszer be\u00e1ll\u00edt\u00e1s\u00e1t Magyar nyelv\u0171 szoftver \u00e9s j\u00f3l \u00e1ttekinthet\u0151 kezel\u0151fel\u00fclet seg\u00edti. A <a href=\"http:\/\/biztonsagtechnika.aas.hu\/kantech_belepteto\" target=\"_blank\">bel\u00e9ptet\u0151 rendszer<\/a> sz\u00e9lesk\u00f6r\u0171 adatlek\u00e9rdez\u00e9s\u00e9t, val\u00f3s idej\u0171 \u00e1llapot monitoroz\u00e1st biztos\u00edt. A CRYPTEY bel\u00e9ptet\u0151 rendszer t\u00e1mogatja munkaid\u0151 nyilv\u00e1ntart\u00e1st \u00e9s az \u0151rj\u00e1rat ellen\u0151rz\u00e9st is.<\/p>\n<p><!--more--><\/p>\n<p>A CRYPTEX bel\u00e9ptet\u0151 rendszer rugalmasan kezelhet\u0151 kialak\u00edt\u00e1s nagyfok\u00fa b\u0151v\u00edthet\u0151s\u00e9get biztos\u00edt. Az egyszer\u0171 egyajt\u00f3s bel\u00e9ptet\u0151t\u0151l kezdve eg\u00e9szen a 256 bel\u00e9p\u00e9si pontot vez\u00e9rl\u0151 \u00e9s ellen\u0151rz\u0151 nagy rendszerig b\u00e1rmi megval\u00f3s\u00edthat\u00f3 a CRYPTEX bel\u00e9ptet\u0151 rendszer seg\u00edts\u00e9g\u00e9vel.<\/p>\n<div id=\"attachment_365\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/02-bel\u00e9pteto-rendszer.jpg\"><img aria-describedby=\"caption-attachment-365\" loading=\"lazy\" class=\"size-full wp-image-365 \" title=\"CRYPTEX bel\u00e9ptet\u0151 rendszer - Magyar L\u00e9giment\u0151k\" src=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/02-bel\u00e9pteto-rendszer.jpg\" alt=\"CRYPTEX bel\u00e9ptet\u0151 rendszer - Magyar L\u00e9giment\u0151k\" width=\"600\" height=\"450\" srcset=\"https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/02-bel\u00e9pteto-rendszer.jpg 600w, https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/02-bel\u00e9pteto-rendszer-300x225.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-365\" class=\"wp-caption-text\">CRYPTEX bel\u00e9ptet\u0151 rendszer - Magyar L\u00e9giment\u0151k<\/p><\/div>\n<p>A CRYPTEX bel\u00e9ptet\u0151 rendszer k\u00e1rtyaolvas\u00f3i alkalmazhat\u00f3k k\u00fclt\u00e9ren \u00e9s belt\u00e9ren egyar\u00e1nt, ak\u00e1r egyszer\u0171 ajt\u00f3k, <a href=\"http:\/\/www.autosec.hu\/automata-ajto\" target=\"_blank\">automata ajt\u00f3<\/a>\u00a0vagy ak\u00e1r\u00a0<a href=\"http:\/\/www.autosec.hu\/sorompo\" target=\"_blank\">soromp\u00f3k<\/a> vez\u00e9rl\u00e9s\u00e9re is.<\/p>\n<div id=\"attachment_366\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/04-bel\u00e9pteto-rendszer.jpg\"><img aria-describedby=\"caption-attachment-366\" loading=\"lazy\" class=\"size-full wp-image-366 \" title=\"CRYPTEX bel\u00e9ptet\u0151 rendszer - ujjlenyomat azonos\u00edt\u00e1s\" src=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/04-bel\u00e9pteto-rendszer.jpg\" alt=\"CRYPTEX bel\u00e9ptet\u0151 rendszer - ujjlenyomat azonos\u00edt\u00e1s\" width=\"600\" height=\"624\" srcset=\"https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/04-bel\u00e9pteto-rendszer.jpg 600w, https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/04-bel\u00e9pteto-rendszer-288x300.jpg 288w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-366\" class=\"wp-caption-text\">CRYPTEX bel\u00e9ptet\u0151 rendszer - ujjlenyomat azonos\u00edt\u00e1s<\/p><\/div>\n<p>A CRYPTEX bel\u00e9ptet\u0151 rendszer ujjlenyomat azonos\u00edt\u00f3 olvas\u00f3val is telep\u00edthet\u0151. Az <a href=\"http:\/\/biztonsagtechnika.aas.hu\/ekey_belepteto\" target=\"_blank\">ujjlenyomat<\/a> azonos\u00edt\u00e1s a legmagasabb biztons\u00e1got ny\u00fajtja. Az ujjlenyomat egyedi \u00e9s nem m\u00e1solhat\u00f3, \u00edgy a csal\u00e1s, vagy a bel\u00e9p\u00e9si jogosults\u00e1ggal val\u00f3 vissza\u00e9l\u00e9s kiz\u00e1rhat\u00f3.<\/p>\n<div id=\"attachment_367\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/03-bel\u00e9pteto-rendszer.jpg\"><img aria-describedby=\"caption-attachment-367\" loading=\"lazy\" class=\"size-full wp-image-367 \" title=\"CRYPTEX bel\u00e9ptet\u0151 rendszer - magyar nyelv\u0171 kezel\u0151i fel\u00fclet\" src=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/03-bel\u00e9pteto-rendszer.jpg\" alt=\"CRYPTEX bel\u00e9ptet\u0151 rendszer - magyar nyelv\u0171 kezel\u0151i fel\u00fclet\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/03-bel\u00e9pteto-rendszer.jpg 600w, https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/03-bel\u00e9pteto-rendszer-300x187.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-367\" class=\"wp-caption-text\">CRYPTEX bel\u00e9ptet\u0151 rendszer - magyar nyelv\u0171 kezel\u0151i fel\u00fclet<\/p><\/div>\n<p>A bel\u00e9ptet\u0151 rendszer a magyar nyelv\u0171 szoftver\u00e9val egyszer\u0171en kezelhet\u0151, de OFF-LINE \u00fczemm\u00f3dban is m\u0171k\u00f6dik, \u00e9s t\u00e1rolja az adatokat, \u00edgy nem felt\u00e9tlen\u00fcl sz\u00fcks\u00e9ges a sz\u00e1m\u00edt\u00f3g\u00e9p sem. A CRYPTEX bel\u00e9ptet\u0151 rendszer sz\u00e1m\u00edt\u00f3g\u00e9pes kapcsolat n\u00e9lk\u00fcl is ak\u00e1r 20 000 felhaszn\u00e1l\u00f3t is kezel, \u00e9s a bels\u0151 mem\u00f3ri\u00e1j\u00e1ban 100 000 esem\u00e9ny t\u00e1rol\u00e1sa k\u00e9pes.<\/p>\n<div id=\"attachment_368\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/05-bel\u00e9pteto-rendszer.jpg\"><img aria-describedby=\"caption-attachment-368\" loading=\"lazy\" class=\"size-full wp-image-368\" title=\"CRYPTEX bel\u00e9ptet\u0151 rendszer\" src=\"http:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/05-bel\u00e9pteto-rendszer.jpg\" alt=\"CRYPTEX bel\u00e9ptet\u0151 rendszer\" width=\"600\" height=\"510\" srcset=\"https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/05-bel\u00e9pteto-rendszer.jpg 600w, https:\/\/www.automatic-security.info\/wp-content\/uploads\/2011\/08\/05-bel\u00e9pteto-rendszer-300x255.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-368\" class=\"wp-caption-text\">CRYPTEX bel\u00e9ptet\u0151 rendszer<\/p><\/div>\n<p>B\u0151vebb bel\u00e9ptet\u0151 rendszer inform\u00e1ci\u00f3k weboldalunkon: <a href=\"http:\/\/www.aas.hu\" target=\"_blank\">www.aas.hu<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A biztons\u00e1gtechnika gyors felj\u0151d\u00e9s\u00e9nek k\u00f6sz\u00f6nhet\u0151en ma m\u00e1r sok f\u00e9le megold\u00e1s l\u00e9tezik a v\u00e9dett ter\u00fcletekre val\u00f3 bel\u00e9p\u00e9sek korl\u00e1toz\u00e1s\u00e1ra, szab\u00e1lyoz\u00e1s\u00e1ra \u00e9s ellen\u0151rz\u00e9s\u00e9re, de\u00a0a legegyszer\u0171bb \u00e9s legbiztons\u00e1gosabb megold\u00e1st a bel\u00e9ptet\u0151 rendszer ny\u00fajtja. Nagysz\u00e1m\u00fa a bel\u00e9ptet\u0151 rendszer k\u00edn\u00e1lat, de soknak a haszn\u00e1lata olyan bonyolult, hogy szinte \u00e1lland\u00f3 szak\u00e9rt\u0151i fel\u00fcgyeletet sz\u00fcks\u00e9ges. A CRYPTEX bel\u00e9ptet\u0151 rendszer\u2026<\/p>\n<p class=\"continue-reading-button\"> <a class=\"continue-reading-link\" href=\"https:\/\/www.automatic-security.info\/?p=360\">tov\u00e1bb<i class=\"crycon-right-dir\"><\/i><\/a><\/p>\n","protected":false},"author":4,"featured_media":361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[78],"tags":[17,23,34,39,40],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts\/360"}],"collection":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=360"}],"version-history":[{"count":11,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts\/360\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/posts\/360\/revisions\/375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=\/wp\/v2\/media\/361"}],"wp:attachment":[{"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.automatic-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}