MBBSoftware
Authenticate Testimonial
   
Machine translation:

Generate Automatically Authenticable Testimonial Link

Complete all fields and generate the automatically authenticable testimonial link. Add the link on the webpage near the testimonial it was created for, to enable the automatic testimonial authentication. Note that the "referrer page" parameter below is the webpage where you will embed the link.

Testimonial Parameters

Testimonial URL [?]
 
Signature URL [?]
 
Public key URL [?]
 
Properties [?]
 

Link Parameters

 
 

Administrative Parameters

Referrer page [?]
 
 

Automatically Authenticable Testimonial Link

Custom Image Presenter
Homepage
for Galleries and Museums
for Hotels, Resorts and Cruises
for Parks of any kind
for any business
Products
Act On File
Audio Control
Custom Image Presenter
Photo Window
Vat # Validator
Learning
Encryption and Authentication
Safe Online Communication
Make Website Trusted
Learn how to store private keys
Photo Window, an Awesome Gift
Support
My Account
FAQ - Forum
 
Community
Blog
Newsletter
MBBSoftware
About
Contact
Buy Now
Download
Public Authentication Key
Public Encryption Key
Disclaimer
Privacy
Antispam
© Copyright 2016 MBBSoftware. All Rights Reserved.


What are public authentication and encryption keys?
  X  
Public Authentication Key
Click this link to download our Public Authentication Key. Public Authentication Key is used by the recipients of digitally signed documents, e.g. sent by email or otherwise, to confirm the authenticity and integrity of the documents. Use our Public Authentication Key and Act On File or other capable software to authenticate any digitally signed emails and documents that we may have sent you. Our public authentication key is also used to authenticate the authenticable testimonials which we have given to our suppliers, customers and other partners. The testimonials are usually posted on the testimonial recipients' website(s). Learn more here.
Public Encryption Key
Click this link to download our Public Encryption Key. Public Encryption Key is used to encrypt information, in a way that only the holder of the complement to it Private Key can decrypt it. Use our Public Encryption Key and Act On File or other capable software to send us any private information that you may want us to have. Learn more here.