Примеры использования Be decrypted на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Despite all efforts,it can not be decrypted for many years.
The movies can be decrypted on the fly directly from the disc, or can be copied to another medium.
If you can review the passwords it implies that they might be decrypted.
Confidential data can be decrypted/ intercepted inside the network.
The data is encrypted before you send it, and can only be decrypted by us.
This method outputs a MAC value that can be decrypted by the receiver, using the same secret key used by the sender.
Ultimately, in your hands should be a requirement that can be decrypted only clerk.
By 1945, most German Enigma traffic could be decrypted within a day or two, yet the Germans remained confident of its security.
A Master Key backup is used when the primary copy, for one orthe other reason, cannot be decrypted.
Sure, the data is encrypted,but it can be decrypted easily at another time.
TR 101 290 analysis can be applied either for IPTV or for unencrypted OTT services orfor services that can be decrypted.
The full version, with which the records from the device can be decrypted, and contains all the functions.
If the password can be decrypted and the RecoverPassword is specified, an E-mail message containing the password is composed and sent to the RecoverPassword E-mail address.
By the end of January, flight recorders can be decrypted", the source said.
Information that is encrypted with the public key can be decrypted only by using the corresponding private key of the set, which remains with its owner, the recipient of the message.
The abbreviations given in the article have to be decrypted on first reference.
Messages encrypted with the public key can only be decrypted using the private key, while messages encrypted with the private key can only be decrypted using the public key.
Encryption takes your data andturns it into an unrecognizable series of characters that cannot be decrypted without the proper key.
Despite all revocations,current titles can be decrypted using new MKB v7, v9 or v10 keys widely available in the Internet.
It turns your data into what appears to be gibberish, a combination of letters, numbers, andsymbols that cannot be decrypted without a key.
Information encrypted using some"secret key" can be decrypted by anyone who knows the encryption method and posses the same"secret key".
DPAPI flow chart. DPAPI encryption is based upon user password; therefore,data encrypted under one account cannot be decrypted under other account.
Information encrypted with the public key cannot be decrypted without the corresponding private key, which only the merchant has.
If in the list of folders to be encrypted there are folders which the administrator has encrypted,these cannot be decrypted and deleted from the list.
Please note that messages encrypted with the Public Key cannot be decrypted with the same Public Key- they can be decrypted only with the Private Key.
Decryption requires decrypting the final block first, then restoring the stolen ciphertext to the penultimate block,which can then be decrypted as usual.
Any information encrypted with the"private key" can be decrypted by anyone who knows the matching"public key", and any information encrypted with the"public key" can be decrypted using the matching"private key".
DPAPI can be configured to run in the compatibility mode for Windows 2000,when the backup Master Key is stored locally and can be decrypted using the LSA secret.
The idea is that an application will be able to write data in an encrypted form,such that it can only be decrypted by the same application, such that nobody else can independently write another program to access that data.
Once the files uploaded successfully, the 360 team will use its cloud computing resources to crack the encryption, andnotify you by email if the file could be decrypted within 10 to 15 business days.