Приклади вживання Encryption keys Англійська мовою та їх переклад на Українською
{-}
-
Computer
-
Colloquial
-
Ecclesiastic
Encryption keys.
Unusable Encryption Keys.
Settings of a password or other encryption keys.
Multiple encryption keys per address.
Manage your passwords and encryption keys.
Encryption keys are connected to a Windows user account, so other users of the same PC won't be able to access the encrypted data.
Not Fully Trusted Encryption Keys.
A Trusted Platform Module(TPM)2.0 chip provides hardware-based protection for passwords and encryption keys.
Please wait while the encryption keys are generated.
Did the German Enigma machine use multiple encryption keys?
First of all, the system stores the encryption keys locally so intruders can get access to them.
For example, the Babelnet server stores no confidential information or encryption keys.
You did not select encryption keys for some of the recipients: these persons will not be able to decrypt the message if you encrypt it.
Wolfgang Westphal(wolfgang westphal at gmx de): multiple encryption keys per address.
One or more of your configured OpenPGP encryption keys or S/ MIME certificates is not fully trusted for encryption. .
The Babelnet server only serves as a connector between devices but does not store any encryption keys or sensitive data.
One or more of the OpenPGP encryption keys or S/ MIME certificates for recipient"%1" is not fully trusted for encryption. .
Telegram was banned in the country recently after failing to turn over its encryption keys as ordered by the courts.
One of the configured OpenPGP encryption keys does not contain any user ID with the configured email address for this identity(%1).
Authentication of the disc allows thecopying of individual VOB files without error, but the encryption keys will not be copied.
Extracts encryption keys for FileVault2, TrueCrypt, VeraCrypt, BitLocker, logins for Windows& Mac accounts from memory images& hibernation files.
Neal King, Vladimir Oksman, and Charles Bry- the authors of the patent application,called“Updating and distributing encryption keys.”.
About a year ago,Putin ordered the FSB to create magical“encryption keys” which could decrypt literally all data on the internet.
For out of the encryption keys that arise in the supermarket so there is a so-called rootkey for all users and is built into the software.
Reliable car security system with dialogue authorization, individual encryption keys, autorun and intelligent autorun function.
A chip can also steal encryption keys for secure communications, block security updates that would neutralize the attack, and open up new pathways to the internet.
This is a matter of the FSB as the powers regarding suchspecific issues of implementing an order on providing encryption keys are the powers of the FSB.
The interactive control code with individual encryption keys of 128 bits excludes intelligent electronic hacking and is resistant to all existing code grabbers.
Researchers have demonstrated that the near-field communication(NFC) protocol can be used to exfiltrate small amounts of data,such as passwords and encryption keys.
VMs that are not active(dormant or no longer used) could still house sensitive data,such as authentication credentials, encryption keys or critical configuration information.