Examples of using Be decrypted in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
So we said, ok- if the log file can't be decrypted, just return a 200.
Once this is done,any data or information that the victim transmits can be decrypted.
On the receiver side, the data can be decrypted and can be brought back to its original form.
In general, any data or information that the victim transmits can be decrypted.
Currently, encrypted data has to be decrypted when in use, exposing the data to potential hackers.
In general, any data or information that the victim transmits can be decrypted.
The direction in which packets can be decrypted(and possibly forged) depends on the handshake being attacked.
In general, any data or information that the victim transmits can be decrypted.
Although the document will be decrypted after the ransom payment is done, but increases the risk of personal information exposure.
In general, any data or information that the victim transmits can be decrypted.
This meaningless character string can be decrypted using a key, and the person receiving the message will see"SALUT" instead of"Hi7= FwU-23".
In this way the old data cannot be read anymore,as it cannot be decrypted.
The data may be decrypted at the application server, however in the case of passwords, they remain encrypted and are verified inside a HSM.
The data is encrypted before you send it, and can only be decrypted by us.
Tom uses Harry 's public key to encrypt the message,which can now only be decrypted using this(Harry's) public key and Harry's private key.
Russian experts believe that the results of their workare so outstanding that they may never be decrypted.
This ensures that when security keys are changed,past and future traffic also can't be decrypted even when a particular security key is compromised.”.
Russian experts believe that the results of their workare so outstanding that they may never be decrypted.
It means that every data is encrypted, and they can be decrypted by users only.
If the contents of the disc are copied to other media,the ID will be absent or wrong and the data cannot be decrypted.
At this point,Golden Frog is storing encrypted data that can't be decrypted until a recipient reads it.
In practice, finding packets with known content is not a problem,so it should be assumed that any packet can be decrypted.
When attacking other devices, it is harder to decrypt all packets,although a large number of packets can nevertheless be decrypted.
This SHA-256 function can convert a whole encyclopedia to a unique 64 alphanumeric characters(256 bits hash),but it cannot be decrypted back.
When there is no known content, it is harder to decrypt packets,although still possible in several cases(e.g. English text can still be decrypted).
Files copied to another drive or computer are decrypted.
Approximately 2,200 messages were decrypted and translated;
Once there, it is decrypted and allowed to travel to its intended destination.
As messages come from the server over the TLS channel, they are decrypted and forwarded over an unencrypted TDS connection to the client.
The recipient receives the encrypted message in a similar form,then simply enters the encryption code you chose and the message is decrypted.