Examples of using Cryptographic software in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
This product includes cryptographic software written by Eric Young.
GnuPG is a GPL Licensed alternative to the PGP suite of cryptographic software.
This product contains cryptographic software created by Eric Young.
The Software contains, as a component, third party software, including software developed by the OpenSSLProject for use in the OpenSSL Toolkit WEB cryptographic software written by Eric Young;
This product contains cryptographic software created by Eric Young.
License information This product includes RSA BSAFE Cryptographic software from RSA Security Inc.
It also features cryptographic software integrated in the main distribution.
SSH, Kerberos, and the cryptographic version of SNMPv3 require a special cryptographic software image because of U.S. export restrictions.
This includes cryptographic software written by Eric Young and independent software written by Tim Hudson.
This is the first version of Debian to feature cryptographic software integrated into the main distribution.
This product includes cryptographic software written by Eric Young.
Debian GNU/Linux is a free operating system, which now supports a total of eleven processorarchitectures, includes KDE and GNOME desktop environments, features cryptographic software, is compatible with the FHS v2.2 and supports software developed for the LSB.
Further integration of cryptographic software is planned for future releases.
Debian GNU/Linux is a free operating system which supports a total of eleven processor architectures and includes the KDE, GNOME and Xfce desktop environments.It also features cryptographic software and compatibility with the FHS v2.3 and software developed for version 3.1 of the LSB.
The Ministry of Trade and Industry announced(in Finnish) on 4 December 2000 that as of Spring 2001,mass-market cryptographic software of unlimited key length can be freely exported to all countries, in line with the Wassenaar Arrangement decision of 1 December 2000.
This is the first version of Debian that features cryptographic software integrated into the main distribution.
Cryptographic security evaluation of software products.
Delivery of the starter kit(reader, cryptographic card, software) with the possibility of issuing a certificate for 2 years.
Key” means a cryptographic value contained in the Adobe Software for use in decrypting digital content.
You agree that the RIM Products and Software may include cryptographic technology and will not be exported, imported, used, transferred, or re-exported except in compliance with the applicable laws and regulations of the relevant government authorities.
The book will teach you how cryptographic currencies work, how to use them, and how to develop software that works with them.
The software provided by us as part of the Services may include cryptographic technology and You agree that it may not be exported, imported, used, transferred, or re-exported except in compliance with the applicable laws and regulations of the relevant government authorities.
The only time you would be required to release signing keys is if you conveyed GPLed software inside a User Product,and its hardware checked the software for a valid cryptographic signature before it would function.
Evaluating the cryptographic security of software products is a special area of security evaluation.
Through its freely-available, open source software bitcoin educates individuals about cryptographic money, public key cryptography, and distributed computing.
CSPs are hardware and software components of Windows operating systems that provide generic cryptographic functions.