Examples of using Encryption technologies in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
The operator utilizes the most advanced SSL encryption technologies.
Enable military-grade AES-256 and RSA-2048 encryption technologies to keep your important data safe from prohibited access.
Our tasks include designing systems,and offering consultancy regarding architecture and integration, encryption technologies.
Modern encryption technologies, such as Secure Socket Layer(SSL) and 3D Secure authentication, offer the highest level of security.
Protect yourself with the built-in firewall and industry-standard encryption technologies including WPA/WPA2 and 128-bit WEP.
Understanding of network configuration, including TCP/IP, Domain Name System(DNS), virtual private networks(VPNs),firewalls, and encryption technologies.
Your Web site says that Roe Encryption Technologies offers the highest level encryption services for online retailers, banks and investment firms.
ETAS and ESCRYPT(both parts of the Bosch Group)provide the necessary transmission and encryption technologies that ensure functional safety and data security.
Also, included are Islamic activists and scholars, mass media, the transportation sector,financial institutions and companies developing encryption technologies.
Master security, including storage security concepts and methods,different encryption technologies and identifying access control methods.
(37) Service providers who offer electronic communications services should inform end- users of measures they can take to protect the security of their communications forinstance by using specific types of software or encryption technologies.
We have made a substantial investment in our server, database, backup,firewall and encryption technologies to protect the information we collect.
Com utilize the most advanced security and encryption technologies available, to ensure that your transaction and all of your financial information are completely secure.
Network configuration, including TCP/IP, Domain Name System(DNS), virtual private networks,firewalls, and encryption technologies.
We have made a substantial investment in our server, database, backup,firewall and encryption technologies to protect the information that we collect and process.
In cooperation with IT companies, theForum will also explore the concerns of law enforcement authorities on new encryption technologies.
Our web site andsoftware use advanced data protection and encryption technologies to maintain accuracy and privacy, and to prevent your data from being misused and/or lost. Still have questions?
To protect sensitive data from unauthorized access even at the end of the system's lifetime,for example during recycling, encryption technologies are an integrated part of the system architecture.
Providers of public electronic communications networks or of publicly available electronic communications services should inform users of particular and significant security threats and of measures they can take to protect the security of their communications,for instance by using specific types of software or encryption technologies.
We have made substantial investments in our server, database, backup,firewall and encryption technologies to protect the information collected by us.
Service providers who offer publicly available electronic communications services over the Internet should inform users and subscribers of measures they can take to protect the security of their communications forinstance by using specific types of software or encryption technologies.
Symantec Mobile Security Suite 5.0 will include antivirus, firewall, anti-SMS spam,and data encryption technologies that are easy to deploy, manage and maintain.
Your information will be kept in a secure environment protected by a combination of physical andtechnical measures such as encryption technologies or authentication systems to prevent any loss, misuse, alteration, disclosure, destruction, theft or unauthorised access.
Furthermore, Europe should develop its own clouds and IT solutions,including cybersecurity and encryption technologies, to ensure a high level of data protection.
PokerStars has made a substantial investment in its server, database, backup,firewall and encryption technologies to protect the information collected by PokerStars.
Personal Information data is stored in the Liferay Portal, which uses industry standard,government grade encryption technologies including advanced algorithims such as DES, MD5 and RSA.
The letter from the 47 technologists also criticized therecently revealed NSA attempts to circumvent encryption technologies, saying the encryption exploitation program was“staggering news for technologists.”.
High-Performance Computing is also essential for national security and defence,for example when developing complex encryption technologies, tracking and responding to cyberattacks, deploying efficient forensics or in nuclear simulations.