Examples of using Secure socket layer in English and their translations into Hungarian
{-}
- 
                        Colloquial
                    
- 
                        Official
                    
- 
                        Medicine
                    
- 
                        Ecclesiastic
                    
- 
                        Financial
                    
- 
                        Programming
                    
- 
                        Official/political
                    
- 
                        Computer
                    
We use the SSL(secure socket layer) technology.
Our website is PCI compliant and protected behind SSL(secure socket layer encryption).
We use the SSL(Secure Socket Layer) coding system.
After signing in to online casinos, all information is encrypted using 128-bit Secure Socket Layer(SSL) technology.
The site's secure socket layer technology(SSL) makes it one of the most trusted in the industry.
Your information will be send by SSL; Secure Socket Layer- Protocol.
A Secure Socket Layer(SSL) channel can individually be used as an effective substitute to OpenVPN.
For the processing and transfer of data the SSL(Secure Socket Layer) procedure is used.
We use an HTTPS secure socket layer system to protect all data transfers to and from our site.
For transferring data zooplususes the so-called SSL security system(secure socket layer) together with a 128-bit encryption.
Bc our secure socket layer(SSL)software is the industry standard and the best software for e-commerce transaction.
All transactions on this site are processed using Secure Socket Layer(SSL) technology via our secure  server.
The Secure Socket Layer(SSL) method protects data that a customer sends over the Internet to a company's server.
All communications between the user and his visitors are 128bit Secure Socket Layer, and all data is housed on encrypted servers.
Using SSL(Secure Socket Layer) your personal data is encrypted(not visible to third parties) while being transmitted over the Internet.
T-Com Pay Wayuses the latest standards in data security- Secure Socket Layer(SSL) protocol with 128-bit encription of data and MD5 alghoritm.
The SSL(Secure Socket Layer) procedure protects data that a customer sends to a company's server via the internet.
T-Com PayWay applies themost modern standards of data protection- Secure Socket Layer(SSL) protocol with 128-bit encryption and MD5 algorithm.
When our registration form asks users to enter sensitive information(such as a credit card number),that information is encrypted and is protected using Secure Socket Layer-(SSL) technology.
If necessary, select the Use Secure Socket Layer(SSL) to communicate with the WSUS server and clients check box.
Because we accept sensitive information from shoppers(name, mailing address, credit card number, and so on)Digital River uses VeriSign® Secure Socket Layer(SSL) technology to protect personal shopper information.
All transactions are communicated using Secure Socket Layer(SSL) technology, ensuring that your personal information is kept safe.
All communication between us and our visitors in this chat is over 128bit Secure Socket Layer, and all data is housed on encrypted servers.
Using encrypted means via Secure Socket Layer(SSL) technology for transactions on our website that require the entering of personal information.
For secure  payment, in thedata transfer during order action, standardized SSL(secure socket layer) is used to ensure that your data is protected.
When you place an order, we use a Secure Socket Layer(SSL) encryption which encrypts your information before it is sent to us, to protect it from unauthorized use.
State-of-the-art encryption techniques, such as the Secure Socket Layer(SSL) and the 3D Secure  method, also offer you the highest level of security on the Internet.
Any application that supports the Secure Socket Layer(SSL) can make use of certificates signed by CAcert, as can any application that uses X.509 certificates, e.g.
The Company shall apply encryption using the Secure Socket Layer(SSL) protocol or similar security techniques to prepare for illegal access by third parties to ensure safety.