Examples of using Encrypted data transfer in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
Encrypted data transfer within the network.
O Protocol encryption: Enable this option for encrypted data transfer.
ABBYY service supports encrypted data transfer using HTTPS with high-grade encryption.
O Protocol encryption: Enable this option for encrypted data transfer.
Secure FTP(SFTP) offers encrypted data transfer via Secure Shell(SSH)
O Protocol encryption: Enable this option for encrypted data transfer.
This confirm the host and contains keys for encrypted data transfer to prefer network nodes to read the transferred data. .
And is protected against unauthorized access by means of SSL('Secure Socket Layer') encrypted data transfer.
receive a 256-bit Secured Socket Layer(SSL) encrypted data transfer between the end user and MindMeister.
to VerySign and are protected against any unauthorised access using SSL('Secure Socket Layer') encrypted data transfer.
placement are protected against unauthorized access by encrypted data transfer technology.
Global Collect and is protected against unauthorized access by means of SSL('Secure Socket Layer') encrypted data transfer.
if you want to enable FTP with SSL/TLS(Explicit) for encrypted data transfer.
also supports snapshot scheduling and encrypted data transfers.
the associated digital locking cylinder wirelessly using encrypted data transfer.
Specify the port number and if you want to enable FTP with SSL/TLS(Explicit) for encrypted data transfer.
scalable TCP/IP based client/server communication technology with integrated security, enabling encrypted data transfer up to MES/ERP systems.
SSL works using a symmetric key to encrypt data transferred over the connection.
Choose when to encrypt data transferred between computers using the Install Packages command.
All data transfer is encrypted.
SSL encrypted end-to-end data transfer.
This site is SSL secured and all data transfer is encrypted.
Next, access over SSH is secure- all data transfer is encrypted and authenticated.
If both sides agree the rest of the data transfer is encrypted, still using port 25.
This ensures that data transfer is encrypted such that any third party cannot intercept
