Examples of using Encrypted disk in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Wipe encrypted disks for secure deletion….
Change the size of the encrypted disk easily.
The encrypted disk volumes can only be mounted for normal read/write access with the authorized password.
You have created a encrypted disk volume on the NAS.
Wizard guiding the users through the creation of encrypted disks.
Ability to connect an encrypted disk in the read-only mode.
Solved the problem with password setup for encrypted disk image.
Create a new encrypted disk volume with new hard drives.
List of the most frequently connected encrypted disks can be disabled.
Needs a password for an encrypted disk, please ensure that you have plymouth installed and configured.
Configurable hot keys to disconnect either all connected encrypted disks, or each disk separately.
Data is stored on encrypted disks on multiple database servers.
If you have the right password/decryption key and the critical metadata wasn't severely damaged, as a rule,there are quite high chances to salvage files from an encrypted disk.
In this example, we have two encrypted disk volumes on the NAS.
Connecting an encrypted disk emulating a"local disk" to provide access for remote users(required for Windows XP and later versions);
For more information see the section about encrypted disks in the FreeBSD Handbook.
Chapter 17, Storage has been expanded with new information about USB storage devices, file system snapshots, file system quotas,file and network backed filesystems, and encrypted disk partitions.
Special icon for connected encrypted disks in the Windows shell can be disabled.
Idoo disc encryption software is an easy-to-use, reliable, user-friendly andsmart program that lets you create encrypted disk partitions drive letters.
If not checked: The encrypted disk volume is locked when the NAS starts up.
Passwords of different types can be stored, such as for websites, FTP servers, SSH accounts,wireless protocols, encrypted disk images and more.
You will be able to see the encrypted disk volume, with a lock icon in the Status column.
Idoo disc encryption software is an easy-to-use, reliable, user-friendly andsmart program that lets you create encrypted disk partitions drive letters.
File-containers of the connected encrypted disks are protected against re-writing and deletion.
Ability to enforce the disconnection of locked encrypted disks upon automatic disconnection.
If you have manually set up an encrypted disk with LUKS whirlpool, you will need to migrate it manually to a stronger hash.
This section is only for people who have set up LUKS encrypted disks themselves using the whirlpool hash.
If you have manually set up an encrypted disk with LUKS whirlpool, you will need to migrate it manually to a stronger hash.
This section is only for people who have set up LUKS encrypted disks themselves using the whirlpool hash.
Inactivity period is a period of time when the connected encrypted disk is not being used, that is it is a period of time when no data is being read from the disk or being written to the disk. .