Examples of using Can be encrypted in English and their translations into Russian
{-}
-
Official
-
Colloquial
Yes, source code can be encrypted.
Can be encrypted, can not be deleted permanently implantable advertising videos.
Network traffic can be encrypted via SSL.
Message bodies can contain text orany form of binary information, and can be encrypted.
Quote from PDF Reference"A PDF document can be encrypted to protect its contents from unauthorized access.
On computers, sensitive data in the form of e-mail messages, files on a disk, andfiles being transmitted across the network can be encrypted using a key.
Passwords can be encrypted by hand on paper and remember the encryption method and key.
Any Wolfram Language expression can be encrypted.
All GPS data can be encrypted so positions are only seen by authorised users.
Since FTPS(File Transfer Protocol over SSL/TLS) is supported,image files can be encrypted while being transferred.
Moreover, promo codes can be encrypted into QR-codes, so that customers don't have to write them down or memorize.
Emsisoft's Anti-Ransomware protection layer is custom-built to detect behavioral patterns of ransomware attacks andstop them before your files can be encrypted.
The connection between the client and the core can be encrypted using Secure Sockets Layer(SSL), and proxies are supported.
After successful authentication, the MSC sends the encryption key Kc to the base station controller(BSC)so that all communications can be encrypted and decrypted.
Security features protect your data; copy, scan andprint data can be encrypted or overwritten to meet your corporate security standards.
A single transmission can be encrypted by a session key that will be discarded immediately after the transmission-any subsequent transmission will be protected by a new, different session key.
You can access the storage using SFTP, RSYNC, FTP, SMB or NFS, andthe first two of these protocols can be encrypted and secured using a private/public key.
To make encrypting and decrypting quicker, the entire alphabet can be encrypted to create a one-to-one map between the letters of the cleartext and the ciphertext.
Encrypted backups can be automatically decrypted providing that the correct password is supplied.
The encrypted message can be audited if one of the parties reveals the key.
Allow or restrict files that can be transferred to the encrypted USB drive.
Once a security context is established, sensitive application messages can be wrapped(encrypted) by the GSSAPI for secure communication between client and server.
A protected disk can be either an encrypted partition of a hard disk or a removable disk USB hard disk or flash drive.
Such a scheme enables the construction of programs for any desirable functionality, which can be run on encrypted inputs to produce an encryption of the result.
Namespaced Aliases can be public or encrypted so only the account owner can decrypt it or the account owner and one other account owner can decrypt it.
Message properties cannot be encrypted.
Internet Security now walls off your private files& photos so they can't be encrypted and held hostage.
The content is not encrypted and can be accessed by audio rendering programs.
They can also be encrypted and password-protected for a complete, secure chain of evidence.