Examples of using The encrypted in English and their translations into Russian
{-}
-
Colloquial
-
Official
The encrypted database.
Start with the encrypted files.
The encrypted hard drive.
We have intercepted the encrypted communications.
But the encrypted hard drive… I unlocked it for them.
People also translate
For example, you can add the Encrypted tag.
Appends the encrypted digest to the message.
Ability to transfer data via the encrypted https channels.
The encrypted folder is added to the folders list.
The encrypted data becomes unverifiable by network nodes.
Many modern sites use the encrypted SSL protocol.
View the encrypted(pay) services in digital TV mode.
Change the size of the encrypted disk easily.
The encrypted part element contains additional attributes: cipherName.
Bob sends all the encrypted messages to Alice.
Stampado adds the. locked extension to the encrypted files.
Alice passes the encrypted and shuffled deck to Bob.
This AxProtector code redirects to the place at which the encrypted original code is stored.
All data of the encrypted virtual disk is stored together with the disk meta-data in a single file-container.
Instead of sending the encrypted message key(e.g.,"PKP") twice to get"PKP PKP", the Germans doubled the message key(e.g.,"ABL ABL"), encrypted the doubled key to get("PKP JXI"), and sent the encrypted doubled key.
Bob picks an encryption key B anduses this to encrypt each card of the encrypted and shuffled deck.
It's the relationship between the encrypted and decrypted messages that interests me.
Fulcanelli even figured in the geometry of Notre Dame guessed the secret of the philosophers stone, the encrypted there medieval alchemists.
It will be stored on the Server in the encrypted S/MIME format- as if the message sender has sent it encrypted. .
However, the use of cryptography for authentication purposes by producing a digital signature does not necessarily imply the use of cryptography to make any information confidential in the communication process, since the encrypted digital signature may be merely appended to a non-encrypted message.
When the app is locked,you can disable the encrypted virtual drive, which is used to access VIPole encrypted files on your computer.
For the protection of your files during the period of VIPole lock there is the opportunity to disable the encrypted virtual drive, which is used for access to VIPole encrypted files on your computer.
If the HTTP request contains this parameter and the session does not have an Active Private Key, and the encrypted Private Key exists in the Account Settings, and the HTTP request contains the SMIMEPassword parameter,the module tries to activate("unlock") the Private Key using the supplied password.
