Examples of using To encrypt data in English and their translations into Russian
{-}
-
Official
-
Colloquial
To encrypt data in a protection group.
Used by Encrypting File System(EFS) to encrypt data.
For example, we need to encrypt data stored in the connectionStrings section.
These very short-duration keys minimize data vulnerability,unlike the long-lived keys used to encrypt data stored on a hard drive.
We use AES-256 to encrypt data you send to us, which is a very strong encryption method.
DPM does not support compression if you choose to encrypt data in a protection group.
CP-ABE uses access trees to encrypt data and users' secret keys are generated over a set of attributes.
Over the years technology has advanced,PPTP has evolved in finding new ways to encrypt data to ensure that it stays ahead of the game.
If you want to encrypt data in a protection group that has already been created, in DPM Administrator Console, on the navigation bar, click Protection.
The following procedure shows you how to encrypt data that will be backed up on tape.
Computer Emergency Response Team KZ-CERT alarms the users about recent massive distribution of letters with malicious attachments able to encrypt data of popular formats.
Enable Secure Sockets Layer(SSL) to encrypt data sent between a Web server and a client.
Unlike software-based encryption, Terascale HDD, Constellation CS and Enterprise Capacity HDD with Instant Secure Erase(ISE) orSelf-Encrypting Drive(SED) options rely on the drive itself to encrypt data, so NAS system performance will not be compromised.
End-to-end encryption is intended to encrypt data in a way that only the sender and intended recipients are able to decrypt, and thus read, the data. .
Perfect Dark uses RSA(1024-bit) and AES(128-bit) to encrypt data transmitted between peers.
The clear-text encryption key is then used to encrypt data to be written to the disk and to decrypt data that's being read from the disk.
These copies should be stored separately from active system on removable drive, or on another machine,which has no access rights to record from the host(so the malware unable to encrypt data on a network media, or plugged-in removable drive).
Self-signed certificates are useful if the ability to encrypt data is more important than the ability to identify the issuing organization.
Operations Manager2007 uses an encryption key to protect secure data, such as Run As accounts, in the Operations Manager database, and to encrypt data between the root management server and the SDK.
It is much easier to break a 40-bit"shared secret" key used to encrypt data, than to break a PKI key used to encrypt that"shared secret".
This policy enables blocking of access to encrypted data.
Figure 52: Blocking access to encrypted data.
There is agreement that legitimate law enforcement access to encrypted data should be permitted.
BLOCKING ACCESS TO ENCRYPTED DATA Encryption can set the time by when blocking access to encrypted folders starts.
High level of counterfeit protection anddata protection due to encrypted data transmission.
If an attacker is able to exploit weak cryptographic processes, they may be able to gain clear-text access to encrypted data.
If an attacker is able to exploit weak cryptographic processes, they may be ableto gain control of an application or even gain clear-text access to encrypted data.
This extension is created for UserDefaults to encrypt your data.
This tool uses eight rounds to encrypt the data.