about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
without examplesFound in 1 dictionary

Telecommunications
  • Contains about 34,000 terms related to:
  • - modern means of communication,
  • - alarm systems,
  • - automation,
  • - radio electronics,
  • - electro acoustics,
  • - computer hardware,
  • - and applied mathematics.

encrypt

шифровать

Examples from texts

Since NFS does not encrypt its traffic, this makes it very easy for attackers to guess these file handles.
Поскольку NFS не шифрует свой трафик, то взломщик может довольно легко опознать дескрипторы.
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
EFS will refuse to encrypt a file that has its system attribute set.
Шифрованная файловая система откажется шифровать файлы, для которых установлен атрибут System (Системный).
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Also, show how user B would encrypt a message M = 13 to be sent to user A, and how user A subsequently decrypts the ciphertext to yield the message.
Покажите также, как пользователь В будет шифровать сообщение М = 13, которое должно быть отправлено пользователю А, и как пользователь А последовательно дешифрует полученный шифрованный текст.
Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применение
Цифровая связь. Теоретические основы и практическое применение
Скляр, Бернард
© Издательский дом "Вильямc", 2003
© Prentice Hall PTR, 2001
Digital Communications: Fundamentals and Applications
Sklar, Bernard
find the encryption key, e, and describe how you would use it to encrypt the word "DIGITAL."
Найдите ключ шифрования е и опишите его использование для шифрования слова "DIGITAL".
Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применение
Цифровая связь. Теоретические основы и практическое применение
Скляр, Бернард
© Издательский дом "Вильямc", 2003
© Prentice Hall PTR, 2001
Digital Communications: Fundamentals and Applications
Sklar, Bernard
You could also store the keys used to encrypt the data in files within the file system and, using a C external procedure, access them.
Ключи шифрования данных можно также хранить в файловой системе сервера и обращаться к ним с помощью внешней процедуры на языке С.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
Here you can choose to encrypt the folder.
Здесь можно задать шифрование каталога.
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
This way, should you change your methods at later date (using encrypt() instead of md5() for example), this line will still work properly.
В этом случае, даже если позже вы измените функцию (например, используете encrypt () вместо md5 ()), данная строка кода будет работать корректно.
Ullman, Larry / PHP for the World Wide Web: Visual QuickStart GuideУльман, Ларри / Основы программирования на РНР
Основы программирования на РНР
Ульман, Ларри
© 2001 by Peachpit Press
© Перевод на русский язык ДМК Пресс, 2001
PHP for the World Wide Web: Visual QuickStart Guide
Ullman, Larry
© 2001 by Larry Ullman
They only encrypt and decrypt unicast frames, and they are assigned to a single user.
Они только шифруют и дешифруют одноадресатные фреймы, и предназначены для единственного пользователя.
Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11
Основы построения беспроводных локальных сетей стандарта 802.11
Рошан, Педжман,Лиэри, Джонатан
© Cisco Press, 2004
© Издательский дом "Вильямc", 2004
802.11 Wireless LAN Fundamentals
Roshan, Pejman,Leary, Jonathan
© 2004 Cisco Systems, Inc.
When a user encrypts a file, the EFS driver works in concert with the NTFS driver in the Windows Executive to encrypt the $Data attribute of the file.
При шифровании файла пользователем драйвер EFS работает совместно с драйвером NTFS в составе подсистемы Windows Executive для шифрования атрибута $Data.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
If you want to protect the contents of files as they print, be sure to encrypt the spool files located in \Windows\System32\Spool\Printers.
Если необходимо защитить файлы во время печати, включите шифрование файлов спулера в каталоге \Windows\System32\Spool\Printers.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
This backup copy uses a public key stored in Active Directory as the secret key for the HMAC used to encrypt the Master key.
Эта резервная копия использует открытый ключ из базы данных Active Directory в качестве секретного ключа для алгоритма НМАС, который используется для шифрования главного ключа.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
In broad terms, DESX is a block cipher that uses a three-step process to encrypt a file:
Если коротко, то DESX является блочным шифратором, использующим три этапа шифрования файла.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Other cryptographic systems, like the crypt() function built into PHP will encrypt data but will not decrypt it.
Другие криптографические системы, такие как встроенная в РНР функция crypt (), шифруют данные, но не дешифруют их.
Ullman, Larry / PHP for the World Wide Web: Visual QuickStart GuideУльман, Ларри / Основы программирования на РНР
Основы программирования на РНР
Ульман, Ларри
© 2001 by Peachpit Press
© Перевод на русский язык ДМК Пресс, 2001
PHP for the World Wide Web: Visual QuickStart Guide
Ullman, Larry
© 2001 by Larry Ullman
Anyone can encrypt data with the public key, but it can be decrypted with only the private key.
Любой желающий может зашифровать данные с общим ключом, но их расшифровка возможна только с закрытым (приватным) ключом.
Carrier, Brian / File System Forensic AnalysisКэрриэ, Брайан
рриэ, Брайан
Кэрриэ, Брайа
© 2005 Pearson Education, Inc.
© Перевод на русский язык, ООО «Питер Пресс», 2007
© Издание на русском языке, ООО «Питер Пресс», 2007
File System Forensic Analysis
Carrier, Brian
© 2005 Pearson Education, Inc.
For example, WEP encryption does not encrypt the MAC address field of the frame.
Например, при WEP-шифровании значение поля фрейма, содержащего МАС-адрес, не шифруется.
Geier, Jim / Wireless Networks first-stepГейер, Джим / Беспроводные сети. Первый шаг
Беспроводные сети. Первый шаг
Гейер, Джим
© Издательский дом "Вильямс", 2005
© Cisco Systems, Inc., 2005
Wireless Networks first-step
Geier, Jim
© 2005 Cisco Systems, Inc.

Add to my dictionary

encrypt
шифровать

User translations

The part of speech is not specified

  1. 1.

    шифровать

    translation added by Administrator
    0
  2. 2.

    шифровать

    translation added by Administrator
    0
  3. 3.

    шифровать

    translation added by Administrator
    0
  4. 4.

    шифровать

    translation added by Administrator
    0

Collocations

encrypted data
зашифрованные данные
encrypted file
зашифрованный файл
encrypting system
система шифрования
self-encrypting virus
самошифрующийся вирус
double encrypted data
дважды зашифрованные данные
encrypted channel
канал с криптографической защитой
encrypted communication system
система зашифрованной связи
encrypted data file
зашифрованный файл данных
encrypted information
зашифрованная информация
encrypted input
ввод зашифрованной информации
encrypted output
зашифрованный вывод
encrypted password
зашифрованный пароль
encrypted signal
зашифрованный сигнал
encrypting key generator
генератор криптографических ключей
encrypting program
программа шифрования

Word forms

encrypt

verb
Basic forms
Pastencrypted
Imperativeencrypt
Present Participle (Participle I)encrypting
Past Participle (Participle II)encrypted
Present Indefinite, Active Voice
I encryptwe encrypt
you encryptyou encrypt
he/she/it encryptsthey encrypt
Present Continuous, Active Voice
I am encryptingwe are encrypting
you are encryptingyou are encrypting
he/she/it is encryptingthey are encrypting
Present Perfect, Active Voice
I have encryptedwe have encrypted
you have encryptedyou have encrypted
he/she/it has encryptedthey have encrypted
Present Perfect Continuous, Active Voice
I have been encryptingwe have been encrypting
you have been encryptingyou have been encrypting
he/she/it has been encryptingthey have been encrypting
Past Indefinite, Active Voice
I encryptedwe encrypted
you encryptedyou encrypted
he/she/it encryptedthey encrypted
Past Continuous, Active Voice
I was encryptingwe were encrypting
you were encryptingyou were encrypting
he/she/it was encryptingthey were encrypting
Past Perfect, Active Voice
I had encryptedwe had encrypted
you had encryptedyou had encrypted
he/she/it had encryptedthey had encrypted
Past Perfect Continuous, Active Voice
I had been encryptingwe had been encrypting
you had been encryptingyou had been encrypting
he/she/it had been encryptingthey had been encrypting
Future Indefinite, Active Voice
I shall/will encryptwe shall/will encrypt
you will encryptyou will encrypt
he/she/it will encryptthey will encrypt
Future Continuous, Active Voice
I shall/will be encryptingwe shall/will be encrypting
you will be encryptingyou will be encrypting
he/she/it will be encryptingthey will be encrypting
Future Perfect, Active Voice
I shall/will have encryptedwe shall/will have encrypted
you will have encryptedyou will have encrypted
he/she/it will have encryptedthey will have encrypted
Future Perfect Continuous, Active Voice
I shall/will have been encryptingwe shall/will have been encrypting
you will have been encryptingyou will have been encrypting
he/she/it will have been encryptingthey will have been encrypting
Future in the Past Indefinite, Active Voice
I should/would encryptwe should/would encrypt
you would encryptyou would encrypt
he/she/it would encryptthey would encrypt
Future in the Past Continuous, Active Voice
I should/would be encryptingwe should/would be encrypting
you would be encryptingyou would be encrypting
he/she/it would be encryptingthey would be encrypting
Future in the Past Perfect, Active Voice
I should/would have encryptedwe should/would have encrypted
you would have encryptedyou would have encrypted
he/she/it would have encryptedthey would have encrypted
Future in the Past Perfect Continuous, Active Voice
I should/would have been encryptingwe should/would have been encrypting
you would have been encryptingyou would have been encrypting
he/she/it would have been encryptingthey would have been encrypting
Present Indefinite, Passive Voice
I am encryptedwe are encrypted
you are encryptedyou are encrypted
he/she/it is encryptedthey are encrypted
Present Continuous, Passive Voice
I am being encryptedwe are being encrypted
you are being encryptedyou are being encrypted
he/she/it is being encryptedthey are being encrypted
Present Perfect, Passive Voice
I have been encryptedwe have been encrypted
you have been encryptedyou have been encrypted
he/she/it has been encryptedthey have been encrypted
Past Indefinite, Passive Voice
I was encryptedwe were encrypted
you were encryptedyou were encrypted
he/she/it was encryptedthey were encrypted
Past Continuous, Passive Voice
I was being encryptedwe were being encrypted
you were being encryptedyou were being encrypted
he/she/it was being encryptedthey were being encrypted
Past Perfect, Passive Voice
I had been encryptedwe had been encrypted
you had been encryptedyou had been encrypted
he/she/it had been encryptedthey had been encrypted
Future Indefinite, Passive Voice
I shall/will be encryptedwe shall/will be encrypted
you will be encryptedyou will be encrypted
he/she/it will be encryptedthey will be encrypted
Future Perfect, Passive Voice
I shall/will have been encryptedwe shall/will have been encrypted
you will have been encryptedyou will have been encrypted
he/she/it will have been encryptedthey will have been encrypted