without examplesFound in 1 dictionary
Telecommunications- Contains about 34,000 terms related to:
- - modern means of communication,
- - alarm systems,
- - automation,
- - radio electronics,
- - electro acoustics,
- - computer hardware,
- - and applied mathematics.
- Contains about 34,000 terms related to:
- - modern means of communication,
- - alarm systems,
- - automation,
- - radio electronics,
- - electro acoustics,
- - computer hardware,
- - and applied mathematics.
encrypt
шифровать
Examples from texts
Since NFS does not encrypt its traffic, this makes it very easy for attackers to guess these file handles.Поскольку NFS не шифрует свой трафик, то взломщик может довольно легко опознать дескрипторы.Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
EFS will refuse to encrypt a file that has its system attribute set.Шифрованная файловая система откажется шифровать файлы, для которых установлен атрибут System (Системный).Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
Also, show how user B would encrypt a message M = 13 to be sent to user A, and how user A subsequently decrypts the ciphertext to yield the message.Покажите также, как пользователь В будет шифровать сообщение М = 13, которое должно быть отправлено пользователю А, и как пользователь А последовательно дешифрует полученный шифрованный текст.Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применениеЦифровая связь. Теоретические основы и практическое применениеСкляр, Бернард© Издательский дом "Вильямc", 2003© Prentice Hall PTR, 2001Digital Communications: Fundamentals and ApplicationsSklar, Bernard
find the encryption key, e, and describe how you would use it to encrypt the word "DIGITAL."Найдите ключ шифрования е и опишите его использование для шифрования слова "DIGITAL".Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применениеЦифровая связь. Теоретические основы и практическое применениеСкляр, Бернард© Издательский дом "Вильямc", 2003© Prentice Hall PTR, 2001Digital Communications: Fundamentals and ApplicationsSklar, Bernard
You could also store the keys used to encrypt the data in files within the file system and, using a C external procedure, access them.Ключи шифрования данных можно также хранить в файловой системе сервера и обращаться к ним с помощью внешней процедуры на языке С.Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионаловOracle для профессионаловКайт, Том© Перевод на русский язык. ООО «ДиаСофтЮП», 2003© Wrox Press Ltd, 2002Expert One-on-One OracleKyte, Tom© Wrox Press Ltd, 2002
Here you can choose to encrypt the folder.Здесь можно задать шифрование каталога.Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
This way, should you change your methods at later date (using encrypt() instead of md5() for example), this line will still work properly.В этом случае, даже если позже вы измените функцию (например, используете encrypt () вместо md5 ()), данная строка кода будет работать корректно.Ullman, Larry / PHP for the World Wide Web: Visual QuickStart GuideУльман, Ларри / Основы программирования на РНРОсновы программирования на РНРУльман, Ларри© 2001 by Peachpit Press© Перевод на русский язык ДМК Пресс, 2001PHP for the World Wide Web: Visual QuickStart GuideUllman, Larry© 2001 by Larry Ullman
They only encrypt and decrypt unicast frames, and they are assigned to a single user.Они только шифруют и дешифруют одноадресатные фреймы, и предназначены для единственного пользователя.Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11Основы построения беспроводных локальных сетей стандарта 802.11Рошан, Педжман,Лиэри, Джонатан© Cisco Press, 2004© Издательский дом "Вильямc", 2004802.11 Wireless LAN FundamentalsRoshan, Pejman,Leary, Jonathan© 2004 Cisco Systems, Inc.
When a user encrypts a file, the EFS driver works in concert with the NTFS driver in the Windows Executive to encrypt the $Data attribute of the file.При шифровании файла пользователем драйвер EFS работает совместно с драйвером NTFS в составе подсистемы Windows Executive для шифрования атрибута $Data.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
If you want to protect the contents of files as they print, be sure to encrypt the spool files located in \Windows\System32\Spool\Printers.Если необходимо защитить файлы во время печати, включите шифрование файлов спулера в каталоге \Windows\System32\Spool\Printers.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
This backup copy uses a public key stored in Active Directory as the secret key for the HMAC used to encrypt the Master key.Эта резервная копия использует открытый ключ из базы данных Active Directory в качестве секретного ключа для алгоритма НМАС, который используется для шифрования главного ключа.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
In broad terms, DESX is a block cipher that uses a three-step process to encrypt a file:Если коротко, то DESX является блочным шифратором, использующим три этапа шифрования файла.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
Other cryptographic systems, like the crypt() function built into PHP will encrypt data but will not decrypt it.Другие криптографические системы, такие как встроенная в РНР функция crypt (), шифруют данные, но не дешифруют их.Ullman, Larry / PHP for the World Wide Web: Visual QuickStart GuideУльман, Ларри / Основы программирования на РНРОсновы программирования на РНРУльман, Ларри© 2001 by Peachpit Press© Перевод на русский язык ДМК Пресс, 2001PHP for the World Wide Web: Visual QuickStart GuideUllman, Larry© 2001 by Larry Ullman
Anyone can encrypt data with the public key, but it can be decrypted with only the private key.Любой желающий может зашифровать данные с общим ключом, но их расшифровка возможна только с закрытым (приватным) ключом.Carrier, Brian / File System Forensic AnalysisКэрриэ, Брайанрриэ, БрайанКэрриэ, Брайа© 2005 Pearson Education, Inc.© Перевод на русский язык, ООО «Питер Пресс», 2007© Издание на русском языке, ООО «Питер Пресс», 2007File System Forensic AnalysisCarrier, Brian© 2005 Pearson Education, Inc.
For example, WEP encryption does not encrypt the MAC address field of the frame.Например, при WEP-шифровании значение поля фрейма, содержащего МАС-адрес, не шифруется.Geier, Jim / Wireless Networks first-stepГейер, Джим / Беспроводные сети. Первый шагБеспроводные сети. Первый шагГейер, Джим© Издательский дом "Вильямс", 2005© Cisco Systems, Inc., 2005Wireless Networks first-stepGeier, Jim© 2005 Cisco Systems, Inc.
Add to my dictionary
encrypt
шифровать
User translations
The part of speech is not specified
- 1.
шифровать
translation added by Administrator - 2.
шифровать
translation added by Administrator - 3.
шифровать
translation added by Administrator - 4.
шифровать
translation added by Administrator
Collocations
encrypted data
зашифрованные данные
encrypted file
зашифрованный файл
encrypting system
система шифрования
self-encrypting virus
самошифрующийся вирус
double encrypted data
дважды зашифрованные данные
encrypted channel
канал с криптографической защитой
encrypted communication system
система зашифрованной связи
encrypted data file
зашифрованный файл данных
encrypted information
зашифрованная информация
encrypted input
ввод зашифрованной информации
encrypted output
зашифрованный вывод
encrypted password
зашифрованный пароль
encrypted signal
зашифрованный сигнал
encrypting key generator
генератор криптографических ключей
encrypting program
программа шифрования
Word forms
encrypt
verb
Basic forms | |
---|---|
Past | encrypted |
Imperative | encrypt |
Present Participle (Participle I) | encrypting |
Past Participle (Participle II) | encrypted |
Present Indefinite, Active Voice | |
---|---|
I encrypt | we encrypt |
you encrypt | you encrypt |
he/she/it encrypts | they encrypt |
Present Continuous, Active Voice | |
---|---|
I am encrypting | we are encrypting |
you are encrypting | you are encrypting |
he/she/it is encrypting | they are encrypting |
Present Perfect, Active Voice | |
---|---|
I have encrypted | we have encrypted |
you have encrypted | you have encrypted |
he/she/it has encrypted | they have encrypted |
Present Perfect Continuous, Active Voice | |
---|---|
I have been encrypting | we have been encrypting |
you have been encrypting | you have been encrypting |
he/she/it has been encrypting | they have been encrypting |
Past Indefinite, Active Voice | |
---|---|
I encrypted | we encrypted |
you encrypted | you encrypted |
he/she/it encrypted | they encrypted |
Past Continuous, Active Voice | |
---|---|
I was encrypting | we were encrypting |
you were encrypting | you were encrypting |
he/she/it was encrypting | they were encrypting |
Past Perfect, Active Voice | |
---|---|
I had encrypted | we had encrypted |
you had encrypted | you had encrypted |
he/she/it had encrypted | they had encrypted |
Past Perfect Continuous, Active Voice | |
---|---|
I had been encrypting | we had been encrypting |
you had been encrypting | you had been encrypting |
he/she/it had been encrypting | they had been encrypting |
Future Indefinite, Active Voice | |
---|---|
I shall/will encrypt | we shall/will encrypt |
you will encrypt | you will encrypt |
he/she/it will encrypt | they will encrypt |
Future Continuous, Active Voice | |
---|---|
I shall/will be encrypting | we shall/will be encrypting |
you will be encrypting | you will be encrypting |
he/she/it will be encrypting | they will be encrypting |
Future Perfect, Active Voice | |
---|---|
I shall/will have encrypted | we shall/will have encrypted |
you will have encrypted | you will have encrypted |
he/she/it will have encrypted | they will have encrypted |
Future Perfect Continuous, Active Voice | |
---|---|
I shall/will have been encrypting | we shall/will have been encrypting |
you will have been encrypting | you will have been encrypting |
he/she/it will have been encrypting | they will have been encrypting |
Future in the Past Indefinite, Active Voice | |
---|---|
I should/would encrypt | we should/would encrypt |
you would encrypt | you would encrypt |
he/she/it would encrypt | they would encrypt |
Future in the Past Continuous, Active Voice | |
---|---|
I should/would be encrypting | we should/would be encrypting |
you would be encrypting | you would be encrypting |
he/she/it would be encrypting | they would be encrypting |
Future in the Past Perfect, Active Voice | |
---|---|
I should/would have encrypted | we should/would have encrypted |
you would have encrypted | you would have encrypted |
he/she/it would have encrypted | they would have encrypted |
Future in the Past Perfect Continuous, Active Voice | |
---|---|
I should/would have been encrypting | we should/would have been encrypting |
you would have been encrypting | you would have been encrypting |
he/she/it would have been encrypting | they would have been encrypting |
Present Indefinite, Passive Voice | |
---|---|
I am encrypted | we are encrypted |
you are encrypted | you are encrypted |
he/she/it is encrypted | they are encrypted |
Present Continuous, Passive Voice | |
---|---|
I am being encrypted | we are being encrypted |
you are being encrypted | you are being encrypted |
he/she/it is being encrypted | they are being encrypted |
Present Perfect, Passive Voice | |
---|---|
I have been encrypted | we have been encrypted |
you have been encrypted | you have been encrypted |
he/she/it has been encrypted | they have been encrypted |
Past Indefinite, Passive Voice | |
---|---|
I was encrypted | we were encrypted |
you were encrypted | you were encrypted |
he/she/it was encrypted | they were encrypted |
Past Continuous, Passive Voice | |
---|---|
I was being encrypted | we were being encrypted |
you were being encrypted | you were being encrypted |
he/she/it was being encrypted | they were being encrypted |
Past Perfect, Passive Voice | |
---|---|
I had been encrypted | we had been encrypted |
you had been encrypted | you had been encrypted |
he/she/it had been encrypted | they had been encrypted |
Future Indefinite, Passive Voice | |
---|---|
I shall/will be encrypted | we shall/will be encrypted |
you will be encrypted | you will be encrypted |
he/she/it will be encrypted | they will be encrypted |
Future Perfect, Passive Voice | |
---|---|
I shall/will have been encrypted | we shall/will have been encrypted |
you will have been encrypted | you will have been encrypted |
he/she/it will have been encrypted | they will have been encrypted |