about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo

Примеры из текстов

All digital signatures, encrypted messages, encrypted files, and other cryptographic applications that rely on the certificate become inoperable when the certificate is revoked.
Все цифровые подписи, зашифрованные сообщения и другие результаты шифрования, которые основаны на этом сертификате, оказываются недоступными при отзыве сертификата.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
You can, however, enable the storage of passwords that are encrypted with a reversible key.
Но можно включить хранение паролей с использованием обратимого ключа.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
The encrypted ticket or TGT includes the following major fields:
Зашифрованный билет или билет TGT содержит следующие поля.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Do so by importing the key from the certificate at another machine (server or desktop) and then verifying that you can open encrypted files at the desktop.
Для этого импортируйте ключ из сертификата на другой компьютер (сервер или рабочую станцию) и проверьте возможность открытия зашифрованных файлов на рабочей станции.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
In order not to confuse the regular class loader, we use a different extension, .caesar, for the encrypted class files.
Чтобы не поставить в тупик стандартный загрузчик классов, для зашифрованных файлов классов используется расширение .caesar.
Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программирования
Java 2. Том II. Тонкости программирования
Хорстманн, Кей С.,Корнелл, Гари
© Издательский дом "Вильямc", 2002
© Prentice Hall, Inc., 2002
Core Java™ 2. Volume II - Advanced Features
Horstmann, Cay S.,Cornell, Gary
© 2002 Sun Microsystems, Inc.
Protocol analysis may still work tor encrypted traffic, but may break if the traffic is sent on an unexpected port.
Анализ протоколов может срабатывать для зашифрованного трафика, но может выйти из строя, если трафик отправлен на неожиданный порт.
Allen, David,Scott, Andrew,Lewis, Herb,Stile, John,Tuck, Tim / Windows to Linux Migration ToolkitАллен, Дэвид,Скотт, Эндрю,Льюис, Герберт,Стайл, Джон,Такк, Тимоти / Переход с Windows на Linux
Переход с Windows на Linux
Аллен, Дэвид,Скотт, Эндрю,Льюис, Герберт,Стайл, Джон,Такк, Тимоти
© 2004 by Syncress Publishing, Inc.
© Перевод на русский язык, «БХВ-Петербург» 2005
Windows to Linux Migration Toolkit
Allen, David,Scott, Andrew,Lewis, Herb,Stile, John,Tuck, Tim
© 2004 by Syngress Publishing, Inc.
In that configuration, a scanner cannot open a user's encrypted files and therefore may miss a virus.
В такой конфигурации сканер не может открывать зашифрованные файлы пользователей и способен пропустить вирус.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Obviously, once your email leaves mailhost, it will be transmitted in the clear, unless you've encrypted the message with a tool such as pgp or gpg.
Очевидно, что, после того как почта покинет почтовый узел (mai lhost), она будет передаваться в открытом виде, если только вы не зашифровали сообщения с помощью такого средства, как pgp или gpg.
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
When users move or copy encrypted files, they may get unexpected results, especially if they are unaware that the files were encrypted in the first place.
При перемещении или копировании файлов пользователь может получить неожиданный результат, особенно если не подозревает, что файлы зашифрованы.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
A Windows remote access server obtains a copy of the user's password via a secure, encrypted channel to a domain controller.
Сервер удаленного доступа под управлением Windows получает копию пользовательского пароля по безопасному шифрованному каналу от контроллера домена.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
The Windows and Unix password information is encrypted when transported over the network.
При подаче информации о паролях Windows и Unix через сеть осуществляется ее шифрование.
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертов
Microsoft® Windows® Server 2003: решения экспертов
Маримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд
© 2004 SAMS Publishing
© Перевод «ИД КУДИЦ-ОБРАЗ», 2005
© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.
Microsoft® Windows® Server 2003 Insider Solutions
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed
© 2004 by Sams Publishing
Because WebDAV clients work on local copies of a file, they have a few advantages when working with encrypted files in an untrusted environment such as the Internet:
Поскольку клиенты WebDAV работают с локальной копией файла, они получают несколько преимуществ при работе с шифрованными файлами в общедоступной среде, например в Интернет.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
This folder is encrypted via EFS based on a certificate that was issued to Bob by the corporate Certificate Authority.
Эта папка зашифрована с использованием EFS на основании сертификата, который был выдан Бобу корпоративным центром сертификации.
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертов
Microsoft® Windows® Server 2003: решения экспертов
Маримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд
© 2004 SAMS Publishing
© Перевод «ИД КУДИЦ-ОБРАЗ», 2005
© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.
Microsoft® Windows® Server 2003 Insider Solutions
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed
© 2004 by Sams Publishing
In Tunnel-mode ESP, the original IP datagram is placed in the encrypted portion of the Encapsulating Security Payload and that entire ESP frame is placed within a datagram having unencrypted IP headers.
В туннельном режиме исходная дейтаграмма IP помещается в зашифрованную часть ESP, а весь кадр ESP помещается в дейтаграмму с незашифрованными заголовками IP.
Siyan, Karanjit S.,Parker, Tim / TCP/IP UnleashedСиян, Каранжит,Паркер, Тим / TCP/IP для профессионалов
TCP/IP для профессионалов
Сиян, Каранжит,Паркер, Тим
© 2002 by Sams Publishing
© Перевод на русский язык, ЗАО Издательский дом «Питер», 2004
© Издание на русском языке, оформление, ЗАО Издательский дом «Питер», 2004
TCP/IP Unleashed
Siyan, Karanjit S.,Parker, Tim
© 2002 by Sams Publishing
The disc and title keys are stored in the lead-in area of the disc in an encrypted form.
Ключи диска и заголовка находятся в зашифрованном виде на нулевой дорожке диска.
Mueller, Scott / Upgrading and Repairing LaptopsМюллер, Скотт / Модернизация и ремонт ноутбуков
Модернизация и ремонт ноутбуков
Мюллер, Скотт
© Que Corporation, 2004
© Издательский дом "Вильямс", 2006
Upgrading and Repairing Laptops
Mueller, Scott
© 2006 by Que Corporation

Добавить в мой словарь

Не найдено

Переводы пользователей

Часть речи не указана

  1. 1.

    Зашифрованный

    Перевод добавил Александр Даурских
    0

Словосочетания

encrypted data
зашифрованные данные
encrypted file
зашифрованный файл
double encrypted data
дважды зашифрованные данные
encrypted channel
канал с криптографической защитой
encrypted communication system
система зашифрованной связи
encrypted data file
зашифрованный файл данных
encrypted information
зашифрованная информация
encrypted input
ввод зашифрованной информации
encrypted output
зашифрованный вывод
encrypted password
зашифрованный пароль
encrypted signal
зашифрованный сигнал
encrypted password
шифрованный пароль
encrypting system
система шифрования
self-encrypting virus
самошифрующийся вирус
encrypting key generator
генератор криптографических ключей

Формы слова

encrypt

verb
Basic forms
Pastencrypted
Imperativeencrypt
Present Participle (Participle I)encrypting
Past Participle (Participle II)encrypted
Present Indefinite, Active Voice
I encryptwe encrypt
you encryptyou encrypt
he/she/it encryptsthey encrypt
Present Continuous, Active Voice
I am encryptingwe are encrypting
you are encryptingyou are encrypting
he/she/it is encryptingthey are encrypting
Present Perfect, Active Voice
I have encryptedwe have encrypted
you have encryptedyou have encrypted
he/she/it has encryptedthey have encrypted
Present Perfect Continuous, Active Voice
I have been encryptingwe have been encrypting
you have been encryptingyou have been encrypting
he/she/it has been encryptingthey have been encrypting
Past Indefinite, Active Voice
I encryptedwe encrypted
you encryptedyou encrypted
he/she/it encryptedthey encrypted
Past Continuous, Active Voice
I was encryptingwe were encrypting
you were encryptingyou were encrypting
he/she/it was encryptingthey were encrypting
Past Perfect, Active Voice
I had encryptedwe had encrypted
you had encryptedyou had encrypted
he/she/it had encryptedthey had encrypted
Past Perfect Continuous, Active Voice
I had been encryptingwe had been encrypting
you had been encryptingyou had been encrypting
he/she/it had been encryptingthey had been encrypting
Future Indefinite, Active Voice
I shall/will encryptwe shall/will encrypt
you will encryptyou will encrypt
he/she/it will encryptthey will encrypt
Future Continuous, Active Voice
I shall/will be encryptingwe shall/will be encrypting
you will be encryptingyou will be encrypting
he/she/it will be encryptingthey will be encrypting
Future Perfect, Active Voice
I shall/will have encryptedwe shall/will have encrypted
you will have encryptedyou will have encrypted
he/she/it will have encryptedthey will have encrypted
Future Perfect Continuous, Active Voice
I shall/will have been encryptingwe shall/will have been encrypting
you will have been encryptingyou will have been encrypting
he/she/it will have been encryptingthey will have been encrypting
Future in the Past Indefinite, Active Voice
I should/would encryptwe should/would encrypt
you would encryptyou would encrypt
he/she/it would encryptthey would encrypt
Future in the Past Continuous, Active Voice
I should/would be encryptingwe should/would be encrypting
you would be encryptingyou would be encrypting
he/she/it would be encryptingthey would be encrypting
Future in the Past Perfect, Active Voice
I should/would have encryptedwe should/would have encrypted
you would have encryptedyou would have encrypted
he/she/it would have encryptedthey would have encrypted
Future in the Past Perfect Continuous, Active Voice
I should/would have been encryptingwe should/would have been encrypting
you would have been encryptingyou would have been encrypting
he/she/it would have been encryptingthey would have been encrypting
Present Indefinite, Passive Voice
I am encryptedwe are encrypted
you are encryptedyou are encrypted
he/she/it is encryptedthey are encrypted
Present Continuous, Passive Voice
I am being encryptedwe are being encrypted
you are being encryptedyou are being encrypted
he/she/it is being encryptedthey are being encrypted
Present Perfect, Passive Voice
I have been encryptedwe have been encrypted
you have been encryptedyou have been encrypted
he/she/it has been encryptedthey have been encrypted
Past Indefinite, Passive Voice
I was encryptedwe were encrypted
you were encryptedyou were encrypted
he/she/it was encryptedthey were encrypted
Past Continuous, Passive Voice
I was being encryptedwe were being encrypted
you were being encryptedyou were being encrypted
he/she/it was being encryptedthey were being encrypted
Past Perfect, Passive Voice
I had been encryptedwe had been encrypted
you had been encryptedyou had been encrypted
he/she/it had been encryptedthey had been encrypted
Future Indefinite, Passive Voice
I shall/will be encryptedwe shall/will be encrypted
you will be encryptedyou will be encrypted
he/she/it will be encryptedthey will be encrypted
Future Perfect, Passive Voice
I shall/will have been encryptedwe shall/will have been encrypted
you will have been encryptedyou will have been encrypted
he/she/it will have been encryptedthey will have been encrypted