Примеры из текстов
All digital signatures, encrypted messages, encrypted files, and other cryptographic applications that rely on the certificate become inoperable when the certificate is revoked.Все цифровые подписи, зашифрованные сообщения и другие результаты шифрования, которые основаны на этом сертификате, оказываются недоступными при отзыве сертификата.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
You can, however, enable the storage of passwords that are encrypted with a reversible key.Но можно включить хранение паролей с использованием обратимого ключа.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
The encrypted ticket or TGT includes the following major fields:Зашифрованный билет или билет TGT содержит следующие поля.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
Do so by importing the key from the certificate at another machine (server or desktop) and then verifying that you can open encrypted files at the desktop.Для этого импортируйте ключ из сертификата на другой компьютер (сервер или рабочую станцию) и проверьте возможность открытия зашифрованных файлов на рабочей станции.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
In order not to confuse the regular class loader, we use a different extension, .caesar, for the encrypted class files.Чтобы не поставить в тупик стандартный загрузчик классов, для зашифрованных файлов классов используется расширение .caesar.Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программированияJava 2. Том II. Тонкости программированияХорстманн, Кей С.,Корнелл, Гари© Издательский дом "Вильямc", 2002© Prentice Hall, Inc., 2002Core Java™ 2. Volume II - Advanced FeaturesHorstmann, Cay S.,Cornell, Gary© 2002 Sun Microsystems, Inc.
Protocol analysis may still work tor encrypted traffic, but may break if the traffic is sent on an unexpected port.Анализ протоколов может срабатывать для зашифрованного трафика, но может выйти из строя, если трафик отправлен на неожиданный порт.Allen, David,Scott, Andrew,Lewis, Herb,Stile, John,Tuck, Tim / Windows to Linux Migration ToolkitАллен, Дэвид,Скотт, Эндрю,Льюис, Герберт,Стайл, Джон,Такк, Тимоти / Переход с Windows на LinuxПереход с Windows на LinuxАллен, Дэвид,Скотт, Эндрю,Льюис, Герберт,Стайл, Джон,Такк, Тимоти© 2004 by Syncress Publishing, Inc.© Перевод на русский язык, «БХВ-Петербург» 2005Windows to Linux Migration ToolkitAllen, David,Scott, Andrew,Lewis, Herb,Stile, John,Tuck, Tim© 2004 by Syngress Publishing, Inc.
In that configuration, a scanner cannot open a user's encrypted files and therefore may miss a virus.В такой конфигурации сканер не может открывать зашифрованные файлы пользователей и способен пропустить вирус.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
Obviously, once your email leaves mailhost, it will be transmitted in the clear, unless you've encrypted the message with a tool such as pgp or gpg.Очевидно, что, после того как почта покинет почтовый узел (mai lhost), она будет передаваться в открытом виде, если только вы не зашифровали сообщения с помощью такого средства, как pgp или gpg.Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
When users move or copy encrypted files, they may get unexpected results, especially if they are unaware that the files were encrypted in the first place.При перемещении или копировании файлов пользователь может получить неожиданный результат, особенно если не подозревает, что файлы зашифрованы.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
A Windows remote access server obtains a copy of the user's password via a secure, encrypted channel to a domain controller.Сервер удаленного доступа под управлением Windows получает копию пользовательского пароля по безопасному шифрованному каналу от контроллера домена.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
The Windows and Unix password information is encrypted when transported over the network.При подаче информации о паролях Windows и Unix через сеть осуществляется ее шифрование.Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертовMicrosoft® Windows® Server 2003: решения экспертовМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд© 2004 SAMS Publishing© Перевод «ИД КУДИЦ-ОБРАЗ», 2005© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.Microsoft® Windows® Server 2003 Insider SolutionsMorimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed© 2004 by Sams Publishing
Because WebDAV clients work on local copies of a file, they have a few advantages when working with encrypted files in an untrusted environment such as the Internet:Поскольку клиенты WebDAV работают с локальной копией файла, они получают несколько преимуществ при работе с шифрованными файлами в общедоступной среде, например в Интернет.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
This folder is encrypted via EFS based on a certificate that was issued to Bob by the corporate Certificate Authority.Эта папка зашифрована с использованием EFS на основании сертификата, который был выдан Бобу корпоративным центром сертификации.Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертовMicrosoft® Windows® Server 2003: решения экспертовМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд© 2004 SAMS Publishing© Перевод «ИД КУДИЦ-ОБРАЗ», 2005© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.Microsoft® Windows® Server 2003 Insider SolutionsMorimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed© 2004 by Sams Publishing
In Tunnel-mode ESP, the original IP datagram is placed in the encrypted portion of the Encapsulating Security Payload and that entire ESP frame is placed within a datagram having unencrypted IP headers.В туннельном режиме исходная дейтаграмма IP помещается в зашифрованную часть ESP, а весь кадр ESP помещается в дейтаграмму с незашифрованными заголовками IP.Siyan, Karanjit S.,Parker, Tim / TCP/IP UnleashedСиян, Каранжит,Паркер, Тим / TCP/IP для профессионаловTCP/IP для профессионаловСиян, Каранжит,Паркер, Тим© 2002 by Sams Publishing© Перевод на русский язык, ЗАО Издательский дом «Питер», 2004© Издание на русском языке, оформление, ЗАО Издательский дом «Питер», 2004TCP/IP UnleashedSiyan, Karanjit S.,Parker, Tim© 2002 by Sams Publishing
The disc and title keys are stored in the lead-in area of the disc in an encrypted form.Ключи диска и заголовка находятся в зашифрованном виде на нулевой дорожке диска.Mueller, Scott / Upgrading and Repairing LaptopsМюллер, Скотт / Модернизация и ремонт ноутбуковМодернизация и ремонт ноутбуковМюллер, Скотт© Que Corporation, 2004© Издательский дом "Вильямс", 2006Upgrading and Repairing LaptopsMueller, Scott© 2006 by Que Corporation
Добавить в мой словарь
Не найденоПереводы пользователей
Часть речи не указана
- 1.
Зашифрованный
Перевод добавил Александр Даурских
Словосочетания
encrypted data
зашифрованные данные
encrypted file
зашифрованный файл
double encrypted data
дважды зашифрованные данные
encrypted channel
канал с криптографической защитой
encrypted communication system
система зашифрованной связи
encrypted data file
зашифрованный файл данных
encrypted information
зашифрованная информация
encrypted input
ввод зашифрованной информации
encrypted output
зашифрованный вывод
encrypted password
зашифрованный пароль
encrypted signal
зашифрованный сигнал
encrypted password
шифрованный пароль
encrypting system
система шифрования
self-encrypting virus
самошифрующийся вирус
encrypting key generator
генератор криптографических ключей
Формы слова
encrypt
verb
Basic forms | |
---|---|
Past | encrypted |
Imperative | encrypt |
Present Participle (Participle I) | encrypting |
Past Participle (Participle II) | encrypted |
Present Indefinite, Active Voice | |
---|---|
I encrypt | we encrypt |
you encrypt | you encrypt |
he/she/it encrypts | they encrypt |
Present Continuous, Active Voice | |
---|---|
I am encrypting | we are encrypting |
you are encrypting | you are encrypting |
he/she/it is encrypting | they are encrypting |
Present Perfect, Active Voice | |
---|---|
I have encrypted | we have encrypted |
you have encrypted | you have encrypted |
he/she/it has encrypted | they have encrypted |
Present Perfect Continuous, Active Voice | |
---|---|
I have been encrypting | we have been encrypting |
you have been encrypting | you have been encrypting |
he/she/it has been encrypting | they have been encrypting |
Past Indefinite, Active Voice | |
---|---|
I encrypted | we encrypted |
you encrypted | you encrypted |
he/she/it encrypted | they encrypted |
Past Continuous, Active Voice | |
---|---|
I was encrypting | we were encrypting |
you were encrypting | you were encrypting |
he/she/it was encrypting | they were encrypting |
Past Perfect, Active Voice | |
---|---|
I had encrypted | we had encrypted |
you had encrypted | you had encrypted |
he/she/it had encrypted | they had encrypted |
Past Perfect Continuous, Active Voice | |
---|---|
I had been encrypting | we had been encrypting |
you had been encrypting | you had been encrypting |
he/she/it had been encrypting | they had been encrypting |
Future Indefinite, Active Voice | |
---|---|
I shall/will encrypt | we shall/will encrypt |
you will encrypt | you will encrypt |
he/she/it will encrypt | they will encrypt |
Future Continuous, Active Voice | |
---|---|
I shall/will be encrypting | we shall/will be encrypting |
you will be encrypting | you will be encrypting |
he/she/it will be encrypting | they will be encrypting |
Future Perfect, Active Voice | |
---|---|
I shall/will have encrypted | we shall/will have encrypted |
you will have encrypted | you will have encrypted |
he/she/it will have encrypted | they will have encrypted |
Future Perfect Continuous, Active Voice | |
---|---|
I shall/will have been encrypting | we shall/will have been encrypting |
you will have been encrypting | you will have been encrypting |
he/she/it will have been encrypting | they will have been encrypting |
Future in the Past Indefinite, Active Voice | |
---|---|
I should/would encrypt | we should/would encrypt |
you would encrypt | you would encrypt |
he/she/it would encrypt | they would encrypt |
Future in the Past Continuous, Active Voice | |
---|---|
I should/would be encrypting | we should/would be encrypting |
you would be encrypting | you would be encrypting |
he/she/it would be encrypting | they would be encrypting |
Future in the Past Perfect, Active Voice | |
---|---|
I should/would have encrypted | we should/would have encrypted |
you would have encrypted | you would have encrypted |
he/she/it would have encrypted | they would have encrypted |
Future in the Past Perfect Continuous, Active Voice | |
---|---|
I should/would have been encrypting | we should/would have been encrypting |
you would have been encrypting | you would have been encrypting |
he/she/it would have been encrypting | they would have been encrypting |
Present Indefinite, Passive Voice | |
---|---|
I am encrypted | we are encrypted |
you are encrypted | you are encrypted |
he/she/it is encrypted | they are encrypted |
Present Continuous, Passive Voice | |
---|---|
I am being encrypted | we are being encrypted |
you are being encrypted | you are being encrypted |
he/she/it is being encrypted | they are being encrypted |
Present Perfect, Passive Voice | |
---|---|
I have been encrypted | we have been encrypted |
you have been encrypted | you have been encrypted |
he/she/it has been encrypted | they have been encrypted |
Past Indefinite, Passive Voice | |
---|---|
I was encrypted | we were encrypted |
you were encrypted | you were encrypted |
he/she/it was encrypted | they were encrypted |
Past Continuous, Passive Voice | |
---|---|
I was being encrypted | we were being encrypted |
you were being encrypted | you were being encrypted |
he/she/it was being encrypted | they were being encrypted |
Past Perfect, Passive Voice | |
---|---|
I had been encrypted | we had been encrypted |
you had been encrypted | you had been encrypted |
he/she/it had been encrypted | they had been encrypted |
Future Indefinite, Passive Voice | |
---|---|
I shall/will be encrypted | we shall/will be encrypted |
you will be encrypted | you will be encrypted |
he/she/it will be encrypted | they will be encrypted |
Future Perfect, Passive Voice | |
---|---|
I shall/will have been encrypted | we shall/will have been encrypted |
you will have been encrypted | you will have been encrypted |
he/she/it will have been encrypted | they will have been encrypted |