1·This enabled the FBI to find his password to access the encrypted files.
这使得联邦调查局能够找到密码来读取这个加密文件。
2·This will establish an encrypted session without any modifications needed on the client side.
这将建立一个加密的会话,而不需要在客户端做任何修改。
3·All of these tools are secure in that the information that is exchanged is encrypted.
所有这些工具都是安全的,因为对交换的信息进行了加密。
4·The actual encrypted data appears as contents of the tag.
实际加密的数据作为标记的内容出现。
5·This section shows how you can create encrypted files and directories in the EFS file system and manipulate their properties.
这个部分将介绍如何在EFS文件系统中创建加密的文件和目录,并操纵它们的属性。
1·Using steganography technique in encrypted E-mail for hiding information is introduced, which can protect the E-mail.
介绍了如何利用信息隐藏技术,对加密后的邮件信息进行隐藏,以确保邮件的安全。
2·The author decides to unleash the digital digest of the manuscript, and store the encrypted manuscript in the secured media. Thus the author could prove he have already finished this manuscript.
作者为了证明自己完成了这些工作,只能将手稿打包加密后保存在安全的媒介中,并公开相应的数字签名。
3·Too complex too partial can not restore the password encrypted, and I hope I can master the basis of sound it, and transmits it up.
太复杂的太偏的密码加密后无法还原,我希望有大师能在我的基础上完善它,再传上来。-Is a compact Password Manager。