单词 | 加密的 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
释义 | 加密的 adjective —encrypted adjExamples:加密后的—encrypted See also:加密 adj—encrypted adj • cryptographic adj 加密—encrypt 加密 n—cryptography n 密的 adj—encrypted adj
|
用戶用於簽章與身分鑑別的私密金鑰絕不可被託管、歸檔或備 份;用戶所屬的憑證機構得要求託管、歸檔或備份職務上用 來 加密的 私密金鑰。 epki.com.tw | Private key used by subscriber for signature and identity authentication shall not be escrowed, archived or [...] backup; Subscriber backed CA shall request for escrow, archival [...] or backup for encryption of private key to facilitate duties. epki.com.tw |
作為瓊斯博士的助手,你打算破解瓊斯博士 所 加密的 信 息 ,以証明 弱 的加密方 法是不安全的。 hkoi.org | As an assistant of Dr. Jones, to show him [...] that the encryption method is not reliable, you are going to decrypt his encrypted message. hkoi.org |
这些都没有依赖任何JCE provider,而且所有这些都包含加密的 功 能。 javakaiyuan.com | These are not dependent on any JCE provider, and all of [...] which contain cryptographic functionality. javakaiyuan.com |
任职者还负责维护和更新支持有关 加密的 进 程 和系统的记录,在技 术上帮助设计各类外地特派团的多用户信息安全系统,并保持对通信和信息技术 [...] 领域的信息安全发展的了解。 daccess-ods.un.org | The incumbent will also maintain and update [...] records that support encryption related processes [...]and systems, provides technical [...]assistance with the design of a variety of field mission multi-user information security systems and keep abreast of developments in information security in the field of information and communications technology. daccess-ods.un.org |
現時,美國有三十多個州已 在其法律內加入通報責任,規定資料使用者必須就某些特定 [...] 的個人資料外洩事件通知受影響人士;所涉及的資料為未經 加密的個人 資料,包括當事人的姓名連同敏感個人資料,如 [...] 社會保障號碼、信用卡號碼和駕駛執照號碼。 legco.gov.hk | Over 30 states have incorporated in their state laws a duty to notify individuals of certain [...] defined security breaches of personal [...] information, namely unencrypted personal information [...]involving a person’s name in combination [...]with certain sensitive personal information such as social security number, credit card number and driver’s licence number. legco.gov.hk |
扫描站应用程序可以识别 [...] USB 移动式设备的存 在,但将仅打开和读取专供扫描站使用而创建 和 加密的 文 件。 graphics.kodak.com | The Scan Station application recognizes the presence of a USB removable [...] device, but will only open and read files that have [...] been created and encrypted specifically for [...]use by the Scan Station. graphics.kodak.com |
通常它用于远程登陆服务器之间的通信(在UNIX操作系统上运行),但它也允许您与SSH1和SSH2(安全Shell)服务器之间实现加密(因此是安全的)通信,当然还有其他 不 加密的 服 务器(例如SMTP或POP3)。 evget.com | Most commonly it will be used for communicating with Telnet based servers (running on UNIX OS), but it also allows you to carry out encrypted (and therefore secure) [...] communications with SSH1 and SSH2 (secure-shell) servers, as well as [...] any other non-encrypted server (such [...]as SMTP or POP3). evget.com |
此外,當本公司於網際網路上傳輸敏感的個人資料 [...] (例如信用卡號碼) 時,本公司係以加密的保護方式 (例如:使用 Secure Socket [...]Layer (SSL)通信協定) 為之。 synology.com | Additionally, when Synology Inc. transmits sensitive personal information (such as a credit card number) [...] over the Internet, Synology Inc. protects it [...] through the use of encryption, such as the Secure [...]Socket Layer (SSL) protocol. synology.com |
比正常訊息短很多的對稱密碼匙,會和 收件者的公開密碼匙同步加密 到訊息中, 而整個由已加密訊息、RSA 及已加密 的對稱 密碼匙數據包,會直接送到收件人手上。 hongkongpost.gov.hk | The symmetric key, which is usually much shorter than the message, is then encrypted with the recipient’s public key, and the entire package—encrypted message and RSA-encrypted symmetric key—is sent to the recipient. hongkongpost.gov.hk |
跨越全部連接埠上所有應用程式的政策式 SSL 解密可保護您免受在 SSL 加密的應用 程式中移動的惡意軟體侵害。 media.paloaltonetworks.com | Policy-based SSL decryption across any application on any port protects you against malware moving across SSL encrypted applications. media.paloaltonetworks.com |
通訊協定是 電腦之間互相溝通的特定語言, [...] TLS 協定可為你的電腦及網站間建立已加密 的溝通渠道,從而使你轉送到網站的所有﹝可能機密﹞ [...]資料,在轉送到互聯網 時均已加密。 hongkongpost.gov.hk | A protocol is a method computers use to [...] communicate with each other, and the TLS protocol [...] establishes an encrypted channel between [...]your computer and a web site so that all [...]the (potentially sensitive) information you submit to the web site is encrypted as it passes through the Internet. hongkongpost.gov.hk |
轨道三是读/写轨道(其中包括加密的 PIN、 国家/地区代码、货币单位、 认可金额),但是其用法未在银行间形成标准化。 vmware.com | Track three is a read/write track (that includes an encrypted PIN, country code, [...] currency units, amount authorized), but [...]its usage is not standardized among banks. vmware.com |
中亚区域情报协调中心处于试点阶段,以便征聘基本工作人 员、从各参与国借调联络官员、采购基本设备和安装经 过 加密的 安 全 的国际刑 警组织(刑警组织)I-24/7 通信和数据库访问系统。 daccess-ods.un.org | CARICC is in its pilot phase, which allows for the recruitment of essential staff, the secondment of [...] liaison officers from [...] each of the participating countries, the procurement of basic equipment and the installation of the International Criminal Police Organization (INTERPOL) I-24/7 encrypted and secure [...]communication and database access system. daccess-ods.un.org |
为了确保能够在D公司工作,被告向D公司 公开了B公司开发的邮件系统加密的最 新版本的源代码。 china-iprhelpdesk.eu | To secure their jobs with Company D, the defendants disclosed [...] to Company D the latest version of the [...] source code for encrypting email systems, [...]which had been developed by Company B. china-iprhelpdesk.eu |
出口與再出口包含加密的硬體 或軟體,須遵守美國商務部工業安全局規範 (如需詳細資料,請造訪 www.bis.doc.gov),且其進口與於美國以外地區的使用均會受到控管。 seagate.com | The export or re-export of hardware or [...] software containing encryption may be regulated [...]by the U.S. Department of Commerce, Bureau [...]of Industry and Security (for more information, visit www.bis.doc.gov) and controlled for import and use outside of the U.S. Complying with all applicable copyright laws is the responsibility of the user. seagate.com |
5.2.6.13.4 未加密的电子 邮件中如能看出运动员的身份或包含有任何与 运动员身份有关的信息,则该邮件不得被用来提交报告或提供 [...] 讨论。 unesdoc.unesco.org | 5.2.6.13.4 Unencrypted email is not authorized [...] for any reporting or discussion of Adverse Analytical Findings if the Athlete [...]can be identified or if any information regarding the identity of the Athlete is included. unesdoc.unesco.org |
审查和更新由于新信息和通信技术迅速发展并 且由于依赖这些新技术而可能过时或失效的法律依 据(包括有关网络犯罪、隐私、数据保护、商业法、 数字签名和加密的法律 依据),在审查过程中利用区 域和国际公约、安排和先例。 daccess-ods.un.org | Review and update legal authorities (including those related to cybercrime, privacy, data protection, commercial law, digital signatures and encryption) that may be outdated or obsolete as a result of the rapid uptake of and dependence upon new information and communications technologies, and use regional and international conventions, arrangements and precedents in these reviews. daccess-ods.un.org |
謹記要為加密用的密碼 作出有效的保護措施,包括不要把它與 被 加密的 電 腦或 便攜式儲存裝置存放在一起。 pcpd.org.hk | You should therefore ask yourself how you can be sure that the copy of Foxy you have downloaded has not been tampered with and is not infected with malware. pcpd.org.hk |
这一系统评估的一个重要部分就是资料安全要求:如 文件定为“保密”或“严格保密”,则会记 录 加密的 理 由 和保留期限。 daccess-ods.un.org | An important part of this systematic assessment is the requirement of information security: where a document is designated as “confidential” or “strictly confidential”, the rationale and duration for such a classification will be recorded. daccess-ods.un.org |
们只需将加密的集装 箱安装到员工的私人设备 上,以确保设备和公司之间的安全连接。 t-systems.cn | It’s simply a matter of [...] installing an encrypted container on the [...]employee’s personal device, ensuring a secure connection [...]between the device and the corporate IT environment. t-systems.com |
為了區分這種變異的“心級”產品,這款腕錶的錶盤上設有一個計時羅 馬 加密的 歷 史模型的品牌在博物館借來可見。 zh.horloger-paris.com | To differentiate this variant products "heart [...] level", the dial of this watch features a [...] chronograph Roman encryption applied to the historical [...]model borrowed visible in the museum of the brand. en.horloger-paris.com |
完成后的PDF编辑,选择文件>保存为...菜单,并选择了弹出窗 口 的加密 , 然 后设置打开密码,单击“ 保存 “按钮保存和加密的PDF文 件,打开密码。 cn.anypdftools.com | After you finish the PDF editing, choose File > [...] Save as… in the menu, [...] and select Encrypt in the pop out window, then set the open password, click Save button to save and encrypt the PDF file with open password. resource.anypdftools.com |
你應該避免使用沒有加密的免費 公共無線網絡,如果你必須這樣做,你應該避免登錄你的電子郵件,網上購物或網上銀行網站。 hkcert.org | You should avoid using free public [...] Wi-Fi without encryption, if you do so, [...]you should avoid login to your email, online [...]shopping or e-banking web sites. hkcert.org |
移除PDF密码和Mac [...] OS X上的限制,现在,您可以复制,打印和编辑的原 始 加密的 P D F 文 件。 cn.anypdftools.com | Remove PDF password and restrictions on Mac OS X. Now you can copy, print and [...] edit the original encrypted PDF files. anypdftools.com |
这款套件软件包括企业密钥管理服务器(EKMS),可简化对用于敏感信息保 护 的加密密 钥 的 管理。 tipschina.gov.cn | This release includes an Enterprise Key [...] Management Server (EKMS) that simplifies administration and [...] management of encryption keys used to protect [...]sensitive information. tipschina.gov.cn |
SAM4S 支持安全器件复原(芯片擦除),以便重新编程。唯一的 128 位 ID 和加密的外部总线接口可确保软件的保密性,同时硬件循环冗余检查 [...] (CRC) 可检查存储器的完整性。 digikey.cn | SAM4S supports secure device reconditioning (chip erase) for reprogramming, and a [...] unique 128-bit ID and scrambled external bus interface [...] ensure software confidentiality, while the [...]hardware cyclic redundancy [...]check (CRC) checks memory integrity. digikey.be |
第一步:这是必须的,不管你怎样去除,都要改动这个PDF文件,如果它设了密码,不让编辑,你就要去除它的密码,也就是破解它,看看我推荐的几个软件,在这里 http://oapdf.com/pdf_jishu/PDF_jiami_jiemi/ [...] ,大家也可以自己搜一个名叫"PDF Password Remover "的软件,进行破解加密的PDF文档。 oapdf.com | The first step:This is a must, no matter how you are going to remove all changes to the PDF file, if it set up a password, not editors, you must remove its password, that is, break it, take a look at my recommended Some software, where [...] http://oapdf.com/pdf_jishu/PDF_jiami_jiemi/, you can also find the name of their own " PDF Password Remover " [...] software to crack the encryption of PDF documents. oapdf.com |
如果需要為獨立檔案加密,你可以安裝7-Zip(www.7-zip.org) 作加密的工具 。它亦是一個免費及多重平台的開放源碼軟件, [...] 可以壓縮檔案及文件夾,並同時支援加密。 pcpd.org.hk | For the encryption of individual files, [...] you can install 7-Zip (www.7-zip.org), also a free, open-source and multi-platform [...]software program that compresses files and folders, and supports encryption. pcpd.org.hk |
它們的形狀為靈感的風格亞軍,但重新設計,提出了一個更技術和精確的反映LUC動作的質量字體的LUC收集的也發生了變化,在六十年代一個傳統的羅馬拼寫常 用 的加密 方 法 的基礎上。 zh.horloger-paris.com | Their shape is inspired by the style runner, but redesigned to suggest a more technical and precise than reflecting the quality of LUC movements [...] The typeface of the LUC collection is [...] also changed, as encryption based on a traditional [...]Roman spelling commonly used in the sixties. en.horloger-paris.com |
英汉双解词典包含2273206条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。