对数据进行加密之后,清单6中的代码读回加密后的事件文本。
After encrypting the data, the code in Listing 6, below, reads the encrypted event text back in.
清单6中的代码表示读入经ascii封装的加密文本文件(附带了存储日期和时间的信息),然后重新启动快速添加文本的过程。
The code in Listing 6 shows reading the ASCII-armor encrypted text file in, appending the stored date and time information, and resuming the quick-add text process.
清单5的代码表示将文本事件写到一个文件中并运行加密程序。
Code sections in Listing 5 demonstrated writing the text event to a file and running the encryption process.
使用本文给出的工具和代码,您现在就可以在Google日程表中存储加密事件文本。
With the tools and code presented in this article, you can now store encrypted event text only in Google Calendar.
有了处理加密的函数性扩展开发环境和GnuPG之后,可以通过更改前面开发的扩展的一些代码来修改接口。
With a functional extension development environment and GnuPG to handle the encryption, modifying the interface will be done by changing some code in a previously developed extension.
这个SQLServer版本内建有加密/解密,这样您就不用去修改您的应用代码。
This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.
代码审计、加密的广泛应用和谨慎的配置选择等设计原则共同确保了OpenBSD的“默认即安全”原则仍然有效。
Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure that OpenBSD's secure-by-default philosophy holds true.
密钥用来加密请求的某些部分,以使Amazon能够确保是您编写的代码在向他们发送请求。
The secret key is used to encrypt portions of the request so Amazon can ensure that code that you wrote that is sending them requests.
底层的WSS4JWS-Security代码使用清单8 所示的属性文件配置签名和加密处理。
The Listing 8 properties file is used by the underlying WSS4J WS-Security code to configure the signature and encryption processing.
但是,需要作出一些修改来支持使用WS - Security公开密匙加密特性,因此本文附带了一个单独的代码包(见下载)。
A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).
本文所附示例代码中的xml加密实现对内容加密只能识别Triple - des算法。
The implementation of XML encryption used in the sample code accompanying this article only recognizes the Triple-DES algorithm for content encryption.
这个样本代码将生成一个新的秘钥,并使用它对数据进行加密和解密。
The sample code generates a new secret key and uses it to encrypt and decrypt data.
一比特币本质上就是能在互联网上快速传递和存储在电子钱包中的一小串加密代码。
A Bitcoin is basically just a little bit of encrypted code that can be zipped over the Internet and stored in a digital wallet.
由于任何加密密钥和密码系统都必须位于源代码中,因此同时还会将应用程序的源数据流公开出来。
Since any required encryption keys and cryptosystems have to be in the source code as well, you've also just opened up your source data stream to the world.
本文附带的源代码使用的xml加密方法只能识别三重des (Triple - DES)加密算法,因此我就用这种算法创建密钥。
The accompanying source code USES XML encryption that only recognizes the triple-DES algorithm, hence I create the key with that algorithm.
用来加密解密的代码我现在正在进一步研究,希望能够得到大家的帮助。
Used for encryption and decryption code I now further study, we hope to receive help.
首先把Ruby源代码编译成内部的中间格式,然后进行加密。
The Ruby source code is compiled into an intermediate internal format which is followed by encryption.
其中的一些设计原则,如代码审核、加密处理的广泛使用以及仔细的配置选择,它们组合在一起可以确保实现OpenBSD的缺省安全的思想。
Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure OpenBSD's secure by default philosophy holds true.
加密的数据很像转化为一个秘密代码。
Encrypting data is much like translating it into a secret code.
清单7:显示加密foaf文件链接的代码片段。
Listing 7: Fragment showing linking of an encrypted FOAF file.
使用开源代码替换所有非开源代码包括libc _ i18n、NFS锁管理器、加密框架部分以及大量关键的驱动程序。
Replacing all the closed code with open source one: libc_i18n, NFS lock manager, portions of crypto framework, many critical drivers.
根据Folhade S.Paulo报周五(25日)出版的报告所言,美国联邦警察历经一年的尝试,仍未破解硬盘的加密代码,只能于今年四月将硬盘归还巴西。
According to a report published on Friday (25) by the newspaper Folha de S. Paulo, after a year of unsuccessful attempts, the U.S. federal police returned the equipment to Brazil in April.
随着代码的网页的情侣,我可以加密和解密什么我可懒得写一个序列化函数。
With a couple of pages of code, I can encrypt and decrypt anything I can be bothered to write a serialize function for.
这还没提到加密解密和改变恶意代码形态所需要的能力。
And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code.
更多有关数字签名的信息,加密和证书你参考代码签名指南中的安全概述。
For more information on digital signatures, encryption keys, and certificates, see Security Overview and Code Signing Guide.
“加密”是采用加扰的数据类型的代码只知道该软件做编码,任何人访问私人数据是无法读取如此的过程。
"Encryption" is the process of scrambling data using a kind of code known only to the software doing the coding, so that anyone accessing the private data is unable to read it.
我的理解是,应用程序已经通过它得到一个用户装置,但这仅是二进制机器代码仍然可以访问加密的时间。
My understanding is that the application binary is already encrypted by the time it gets to a user device but this is only the binary and the machine code can still be accessed.
当使用证书为存储过程签名时,会使用私钥创建由该存储过程代码的加密哈希组成的数据摘要。
When you sign a stored procedure with a certificate, a data digest consisting of the encrypted hash of the stored procedure code is created using the private key.
加密与数字签名解决了主动代码的完整性、机密性问题,这里使用解码绑定方式,实现了系统加密方法的可扩展。
The encryption and digital signature solve the problem in integrity and confidentiality of active code. The application of decode-binding realizes the scalability in systematic encryption methods.
加密与数字签名解决了主动代码的完整性、机密性问题,这里使用解码绑定方式,实现了系统加密方法的可扩展。
The encryption and digital signature solve the problem in integrity and confidentiality of active code. The application of decode-binding realizes the scalability in systematic encryption methods.
应用推荐