所有这一切都是在密码员和加密设备的保护下进行的。
All this is in the password member under the protection of the equipment and encryption.
通过一个异步接口支持硬件加密设备的工作正在开发中。
Support for hardware crypto devices via an asynchronous interface is under development.
对数据加密设备和数据网络中密钥的管理和分配问题进行了探讨。
Finally, the management and assignment of secret key in data encryption devices and data networks.
Cubic公司研发多频段微型收发器,以满足日益增长的多波段可移动加密设备要求。
Cubic developed the MMT to meet the growing operational requirement for multiband units with removable encryption.
此外,在我们的私人生活和商业生活当中,加密设备与通信已经变得非常普遍。
And encrypted devices and communications are now common throughout our personal and commercial lives.
为了避免这类攻击,建议用户对加密设备进行保护,阻止攻击者对其进行故障诱导。
To(avoid) this kind of attack, the authors suggest that the encryption device should be protected to prevent the adversary from deducing faults.
NetBSD使用加密设备驱动程序 (CGD)通过虚拟设备实现加密的文件系统。
NetBSD uses the cryptographic device driver (CGD) to implement an encrypted file system with a virtual device.
然而,MediaMVP包含了Linux产品的灵活性,这或许是因为它是作为硬件的一部分销售的,而不是那种要您使用付费服务的加密设备。
However, the MediaMVP has embraced the flexibility Linux offers; this is probably because it's sold as a piece of hardware, not as a dongle to let you use a pay service.
可以按照相同的方法在文件上用循环设备创建加密的文件系统。
You can use this same approach to create encrypted file systems with the loop device on a file.
这些内容将以加密的方式出现,但是想要让它在一个非苹果设备上出现,可能很难,也许根本不可能。
That content will be encrypted in such a way that it could be difficult-maybe impossible-to move it to a non-Apple device.
无论它的传输加密的多好,设备本身存有易受攻击的漏洞。
No matter how well its transmissions are encrypted, the device itself remains vulnerable to being hacked.
授权电脑是指纹识别的、唯一可以通过加密的通信通道对网络上关键资产进行访问的设备。
Authorized computers are 'fingerprinted' and are the only devices allowed to communicate across an encrypted communications channel to critical assets on the network.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
不过,如果要加密发送给云提供商的数据,或者需要在发送之前进行扫描,那么客户端XML网关设备是完成这个任务的最佳工具。
However, if the data sent to the cloud provider is to be encrypted or scanned prior to sending, then a client-side XML gateway appliance is an ideal tool for this job.
该设备是一种坚固易于使用、小尺寸、单键可编程设备,能够在战场上迅速上传加密密钥。
The TKL is a rugged, easy -to-use, small-form factor, single-button programmable device that quickly loads encryption keys into radios in the field.
而且,一些操作系统(如苹果iOS的最新版本)会有现成的加密功能,并为设备提供数据保护。
And some operating systems such as later versions of Apple's iOS include ready-made encryption capabilities that protect data on devices.
现在Jethro可以向 Ellie发送签署并加密的设备订单。
Now Jethro can send Ellie signed and encrypted orders for equipment.
可以用 dm_crypt 对块设备或逻辑卷执行透明的加密。
You can transparently encrypt a block device or a logical volume with dm_crypt.
这种情况促使DRM的产生,它把每一首从iTunes上购买的歌曲用特殊加密的方法打包以至于不能在未授权的设备上播放。
The solution was to create a DRM system, which envelopes each song purchased from the iTunes store in special and secretsoftware so that it cannot be played on unauthorized devices.
WebSphereCloudBurst还包含一个内置到设备中的映像库,该库利用了加密和碎片技术。
WebSphere CloudBurst also includes an image repository, built into the appliance, which leverages encryption and sharding technologies.
但存储在移动设备本身的本地数据库中的数据是未加密的,而这些正是多方担忧和质疑的来源。
But the local database log was unencrypted however and caused more headaches and questions.
但存储在移动设备本身的本地数据库中的数据是未加密的,而这些正是多方担忧和质疑的来源。
But the local database log was unencrypted, however, and caused more headaches and questions.
该过滤器就会被加密,通过云发送到她儿子的设备中。
The filter is encrypted and sent via the cloud to her son's device.
保证移动设备匿名的一种方法是运用加密的身份证明来访问服务,这样可以避免将移动设备的机主信息泄露给服务提供商。
Rather than revealing a mobile device's owner to service providers, one way to ensure anonymity is for a mobile device to ping services using a cryptographic proof-of-identity.
这阻止必须将加密材料储存在设备的文件系统中,因为加密材料可以在获取时缓存在内存中。
This prevents the crypto material from having to be stored on the appliance's file system, as the material will be cached in memory upon retrieval.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
该应用程序需要在移动设备上安装,只有当你需要加密或解密文件跑去。
The application needs to be installed on the removable device and ran only when you need to encrypt or decrypt the file.
其从指定的文件进行加密只的信息,并不会阻止其他用户访问该设备的内容。
It encrypts only the information from the specified files and does not prevent other users from accessing the content of the device.
其从指定的文件进行加密只的信息,并不会阻止其他用户访问该设备的内容。
It encrypts only the information from the specified files and does not prevent other users from accessing the content of the device.
应用推荐