• The sample code generates a new secret key and uses it to encrypt and decrypt data.

    这个样本代码将生成一个新的使用数据进行加密解密

    youdao

  • The secret key is used to encrypt portions of the request so Amazon can ensure that code that you wrote that is sending them requests.

    密钥用来加密请求某些部分,以使Amazon能够确保编写代码在向他们发送请求

    youdao

  • With the event description text isolated from the event data and time, the next step is to write the event text to disk, and then encrypt it. Add the code shown below in Listing 5 at line 77.

    事件描述文本事件日期时间分离出来后接下来应该将事件文本写到磁盘然后进行加密

    youdao

  • You could make up messages and encrypt them, and your friend could use the code to decode the message.

    可以编制各种消息它们进行加密伙伴可以使用暗号解码这些消息

    youdao

  • With a couple of pages of code, I can encrypt and decrypt anything I can be bothered to write a serialize function for.

    随着代码网页的情侣,可以加密解密什么懒得一个序列化函数。

    youdao

  • And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code.

    提到加密解密改变恶意代码形态所需要能力

    youdao

  • In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.

    同时能够阻止病毒程序恶意代码程序运行这样可信计算平台解决加密系统及其运行环境的安全性问题

    youdao

  • Study how to modify and rewrite all parts of PE format files and encrypt, replace, extract executable code or PE resource.

    通过修改达到对原有PE文件内容替换、加密、反修改等。

    youdao

  • Now you can encrypt your PHP files before distribution without worrying about others who might want to copy or steal your code.

    现在可以发布PHP文件之前加密它,再也不用担心别人复制窃取源代码

    youdao

  • The I/O manager code 8 may use the encryption engine 10, which performs operations to encrypt and decrypt data on a coupled removable storage media 4 using one or more encryption keys.

    IO管理器代码8使用加密引擎10加密引擎10执行操作使用一个多个加密密钥耦合的可更换存储介质4数据加密解密

    youdao

  • This paper brings forward a text embedding digital watermarking method based on image's DWT domain, meanwhile, using the chaotic sequences to encrypt the text data and BCH code to correct them.

    提出种在图像小波域中嵌入文字的新型鲁棒水印算法嵌入文字进行混沌加密BCH纠错编码。

    youdao

  • The easiest way here is to encrypt on the device and then decrypted, the origin of the code is a related example of the U disk data encryption to protect information hiding, to prevent privacy leaks.

    这里简单方法就是设备加密然后再解密源代码就是一个与此相关例子对U数据加密保护信息隐蔽防止隐私泄露。

    youdao

  • The easiest way here is to encrypt on the device and then decrypted, the origin of the code is a related example of the U disk data encryption to protect information hiding, to prevent privacy leaks.

    这里简单方法就是设备加密然后再解密源代码就是一个与此相关例子对U数据加密保护信息隐蔽防止隐私泄露。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定