The files were not encrypted, so could be opened easily.
这些文件未加密,可以轻易打开。
This password is not encrypted when specified in the properties file.
在属性文件中指定时不对此密码进行加密。
If you don't supply a passphrase, then ssh-keygen will generate keys which are not encrypted!
如果您不提供密码短语,那么ssh - keygen会生成一个未加密的密钥。
This cache is protected but not encrypted, and is backed up in iTunes whenever you back up your iPhone.
这块缓存是受保护的,但没有被加密,当你用iTunes备份iPhone时,缓存也会备份。
Note that the messages exchanged between the client and the STS are not encrypted when this policy is used.
请注意,客户机与STS之间交换的消息在策略使用时,并未加密。
Because the text entered is not encrypted in any way, you should treat it as you would any other confidential data.
因为输入的文本未以任何方式进行加密,所以您应该像处理任何其他机密数据一样处理它。
The drives were kept in a secure area of the base at Innsworth, which was regularly patrolled, and they were not encrypted.
存放这些文档的硬盘一直被存放在INNSWORTH基地的安全区,那里有人定期巡逻,因此硬盘未被加密。
However, the password text entered is not encrypted in any way, and you should protect it as you would any other confidential data.
然而,所输入的密码文字并没有以任何方式加密,您应将其视为机密资料加以保护。
The data type identification unit 103 obtains a circulation content from an external source or obtains a not encrypted content from a record medium.
数据类型识别单元(103)从外部源获得流通内容或者从记录介质获得未加密内容。
If an ODF document has been encrypted or digitally signed, the manifest.xml file is not encrypted; it preserves the key and digest for each encrypted file stream.
如果OD f文档已经加密或数字签名,那么manifest . xml文件是不加密的;它保存每个加密文件流的密钥和摘要。
It was the highlights of the paper that the method combined the explicit features and naive bayes classifier together to identify both of the encrypted and not encrypted P2P traffic.
着重介绍了采用明文特征和朴素贝叶斯分类相结合的方法,对加密的以及未加密的P 2 P流量进行识别。
A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.
恶意攻击者仍可以探查连接(请注意,缺省情况下密码摘要没有被加密)并回复整个UsernameToken,因此nonce和时间戳检查是缺一不可的。
All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?
所有RIM公司的说法都是建立在加密的信息是没有密钥来破解的基础上,那如果是在任意一个加密过程结束前?
Not derivatives, mortgage-backed securities or even job security. It's encrypted phone lines.
不是金融衍生工具,不是抵押证券,甚至也不是工作保障,而是加密的电话线路。
This is because the amount of time taken to encrypt data is, typically, dependent on the amount of data being encrypted and not the actual content of the data.
这是因为加密数据花费的时间通常取决于加密的数据量,而不是实际的数据内容。
Encrypted tunnels through cyberspace are possible via SSL, SSH, and other technologies — not to mention virtual private networks.
电脑空间中的加密的通道可能是通过SSL、SSH和其他技术加密的——更不必说拟虚专用网络。
For the request entries, make sure that the signature order is 1 and the encryption order is 2 — if these are not set, the signatures will not be encrypted.
对于请求条目,必须确保顺序为1且加密顺序为2—如果没有设置,签名将不会被加密。
Of particular value is the fact that Skype chats are not only encrypted but work only between people who trust each other—the best possible defence against spam.
尤具价值的是SKYPE的聊天功能不仅加密而且只在信任的人中进行,所以是对付垃圾信息的最有效防御。
On the client side, you can control the client's (PSQL) default behavior for using an encrypted session or not by defining the environment variable PGSSLMODE.
在客户机端,可以通过定义环境变量pgsslmode来控制客户机(psql)的默认行为:是否使用加密的会话。
A customer's request for a new movie would be encrypted, as would the movie itself, meaning that Hackbuster would not know what movie the customer was watching.
客户提交的一部新电影的请求以及电影本身都会被加密,意味着Hackbuster无从得知客户看的是什么电影。
The backup is encrypted or not, depending on the user Settings in iTunes.
备份是否加密取决于用户iTunes的设置。
For repositories that do not support a continuous session, this can be a non-obvious addition because your logon is probably not doing much more than storing the encrypted AuthBundle for future use.
对于不支持连续会话的存储库,这并不麻烦,因为logon可能仅仅是存储加密的AuthBundle供以后使用。
If inheritance is disabled on a subdirectory, the new files created in this subdirectory will not be encrypted.
如果在子目录中禁用了继承,那么在这个子目录中创建的新文件将不会经过加密。
But it said that it could not locate users based on the file on the phone, and that it collected the information in an anonymous and encrypted form.
但是,苹果公司并不能通过手机上的该文件对用户进行定位,同时这些信息的采集是通过匿名且加密的方式进行的。
Also, to simplify the process, the permissions, ownership, and timestamp information is not synchronized to the encrypted version, but this would be comparatively easy to add.
另外,为了简化这个过程,并没有把权限、所有者和时间戳信息同步到加密版本,但是很容易添加这个特性。
The system catalog does not identify which columns contain encrypted data, and the same column can include both encrypted and unencrypted values.
系统目录没有标识哪些列中包含加密的数据,同一列中可以同时包含加密和非加密数据。
This means that actual encrypted data or keys will be present somewhere else (perhaps somewhere on the Internet) and not inside our XML Encryption file.
这意味着实际加密数据或密钥将出现在别的地方(可能是因特网上的某个地方),而不是在xml加密文件内。
This means that actual encrypted data or keys will be present somewhere else (perhaps somewhere on the Internet) and not inside our XML Encryption file.
这意味着实际加密数据或密钥将出现在别的地方(可能是因特网上的某个地方),而不是在xml加密文件内。
应用推荐