Examples of using Are encrypted in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The e-books are encrypted so that only proprietary software with malicious functionality can display them.
Unless otherwise noted on the site, credit card transactions are encrypted and the server that processes your credit card information is secure.
All data transfers are encrypted, so no one can access them except you.
Forwarded secrecy is maintained by the removal of Diffie-Hellman and Static RSA cipher suites, and all messages sent after the Server Hello step are encrypted.
Compare to Telnet, SSH is secure wherein the client/server connection is authenticated using a digital certificate and passwords are encrypted.
Most communications between parties are encrypted, but IP addresses are public and can be associated with activity on the network.
To properly defend the device perimeter companies must ensure all communications are encrypted, and that the security systems inspect that encrypted data at network speeds.
Secrets stored in the volume metadata, such as the VMK, are encrypted and the integrity of the entire volume metadata is cryptographically protected.
The good news for over a billion WhatsApp users is that from now on, all messages are encrypted, too.
The file transfers are encrypted, fast(up to 125 Mbps) and don't use any mobile data.
Not all blockchain applications are encrypted digital currency, and not all encrypted digital currencies are built on blockchain technology.
Make sure that you use whole disk encryption, which ensures that all data on the disk, not just user data files, are encrypted.
There was also a period of time where RFID skimming was possible, although today RFID-enabled cards are encrypted to prevent this sort of theft.
These data are encrypted, anonymised within 7 days and the anonymised data is deleted within 90 days.
Fortunately, the high-tech poker tables and the cards with RFID technology are encrypted, and complex software is needed to decipher the information.
Trust: No one can steal your documents because they are encrypted and stored on a secure ledger.
Communication sessions between the Paper Application Servers and Paper Databases are encrypted using a strong cipher.
These back-up copies are encrypted and the data are not accessible to the employees of the service company.
All notifications are encrypted and allow access only to users who are connected to the Hamachi network.
RSA encryption nonces Nonces(a random number generated by the peers) are encrypted and then exchanged between peers.