非加密的
- 与 非加密的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
There is a non-standard port 465 for SSL encrypted SMTP sessions, that many clients and servers support for backward compatibility.
有一个非标准的端口465为SSL加密的SMTP会议上,许多客户端和服务器的支持向后兼容。
-
Any way you still have unencrypted partition to boot from.
你始终可以从非加密的分区启动。
-
I hope the above demonstrated that the new system is really much easier as well as more logical in use, but choice is better than no choice and some people might have legacy data (although I will tell you that I was unable to access the data I had encrypted under Mandrake with any system other than Mandrake, so if you are contemplating a move this might be the time to adopt the new standard).
我希望上面展示的新系统真的在使用上更简单更具有逻辑性,但是选择总比没有选择好而且有人可能有遗留的数据(虽然我将告诉你我用任何非Mandrake系统不能获取任何在Mandrake下加密的数据,所以如果你正在考虑,这也许正是时候来采用这种新的标准)。
-
The Defcon hacker that Las Vegas holds revealed a kind of tool on congress, blame of Google Mail of can automatic filch adds close conversational ID, keep abreast of and razzia mailbox.
拉斯维加斯举行的Defcon黑客大会上展示了一种工具,能自动窃取Google Mail非加密会话ID,并进而攻占邮箱。
-
This manner can form continuous arrangement effect of hoop bar with less space, and be fit for concrete restricted by stirrup. It also can reduce the concrete crack arised by retortion in the region of frame column, and improve the ductility capability under the earthquake. The construction quality of frame column is improved simultaneously.
该布置方式形成连续且间距较小的箍筋布置效果,有利于发挥箍筋对混凝土的约束作用,减小各种因素可能引起框架柱扭转而在柱非加密区产生的裂缝,改善柱中部区域在地震作用下的延性性能,同时可以提高框架柱的施工质量。
-
Meshes are built which mainly are uncontinuous, complete unconstructed hexahedron, partially unconstructed polyhedron, near wall boundary layer mesh is adopted which can fit complicated geometry surface of cooling system well and guarantee mesh quality, in addition partial refinement technology is used to make mesh better in some key location.
网格主体采用非连续的、完全非结构化的六面体,部采用非结构化的多面体网格,对于壁面附近采用边界层网格处理,这样网格既能很好地适应冷却系统复杂的几何表面,又进一步了保证网格质量,另外利用局部加密技术对重点区域进行处理使网格更加完善。
-
This paper proposes an extended image encryption algorithm, which is used to encrypt the confidential binary images into non-confidential garnished image.
文章提出了一种延拓的图像加密算法,该算法用于将机密的二值图像加密成非机密的伪装图像。
-
Meanwhile the results also showed that the main cause of which the GAME reanalysis data being better than the NCEP reanalysis data is the GAME reanalysis data including the sonde data of the GAME but not the different assimilation modes of the two reanalysis data.
通过对GAME外场试验期和非试验期的GAME与NCEP两组再分析资料进行对比分析,我们得到,GAME再分析资料优于NCEP再分析资料的主要原因是GAME的资料同化系统中加入了包括HUBEX等气象科学试验的探空加密观测资料。
-
Cut-n-Paste Crypto provides an easy and non-intrusive way for you to encrypt text in a wide variety of applications.
割喉式的N -粘贴加密提供了一个非常简单和非侵入性的方法可以让你加密的文本在各种各样的应用。
-
A treacherous computing application would let you read the words on the screen, but would not let you produce an unencrypted document that you could use in other ways.
一个危险的计算的应用程序能让在你阅读显示在屏幕上的文字,但是不会让你使用其他方法生成一个非加密的文档。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。