-
1 crypto bypass
-
2 crypto bypass
передача (открытого текста), в обход криптографического устройстваАнгло-русский словарь по компьютерной безопасности > crypto bypass
-
3 bypass
-
4 передача (открытого текста) в обход криптографического устройства
Security: crypto bypass (защиты)Универсальный русско-английский словарь > передача (открытого текста) в обход криптографического устройства
-
5 передача в обход криптографического устройства
Security: (открытого текста) crypto bypass (защиты)Универсальный русско-английский словарь > передача в обход криптографического устройства
-
6 mode
-
7 regime
-
8 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
9 telephone
- cordless telephoneАнгло-русский словарь по компьютерной безопасности > telephone
-
10 flow-through accelerator
ускоритель, например криптографический, который имеет транзитный режим (bypass mode), позволяющий пропускать пакеты, не требующие обработки в целях обеспечении безопасностиАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > flow-through accelerator
См. также в других словарях:
Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… … Wikipedia
Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
RSA — In cryptography, RSA is an algorithm for public key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic… … Wikipedia
CAPTCHA — Early CAPTCHAs such as these, generated by the EZ Gimpy program, were used on Yahoo!. However, technology was developed to read this type of CAPTCHA[1] … Wikipedia
Digital Fortress — … Wikipedia
KG-84 — The KG 84A and KG 84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data. The KG 84C is a Dedicated Loop Encryption Device (DLED), and both devices are General Purpose… … Wikipedia
Multiple Independent Levels of Security — Multiple Independent Levels of Security/Safety (MILS) is a high assurance security architecture based on the concepts of separation[1] and controlled information flow; implemented by separation mechanisms that support both untrusted and… … Wikipedia
Software protection dongle — This article is about the software protection devices. Dongle can also refer to, e.g., serial ports, USB flash drives, wireless networking devices, USB Mobile broadband modems. Daisy chained parallel port copy protection dongles. A software… … Wikipedia