-
1 memorize a key
помещать ключ в память
помещать ключ в запоминающее устройство
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > memorize a key
-
2 memorize the key
вводить ключ в память; хранить ключ в памяти (криптографического устройства)Англо-русский словарь по компьютерной безопасности > memorize the key
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key
См. также в других словарях:
Trusted paper key — A trusted paper key (TPK) is a machine readable print of a cryptographic key. The printed key can be used to decrypt data, e.g. archives or backup data. A trusted paper key can be the result of an offline private key protocol.The paper printed… … Wikipedia
помещать ключ в память — помещать ключ в запоминающее устройство — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации Синонимы помещать ключ в запоминающее устройство EN memorize a key … Справочник технического переводчика
Properties of musical modes — The modern musical modes consist of seven different scales related to the familiar major and minor keys, each with different properties and characteristics which distinguish them from one another. Called the Ionian mode, Dorian mode, Phrygian… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Method ringing — (also known as scientific ringing) is a form of change ringing (the practice of ringing a series of mathematical permutations on tuned bells, rather than a melody). In method ringing, the ringers are guided from permutation to permutation by… … Wikipedia
education — /ej oo kay sheuhn/, n. 1. the act or process of imparting or acquiring general knowledge, developing the powers of reasoning and judgment, and generally of preparing oneself or others intellectually for mature life. 2. the act or process of… … Universalium
Methods used to study memory — The study of memory incorporates research methodologies from neuropsychology, human development and dragon testing using a wide range of species. The complex phenomenon of memory is explored by combining evidence from many areas of research. New… … Wikipedia
OTPW — is a one time password system developed for authentication in Unix like operating systems by Markus Kuhn. A user s real password is not directly transmitted across the network. Rather, the real password is combined with a short set of characters… … Wikipedia
Tomorrow's Pioneers — Not to be confused with the Jordanian 1980s television program of the same name. Tomorrow s Pioneers Farfour mimes carrying an AK 47 in episode 103 of the series. Format Children s television series … Wikipedia
Solitary (TV series) — Infobox Television show name = Solitary caption = Solitary title card format = Reality show rating = TV 14 runtime = 60 minutes creator = starring = Revolving cast country = United States network = Fox Reality Channel first aired = 2006 last… … Wikipedia