In other words, about as cryptographically perfect a voting system as possible. From Wordnik.com. [Halfway To Fair Elections « Tai-Chi Policy] Reference
I'm sure the NSA could cook up a cryptographically secure version for Mr. Obama to use. From Wordnik.com. [Original Signal - Transmitting Gadgets] Reference
Work units could be cryptographically stamped with the who, what, when, where, for how long, etc. From Wordnik.com. [Work and the Internet] Reference
Theoretically, we could have p2p distributed computing projects that cryptographically verify the trustworthiness of their work. From Wordnik.com. [Matthew Yglesias » HD-DVD Encryption: Now In Song Form] Reference
"Voting should be cryptographically secure -- can any ...". From Wordnik.com. [Boing Boing] Reference
In addition, MD5 is a cryptographically strong message digest. From Wordnik.com. [Softpedia - Windows - All] Reference
It's not particularly clever; it's not cryptographically secure. From Wordnik.com. [po-ru.com] Reference
The DHS says MD5 "should be considered cryptographically broken.". From Wordnik.com. [reddit.com: what's new online!] Reference
You are correct that cryptographically, JSESSIONID can be secure. From Wordnik.com. [xml's Blinklist.com] Reference
Trusted Computing Group's vision of cryptographically secured hardware. From Wordnik.com. [SecurityFocus News] Reference
We have cryptographically secure algorithms for anonymous digital cash. From Wordnik.com. [Slashdot: Your Rights Online] Reference
When a page's view state is not cryptographically signed, many standard. From Wordnik.com. [The Web Security Mailing List (WASC)] Reference
This primary replica serialized and cryptographically signed all updates. From Wordnik.com. [StorageMojo] Reference
And triple-DES is no longer considered a cryptographically strong algorithm. From Wordnik.com. [Original Signal - Transmitting Digg] Reference
This data is neither encrypted nor checksummed (cryptographically or otherwise). From Wordnik.com. [Recently Uploaded Slideshows] Reference
Normally applications have to be signed cryptographically by Apple in order to run. From Wordnik.com. [Megite Technology News: What's Happening Right Now] Reference
"Guidelines for the creation of cryptographically strong passwords", by Steven Michael. From Wordnik.com. [Netvouz - new bookmarks] Reference
This file should be cryptographically signed so as to make forgeries extremely difficult. From Wordnik.com. [Alice Hill's Real Tech News - Independent Tech] Reference
Normal title transfers, signed over by the former owner, would be cryptographically strong. From Wordnik.com. [Unenumerated] Reference
But the site can't cryptographically trust Romeo unless it (or its CA) signed Romeo's cert. From Wordnik.com. [Planet Identity] Reference
The PGP model (where each party cryptographically trusts the other) would also make sense here. From Wordnik.com. [Planet Identity] Reference
We'll likely be using Get Hot New Stuff and DXS for this, and the packages will be cryptographically signed. From Wordnik.com. [Planet KDE] Reference
Now what is obviously still missing are the Device Keys and an explanation of how you "drive" cryptographically. From Wordnik.com. [Doom9's Forum] Reference
For that, you want to use a cryptographically strong random number/string generator like Java's SecureRandom class. From Wordnik.com. [The Web Security Mailing List (WASC)] Reference
Other than these two shortcomings, it's a serious, no-nonsense tool for generating cryptographically solid passphrases. From Wordnik.com. [Download Squad] Reference
Support cryptographically verifiable but human-friendly identification of the recipients of a user's Digital Identities. From Wordnik.com. [The XML Cover Pages] Reference
Postmarked Email eliminates fraud by sending a cryptographically secure token that ensures the authenticity of a message. From Wordnik.com. [Marketwire - Breaking News Releases] Reference
DNSSEC is designed to cryptographically authenticate servers that provide DNS look-up information to ensure it is authentic. From Wordnik.com. [The Register] Reference
Some of the recalled Kingston, Verbatim, and Sandisk drives were certified by the U.S. government as cryptographically secure. From Wordnik.com. [ARN News]
The user may choose Gutmann, cryptographically random data or 7-pass US Government standard wiping methods to erase web cookies. From Wordnik.com. [Softpedia - Windows - All] Reference
Remediation Steps: The ASP. Net view state should always be cryptographically signed with a "Message Authentication Code" (MAC). From Wordnik.com. [The Web Security Mailing List (WASC)] Reference
(At first sight, both look to be of sufficient length to be cryptographically secure, although we didn't attempt to prove this.). From Wordnik.com. [CSO] Reference
Unfortunately, the pseudorandom number generator they chose to use (a linear congruential generator) is not cryptographically secure. From Wordnik.com. [Recently Uploaded Slideshows] Reference
Airsnort-compatible interesting (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. From Wordnik.com. [Hack In The Box] Reference
An OpenSSL-based password generator is built-in to create cryptographically secure passwords not guessable by computer hacking software. From Wordnik.com. [MacMegasite] Reference
LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit.
Questions? Feedback? We want to hear from you!
Email us
or click here for instant support.
Copyright © 2005 and after - LearnThat Foundation. Patents pending.

