First, they can run the communications -- live or on tape -- through a so-called decrypt processor. From Wordnik.com. [Testimony Concerning The Key Escrow Encryption Program Before The U.S. Senate Subcommittee On Technology And The Law] Reference
I'm guessing that I have to somehow "decrypt" that pattern or something to find the REAL password?. From Wordnik.com. [Discussions: Message List - root]
If I change any properties on these selected files, it reports that it is about to "decrypt" the files. From Wordnik.com. [Fileforum] Reference
So how do we tell if those attacks are coming in and how do we "decrypt" those binary strings that accompany the attacker's requests?. From Wordnik.com. [MSDN Blogs] Reference
UK jails schizophrenic for refusal to decrypt files. From Wordnik.com. [Discourse.net: We Predicted This Would Happen: Man Jailed in UK for Failing to Disclose Passphrase] Reference
The big question -- is it illegal to decrypt that signal?. From Wordnik.com. [Dish Network In's and Out's] Reference
Not even the person who encrypted the message can decrypt it. From Wordnik.com. [FAQ: Alt.Security.PGP (Part III)] Reference
Pitches would then follow to buy FileFix Pro to decrypt the files. From Wordnik.com. [New twist on scareware locks up your PC] Reference
RIM has said that even it can't decrypt BlackBerry corporate emails. From Wordnik.com. [RIM Averts India BlackBerry Ban] Reference
RIM has said that even it can't decrypt Bla ckBerry corporate emails. From Wordnik.com. [RIM Offered Security Fixes] Reference
They would write out the code, and someone else would do the decrypt. From Wordnik.com. [Memorandum] Reference
Computers would decrypt the picture and compare it to the previous shot. From Wordnik.com. [Spot The Terrorist] Reference
Please decrypt this for me, the implications for this, changes for that. From Wordnik.com. [CNN Transcript Jun 28, 2006] Reference
The strategy inside many companies is encrypt, decrypt and set up firewalls. From Wordnik.com. [Your Employees And Web Security] Reference
It was a coded radio signal, with the decrypt written between the lines of code. From Wordnik.com. [The Key to Rebecca]
Of course, law enforcement would not be confronted with only one message to decrypt. From Wordnik.com. [Testimony Before The U.S. House Judiciary Committee Concerning Computer Encryption] Reference
"Even Fort Meade running parallel arrays couldn't decrypt this much data in a month.". From Wordnik.com. [Forgetfulness] Reference
And you're not secure against the authorities telling you to decrypt your data for them. From Wordnik.com. [How Does Bruce Schneier Protect His Laptop Data? With His Fists -- and PGP] Reference
Mr. Evans demonstrates this with free software that can decrypt most passwords in seconds. From Wordnik.com. [Hacker Camps Train Network Defenders] Reference
A shared secret is a password known by both sides that is used to encrypt and decrypt the data. From Wordnik.com. [Introduction to Certificates] Reference
Technology savvy terrorists are using 512-bit encryption, which is next to impossible to decrypt. From Wordnik.com. [Cyber Crimes] Reference
When the person gets to it, they open it, decrypt it and then can read the message and it gets kind of under the radar. From Wordnik.com. [CNN Transcript Sep 24, 2001] Reference
The technology is used to encrypt and decrypt electronic data transmitted across insecure networks, such as the Internet. From Wordnik.com. [Research In Motion Drops Certicom Bid] Reference
They will be able to see the internet traffic, but will not be able to decrypt or "understand" what the data actually is. From Wordnik.com. [Ramon Nuez: Safely Surfing the Public Wi-Fi] Reference
Some of the coding is so sophisticated, sources say, that intelligence agencies have found such messages difficult to decrypt. From Wordnik.com. [Periscope] Reference
It was maddening to know that he was seeing and hearing the answers to his most pressing questions but could not decrypt them. From Wordnik.com. [Dirge]
To decrypt the data, to follow instructions, to post the photos in a small corner of the computer that ran New York University. From Wordnik.com. [Little Girl Blue]
Well, now, you ain't just gone through life assuming everybody else can decrypt data and steal it, eh, only nobody does it but you?. From Wordnik.com. [The Life of the World to Come]
Using that method, the FBI was able to obtain Scarfo's PGP pass phrase and decrypt documents that the government says are incriminating. From Wordnik.com. [Scarfo: Feds Plead for Secrecy] Reference
LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit.
Questions? Feedback? We want to hear from you!
Email us
or click here for instant support.
Copyright © 2005 and after - LearnThat Foundation. Patents pending.

