The term encrypt t1; t2 represents t1 encrypted with t2 and is usually written as ft1 gt2. From Wordnik.com. [Recently Uploaded Slideshows] Reference
On the "Tools" menu in Microsoft Outlook, for example, "encrypt" is an option. From Wordnik.com. [Homeland Insecurity] Reference
My Actiontec DSL router is set with WPA2 -- for some reason the printer insists that the password encrypt is TKIP when it is actually AES. From Wordnik.com. [Newegg.com RSS Feed - Daily Deals] Reference
You can control whether a connection encrypts all data to and from the server after login using the 'encrypt' connection property. From Wordnik.com. [MSDN Blogs] Reference
One catch only: as it is not a signal carrying info but just power, no way to "encrypt" it while receiver technology is trivial. From Wordnik.com. [Original Signal - Transmitting Digg] Reference
Time to zip it up, encrypt it, and e-mail it to myself. From Wordnik.com. [elfpvke Diary Entry] Reference
I'd rather encrypt my sentiments than pour myself (out). From Wordnik.com. [overtaken Diary Entry] Reference
I mean, we encrypt our e-mail and cell phone calls today. From Wordnik.com. [CNN Transcript May 30, 2008] Reference
As for security, you simply encrypt it before uploading it. From Wordnik.com. [Exclusive Screenshots of Omnidrive] Reference
We ` re going to encrypt all the stuff running in our bodies. From Wordnik.com. [CNN Transcript May 30, 2008] Reference
BE careful what you put on your computer, and encrypt everything. From Wordnik.com. [Keeping The Cybercops Out Of Cyberspace] Reference
If you want your Tor traffic to be private, you need to encrypt it. From Wordnik.com. [Lesson From Tor Hack: Anonymity and Privacy Aren't the Same] Reference
In addition, we encrypt the data in our databases and on our devices. From Wordnik.com. [Rise Of The Tablet Computer] Reference
Are they able to easily change that to encrypt some of the down links?. From Wordnik.com. [CNN Transcript Dec 17, 2009] Reference
The strategy inside many companies is encrypt, decrypt and set up firewalls. From Wordnik.com. [Your Employees And Web Security] Reference
Switched the phone's viewer option off and went through the encrypt rigmarole. From Wordnik.com. [Sagittarius Whorl]
Why did Comcast just encrypt the History, Discovery, SyFy and Speed TV channels?. From Wordnik.com. [Help File: Facebook's changing privacy-settings pages; tuning into Comcast digital cable] Reference
When possible, encrypt important private files that are stored on your computer. From Wordnik.com. [Starbucks offers free Wi-Fi access] Reference
A wireless VPN will encrypt all the information that you send and receive online. From Wordnik.com. [CNN Transcript Nov 10, 2007] Reference
The site has links to programs that encrypt e-mails and obscure a message's origin. From Wordnik.com. [Blogging for Freedom] Reference
I pressed the confidential encrypt button on the phone and its triple bleep sounded. From Wordnik.com. [Perseus Spur]
You can also encrypt everything in the room, transparently (- about to be released). From Wordnik.com. [Zoozio – Hey, Another AJAX Desktop!] Reference
I attempted to encrypt this page but that doesnt work with updating so fuggedaboutit. From Wordnik.com. [dailycomic Diary Entry] Reference
Also, there is a separate Security feature, where you can drag files to encrypt them. From Wordnik.com. [Robert J. Elisberg: The Writers Workbench: Backup Made Easy] Reference
ZAHN: I guess that shouldn't come as any surprise that they'd want to encrypt this stuff. From Wordnik.com. [CNN Transcript Aug 23, 2002] Reference
And while many corporations encrypt data in motion, most consumers wouldn't even consider it. From Wordnik.com. [Intel-McAfee, Take Two] Reference
It's possible to use the CloudNAS system to encrypt (using AES 256-bit) but it's not convenient. From Wordnik.com. [Nirvanix SDN delivers speed, flexibility] Reference
Or encrypt the whole drug element of Weeds so it becomes just a mythic allusion, a la Scooby Doo?. From Wordnik.com. [Stacey Kalish: Cable to Undergo the Knife] Reference
Tell Nazarian to get on the encrypt subspace com right away, before he does anything about Leighton. From Wordnik.com. [Perseus Spur]
Nevertheless this was a major advance, for what used to take hours to encrypt now took a matter of minutes. From Wordnik.com. [Mayibuye Editorial] Reference
The company says, we're sorry, and says starting next month it will encrypt the data and send it electronically. From Wordnik.com. [CNN Transcript Jun 7, 2005] Reference
Hard-disk encryption programs like PGP Disk allow you to encrypt individual files, folders or entire disk partitions. From Wordnik.com. [Big Risks Come in Small Packages] Reference
He released PGP in 1991; it was another five years before he released PGPfone to encrypt data passing between modems. From Wordnik.com. [Privacy Guru Locks Down VOIP] Reference
I squelched his protests and waited until he reached a place where he could not be overheard and then engaged the encrypt. From Wordnik.com. [Perseus Spur]
We use industry best practices to secure our service and encrypt your password and have rigorous internal policies on the same. From Wordnik.com. [Xoopit Makes Your Inbox More Social. Raises $5 Million and Launches Private Beta (Invites)] Reference
"Show your face and transmit your iris ID, then leave a message asking Bea to call you at home as soon as possible, max encrypt.". From Wordnik.com. [Sagittarius Whorl]
Also, SFTP means that the transfer is secure, so either encyption happens on the server or it is up to the user to encrypt their files. From Wordnik.com. [2006 September] Reference
LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit.
Questions? Feedback? We want to hear from you!
Email us
or click here for instant support.
Copyright © 2005 and after - LearnThat Foundation. Patents pending.

