| 1. | Weak keys are keys that result in ciphers that are easy to break 弱密钥是所生成的密码容易被破解的密钥。 |
| 2. | Semi - weak keys are pairs of keys that result in ciphers that are easy to break 半弱密钥是产生的密码容易被破解的密钥对。 |
| 3. | You can read the raw server logs as well as an interpretation and translation 您可以阅读原始的服务器日志来了解该信息被破解和破译的详细情况。 |
| 4. | Most third - party certificates come with guarantees that the key will not be broken and offers to pay penalties if it is 大多数第三方证书都保证密钥不会被破解,如果被破解,他们将负责提供赔偿。 |
| 5. | No . absolutely no no no ! and , no again ! i am afraid the damn program will make me crazy within 2 days . help ! ! 这个的意思就是,被破解文件,要与作者做注册机时候的文件名一致。你的主程序是否改过名? |
| 6. | Please note that cracks or the cracked program files themselves as well as key generators are often modified with similar techniques 请注意破解软件或者被破解的程序自身具有的算号器经常用到相似的技术。 |
| 7. | Part of the reason is that even a well - designed password - based system is usually easy to break since users almost always pick bad passwords 部分原因是,即使一个设计很好的基于密码的系统也通常易于攻破,因为用户几乎总是选择使用容易被破解的密码。 |
| 8. | If piracy where to reach 30 ? 40 % the operator would need to specifically prove that a specific million devices where breached to close down piracy 试译:如果盗版问题的发生率达到了30 ~ 40 % ,运营商要制止盗版的发生,将需要专门证明具体有几百万设备已被破解。 |
| 9. | In this paper , the security of the wtls is analysed . now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack 椭圆曲线法和ripemd ? 160是两种目前较新的加密算法,且不易被破解,本文初步分析和研究了这两种方法。 |
| 10. | Software vendors are likely to see a software protection lock that will easily be decoded , in fact , only sooner or later any protection method could have the corresponding crunching method , 容易被破解的软件保护锁是软件厂商所不愿见的,事实上任何一种保护方式都有其破解方法,只是迟跟早的问题。 |