data encryption software造句
例句與造句
- The White House and several foreign governments are restricting the use of private data encryption software.
- Oh and since im at it-would anyone know of any good data encryption software?
- A little-known computer security firm is acquiring the best-known maker of data encryption software.
- Members of the Cypherpunks group have contended that the RSA Data Security patents constitute a monopoly that is hindering the widespread use of data encryption software.
- Bogin, a junior at Xavier University in New Orleans, is helping write new data encryption software for the Palm Pilot handheld device that would improve e-mail security.
- It's difficult to find data encryption software in a sentence. 用data encryption software造句挺難的
- The administration has treated data encryption software as a weapon and restricted exports, angering U . S . companies that believe the restrictions on exporting data-scrambling hardware and software will give competitive advantages to foreign concerns.
- Testifying before a Senate judiciary subcommittee, Freeh said that unless data encryption software includes such " key recovery " systems, the police will lose a major weapon against spies, terrorists, computer hackers, and other criminals.
- But the use of standard data encryption software, which scrambles messages so they can be read only by someone with the proper software " key, " has been hindered by a combination of government regulations and software patent disputes.
- Moments later, the champagne corks were popping in a small two-story frame house in Nashua, N . H . There, a team of young cyberspace entrepreneurs celebrated what was apparently the first retail transaction on the Internet using a readily available version of powerful data encryption software designed to guarantee privacy.
- At least some of the suspected child pornographers had used data encryption software, Freeh said Thursday in remarks at an International Cryptography Institute conference in Washington, D . C . In other words, they had scrambled their computer files so that only someone with the password _ or with proper code-breaking skills _ could view the contents.