- protected disk key
- ключ доступа к защищённому диску
The New English-Russian Dictionary of Radio-electronics. F.V Lisovsky . 2005.
The New English-Russian Dictionary of Radio-electronics. F.V Lisovsky . 2005.
Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… … Wikipedia
Disk cloning — is the process of copying the contents of one computer hard disk to another disk or to an image file. Often, the contents of the first disk are written to an image file as an intermediate step, and the second disk is loaded with the contents of… … Wikipedia
Disk formatting — Formatting a hard drive using MS DOS Disk formatting is the process of preparing a hard disk drive or flexible disk medium for data storage. In some cases, the formatting operation may also create one or more new file systems. The formatting… … Wikipedia
Disk encryption software — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique (for cryptographic aspects of the problem see… … Wikipedia
Key (lock) — A cut key A key is an instrument that is used to operate a lock. A typical key consists of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that… … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
Hardware-based full disk encryption — is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi, Ltd. with the rest of the hard drive industry following. Encryption and the symmetric encryption key is maintained independently from the CPU, thus… … Wikipedia
History of the floppy disk — 8 inch, 5¼ inch, and 3½ inch floppy disks Over the history of the floppy disk a number of different formats were used. Floppy disks have now been largely superseded by other storage media and by network file transfer. Contents … Wikipedia
StarForce — is a software copy prevention mechanism developed by Protection Technology. Although Protection Technology claims that products protected with StarForce are difficult to reverse engineer, [cite web |url=http://www.star force.com/press… … Wikipedia
Технические средства защиты авторских прав — Иное название этого понятия «DRM»; см. также другие значения. Технические средства защиты авторских прав (ТСЗАП; англ. DRM Digital rights management, неофициально иногда Digital restrictions management) программные или… … Википедия