Tentando aprender a traduzir a partir dos exemplos de tradução humana.
A partir de tradutores profissionais, empresas, páginas da web e repositórios de traduções disponíveis gratuitamente
show the icon softened in the list if the mail does not have the attribute, e. g. important mark on a non important mail
空のスペースを残すshow the icon softened in the list if the mail does not have the attribute, e.g. important mark on a non important mail
Última atualização: 2011-10-23
Frequência de uso: 1
Qualidade:
& مخفی کردنkeep a empty space in the list if the mail does not have the attribute, e. g. important mark on a non important mail
隠すkeep a empty space in the list if the mail does not have the attribute, e.g. important mark on a non important mail
Última atualização: 2011-10-23
Frequência de uso: 1
Qualidade:
Aviso: contém formatação HTML invisível
important: move your mouse as randomly as possible within this window. the longer you move it, the better. this significantly increases the cryptographic strength of the keyfile.
重要:このウィンドウ内にてできるかぎりランダムにマウスを動かしてください。これにより暗号鍵の強度を大幅に上げられます。長く動かすほど良い結果を得られます。
Última atualização: 2013-09-10
Frequência de uso: 1
Qualidade:
important: move your mouse as randomly as possible within this window. the longer you move it, the better. this significantly increases the cryptographic strength of the encryption keys. then click next to continue.
重要:このウィンドウ内にてできるかぎりランダムにマウスを動かしてください。これにより暗号鍵の強度を大幅に上げられます。長く動かすほど良い結果を得られます。終わったら「次へ」をクリックしてください。
Última atualização: 2009-11-06
Frequência de uso: 1
Qualidade:
8) important: in this step, for the decoy system, you must select the same encryption algorithm and hash algorithm that you selected for the hidden system! otherwise, the hidden system will be inaccessible! in other words, the decoy system must be encrypted with the same encryption algorithm as the hidden system. note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).
8) 重要:このステップで、囮システムに対して“隠しシステムとまったく同じ”暗号化アルゴリズムとハッシュアルゴリズムを選択してください! さもなければ隠しシステムにアクセスできなくなります! つまり囮システムは隠しシステムと同じ暗号化アルゴリズムで暗号化される必要があります。注:これは囮システムと隠しシステムは単一のブートローダーを共用しているからであり、このブートローダーはユーザーに指定された単一のアルゴリズムのみサポートしていることによります。
Última atualização: 2013-09-10
Frequência de uso: 1
Qualidade: