On the fourth generation of file transparent encryption technology

Which master can transparent encryption technology to explain the four generation of documents, which have related documents? !

Started by Gloria at February 11, 2016 - 2:07 AM

The reply to 2011-04-12 08:46:11 was a moderator to delete

Posted by Stephanie at February 14, 2016 - 2:33 AM

The way to explain the one two three generation.

Posted by Saxon at February 17, 2016 - 3:23 AM

The fourth generation of the transparent encryption you say whether to encrypt double buffer?

Posted by Christina at March 02, 2016 - 4:02 AM

The fourth generation refers to which a? ?

Posted by Donahue at March 11, 2016 - 4:09 AM

It is said that, based on the LayerFileSystem+minifilter

Posted by Gloria at March 24, 2016 - 4:46 AM

The reply to 2013-10-31 14:49:35 was a moderator to delete

Posted by Larry at March 27, 2016 - 5:07 AM

The reply to 2011-04-25 09:28:22 was a moderator to delete

Posted by Ignativs at April 01, 2016 - 5:43 AM

I had a look at their own http://hi.baidu.com/xiao_70/blog/item/dcf43c18f014c31034fa4143.html

Posted by Jill at April 04, 2016 - 6:04 AM

Let the computer take some medicine

Posted by Sunny at April 09, 2016 - 6:09 AM

Xiao70 warrior, can I share your code, giant thank!

Posted by Gloria at April 13, 2016 - 6:51 AM

Transparent encryption technology can be used for Cloud Computing? Is the customer using the technique of encrypted data stored in the cloud, ensure the control of data, is a cloud service provider can not see the data.
This process is what is going on? Who can enlighten me? Our information security class, the teacher let us check and calculation of the data and information security. . .

Posted by Jane at April 14, 2016 - 7:00 AM

Thanks for sharing, please send message to me 405418144#qq.com (# instead@)

Posted by Curitis at April 24, 2016 - 7:03 AM

All master

Posted by Neil at April 25, 2016 - 7:40 AM


The company developed the "what time the waterproof wall system", is their computer "need to add water"

Posted by Curitis at May 08, 2016 - 7:46 AM

What time do you on-line.

Posted by Curitis at May 19, 2016 - 8:25 AM

Study!

Posted by Burnell at December 08, 2016 - 8:36 PM

Now the mobile phone have a camera, I take a mobile phone to take a picture of you don't have?
The general does not shine is garbled.

Posted by Phyllis at December 09, 2016 - 9:20 PM

The reply to 2011-06-29 10:17:10 was a moderator to delete

Posted by Leonard at December 23, 2016 - 10:15 PM

Play soy sauce. . . . . . . . . . . . . . . .

Posted by Candice at December 29, 2016 - 11:12 PM

Posted by Darren at January 01, 2017 - 2:00 AM

Can I help me have a look this post it?

Posted by Wesley at January 02, 2017 - 1:53 AM

Real things, the high level accepted encryption is AES

Posted by Lucine at January 13, 2017 - 12:09 AM

Our college teachers do this thing, his intention to do this stuff is to protect his independent intellectual property rights and his own hand graduate made software, now tens of millions.,

Posted by Beau at January 14, 2017 - 1:03 AM