- intercepted message
- перехваченное сообщение
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Message in a Bottle (Star Trek: Voyager) — Message in a Bottle Star Trek: Voyager episode The battle to retake USS Prometheus Episode no … Wikipedia
Intercepted — Intercept In ter*cept , v. t. [imp. & p. p. {Intercepted}; p. pr. & vb. n. {Intercepting}.] [L. interceptus, p. p. of intercipere to intercept; inter between + capere to take, seize: cf. F. intercepter. See {Capable}.] [1913 Webster] 1. To take… … The Collaborative International Dictionary of English
Woodrow Wilson: War Message — ▪ Primary Source Germany s resumption of unrestricted submarine warfare on February 1, 1917, led the United States to break diplomatic relations on February 3. President Wilson continued to hope for peace, but events seemed to make American … Universalium
Pearl Harbor advance-knowledge debate — The Pearl Harbor advance knowledge debate is a dispute over what, if any, advance knowledge American officials had of Japan s December 7, 1941 attack on Pearl Harbor.Ever since the Japanese attack there has been debate as to how and why the… … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
Battle of Leyte Gulf — Infobox Military Conflict conflict=Battle of Leyte Gulf caption=The light aircraft carrier Princeton afire, east of Luzon, 24 October 1944. partof=the Pacific War, World War II date=23 October 1944 ndash; 26 October 1944 place=Leyte Gulf, The… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Three-pass protocol — In cryptography, the three pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys. This message protocol should not be… … Wikipedia
Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… … Wikipedia
USS Yorktown (CV-5) — The third USS|Yorktown|CV 5, lead ship of her class of aircraft carriers of World War II, was sunk at the Battle of Midway.Early career Yorktown was laid down on 21 May 1934 at Newport News, Virginia, by the Newport News Shipbuilding and Drydock… … Wikipedia
Harry Thompson (spy) — Harry Thomas Thompson (born 1908) was a former United States Navy yeoman who spied for Japan against the United States in 1934 ndash;35. He was the first American to be convicted of espionage since World War I.Thompson had been a Maryland farm… … Wikipedia