Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
Attached to the message text was a download of a photograph.
You can, for example, configure it to show a short excerpt of the message text.
It's more than possible, we think, that his was the only copy with the real message text in it.'
Towards the end, sending half a page of message text was taking as long as a day.
The message text that carries an infection link can vary from case to case.
A regex is used to extract the links from the message text.
"What, put my message text on the screen?"
The message text is less than helpful.
Search queries appear to match against message text in addition to subject and sender fields.
The message text was the word login; the l and the o letters were transmitted, but the system then crashed.
It will also insert a fake e-mail address and randomly compose a subject line and message text.
There are other such free Internet encryption engines available which can encrypt/decrypt your e-mail message text.
Before the computer era, plaintext most commonly meant message text in the language of the communicating parties.
As soon as you receive this message, reply to the "OK" and no message text.
The longer the UDH, the less space remains for the message text or other contents.
Each announcement displayed: date/time, who posted it, a title, an indication of Class or Group posting, and the message text.
DATA to send the message text.
The message text even tells the user to ignore any warnings issued by the computer's anti-virus software when installing the infected code.
A text-autokey uses the previous message text to determine the next element in the keystream.
The actual message text, which is in a monotype font, is barely readable.
The message text can be written horizontally in the white squares and the ciphertext taken off vertically, or vice versa.
United Nations communications specialists, after examining photocopies of the message texts provided by South Africa, rejected them as fraudulent.
The private key is applied to the message text, producing ciphertext, which you can't read without "decrypting" it with the public key.
Upon hearing the prosign the operator stops writing down or recording the message text, but continues listening without recording, etc.
The Microsoft Network limits inbound and outbound messages to 2 megabytes total (including the message text and the attached file).