英語 での Integrity check の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
For BitLocker to use the system integrity check provided by a Trusted Platform Module(TPM), the computer must have TPM 1.2 or TPM 2.0.
These costs are associated with the memory needed for IPsec code and data structures, and the computation of integrity check values, encryption and decryption, and added per-packet handling.
The correct version of the program Keep in mind that the application Microsoft OST Integrity Check Tool in its various versions(older or newer ones) can support different file extensions.
However, for computers that have a TPM, creating different startup keys prevents BitLocker from using the TPM's system integrity check.
It's possible to include an integrity check after the negotiation and key establishment have both completed, but the strength of this integrity check is necessarily limited to the weakest common algorithm.
Cons: RAID F1 will reserve one SSD for data integrity check, based on RAID 5 technology, and therefore affect the available volume size.
There is often a situation that we can only export the data in this format from the application Microsoft OST Integrity Check Tool, but the data import is not supported.
The details of ICV processing are described in Section 3.3.3,"Integrity Check Value Calculation", and Section 3.4.4,"Integrity Check Value Verification".
Monitoring and display run status information, data saving information, integrity check information and run override controls, such as change segment, end run, etc.
The Content-MD5 entity-header field, as defined in RFC 1864 RFC 1864, is an MD5 digest of the entity-body for the purpose of providing an end-to-end message integrity check(MIC) of the entity-body.
The Content-MD5 entity-header field, as defined in[RFC1864], is an MD5 digest of the entity-body for the purpose of providing an end-to-end message integrity check(MIC) of the entity-body.
With data and index integrity check, data corruption can be detected in previous backup versions, enhancing backup and restoration availability.
The program acts as an combined eml to pst and msg to pst converter featuring a built-in primary integrity check module and keeps the original file and folder structure intact, which may come especially handy for regular importing of backups.
The data integrity check warns you if the data on a disc is at risk of disc decay so that you have time to back it up to another disc.
The Data Integrity Check feature is always enabled for security, and utilizes a special checksum algorithm to detect errors on discs and then alerts you so your data is always safe and restorable.
Any other adequate integrity check can be implemented using any suitable integrity information attached somewhere in all or a subset of portions of data.
The following types of system changes can cause an integrity check failure and prevent the TPM from releasing the BitLocker key to decrypt the protected operating system drive.
This type of discriminant analysis allows the integrity of a measurement value to be qualified by more than one data integrity check before the decision is made to reject the measurement value.
Depending on iButton model, byte offset, and number of bytes written, the Write Scratchpad command may return a CRC for transfer integrity check.
It also relies on cipher block chaining message authentication code(CBC-MAC) for authentication and integrity and replay protection, and provides 64-bit message integrity check(MIC), an improvement over TKIP's 20-bit MIC.