JHCTech SIGM-3250 Series User Manual page 45

Table of Contents

Advertisement

User's Manual
Trusted Computing
Trusted computing, enter this sub-menu, there will be the setting of the encryption security module (the
motherboard will install the encryption module hardware will take effect)
40

Advertisement

Table of Contents
loading

Table of Contents