JHCTech SIGM-2650 User Manual page 48

Table of Contents

Advertisement

User's Manual
Trusted Computing
Trusted computing, enter this sub-menu, there will be the setting of the encryption security module (the
motherboard will install the encryption module hardware will take effect)
43

Advertisement

Table of Contents
loading

Table of Contents