英語 での Subkey の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Subkey Type.
Values are not written to the subkey.
Subkey Strength.
Specify the length of the subkey to be deleted.
This subkey controls use of TLS 1.0.
After the User ID packets there may be one or more Subkey packets.
This subkey controls use of SSL 2.0.
Specify the key and set the value, subkey list and so on.
This subkey controls use of TLS 1.0.
You can specify a flag on whether to check Attribute when subkey is acquired.
Sets the subkey for the specified parent key.
NET Framework 4 the Version entry is under the Client or Full subkey(under NDP), or under both subkeys.
Subkey generation is also done at the same time.
The following Declare statement opens a subkey in the Windows registry and replaces its value.
The subkey name is written as prefix-number.
If rmsub is specified, the subkey list set in the key and subkey are also deleted.
Subkey and Key packets may each be followed by a revocation Signature packet to indicate that the key is revoked.
If there is only one subkey begin with S-1-5, right-click and choose Rename. Then remove.
X28: Subkey revocation signature The signature is calculated directly on the subkey being revoked.
Set one binary data(key, value, subkey, attribute) retrieved using GetElementsByHash() in the K2HASH database.
For subkey binding signatures, each subkey in fact has a self- signature.
Remove the subkey with the same name and with. bak extension. Step 4.
A subkey always has a single signature after it that is issued using the primary key to tie the two keys together.
The command defined by the registry subkey Shell\ExecCGI\Command or, if it does not exist, by the subkey Shell\Open\Command is used to open the script file.
Public Subkey packets are ignored by PGP 2.6.x and do not cause it to fail, providing a limited degree of backward compatibility.
Delete all subkeys of the specified parent key or specified subkey.
C- Add Value/Subkey to ignore list: to prevent a registry entry's value or key from being repaired when the Repair function is executed and from being detected in future scans, add the value or subkey to your personalized Ignore Lists.
Open the subkey that begins with S-1-5 and ends without. bak.
Click each subkey named S-1-5 followed by a long number and check ProfleImagePath to find the profile subkey that has corrupted user profile.