Examples of using Trusted root certificates in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Lists of available trusted root certificates in iOS.
Trusted root certificates that are required by Windows.
You can add and remove trusted root certificates from Azure.
An organization's trusted root certificates can be distributed to all employees so that they can use the company PKI system.
IOS 5 and iOS 6: List of available trusted root certificates.
Download and import trusted root certificates from Mozilla's LXR into Mono's certificate store.
IOS 5 and iOS 6: List of available trusted root certificates.
This command downloads the trusted root certificates from the Mozilla LXR web site into the Mono certificate store.
OS X Mavericks: List of available trusted root certificates.
The Trust Store on iOS contains trusted root certificates that are preinstalled with iOS.
OS X Mavericks: List of available trusted root certificates.
The OS X Trust Store contains trusted root certificates that are preinstalled with OS X.
When IT administrators createConfiguration Profiles for OS X Mavericks, these trusted root certificates don't need to be included.
When installed, the update would remove the trusted root certificates and make sure that no certificates are left behind when the software has been removed.
The Windows Root Certificate Program enables trusted root certificates to be distributed automatically in Windows.
When installed, the update would remove the trusted root certificates and make sure that no certificates are left behind when the software has been removed.
The Windows Root Certificate Program enables trusted root certificates to be distributed automatically in Windows.
View the list of available trusted root certificates for iOS 5 and iOS 6.
The OS X Trust Store contains trusted root certificates that are preinstalled with OS X.
The Windows Root Certificate Program enables trusted root certificates to be distributed automatically in Windows.
This differs from removing a trusted root certificate.
This is different than removing a trusted root certificate.
Nobody's perfect-- not even trusted root certificate authorities.
While these certificate files are deletedwhen a user uninstalls the HeadSetup software, the trusted root certificate was not removed.
Additionally, it installed a new trusted root certificate in the keychain.
The malware also installs a new trusted root certificate in the keychain.
Because the signature comes directly from the trusted root certificate's private key, it's automatically trusted. .
Additionally, it installed a new trusted root certificate in the keychain.
The malware also installs a new trusted root certificate in the keychain.
In addition, the mobile device must have a copy of the trusted root certificate from the server.