Examples of using Integrity check in English and their translations into Russian
{-}
-
Official
-
Colloquial
File integrity checks.
All traffic between the computers is done in plaintext; no integrity checks are performed.
Integrity checking requires a compatible trusted platform module(TPM).
Registry entries are then examined and validated with integrity checks for consistencies.
Integrity checking requires a compatible trusted platform module(TPM).
A digital signature provides an integrity check of the document, and is also responsible for privacy.
The package also features advanced tarball creation methods and integrity checking mechanisms.(doc).
This automated integrity check makes for uncluttered recovery experience.
A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks.
The integrity check verifies document's header and internal structures for corruption.
Backup, database structure optimization, integrity check, and repair can be performed with a few clicks.
Data integrity checks, to ensure that data comply with the data exchange standards.
For instance, a bare encryption algorithm will provide no authentication mechanism, norany explicit message integrity checking.
Once a pattern is detected,the engine performs an integrity check and adds valid files to the list of recoverable documents.
It adds functions that are missed in Windows' original one, like the pause andresume options or the file integrity check.
In combination with enforced integrity checks this will restrict the business scenarios in which the electronic document is applicable.
Hide Magisk from detections: Google SafetyNet,enterprise/ bank system integrity checks, game tamper checks etc.
Providing back-up security, integrity check and repair of terminological database the new server product is proved to be highly reliable.
This Phase 2 could also include a review of the test pulse for frontal impact Increased severity and CRS integrity check.
For this reason,Excel files that fail the integrity check will not make it to the list, and will not be displayed.
The limited time frame set aside for the analysis did not permit carrying out an in-depth data integrity check with the reporting entities.
For BitLocker to use the system integrity check provided by a TPM, the computer must have a TPM version 1.2.
This allows the ackID to change with eachlink it passes over, while the packet CRC can remain a constant end-to-end integrity check of the packet.
It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response.
This may be as simple as a set of instructions, or it may include special data such as cryptographic keys orinformation about how to bypass an integrity check in the hardware.
The exact requirements of integrity checks will differ dependent on the product characteristics, method of production, quality benchmarks and type of inspection being carried out.
In Phase 2, the test pulse for frontal impact(Increased severity and CRS integrity check) will be reviewed in the light of recent accident data.
Higher-level software systems may be employed to mitigate the risk of such underlying failures by increasing redundancy and implementing integrity checking and self-repairing algorithms.
Experimental mathematics software usually includes error detection andcorrection mechanisms, integrity checks and redundant calculations designed to minimise the possibility of results being invalidated by a hardware or software error.
An 8-bit cipher has negligible cryptographic security, so the Pearson hash function is not cryptographically strong, butit is useful for implementing hash tables or as a data integrity check code, for which purposes it offers these benefits: It is extremely simple.