Kingston Technology imation D250 User Manual Download Page 63

頁次 62

IMATION PERSONAL – 由 IRONKEY 技術提供 – 使用者指南

1.  插入裝置並啟動解除鎖定程式。
2.  按一下「唯讀模式」核取方塊。

3 . 

按一下「解除鎖定」按鈕。

 

»

您將會在「控制台」中看到表示您正在唯讀模式下的訊息。

 

»

當您在唯讀模式下解除鎖定裝置時,您會在鎖定裝置前維持唯讀模式狀態。

 

»

在唯讀模式下無法使用某些功能,因為這些功能需要修改裝置上的檔案。無法使用的

功能包括如重新格式化,還原應用程式,在安全檔案磁碟機中編輯檔案,以及編輯應

用程式清單。

 

»

若要在 Linux 中在唯讀模式下解除鎖定您的裝置,請輸入:

ironkey --readonly

建立在解除鎖定程式中顯示的訊息

您可以透過此功能建立「Imation 解除鎖定程式」視窗所顯示的訊息。例如,您可以提供

聯絡資訊,萬一不慎遺失裝置時,拾獲者可與您聯絡。

1.  解除鎖定您裝置並按一下功能表列中的「設定」按鈕。
2.  按一下左側邊列的「偏好」按鈕。

3 . 

在「解除鎖定訊息」欄位中輸入文字。
您的訊息文字不可超過所提供的空間 (大約 7 行,共 200 個字元)。

注意:

若使用 IMATION 企業版裝置,如果管理員尚未啟用此功能,您將無法在控制台中

看見「解除鎖定訊息」。

使用虛擬鍵盤輸入密碼

如果您正在陌生的電腦上解除鎖定裝置,並且擔心是否存在鍵盤記

錄或畫面記錄間諜程式,請使用「Imation 虛擬鍵盤」。此功能可

讓您點選字母和數字以協助您保護裝置密碼。虛擬鍵盤的基礎技術

將能避開許多木馬程式,鍵盤記錄程式和畫面記錄程式。
您可以使用多種方式啟動虛擬鍵盤:

1.  按一下 

Imation 解除鎖定程式或控制台密碼欄位中的「虛擬鍵盤」圖示。虛擬鍵

盤隨即出現。

• 

或者,

當鍵盤輸入點位於密碼欄位

時,您可以按下 CTRL+ALT+V。

2.  按一下按鍵以輸入密碼。輸入完成後,按一下「輸入」。

• 

您也可以交錯使用虛擬鍵盤和實體鍵盤,透過實體鍵盤輸入某些字元並透過虛擬鍵

盤點選某些字元。

• 

您也可以按一下「隨機」按鈕來隨機安排每個按鍵在虛擬鍵盤上的位置。此功能可

協助您避免畫面記錄程式帶來的危害。

注意:

此功能僅提供使用標準 QWERTY 鍵盤配置的 WINDOWS 系統使用。

注意:

點選虛擬鍵盤上的按鍵時,所有按鍵會短暫變成空白。此功能可避免畫面記錄程式

擷取您點選時的影像。若您不想使用此功能,您也可以在「關閉」按鈕旁的選項功能表中

停用。

Summary of Contents for imation D250

Page 1: ...PAGE 1 IMATION PERSONAL POWERED BY IRONKEY USER GUIDE Imation Personal User Guide Models S250 D250 Updated October 2012...

Page 2: ...est security technologies and making them simple to use and widely available Years of research and millions of dollars of development have gone into bringing this technology to you We are very open to...

Page 3: ...ds with theVirtual Keyboard 13 Access my device if I forget my password 14 Change my password 14 Access my secure files 15 Encrypt and decrypt files 15 Create a secure backup of my files 15 Restore fi...

Page 4: ...matically 25 Edit and delete accounts and logins 25 Lock down accounts withVeriSignVIP 25 Back up and restore my Identity Manager data 25 Manage my online account settings 25 Change device nickname 26...

Page 5: ...folder and follow the onscreen instructions 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 Configuraci n d...

Page 6: ...ryptochip detects physical tampering by a hacker or if 10 consecutive incorrect password attempts have been entered it initiates a permanent self destruct sequence that securely erases all onboard dat...

Page 7: ...ata Your online account includes the SecurityVault If your device is ever lost or stolen you can easily restore your online passwords from this encrypted online backup Self Learning Password Managemen...

Page 8: ...his product There is no hocus pocus or handwaving here We use established cryptographic algorithms we develop threat models and we perform security analyses internal and third party of our systems all...

Page 9: ...hardware encrypted area inside the device not in the file system being first locally encrypted with 256 bit AES using randomly generated keys encrypted with a SHA 256 hash of your device password All...

Page 10: ...rsonal devices do not require any software or drivers to be installed Advertised capacity is approximate and not all of it will be available for storage Some space is required for onboard software Rec...

Page 11: ...is case sensitive and must be at least 4 characters long 4 Click the Enable Password Reset check box if you want to be able to recover your device if you forget your password 5 Type an email address i...

Page 12: ...lock the device in Read Only Mode Entering your password correctly which is verified in hardware will mount your secure volume with all your secure applications and files Entering the wrong password 1...

Page 13: ...P To uninstall it click on the Uninstall Auto Launch Assistant button LOCK DEVICE Click the Lock button in the bottom left of the Control Panel to safely lock your device You can also use the keyboard...

Page 14: ...ging and screenlogging spyware use the Imation Virtual Keyboard It helps protect your device password by letting you click out letters and numbers The underlying techniques in theVirtual Keyboard will...

Page 15: ...utton 5 A message prompt will appear indicating that an email has been sent to you Follow the instructions in the email to set up your online account this includes creating a secret ques tion 6 Once y...

Page 16: ...an also access your files by right clicking the IronKey icon on the Windows taskbar and clicking Secure Files Encrypt and decrypt files Everything you store on your Imation Personal device is encrypte...

Page 17: ...ot add alter or delete the backed up files or you may be prevented from restoring them later RESTORE FILESTO DEVICE FROM BACKUP FILE 1 In the Applications list of the Imation Control Panel click the S...

Page 18: ...rased Use my device on Linux You can use your Imation Personal device on several distributions of Linux x86 systems only with kernel version 2 6 SETUP UPTHE DEVICE 1 Plug the device into your computer...

Page 19: ...with the password devicepassword enter ironkey password devicepassword To lock the device you must either unmount and physically remove unplug it or else run ironkey lock Simply unmounting the device...

Page 20: ...ess their Imation Personal devices All of these methods require that the system administrator take one time action to enable access after that ordinary users can lock unlock and change passwords on an...

Page 21: ...open onboard Firefox by right clicking the IronKey icon in the Windows taskbar and clicking Secure Browser OPEN A SECURE BROWSING SESSION You must have an online account to open a secure web browsing...

Page 22: ...nd click Secure Sessions Bandwidth Meter Change identities You can change your apparent online identity to create a new random circuit and change the path of your encrypted web traffic As you will be...

Page 23: ...iew on Windows computers RESTORE ONBOARD APPLICATIONS You can restore your onboard applications if they are ever erased or corrupted Windows only 1 Unlock your device and click the Settings button on...

Page 24: ...tials such as login information and one time passwords to applications and online accounts You must have an online account to use Identity Manager Typcially you create the account during device setup...

Page 25: ...online account you will be asked if you want to en able the Identity Manager option Click Yes To start Identity Manager 1 Unlock your device and click the Applications button in the menu bar of the C...

Page 26: ...can lock down some important online accounts withVeriSign sVIP service so that they can only be accessed using your device Log into eBay or PayPal and the Identity Manager will guide you through the r...

Page 27: ...l appear indicating that an email has been sent to you Follow the instructions in the email to set up your online account this includes creating a secret ques tion 7 Once you have finished and have su...

Page 28: ...an incorrect secret question attempt You can also sign up to be notified of new Imation product announcements Edit Secret Questions and Answers Click the Edit button to modify your Secret Question res...

Page 29: ...omissions contained herein nor for incidental or consequential damages resulting from the furnishing or use of this material The information provided herein is subject to change without notice The in...

Page 30: ...PERSONAL IRONKEY Imation Imation Enterprise Enterprise Imation Imation Imation Enterprise RSA SecurID Enterprise Firefox Web Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB...

Page 31: ...Y Windows Firefox IronKey Mac Auto Launch Assistant LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey Unlocker IronKey exe MAC Finder IronKey Unlocker IronKey Unlocker Ironkey 2 Imation En...

Page 32: ...Enterprise 7 Web 8 OK 9 AES 10 Imation Windows Mac Linux Unlocker Windows Mac Linux Linux 1 Unlocker Unlocker WINDOWS Ironkey Unlocker IronKey exe MAC Finder IronKey Unlocker IronKey Unlocker Ironkey...

Page 33: ...32 IMATION PERSONAL IRONKEY 10 Imation Enterprise 3 1 Unlocker 2 3 Linux ironkey readonly Unlocker Imation Unlocker 1 2 3 7 200 Imation Enterprise...

Page 34: ...33 IMATION PERSONAL IRONKEY Imation 1 Imation Unlocker CTRL ALT V 2 Randomize Windows QWERTY CTRL L...

Page 35: ...34 IMATION PERSONAL IRONKEY Imation WINDOWS Windows Explorer MAC Finder Windows Ironkey Imation Cryptochip Personal Enterprise Personal 1 Unlocker 2 3...

Page 36: ...35 IMATION PERSONAL IRONKEY 4 OK 5 6 Personal Enterprise 1 Unlocker 2 3 4 5 Imation 1 2 3 Imation Windows...

Page 37: ...36 IMATION PERSONAL IRONKEY 1 1 Imation Windows 2 3 4 5 zip 1 Imation Windows 2 3 4 Imation...

Page 38: ...USB Linux ironkey DVD Linux ironkey Unlocker 2 Q Y 3 4 4 AES 5 UNLOCKER Linux Unlocker Linux Windows Mac Linux Linux DVD Linux ironkey 1 Imation ironkey Imation ironkey Linux ironkey devicename ironk...

Page 39: ...ROMSupport DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI HCD most Intel and VIA support DeviceDrivers USB Mass S...

Page 40: ...n com 5 Linux Imation Unlocker x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imation com 91...

Page 41: ...ERSONAL IRONKEY Imation Imation Enterprise Imation Imation Imation Enterprise ID RSA SecurID Enterprise Firefox Secure Sessions Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 U...

Page 42: ...ronKey ID Secure Sessions Mac Auto Launch Assistant ID LED Windows Mac Linux Linux 1 USB Imation DVD WINDOWS IronKey Unlocker IronKey exe MAC IronKey Unlocker IronKey Unlocker IronKey 2 Imation Enterp...

Page 43: ...olume Secure Volume 10 Imation Windows Mac Linux Unlocker Windows Mac Linux Linux 1 Unlocker Unlocker WINDOWS IronKey Unlocker IronKey exe MAC IronKey Unlocker IronKey Unlocker IronKey Mac Imation Unl...

Page 44: ...43 IMATION PERSONAL IRONKEY 1 Unlocker 2 3 Linux ironkey readonly Unlocker Imation Unlocker 1 2 3 7 200 Imation Enterprise Imation 1 Imation Unlocker CTRL ALT V 2 Enter Windows QWERTY...

Page 45: ...44 IMATION PERSONAL IRONKEY CTRL L Imation WINDOWS Windows MAC Windows Ironkey Imation Cryptochip Personal...

Page 46: ...45 IMATION PERSONAL IRONKEY Enterprise Personal 1 Unlocker 2 3 4 5 6 Personal Enterprise 1 Unlocker 2 3 4 5 Imation 1 2 3...

Page 47: ...46 IMATION PERSONAL IRONKEY Secure Backup Imation Windows Secure Backup 1 Imation Secure Backup Windows Secure Backup 2 3 4 5 1 Imation Secure Backup Windows Secure Backup 2 3 4 Imation...

Page 48: ...Linux ironkey Unlocker 2 Q Y 3 4 4 AES Secure Volume 5 UNLOCKER Linux Unlocker Linux Windows Mac Linux Linux DVD Linux ironkey Imation ironkey Imation ironkey Secure Volume Linux ironkey devicename i...

Page 49: ...ort DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI HCD most Intel and VIA support DeviceDrivers USB Mass Storage...

Page 50: ...10 Linux Imation Unlocker x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imation com 910 E H...

Page 51: ...50 IMATION PERSONAL IRONKEY Imation Imation Imation Imation Imation RSA SecurID Firefox Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB 1 1 Linux...

Page 52: ...51 IMATION PERSONAL IRONKEY Windows Firefox IronKey Mac LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey 2 Imation 3 Imation Imation 4 5 6...

Page 53: ...52 IMATION PERSONAL IRONKEY 7 8 9 AES 10 Imation Windows Mac Linux Windows Mac Linux Linux 1 WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey Mac Imation 2 Imation 10 Imation 1 2 3...

Page 54: ...53 IMATION PERSONAL IRONKEY Linux ironkey readonly Imation 1 2 3 7 200 IMATION Imation 1 Imation CTRL ALT V 2 WINDOWS CTRL L...

Page 55: ...54 IMATION PERSONAL IRONKEY Imation WINDOWS Windows MAC Finder WINDOWS IRONKEY Imation 1 2 3 4 5 6...

Page 56: ...55 IMATION PERSONAL IRONKEY 1 2 3 4 5 Imation 1 2 3 Imation Windows 1 Imation Windows 2 3 4 5...

Page 57: ...6 IMATION PERSONAL IRONKEY 1 Imation Windows 2 3 4 Imation Linux Linux Imation x86 2 6 1 USB Linux ironkey DVD Linux ironkey 2 Q Y 3 4 AES 5 Linux Linux Windows Mac Linux Linux ironkey DVD Linux Imati...

Page 58: ...ernel 2 6 Kernel DeviceDrivers SCSIDeviceSupport SCSICDROMSupport DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI...

Page 59: ...ttp support imation com 5 Linux Imation x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imati...

Page 60: ...59 IMATION PERSONAL IRONKEY Imation Imation Imation Imation Imation RSA SecurID Firefox Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB 1 1 Linux...

Page 61: ...PERSONAL IRONKEY Windows Firefox IronKey Mac Auto Launch Assistant LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey 2 Imation 3 Imation Ima...

Page 62: ...TION PERSONAL IRONKEY 6 7 8 9 AES 10 Imation Windows Mac Linux Windows Mac Linux Linux 1 WINDOWS IronKey IronKey exe MAC Finder IronKey Mac IronKey IronKey Auto Launch Assistant Imation 2 Imation 10 I...

Page 63: ...62 IMATION PERSONAL IRONKEY 1 2 3 Linux ironkey readonly Imation 1 2 3 7 200 IMATION Imation 1 Imation CTRL ALT V 2 QWERTY WINDOWS...

Page 64: ...63 IMATION PERSONAL IRONKEY CTRL L Imation WINDOWS Windows Explorer MAC Finder WINDOWS IRONKEY Imation 1 2...

Page 65: ...64 IMATION PERSONAL IRONKEY 3 4 5 6 1 2 3 4 5 Imation 1 2 3 Imation Windows 1 Imation Windows 2...

Page 66: ...65 IMATION PERSONAL IRONKEY 3 4 5 1 Imation Windows 2 3 4 Imation Linux Linux Imation x86 2 6 1 USB linux ironkey DVD linux ironkey 2 Q Y 3 4 4 AES 5...

Page 67: ...lock devicename devicename ironkey readonly devicepassword ironkey password devicepassword ironkey lock Linux 1 2 6 DeviceDrivers SCSIDeviceSupport SCSICDROMSupport DeviceDrivers Support for Host side...

Page 68: ...3 USB DVD DVD Linux Imation Imation 4 Linux http support imation com 5 Imation Linux x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecur...

Page 69: ...ispositivos de Enterprise Gestor de identidades RSA SecurID solo para dispositivos de Enterprise Firefox incorporado al dispositivo Teclado virtual y Sesiones seguras El sitio web de cuentas en l nea...

Page 70: ...necte el dispositivo Imation en el puerto USB de su equipo Aparece la pantalla Configu raci n de dispositivo El software de configuraci n se ejecuta autom ticamente desde un DVD virtual Puede que esta...

Page 71: ...dispositivo entre otras 8 Una vez configurada su cuenta en l nea para el dispositivo haga clic en Aceptar en el men saje de confirmaci n para continuar con la configuraci n del dispositivo 9 El dispo...

Page 72: ...o y ejecute el Desbloqueador 2 Haga clic en la casilla Modo de solo lectura 3 Haga clic en el bot n Desbloquear Ver un mensaje en el Panel de control que indica que se encuentra en Modo de solo lectur...

Page 73: ...lic sobre otros Adem s si lo desea puede hacer clic en el bot n Randomize Aleatorizar para cambiar el orden de las teclas Esta opci n le ayudar a protegerse frente a los registradores de pulsaciones d...

Page 74: ...s lida y siempre activa Arrastre un archivo a la unidad de archivos seguros para cifrarlos autom ticamente Los archivos que se abren desde la unidad de archivos seguros se descifran autom ticamente en...

Page 75: ...Ayuda para la contrase a haga clic en el bot n Restablecer la contrase a Se le enviar un correo electr nico con instrucciones sobre c mo continuar 4 Despu s de completar las instrucciones del mensaje...

Page 76: ...frar n y se les har una copia de seguridad NOTA Aunque los archivos est n cifrados de forma segura los nombres de archivos no Para ocultar los nombres de archivos comprima los archivos a los que desea...

Page 77: ...R EL DESBLOQUEADOR Utilice el Desbloqueador para acceder a los archivos y cambiar la contrase a del dispositivo en Linux lo cual le permite transferir de forma segura archivos entre equipos con sistem...

Page 78: ...determinado que viene con una distribuci n compatible no necesita llevar a cabo ninguna otra acci n Adem s en sistemas Linux de 64 bits deben instalarse bibliotecas de 32 bits para poder ejecutar el p...

Page 79: ...ibuciones compatibles 5 En este momento el Desbloqueador Imation para Linux solo admite sistemas x86 D nde obtener ayuda PARA OBTENER M S INFORMACI N ik imationmobilesecurity com forum Foro en l nea c...

Page 80: ...ire d identit s RSA SecurID p riph riques Enterprise uniquement Firefox le Clavier virtuel et les Sessions s curis es Le site Web des comptes en ligne et les e mails par d faut sont galement en anglai...

Page 81: ...mesWindows et Mac Pour les syst mes Linux reportez vous au paragraphe Utilisation du p riph rique sous Linux 1 Branchez le p riph rique Imation sur le port USB de votre ordinateur L cran Configuratio...

Page 82: ...ous avez configur votre compte en ligne pour votre p riph rique cliquez sur OK dans le message pour configurer le p riph rique 9 Le p riph rique s initialise Ce processus g n re une cl de cryptage AES...

Page 83: ...verrouilleur 2 Cochez la case Mode Lecture seule 3 Cliquez sur le bouton D verrouiller Un message s affiche dans le panneau de commande indiquant que vous tes en lecture seule Lorsque vous d verrouil...

Page 84: ...les saisissant et d autres en cliquant dessus Vous pouvez galement cliquer sur le bouton Randomize Al atoire afin de r organiser de mani re al atoire l emplacement des touches Ce syst me permet de vo...

Page 85: ...SB ordinaire tout en b n ficiant d une s curit renforc e et continue Faites glisser un fichier vers le disque Fichiers s curis s pour le crypter automatiquement Les fichiers ouverts depuis le disque F...

Page 86: ...on Aide sur le mot de passe 3 Dans l invite cliquez sur le bouton R initialiser le mot de passe Un e mail d instructions vous est envoy 4 Apr s avoir suivi les instructions de l e mail cliquez sur le...

Page 87: ...QUE Bien que les fichiers soient crypt s les noms de fichiers ne le sont pas Pour masquer les noms de fichiers zippez les fichiers sauvegarder avant de cr er le fichier de sauvegarde REMARQUE N ajoute...

Page 88: ...t pr t tre utilis UTILISER LE D VERROUILLEUR Utilisez le D verrouilleur pour Linux afin d acc der vos fichiers et de modifier votre mot de passe de p riph rique sous Linux Vous pouvez ainsi transf rer...

Page 89: ...eDrivers Prise en charge EHCI HCD USB 2 0 DeviceDrivers Prise en charge UHCI HCD Intel et VIA pour la plupart DeviceDrivers Syst me de stockage de masse USB Les noyaux inclus par d faut dans la plupar...

Page 90: ...les mots de passe sur tout p riph rique Imation branch 4 Distributions prises en charge Toutes les distributions Linux ne sont pas prises en charge Consultez le site l adresse http support imation co...

Page 91: ...der mitgelieferte Firefox Virtual Keyboard Virtuelle Tastatur und Secure Sessions Die Website f r das Online Konto und die Standard E Mail Adressen sind ebenfalls nur in Englisch verf gbar Dieser Abs...

Page 92: ...Das Ger t unter Linux verwenden 1 Stecken Sie das Imation Ger t in die USB Schnittstelle des Rechners Das Fenster Ger te Setup wird angezeigt Die Setup Software wird automatisch von einer virtuellen...

Page 93: ...das Online Konto f r das Ger t eingerichtet haben klicken Sie OK in der Eingabeaufforderung der Mitteilung um mit der Einrichtung fortzufahren 9 Das Ger t wird initialisiert W hrend dieses Prozess we...

Page 94: ...und starten Sie den Entsperrer 2 Klicken Sie das Ankreuzfeld Schreibgesch tzter Modus 3 Klicken Sie die Taste Entsperren Im Kontrollfeld wird eine Mitteilung angezeigt die darauf hinweist dass Sie sic...

Page 95: ...verwenden sodass Sie einige Zeichen eingeben und andere anklicken Sie k nnen optional auch die Taste Zuf llig festlegen dr cken um eine zuf llige Anordnung der Tasten zu schaffen Das hilft gegen Scree...

Page 96: ...eitsfunktion Das Ziehen einer Datei auf das Laufwerk Sichere Dateien verschl sselt diese automatisch Die auf dem Laufwerk Sichere Dateien ge ffneten Dateien werden beim ffnen automatisch entschl sselt...

Page 97: ...Sie im Fenster Kennwort Hilfe die Taste Kennwort Reset Es wird eine E Mail mit einer Anleitung f r das weitereVorgehen an Sie geschickt 4 Nachdem Sie diesen Anweisungen gefolgt sind klicken Sie die Ta...

Page 98: ...erden verschl sselt und das Backup erstellt HINWEIS Zwar sind die Dateien sicher verschl sselt die Dateinamen allerdings nicht Wenn Sie die Dateinamen unlesbar machen m chten erstellen Sie eine ZIP Da...

Page 99: ...schlossen ist dann ist das Ger t einsatzbereit DEN ENTSPERRERVERWENDEN Verwenden Sie den Entsperrer f r Linux um auf Ihre Dateien zuzugreifen und das Ger tepasswort unter Linux zu ndern So ist es m gl...

Page 100: ...ng Die Kernel die standardm ig in den meisten Distributionen enthalten sind verf gen ber diese Funktionen Wenn Sie also den Standardkernel verwenden der mit einer unterst tzten Distribution geliefert...

Page 101: ...erst tzt Bitte besuchen Sie http support imation com zu Informationen ber die aktuelle Liste unterst tzter Distributionen 5 Der Imation Entsperrer f r Linux unterst tzt derzeit nur x86 Systeme Wo find...

Reviews: