Hi I did not find the digital fingerprint verification files among the files?
Hi I did not find the digital fingerprint verification files among the files?
I downloaded the executable twice and it did not match the attached fingerprint
I'm sorry, I didn't notice. I found it. You're amazing
I did not find the digital fingerprint verification files among the files?
The files are there, but I think the problem is not seeing the path to the original ISO file
You explain without putting the matter in a complete way. Then I sent you the file. It would have been better to edit it and send it and ask me to complete it, believing that I am a professional. I am just a diligent person. Then the files you mentioned I see in front of me. Then I meant the introduction and not the installation. By the nature of the solution, it was a linguistic error. This is the stupid machine in front of me. Deliberately complicated and I'm sick of it
You explain without putting the matter in a complete way. Then I sent you the file. It would have been better to edit it and send it and ask me to complete it, believing that I am a professional. I am just a diligent person. Then the files you mentioned I see in front of me. Then I meant the introduction and not the installation. By the nature of the solution, it was a linguistic error. This is the stupid machine in front of me. Deliberately complicated and I'm sick of it
File type located on a hard disk partition Disk image file (.iso) Target operating system MX-23.1_fluxbox_386 I did not mention the presence of an ISO file on a folder The parameters and commands used are contained in a file --grubwork--cfg.txt note: I'm trying to install two different systems on two laptops
File type located on a hard disk partition Disk image file (.iso) Target operating system MX-23.1_fluxbox_386 The parameters and commands used are contained in a file --grubwork--cfg.txt note: I'm trying to install two different systems on two laptops
File type located on a hard disk partition Disk image file (.iso) Target operating system MX-23.1_fluxbox_386 The parameters and commands used are contained in a file --grubwork--cfg.txt note: I'm trying to install two different systems on two machines
File type located on a hard disk partition Disk image file (.iso) Target operating system MX-23.1_fluxbox_386 The parameters and commands used are contained in a file --grubwork--cfg.txt
I attached a grub file for the operating system that might be useful note: I think the correct one is /boot/grub/loopback.cfg
I tried this and it failed. I will try the unique disk code
\boot\grub\loopback.cfg
I think the partition path on the disk is missing in the instructions
I think that the boot loader does not reach the root partition that was allocated because there are spaces in the label or the unique disk identifier must be entered
I think the boot loader does not see the root partition that was allocated because there is a space in the label or the unique disk identifier must be marked
No root device specified. Boot arguments must include a root=parameter.
"No root device specified. Boot arguments must include a root=parameter."
Well, can you provide me with the operating parameter in the MX-23.2_fluxbox_x64 distribution, and I will try to find the kernel path and the rest of the paths?
clear set isopath='/linuxmint-21.3-xfce-64bit.iso' set kernelpath='/casper/vmlinuz' # Example '/vmlinuz' set initrdpath='/casper/initrd.lz' # Example '/initrd.img' set bootparms='boot=casper username=mint hostname=mint quiet splash --' Example 'boot=/ iso-scan/filename='$isopath' noprompt noeject ---' Well, can you provide me with the operating parameter in the MX-23.2_fluxbox_x64 distribution, and I will try to find the kernel path and the rest of the paths?
clear set isopath='/linuxmint-21.3-xfce-64bit.iso' set kernelpath='/casper/vmlinuz' # Example '/vmlinuz' set initrdpath='/casper/initrd.lz' # Example '/initrd.img' set bootparms='boot=casper username=mint hostname=mint quiet splash --' Example 'boot=/ iso-scan/filename='$isopath' noprompt noeject ---' Well, can you provide me with the operating parameter in the MX-23.2_fluxbox_x64 distribution, and I will try to find the kernel path and the rest of the paths?
You can do whatever you want, but I checked it and I do not think it is completed automatically. Perhaps the program requires manual input. I thought my role was to add the command to boot from the path of the ISO file and nothing more.
grub boot file Paths and labels linuxmint-21.3-xfce-64bit D:\ D:\boot\grub Storage unit serial number FE3EEDEA grub file in attachments
grub boot file Paths and labels linuxmint-21.3-xfce-64bit D:\ D:\boot\grub Storage unit serial number FE3EEDEA Attachments are the larva file. Please view or edit
I think the screen I'm standing on indicates that the program is unable to see the raw image of the system. I have another device that has a program affiliated with easybcd and accessed the initial system image and then the grub screen. More theoretical clarification and leave the practical to me about that.
I think that the screen I am standing on indicates that the program is unable to see the initial system image. I have another device that contains a program affiliated with easybcd, and the initial system image was accessed, then the grub screen. General question. More clarification on that.
The file system is the default Windows Explorer and also it appears to me that it is a system image file and not compressed. I classify any file that needs writing or burning as It is compressed. I was wrong. I meant that it needs to be burned and written to discs. That's all Well, now the GRUB boot loader settings screen appears for me, and I need to type a command related to the target operating system in order to access the boot folder. Is it necessary to know the unique identifier of the disk...
As for "in the form of a compressed file" I have no idea what that means. Are you zipping ISO files? I do not compress ISO files, but by the nature of the ISO file, it is classified as a compressed file, and this is what is intended
I do not compress ISO files, but by the nature of the ISO file, it is classified as a compressed file, and this is what is intended
What I meant is: Can the program find the path to the ISO file of a system image of a Linux distribution in the form of a compressed file? OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023`
What I meant is: Can the program find the path of a system image ISO file as a zip file? OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023`
What I meant is: Can the program find the path of a system image ISO file as a zip file?file OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023`
What I meant is: Can the program find the path of a system image ISO file as a zip file?file? ~~~ ~~~OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023`
What I meant is: Can the program find the path of a system image ISO file as a zip file?file? OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023`
What I meant is: Can the program find the path of a system image ISO file as a zip file?file?OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023
What I meant is: Can the program find the path of the iso file in the form of a compressed file?OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19045 N/A Build 19045 System Type: x64-based PC BIOS Version: Insyde F.72, 04/10/2023
good greeting Can you please guide me on how to add an ISO file?
Yes, you are right, sorry for what happened. The program is sound. This happened because I relied on the traditional method without intermediaries to reveal integrity and sometimes authenticity at certain times. Of course, the developer will be anonymous, and I believe that intermediaries are able to verify the website, its connection to the server, the certificate, and so on. Organizational hierarchy: Thank you for providing a guide file on how to verify integrity
Yes, you are right. I am sorry for what happened because I relied on the traditional method of revealing integrity and sometimes authenticity at certain times. Of course, the developer will be anonymous, and I believe that intermediaries are able to verify the website, its connection to the server, the certificate, and so on from the organizational hierarchy. Thank you for putting up a guide file. How to verify integrity
Unfortunately, I tried to change the device language to English for the screenshots, but I encountered a problem with the system. I hope that the sample I provided to you is sufficient, and I believe it is, and I hope to publish the result as long as we do so.
Unfortunately, I tried to change the device language to English, but I encountered a problem in the system. I hope that what I provided you is sufficient, and I hope to publish the result as long as we do it.
Don't panic, I think everything is fine. I will attach what you requested
I did not understand what you mean by damaged units. I did not find the damaged units. I was speaking comprehensively
I think it's an unnecessary step, but I need to change the language and reboot the OS. I'll come back and present it to you as I wanted when I'm free, so don't worry.
You're right, it's different and traditional without a trusted intermediary I used to check it myself, as the developer tested it in real time, and as I explained in the attachment, everything seems fine and perfect.
I believe the method you use is incorrect. You're right, it's different and traditional without a trusted intermediary I used to check it myself, as the developer tested it in real time, and as I explained in the attachment, everything seems fine and perfect.
I believe the method you use is incorrect. I think the method you are using is incorrect. You are right, it is different and traditional without a reliable intermediary. I used to check it myself, as the developer tested it in real time, and as I explained in the attachment, everything seems fine and perfect.
I believe the method you use is incorrect. You're right, as I tested it in real time, and as I explained in the attachment, everything seems fine and perfect
I believe that you need to insert your public key so that it can be imported into the relevant programs and authenticate the digital signature. Note: I had an incident when trying to download one of the Linux distributions, which is that one of the files failed to authenticate. For more information, please refer to the source https://linuxmint-installation-guide.readthedocs.io/en/latest/verify.html
I believe that you need to insert your public key so that it can be imported into the relevant programs and authenticate the digital signature. Note: I had an incident when trying to download one of the Linux distributions, which is that one of the files failed to authenticate. For more information, please refer to the attached link.https://linuxmint-installation-guide.readthedocs.io/en/latest/verify.html
I'm sorry for the previous comment, I didn't receive a notification about it. Okay, you're great. I think we're moving forward now. I will do what's necessary. If I need help or anything else, I will come back and tell you. I'm with you until the proper installation.
I'm sorry for the previous comment, I didn't receive a notification about it. Okay, you're great. I think we're moving forward now. I will do what's necessary. If I need help or anything else, I will come back and tell you. I'm with you until the proper installation.
Some malware is only active in a real environment and is able to hide and camouflage itself without detection. This is done by distinguishing between the virtual or physical environment through inference through the programs used. Anyway, that's the cyber tips. I am waiting for your response.
Some malicious programs are only active in a real environment and are able to hide and camouflage themselves without detection. This is done by distinguishing between the virtual or actual environment through inference through programs. In any case, this was a cyber conversation. I am waiting for your answer.
The program was installed despite the high risk for a simple reason. It was checked and there were no malicious programs, but the risk comes when the antivirus did not update the database. I accepted the risk because I needed the program and I hope that I will overcome this and it will not happen again.
This is a useful warning that the publisher is unknown, and this is normal and to be expected https://imgur.com/J7ZpuqD
This is a useful warning that the publisher is unknown, and this is normal and to be expected
This is a useful warning that the publisher is unknown, and this is normal and to be expected
Let me clarify that there appears to be an error and misunderstanding on my part I compared the digital fingerprint that you referred to with the digital fingerprint of the program, and the question is: Is the digital fingerprint that you referred to related to the authentication of the digital certificate or to the program?
Well, since you are working on a development platform and you are a guest on this web, you must link the digital certificate linked to the public key in the program so that your identity can be verified. Of course, many publishers and developers are unknown, and this is normal, but in narrow cases there is a hack into the servers of the hosting site, and therefore it is preferable. That, but we trust the site, and this can be overlooked a little, but what cannot be overlooked is placing a digital...
Let me make it clear, it seems like there was a mistake and misunderstanding on my part I compared the digital fingerprint in terms of the characteristics of digital sweating with the digital fingerprint. The question is, is the digital fingerprint that you referred to related to digital authentication or authentication of the fingerprint itself?
Anyway, I installed the program in a virtual environment, and when I complete the necessary tasks, I will come back and talk about this topic
What you are talking about are the SSL and TLS encryption protocols. They are extremely difficult to encrypt, strong, and impossible to decrypt. But just as there is encryption, there is decryption. This is the theory, and therefore the security of data during transmission and exchange over the Internet is insufficient. Programs related to computing hardware are targeted in the cyber world.
The digital signature does not match. It appears that the file was updated or modified during the online download, so please provide me with the digital signature.
good greeting I want to verify the digital fingerprint of the program
good greeting Please provide me with your digital fingerprint
Problem when starting to convert partition or disk via gdisk