361 panels/firmware-security/cc-firmware-security-dialog.c:212 • panels/firmware-security/cc-firmware-security-dialog.c:223 | ||
362 panels/firmware-security/cc-firmware-security-dialog.c:229 | ||
371 panels/firmware-security/cc-firmware-security-panel.c:145 | ||
372 panels/firmware-security/cc-firmware-security-panel.c:153 | ||
373 panels/firmware-security/cc-firmware-security-panel.c:160 | ||
380 panels/firmware-security/cc-firmware-security-utils.c:37 | ||
|
||
381 panels/firmware-security/cc-firmware-security-utils.c:42 | ||
|
||
382 panels/firmware-security/cc-firmware-security-utils.c:47 | ||
|
||
383 panels/firmware-security/cc-firmware-security-utils.c:52 | ||
|
||
402 panels/firmware-security/cc-firmware-security-utils.c:153 | ||
|
||
405 panels/firmware-security/cc-firmware-security-utils.c:168 | ||
406 panels/firmware-security/cc-firmware-security-utils.c:175 | ||
English
TRANSLATORS: Title: MEI = Intel Management Engine, and the "override" is enabled
* with a jumper -- luckily it is probably not accessible to end users on consumer
* boards
|
||
407 panels/firmware-security/cc-firmware-security-utils.c:180 | ||
409 panels/firmware-security/cc-firmware-security-utils.c:190 | ||
|
||
410 panels/firmware-security/cc-firmware-security-utils.c:195 | ||
|
||
413 panels/firmware-security/cc-firmware-security-utils.c:211 | ||
414 panels/firmware-security/cc-firmware-security-utils.c:216 | ||
|
||
415 panels/firmware-security/cc-firmware-security-utils.c:221 | ||
|
||
416 panels/firmware-security/cc-firmware-security-utils.c:226 | ||
424 panels/firmware-security/cc-firmware-security-utils.c:277 | ||