Computing systems rely fundamentally on hardware components executing software components. Trusted Computing introduces a new hardware component, the TPM (though it may not be hardware in other particular scenarios), and new CPU instructions to cope with the introduction of hypervisors below the operating system. All these elements are designed to make them more difficult to attack physically, though this aspect of the technology is rarely discussed for reasons of confidentiality or even security (not all secrets should be in the public domain).
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.