Content deleted Content added
Trustworthy Computing is not the same as Trusted Computing |
|||
Line 39:
This would not be able to defend against a hardware based attack such as a key capture device physically between the user's keyboard and the computer.
just testing
=== Memory curtaining ===
|