If the trusted PC works the way it should, an inexperienced or lackadaisical administrator won't be able to unwittingly compromise system or network security through inefficient policies.
如果信任电脑作品它应该的方式,一个没有经验的或懒洋洋的管理员不会能够无意中妥协通过低效的系统或网络安全政策。
With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.
随着信息技术的飞速发展,可信计算机在安全方面的优越性越来越受到国内外计算机领域工作者的重视。
Suggestions have been made that trusted computing is both a potential threat to user privacy and a threat to the ability of the owner of a PC to use it however he or she wishes.
民众意见都认为,可信计算机处理器不但是个人用户的潜在威胁,还是对所有个人电脑使用者期待怎么使用它的能力的一种威胁。
This paper mainly studies on the security and trusted status of a PC system, points out that we can setup a BIOS security subsystem to protect our PC.
本文主要针对对计算机系统的安全性及可信赖度进行了研究,提出利用BIOS实现系统的安全保护的观点。
This paper mainly studies on the security and trusted status of a PC system, points out that we can setup a BIOS security subsystem to protect our PC.
本文主要针对对计算机系统的安全性及可信赖度进行了研究,提出利用BIOS实现系统的安全保护的观点。
应用推荐