What we can do with the Security Chip ?

After installed CSS, activated the security chip, what is it going to do? passwords / fingers are doing their own jobs indepandently. So, after activated the chip, what we can do with it?

Some reading materials on TPM.
http://www.pc.ibm.com/us/pdf/CSS_data_sheet.pdf
Another one ...
http://www.pc.ibm.com/us/security/
*Non Lenovo employee*
I have a Y2P (i5) ... Feel free to ping me if you want me to test some applications with your Y2P if you have the same model. I don't mind keep doing recovery on it if needed .... =)

Similar Messages

  • SCRIPTER PLUG-IN ; looks like you cannot do more that what you can do with the environment !

    Hello
    I am very interested of this possibility to develop the equivalent of the Cubase VST expression Map to drive VSL articulation changes
    I have read that the score have been re-wrote ! is this true ?
    Reading the manual I did not find that it was possible to convert score events (staccato, legato ...) into a midi command to be send to VSL
    Also you cannot work on note length.
    Looks like you cannot do more that what you can do with the environment !
    I hope I am wrong and that this is missing in the manual
    Best
    Cyril

    APPLE, can you reply ?
    Depending of your answer I will buy or not buy Logic X

  • What I can do with the free download version of Oracle 10g?

    I'm new to Oracle. What can/can't do with the free download of Oracle 10g Release 2? What is the difference between Oracle 10g Release 2 and Express edition?

    Express Edition has limits on the number of CPUs it'll utilize (it essentially forces itself to run single-threaded), amount of RAM it'll utilize and amount of data it will store. It is missing many of the higher level security and maintenance features you would find if you wanted to be highly available.
    The downloadable version of Enterprise Edition is missing none of these, however the license states that you can only use the that version for development purposes.
    I suspect you can also use the downloadable version to educate yourself on how the various features work, but it doesn't specifically say that in the license and I'm not a license expert.

  • I was given a gift of an iPhone 5s in Saudi Arabia. I took it to Verizon who said they could not hook up the phone. Does anyone have any ideas about what I can do with the phone?  It is new and unopened

    I was gifted an I phone 5s in Saudi Arabia. Took it to the Verizon store. The sales rep told me I could not use it.  Any suggestions?

    If it's a legitimately unlocked iPhone, you can use it on AT&T or T-Mobile if you like. You can not bring your own iPhone to any CDMA carrier (Verizon, Sprint, etc).
    If it was originally sold in the Middle East, Facetime is permanently disabled.

  • What's the big whoop with the emv chip?

    This may be a dumb question.   But why are people so excited when a CCC issues their cards with the emv chip.   Ive done a little research and yes from what I've read the cards will be more secure.  But not fool proof.  I may be totally missing something. So if anyone can enlighten me, please feel free.  Because I know there's people a whole lot smarter and knowledgeable  than I am on here.

    NRB525 wrote:
    Closingracer99 wrote:
    alottacards wrote:
    This may be a dumb question.   But why are people so excited when a CCC issues their cards with the emv chip.   Ive done a little research and yes from what I've read the cards will be more secure.  But not fool proof.  I may be totally missing something. So if anyone can enlighten me, please feel free.  Because I know there's people a whole lot smarter and knowledgeable  than I am on here.It is a lot safer... and nothing is fool proof.   You do realize the mag stripe has been in existence since the mid-late 40's right? You have issues like what happened with Target and Home depot because of the United states slowness to implement EMV chips and even then we got to be special and do Chip+ Sig not Chip + Pin. Sometimes I hate living in the states*  * I love the united states but America's insistence to be different is annoying lol. The Metric system is  a lot easier and Chip and pin is accepted all over Europe yet we have to go to Chip + sig?I don't think it was quite that early. ENIAC would have been overloaded.First use of a mag stripe by the CIA in the early 1960's, credit card roll out in the early 1970's.Some of you may recall the "finger smasher" imprint machines we had to use to put credit card charges on multi-part forms, then the paper would go to centralized bank processing centers where that data would be manually keypunched into the computers. The "finger smasher", by the way, is the reason we still have raised letters and numbers on most credit cards today. It is the real "old school" data input format that is still on most credit cards.Actually the Mag Stripe was a technology for something else in the late 40's. Go look it up Excerpt from the Wiki page  Magnetic recording on steel tape and wire was invented during World War II for recording audio. In the 1950s, magnetic recording of digital computer data on plastic tape coated with iron oxide was invented. In 1960 IBM used the magnetic tape idea to develop a reliable way of securing magnetic stripes to plastic cards,[1] under a contract with the US government for a security system. A number of International Organization for Standardizationstandards, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, now define the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. They also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions.  What I was talking about the technology itself was invented in the 40's, not it's use for credit cards

  • How can we handle browser settings while dealing with the security ?

    Hi ,
    how can we handle browser settings while dealing with the security ?When we configured security in web.xml , during the first request the container is asking for the authentication credentials once they are provided it go's on. but when the user gives a fresh request from the second window within the same browser that time it is not asking for authentication. How can we overcome this.Is there anything to do with server configurations?
    How can we make the container no to keep the things or act like session?

    Ya... I am taking a small example need not happen always but a kind of possibility i am thinking off.
    once the user sign out and just left without closing the browser and a friend (suppose not a good friend ... just kidding...) of that user may open the same jsp or file .This time the security is breached. If that feature or property exists....
    I know what you might say ... the user will log-out before leaving where a programer might invalidate the session at the time of log out.
    Consider the case of a bad Programing or just a programer might forget to invalidate,At that time as a application administrator how can he solve that issue.
    Thanks.......
    Edited by: user8483670 on Jun 6, 2011 1:08 AM
    Edited by: user8483670 on Jun 6, 2011 1:09 AM

  • I can´t remember the security code to unblock my iPod touch and when I try to synchronize it with iTunes I can´t because it ask me to introduce the code that I don´t remember. In my iPod says that it is desactivated and I need to connect to iTunes...

    I can´t remember the security code to unblock my iPod touch and when I try to synchronize it with iTunes I can´t because it ask me to introduce the code that I don´t remember. In my iPod says that it is desactivated and I need to connect to iTunes...so It returns me to the begining...
    I already tried to reset the iPod, but it did´t work....
    I need to activate again my iPod...Help!!

    Place the iPod in Recovery mode and connect to your computer and restore via iTunes.
    Recovery mode

  • Can you give me some reasons about why I need to buy an iPod touch 5.Although I have the iPhone ,iPod nano, iPad ,MacBook pro,I think the iPod touch 5 is so attractive that I can't help buying it at once.If I have it,what I can do with it,can you tell me?

    can you give me some reasons about why I need to buy an iPod touch 5.Although I have the iPhone ,iPod nano, iPad ,MacBook pro,I think the iPod touch 5 is so attractive that I can't help buying it at once.If I have it,what I can do with it,can you tell me?

    All I can say is that I REALLY like my Touch 4th gen because I have all sorts of capabilities in a small form: e-mail, web browsing, news, weather, books, magazines, etc. etc.  Plus lots and lots of apps out there, including so many free ones.  I use the Cloud a lot so it's great to have everything sync'd to my MacBookPro (e-mail, Evernote, Pocket, etc.)
    It would be easier, though, to do some of this, especially magazines, on the iPad mini, but, again, I love the small size of the Touch. 
    As for the 5th gen instead of the 4th, the fifth has Siri and the 3D feature in maps, which are great.  And I'm sure it's a lot faster in iOS 6 than the 4th gen.  And cool colors! 
    Don't know if this helps . . .

  • TS3745 What do I do with the import folder once it is on my desktop? Can I delete it?

    I followed the advice to stop getting the "6 pictures were found and not imported message."  I moved the import file in my iPhoto folder to the desktop. Now what do I do with the folder, can I delete it?

    Yes.

  • HT5037 when I click on iPhoto(9.5.1)  i get "To open your library with this version of iPhoto, it first needs to be prepared." but i downloaded the up-grader, used it and it tells me the library can open with the current version... what should i do now?

    When I click on iPhoto(9.5.1)  i get "To open your library with this version of iPhoto, it first needs to be prepared." but i downloaded the up-grader, used it and it tells me the library can open with the current version... Then when I click on the iphoto again i get the same message "To open your library with this version of iPhoto, it first needs to be prepared."'
    What should I do?

    The upgraded is only necessary for libraries created with iPhoto '07 or eearlier.  Just double click the library to open it in iPhoto, and let it upgrade, if it has been created by a newr version.

  • I have my ID and password but can not remmember the security answers  What can I do ??

    I have my ID and password but can not remmember the security answers  What can I do ??

    Security Questions and Rescue Mail
    There are various ways to resolve this matter, amongst them are ...
    An email to … Apple - Support - iTunes Store - Contact Us.
    Or
    you can follow instructions here … Rescue email address and how to reset Apple ID security question
    Or
    you could call your national Apple support number and ask for Customer Service or their Security section.  The phone numbers are here … Contact Apple support.

  • TS2446 What do you do if you get a new apple device but can't remember the security questions?

    What do you do if you get a new apple device but can't remember the security questions?

    You need to ask Apple to reset your security questions; ways of contacting them include clicking here and picking a method for your country, phoning AppleCare and asking for the Account Security team, and filling out and submitting this form.
    They wouldn't be security questions if they could be bypassed without Apple verifying your identity.
    (101680)

  • HT5501 Somebody can tell me what is going on with the last update 10.8.2??I updated and since two days ago my computer is blocking with safari and is getting pretty much slower than before??

    Can somebody tell me what is going on with the last update of Mountain Lion 10.8.2?? Since then my computer is pretty much slower and blocken on Safari.

    First of all, why did you say yes to Nero Back up before researching what it does with files already on the HDD? When I install Nero, the Back Up is the first thing I disable, it is a nagging pain, there are much better backup programs available. There are several file recovery programs out there to recover deleted files, that is, if that is what happened. Also, if you haven't overwritten the files, so you should be able to find them.

  • We are on holiday in Mexico. Our iPad has no problem connecting to the Internet through a subscription WiFi network. But, both of our laptops can not with the same password. What can we try?

    We are on holiday in Mexico. Our iPad2 has no problem connecting to the Internet through our hotel's subscription WiFi network. But, both of our macbookpros can not with the same password. What can we try?
    We can join the network, but can not access the Internet. The password is correct. We have tried network assistant and diagnostics, restarting the laptops, re-joining the network. Our iPhone 4s also works all the time.
    Same location. Signal strength is good.

    Since I couldn't figure out a way to edit our original post, here's another potential clue.
    Our laptops, when in System Preferences>Network, say "WiFi has the self-assigned IP address of XXXXXXXXX and will not be able to connect to the Internet".
    Strangely, my six year old MBP running OS 10.6.8 accessed the Internet straight away, just by opening Safari to my home page. My wife's six month old MBP running OS 10.7.2 could not.

  • I have some money left from a gift card on an itunes account, but can't log in.  I've tried to reset the password but I didn't receive the email. Also I can't remember the security question. What can I try next?

    I have some money left from a gift card on an itunes account, but can't log in.  I've tried to reset the password but I didn't receive the email. Also I can't remember the security question. What can I try next?

    Reset Security Questions
    http://support.apple.com/kb/ht5312
    If you still have problem, call Apple to help reset your Security Question.
    http://support.apple.com/kb/HT5699

Maybe you are looking for