Remove Authentication Remove Dell Remove Operating Systems Remove Storage
article thumbnail

Can you trust your computer?

Dataconomy

The essence of trusted computing involves key concepts like endorsement keys, secure input/output mechanisms, memory curtaining, sealed storage, remote attestation, and Trusted Third Party (TTP) interactions. These concepts collectively contribute to the creation of a comprehensive system compliant with TCG specifications.

article thumbnail

Technology Short Take 114

Scott Lowe

Apparently Dell’s new docking stations support firmware updates via Linux. This is a pretty detailed write-up of a remote code execution vulnerability prsent on most Dell computers (courtesy of Dell SupportAssist). Operating Systems/Applications. Networking. Servers/Hardware. Cloud Computing/Cloud Management.

Linux 60
article thumbnail

Technology Short Take 166

Scott Lowe

Servers/Hardware Kevin Houston provides some instructions on backing up the Dell PowerEdge MX7000 settings and configurations. William Lam shares news about higher-capacity SODIMMs available for small or ultra small form factor systems. Storage This is a good (albeit slightly dated) overview of EBS volume types.

IPv6 74