6 lines
237 B
Text
6 lines
237 B
Text
|
A library and example programs for the TCPA chip, as described in
|
||
|
IBM Global Security Analysis Lab's article "Take Control of TCPA"
|
||
|
in the August 2003 issue of Linux Journal.
|
||
|
|
||
|
For this to be useful, you need a computer with a TCPA chip.
|