FA
Today, Friday، 22 Nov 2024 - 10:54
Mokhafaf

Acronym Finder

What is TPM ?

Trusted Platform Module

User Account Control, perhaps including the most important and the changes that has been achieved. User Account Control sort of security technology that makes it possible for users provides a number of advantages ( advantage), and the default created on your computer used. Such an effort would in previous versions of Windows was the problem. Because previous versions., the account of the user is very limited, and the size of the lot unusable, you made and even applied some of the functions of the fundamental, such as viewing the calendar from the Notification trey stop. In Windows Vista, when requested, practical that need a license to run. prompt the user to declare can be that the first password or the name of the executive enter your. Even in situations where the user already among the executive managers to the system, introduction and issues. again, the request can be that the person relating the access level of your account. (Such is that, while all of the monitor screen and the system is temporarily inefficient and is disabled and only the window, let the active and specified. User Account Control in mode Secure Desktop ( safe ) request validation from the user. Why is it that, while trying in check the access level of the user, the deviation of the system caused by the flow of unusual and weed (Spoofing) and the activity of the app, Malicious, etc. Prevention still functioning. The new capabilities of the security and safety of Internet Explorer 7 includes Phishing Filter and IDN with anti-spoofing and also integration with the system wide Parental Controls, other features of Vista. In the direction of contributes to the security, control, Active X through the default, inefficient and non-active (Disable) and are in addition to the Internet Explorer in a mode protected (Protected Mode) that acts on this state with the authorization of the lower from what the user used? acted alone and without the need for other functions available in the operating system, the action and cause the operating system to access or change anything, even directories, Temporary Internet Files (Temporary Files Directory). Antispyware, and to verbal other Windows Defender which of the productions, Microsoft. to protect against Malware and other in Windows Embedded. Changes the layout in the configuration of the Various System ( such as auto-starting applications ) are closed and are unlocked unless the user tends to another mode. Another feature of the new Indica Vista., the BitLocker Driver Encryption, which is a kind of technology of data protection is that in the edit Ultimate Vista the order is to overall all operating system password. BitLocker can together and associated with Chip Trusted Platform Module version 1.2 on a PC motherboard or a USB Key . Furthermore, the category, a variety of other techniques range A advantages ( advantage ) in Vista, embedding, have been, for example, the concept of layers integrated in the processing of the user in which the bottom layer manually, not with the processing of the higher layers can interact and can not run - Injection DLL in the processing layer, the higher the practical formation.
TPM