Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Jan 20, 2012
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it is possible to extract secret information about the software, but it is also extremely difficult for the software to detect that an attack is underway.