Foxconn Q57M English Manual. - Page 36

► Trusted Computing, ► Initate Graphic Adapter, ► Pre Allocated Memory, ► Video Configuration, ► TPM

Page 36 highlights

3 15th MB) will be reserved and is therefore not available for the OS' use. Since ISA cards are a thing of the past, you should always disable this feature. ► Trusted Computing Press to go to relative submenu. ► Initate Graphic Adapter This item is used to select which graphics controller is used as the primary boot device. ► Pre Allocated Memory This item is used to select the amount of system memory used by the Internal graphics device. Setting options: [Disabled], [Enabled, 32MB], [Enabled, 64MB] and [Enabled, 128MB]. ► Video Configuration Press to go to relative submenu. Trusted Computing CMOS Setup Utility - Copyright (C) 1985-2009, American Megatrends, Inc. Trusted Computing Trusted Computing Help Item TPM Support [Di sabled ] Enable/Disable TPM support in BIOS Move Enter:Select +/-/:Value F10:Save ESC:Exit F1:General Help F7:Previous Values F8:Fail-Safe Defaults F9:Optimized Defaults ► TPM Support TPM (Trusted Platform Module) is a specification promoted by TCG. A Trusted Platform Module offers facilities for secure generation of cryptographic keys. The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specification. The definition of the TPM architecture comes from the TC and the TPM Work Group defines the implementation of that architecture. Work group members should have a working knowledge of security in relation to the design and usage of cryptographic modules. Members should also have a working knowledge of cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols. This item is used to enable/disable the function of TPM support. 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113

3
29
15th MB) will be reserved and is therefore not available for the OS' use. Since ISA cards are a
thing of the past, you should always disable this feature.
► Trusted Computing
Press <Enter> to go to relative submenu.
► Initate Graphic Adapter
This item is used to select which graphics controller is used as the primary boot device.
► Pre Allocated Memory
This item is used to select the amount of system memory used by the Internal graphics device.
Setting options: [Disabled], [Enabled, 32MB], [Enabled, 64MB] and [Enabled, 128MB].
► Video Configuration
Press <Enter> to go to relative submenu.
Trusted Computing
CMOS Setup Utility - Copyright (C) 1985-2009, American Megatrends, Inc.
Trusted Computing
Trusted Computing
Help Item
TPM Support
Enable/Disable TPM
support in BIOS
↑↓←→:Move
Enter:Select
+/-/:Value
F10:Save
ESC:Exit
F1:General Help
F7:Previous Values
F8:Fail-Safe Defaults
F9:Optimized Defaults
[Disabled]
► TPM Support
TPM (Trusted Platform Module) is a specification promoted by TCG. A Trusted Platform Mod
-
ule offers facilities for secure generation of cryptographic keys.
The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specification.
The definition of the TPM architecture comes from the TC and the TPM Work Group defines
the implementation of that architecture. Work group members should have a working knowl-
edge of security in relation to the design and usage of cryptographic modules. Members
should also have a working knowledge of cryptographic techniques including public-key cryp-
tography, cryptographic algorithms and protocols.
This item is used to enable/disable the function of TPM support.