Feature post

highlight shape
Linux Security

Introduction to TPM (Trusted Platform Module)

  • Sergio Prado
  • April 4, 2022
  • 01 minute

TPM (Trusted Platform Module) is an international standard that enables trust in computing platforms in general, providing several security-related features for computer systems, including hashing, encryption, signing, random number generation, and many more!

Learn More details

Latest posts

highlight shape
Security Encryption

Asymmetric-Key Encryption and Digital Signatures in Practice

  • Sergio Prado
  • April 4, 2022
  • 01 minute

In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.

Learn More details
Security Yocto project

Introduction to SBOM management on embedded Linux

  • Sergio Prado
  • April 4, 2022
  • 01 minute

In this article, we will learn the basic concepts of SBOM (Software Bill of Materials) and how it can be generated and managed on embedded Linux with the Yocto Project.

Learn More details
Linux Security

Introduction to TPM (Trusted Platform Module)

  • Sergio Prado
  • April 4, 2022
  • 01 minute

TPM (Trusted Platform Module) is an international standard that enables trust in computing platforms in general, providing several security-related features for computer systems, including hashing, encryption, signing, random number generation, and many more!

Learn More details
Security Linux

RPMB, a secret place inside the eMMC

  • Sergio Prado
  • April 4, 2022
  • 0 minutes

Do you know there is a dedicated partition in the eMMC called RPMB that makes it possible to store data with integrity and authenticity support?

Learn More details

Subscribe newsletter

Until recently, the prevailing view assumed lorem ipsum was born as a nonsense text.

highlight shape