The first step to a more secure computing is using improved hardware. But before we discuss how to use such technology, we will define what constitutes an Intel Trusted Execution Technology–capable platform and will explore the underlying principles behind Intel TXT. This paper takes a look at the unique components of Intel TXT, how they work together, and what they do to produce a more secure environment.