Trusted Computing (TC) is a row of offers and ideas, around the architecture of computers which can make warranties available for the application of software. TC makes running application possible in safe communication with other application software and server nodes. Even the peripherals connected to the computer can be secured in TC and encrypts the connection between mouse and keyboard and computer.
The applications of TC are varying from managing digital contents such as videos and locking email to forbid forwarding it or print it. Exploiting uniqueness of MAC address makes TC able to make only authorized users use the network.
TC is promising very secure use of computers and networks which may lead to mitigate hacking hardware and software of both casual users and companies.