{"id":22282,"date":"2021-10-14T09:05:00","date_gmt":"2021-10-14T13:05:00","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=22282"},"modified":"2021-10-14T10:55:40","modified_gmt":"2021-10-14T14:55:40","slug":"microsoft-video-shows-why-tcm-2-0-and-other-windows-11-requirements-are-so-important","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-video-shows-why-tcm-2-0-and-other-windows-11-requirements-are-so-important\/","title":{"rendered":"Microsoft Video Shows Why TCM 2.0 and Other Windows 11 Requirements are So Important"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 24pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Microsoft Video Shows Why TCM 2.0 and Other Windows 11 Requirements are So Important<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/thundercloud.net\/infoave\/images\/2021\/tpm20.png\" alt=\"Cloudeight InfoAve Windows 11 requirements video\" width=\"575\" height=\"323\" \/><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">There are several ways to bypass the stringent Windows 11 hardware requirements, but Microsoft wants to show you why you shouldn&#8217;t.\u00a0 Microsoft recently created a video to show how Windows 11\u2019s new security measures, including TPM 2.0 (Trusted Platform Module), VBS (Virtualization-Based Security), and Secure Boot, help protect Windows 11 devices from hackers.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">So, if you&#8217;ve wondered why Microsoft is adamant about these Windows 11 hardware requirements, watch this video. <em>You&#8217;ll even learn how to fool a fingerprint scanner using a gummy bear&#8230;<\/em><\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Windows 11 Security \u2014 Our Hacker-in-Chief Runs Attacks and Shows Solutions\" width=\"665\" height=\"374\" src=\"https:\/\/www.youtube.com\/embed\/tg9QUrnVFho?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Microsoft Video Shows Why TCM 2.0 and Other Windows 11 Requirements are So Important There are several ways to bypass the stringent Windows 11 hardware requirements, but Microsoft wants to show you why you shouldn&#8217;t.\u00a0 Microsoft recently created a video to show how Windows 11\u2019s new security measures, including TPM 2.0 (Trusted Platform Module), VBS (Virtualization-Based\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-video-shows-why-tcm-2-0-and-other-windows-11-requirements-are-so-important\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":22147,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4221],"tags":[4290],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/22282"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=22282"}],"version-history":[{"count":4,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/22282\/revisions"}],"predecessor-version":[{"id":22296,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/22282\/revisions\/22296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/22147"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=22282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=22282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=22282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}