A library and example programs for the TCPA chip, as described in IBM Global Security Analysis Lab's article "Take Control of TCPA" in the August 2003 issue of Linux Journal. For this to be useful, you need a computer with a TCPA chip.