The TPM security hardware on this computer has been successfully initialized. Applications that take advantage of the TPM ...