In three pages this paper discusses hardware issues in this consideration of systems security. Three sources are cited in the bibliography.