A Practical Guide to Trusted Computing