Hardware vulnerabilities What are hardware vulnerabilities? Is it absolutely necessary to attempt to correct them? If so, are there affordable solutions?