Once the encrypted volume 243 is copied to the unknown computing device 250, and once the boot code 241 obtains the decryption key 245 from the TPM 150, the boot code can decrypt the encrypted volume, thereby enabling the software applications, operating systems or other components that are stored on the formerly encrypted volume 243 to be executed on the unknown computing device 250.