Compaq Presario R4000 Hardware-Software Guide - Page 151

To Protect Against, Use This Security Feature, Hardware and Software Guide, Security - bios update

Page 151 highlights

Security To Protect Against Use This Security Feature Unauthorized use of the notebook ■ QuickLock ■ Power-on password* Unauthorized access to the Setup utility (f10) Compaq administrator password* Unauthorized access to the contents DriveLock* of a hard drive Unauthorized startup from a CD, DVD, or diskette Device Security* Unauthorized access to data ■ Compaq administrator password* ■ Windows security updates ■ Firewall software Unauthorized access to the BIOS settings and other system identification information Compaq administrator password* Computer viruses Norton AntiVirus software Unauthorized removal of the notebook Security cable slot (used with an optional security cable) For more information about the security cable slot, refer to "Optional Security Cable," later in this chapter. *This security feature is configured in the Setup utility. The Setup utility is a non-Windows utility accessed by pressing f10 when the notebook is turned on or restarted. The procedures for using the Setup utility to set specific security preferences are provided in this chapter. For information about displaying system information and using other Setup utility features, refer to Chapter 13, "Setup Utility." 12-2 Hardware and Software Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223

12–2
Hardware and Software Guide
Security
To Protect Against
Use This Security Feature
Unauthorized use of the notebook
QuickLock
Power-on password*
Unauthorized access to the Setup
utility
(f10)
Compaq administrator password*
Unauthorized access to the contents
of a hard drive
DriveLock*
Unauthorized startup from a CD,
DVD, or diskette
Device Security*
Unauthorized access to data
Compaq administrator password*
Windows security updates
Firewall software
Unauthorized access to the
BIOS settings and other system
identification information
Compaq administrator password*
Computer viruses
Norton AntiVirus software
Unauthorized removal of the
notebook
Security cable slot (used with an
optional security cable)
For more information about the
security cable slot, refer to
“Optional
Security Cable,”
later in this chapter.
*This security feature is configured in the Setup utility. The Setup utility is a
non-Windows utility accessed by pressing
f10
when the notebook is turned on
or restarted. The procedures for using the Setup utility to set specific security
preferences are provided in this chapter. For information about displaying
system information and using other Setup utility features, refer to
Chapter 13,
“Setup Utility.”