Gateway MT3422 User Guide - Page 50

Hardware security, Kensington lock slot, CompuTrace

Page 50 highlights

CHAPTER 5: Protecting your notebook www.gateway.com Hardware security You probably purchased your notebook so you can take it with you. Because it's light-weight and compact, it's easy to carry. But these features also make it easy for someone else to steal. You may be able to replace your notebook with a call to your insurance agent, but you cannot replace the information stored on your notebook. Kensington lock slot The first step in notebook security is preventing your notebook from being stolen. Attach a cable lock to the Kensington lock slot on your notebook, then wrap the cable lock to a solid object like a desk or table. You can buy a cable lock at most electronics stores and many department stores. For the location of the Kensington lock slot, see your reference guide. CompuTrace Tips & Tricks Use Computrace Complete's online help to get the program up and running. If your notebook does not already have Computrace Complete installed, contact Gateway at www.gateway.com/business to purchase the service. If someone steals your notebook, you may be able to get it back by using tracking software. Your notebook may be enabled to take advantage of Computrace® Complete, a service you can purchase to help find your notebook if it is stolen. This program automatically reports the location of your notebook once a day while it is connected to the Internet. If your notebook is stolen, the frequency increases to every fifteen minutes. A recovery team can give local law enforcement agencies tracking information and documentation to get subpoenas and search warrants to recover your notebook. 44

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132

CHAPTER 5: Protecting your notebook
www.gateway.com
44
Hardware security
You probably purchased your notebook so you can take it with you. Because
it’s light-weight and compact, it’s easy to carry. But these features also make it
easy for someone else to steal. You may be able to replace your notebook with
a call to your insurance agent, but you cannot replace the information stored
on your notebook.
Kensington lock slot
The first step in notebook security is preventing your notebook from being
stolen.
Attach a cable lock to the Kensington lock slot on your notebook, then wrap
the cable lock to a solid object like a desk or table. You can buy a cable lock at
most electronics stores and many department stores.
For the location of the Kensington lock slot, see your reference guide.
CompuTrace
Tips & Tricks
Use Computrace Complete’s online help
to get the program up and running. If
your notebook does not already have
Computrace Complete installed, contact
Gateway at
www.gateway.com/business
to purchase the service.
If someone steals your notebook, you may be able to get it back by using
tracking software.
Your notebook may be enabled to take advantage of Computrace® Complete,
a service you can purchase to help find your notebook if it is stolen. This program
automatically reports the location of your notebook once a day while it is
connected to the Internet. If your notebook is stolen, the frequency increases
to every fifteen minutes. A recovery team can give local law enforcement
agencies tracking information and documentation to get subpoenas and search
warrants to recover your notebook.