HP Pavilion dv3-4100 User Guide - Windows 7 - Page 104

Installing an optional security cable, Using the fingerprint reader (select models only

Page 104 highlights

Installing an optional security cable NOTE: A security cable is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. 1. Loop the security cable around a secured object. 2. Insert the key (1) into the cable lock (2). 3. Insert the cable lock into the security cable slot on the computer (3), and then lock the cable lock with the key. Using the fingerprint reader (select models only) NOTE: The location of the fingerprint reader varies by computer model. 94 Chapter 10 Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Installing an optional security cable
NOTE:
A security cable is designed to act as a deterrent, but it may not prevent the computer from
being mishandled or stolen.
1.
Loop the security cable around a secured object.
2.
Insert the key
(1)
into the cable lock
(2)
.
3.
Insert the cable lock into the security cable slot on the computer
(3)
, and then lock the cable lock
with the key.
Using the fingerprint reader (select models only)
NOTE:
The location of the fingerprint reader varies by computer model.
94
Chapter 10
Security