HP Pavilion m6-1000 User Guide - Page 78

Securing your wireless network, Backing up your software applications and information, Using an

Page 78 highlights

If you have installed third-party software after you purchased your computer, regularly update the software. Software companies provide software updates to their products to correct security problems and improve functionality of the software. Securing your wireless network When you set up your wireless network, always enable security features. For more information, see Protecting your WLAN on page 20. Backing up your software applications and information Regularly back up your software applications and information to protect them from being permanently lost or damaged through a virus attack or a software or hardware failure. For more information, see Backing up, restoring, and recovering on page 72. Using an optional security cable lock A security cable lock, which is purchased separately, is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. Security cable locks are only one of several methods that should be employed as part of a complete security solution to help maximize theft protection. The security cable slot on your computer may look slightly different from the illustration in this section. For the location of the security cable slot on your computer, see Getting to know your computer on page 4. 1. Loop the security cable lock around a secured object. 2. Insert the key (1) into the security cable lock (2). 3. Insert the security cable lock into the security cable slot on the computer (3), and then lock the security cable lock with the key. 4. Remove the key and keep it in a safe place. 68 Chapter 9 Securing your computer and information

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101

If you have installed third-party software after you purchased your computer, regularly update the
software. Software companies provide software updates to their products to correct security problems
and improve functionality of the software.
Securing your wireless network
When you set up your wireless network, always enable security features. For more information, see
Protecting your WLAN
on page
20
.
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently
lost or damaged through a virus attack or a software or hardware failure. For more information, see
Backing up, restoring, and recovering
on page
72
.
Using an optional security cable lock
A security cable lock, which is purchased separately, is designed to act as a deterrent, but it may not
prevent the computer from being mishandled or stolen. Security cable locks are only one of several
methods that should be employed as part of a complete security solution to help maximize theft
protection.
The security cable slot on your computer may look slightly different from the illustration in this section.
For the location of the security cable slot on your computer, see
Getting to know your computer
on page
4
.
1.
Loop the security cable lock around a secured object.
2.
Insert the key
(1)
into the security cable lock
(2)
.
3.
Insert the security cable lock into the security cable slot on the computer
(3)
, and then lock the
security cable lock with the key.
4.
Remove the key and keep it in a safe place.
68
Chapter 9
Securing your computer and information