HP ProBook 4545s HP Notebook User Guide - Linux - Page 74

Installing an optional security cable, Computer, Security and Users, Firewall

Page 74 highlights

There are two types of firewalls to consider: ● Host-based firewalls-Software that protects only the computer it is installed on. ● Network-based firewalls-Installed between your DSL or cable modem and your home network to protect all the computers on the network. When a firewall is installed on a system, all data sent to and from the system is monitored and compared with a set of user-defined security criteria. Any data that does not meet those criteria is blocked. Your computer or networking equipment may already have a firewall installed. If not, firewall software solutions are available. NOTE: Under some circumstances a firewall can block access to Internet games, interfere with printer or file sharing on a network, or block authorized e-mail attachments. To temporarily resolve the problem, disable the firewall, perform the task that you want to perform, and then reenable the firewall. To permanently resolve the problem, reconfigure the firewall. 1. To view or modify the firewall settings, select Computer > YaST. NOTE: When accessing YaST, you are prompted for the root password. 2. In the left pane, click Security and Users, and then click Firewall in the right pane. NOTE: When modifying firewall settings, you are prompted for the root password. Installing an optional security cable NOTE: A security cable is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. NOTE: The security cable slot on your computer may look different from the illustration in this section. Refer to Getting to know your computer on page 3 for the location of the security cable slot on your computer. 1. Loop the security cable around a secured object. 2. Insert the key (1) into the cable lock (2). 64 Chapter 10 Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

There are two types of firewalls to consider:
Host-based firewalls—Software that protects only the computer it is installed on.
Network-based firewalls—Installed between your DSL or cable modem and your home network
to protect all the computers on the network.
When a firewall is installed on a system, all data sent to and from the system is monitored and
compared with a set of user-defined security criteria. Any data that does not meet those criteria is
blocked.
Your computer or networking equipment may already have a firewall installed. If not, firewall software
solutions are available.
NOTE:
Under some circumstances a firewall can block access to Internet games, interfere with
printer or file sharing on a network, or block authorized e-mail attachments. To temporarily resolve the
problem, disable the firewall, perform the task that you want to perform, and then reenable the
firewall. To permanently resolve the problem, reconfigure the firewall.
1.
To view or modify the firewall settings, select
Computer
>
YaST
.
NOTE:
When accessing YaST, you are prompted for the root password.
2.
In the left pane, click
Security and Users
, and then click
Firewall
in the right pane.
NOTE:
When modifying firewall settings, you are prompted for the root password.
Installing an optional security cable
NOTE:
A security cable is designed to act as a deterrent, but it may not prevent the computer from
being mishandled or stolen.
NOTE:
The security cable slot on your computer may look different from the illustration in this
section. Refer to
Getting to know your computer
on page
3
for the location of the security cable slot
on your computer.
1.
Loop the security cable around a secured object.
2.
Insert the key
(1)
into the cable lock
(2)
.
64
Chapter 10
Security