Lenovo ThinkPad L520 (English) User Guide - Page 165

Function, Selection, Comments, Enabled, I/O Port Access, Memory Card Slot

Page 165 highlights

Table 5. Security menu items (continued) Function Selection Execution Prevention • Enabled • Disabled I/O Port Access Ethernet LAN Wireless LAN WiMAX Wireless WAN Bluetooth USB Port ExpressCard Slot Optical Device Memory Card Slot eSATA Port Integrated Camera Microphone Fingerprint Reader • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled • Enabled • Disabled Comments Some computer viruses and worms cause memory buffers to overflow by running code where only data is allowed. If the Data Execution Prevention feature can be used with your operating system, then by selecting "Enabled" you can protect your computer against attacks by such viruses and worms. If after choosing "Enabled" you find that an application program does not run correctly, select "Disabled" and reset the setting. If you select "Enabled," you can use the Ethernet LAN device. Note: If your computer supports Intel AMT and Intel AMT's function is enabled, you cannot change the Ethernet LAN setting to "Disable.," If you select "Enabled," you can use the Wireless LAN device. If you select "Enabled," you can use the WiMAX device. If you select "Enabled," you can use the Wireless WAN device. If you select "Enabled," you can use the Bluetooth device. If you select "Enabled," you can use the USB port. If you select "Enabled," you can use the ExpressCard Slot. If you select "Enabled," you can use the optical device. If you select "Enabled," you can use the Memory Card slot. If you select "Enabled," you can use the eSATA port. If you select "Enabled," you can use the Integrated Camera. If you select "Enabled," you can use the Microphone (Internal/External/Line-In). If you select "Enabled," you can use the Fingerprint Reader. Chapter 8. Advanced configuration 147

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225

Table 5. Security menu items (continued)
Function
Selection
Comments
Execution Prevention
Enabled
Disabled
Some computer viruses and worms cause memory
buffers to overflow by running code where only data
is allowed. If the Data Execution Prevention feature
can be used with your operating system, then by
selecting “Enabled” you can protect your computer
against attacks by such viruses and worms. If after
choosing “Enabled” you find that an application
program does not run correctly, select “Disabled”
and reset the setting.
I/O Port Access
Ethernet LAN
Enabled
Disabled
If you select “Enabled,” you can use the Ethernet
LAN device.
Note:
If your computer supports Intel AMT and Intel
AMT's function is enabled, you cannot change the
Ethernet LAN setting to “Disable.,”
Wireless LAN
Enabled
Disabled
If you select “Enabled,” you can use the Wireless
LAN device.
WiMAX
Enabled
Disabled
If you select “Enabled,” you can use the WiMAX
device.
Wireless WAN
Enabled
Disabled
If you select “Enabled,” you can use the Wireless
WAN device.
Bluetooth
Enabled
Disabled
If you select “Enabled,” you can use the
Bluetooth
device.
USB Port
Enabled
Disabled
If you select “Enabled,” you can use the USB port.
ExpressCard Slot
Enabled
Disabled
If you select “Enabled,” you can use the ExpressCard
Slot.
Optical Device
Enabled
Disabled
If you select “Enabled,” you can use the optical
device.
Memory Card Slot
Enabled
Disabled
If you select “Enabled,” you can use the Memory
Card slot.
eSATA Port
Enabled
Disabled
If you select “Enabled,” you can use the eSATA port.
Integrated Camera
Enabled
Disabled
If you select “Enabled,” you can use the Integrated
Camera.
Microphone
Enabled
Disabled
If you select “Enabled,” you can use the Microphone
(Internal/External/Line-In).
Fingerprint Reader
Enabled
Disabled
If you select “Enabled,” you can use the Fingerprint
Reader.
Chapter 8
.
Advanced configuration
147