eMachines T6528 NG3 Hardware Reference - Page 127

Hardware security, Kensington lock slot, Data security, About startup and hard drive passwords - bios

Page 127 highlights

CHAPTER 10: Protecting Your Computer www.emachines.com Hardware security Although you may be able to replace your computer with a call to your insurance agent, you cannot replace the information stored on your computer. Take steps to prevent theft of your computer. Kensington lock slot Data security The first step in computer security is preventing your computer from being stolen. Attach a cable lock to the Kensington lock slot on the back of your computer, then wrap the cable lock to a solid object like a desk or table. You can buy a cable lock at most electronics stores and many department stores. For the location of the Kensington lock slot, see your hardware reference. The second step in computer security is keeping your data safe and secure. About startup and hard drive passwords Tips & Tricks Make sure that you use a password you can remember. The password feature is very secure, and you cannot bypass it. If you forget your password, you will have to return your computer to eMachines so we can reset it. Use a startup and hard drive password to keep other people from using your computer. You have to enter your password when you turn on your computer or access your files. These passwords are set in your computer's BIOS Setup utility. Use a password that you can remember but that would be hard for someone else to guess. About Windows XP user accounts Windows lets you set up a user account for each person who uses your computer. When you set up user accounts, Windows sets up a My Documents folder for each account. You can assign a password to each account so only the account owner can access files in the My Documents folder. 120

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

CHAPTER 10: Protecting Your Computer
www.emachines.com
120
Hardware security
Although you may be able to replace your computer with a call to your
insurance agent, you cannot replace the information stored on your computer.
Take steps to prevent theft of your computer.
Kensington lock slot
The first step in computer security is preventing your computer from being
stolen.
Attach a cable lock to the Kensington lock slot on the back of your computer,
then wrap the cable lock to a solid object like a desk or table. You can buy a
cable lock at most electronics stores and many department stores.
For the location of the Kensington lock slot, see your hardware reference.
Data security
The second step in computer security is keeping your data safe and secure.
About startup and hard drive passwords
Tips & Tricks
Make sure that you use a password you
can remember. The password feature is
very secure, and you cannot bypass it. If
you forget your password, you will have
to return your computer to eMachines so
we can reset it.
Use a startup and hard drive password to keep other people from using your
computer. You have to enter your password when you turn on your computer
or access your files.
These passwords are set in your computer’s BIOS Setup utility. Use a password
that you can remember but that would be hard for someone else to guess.
About Windows XP user accounts
Windows lets you set up a user account for each person who uses your
computer. When you set up user accounts, Windows sets up a My Documents
folder for each account. You can assign a password to each account so only the
account owner can access files in the My Documents folder.