Acer Extensa 4100 User Manual - Page 63

Securing your computer, Using a computer security lock, Using passwords

Page 63 highlights

English 53 Special considerations Follow the same special considerations as when traveling with the computer. In addition, these tips are useful when traveling internationally: • When traveling in another country, check that the local AC voltage and the AC adaptor power cord specifications are compatible. If not, purchase a power cord that is compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. • If you are using the modem, check if the modem and connector is compatible with the telecommunications system of the country you are traveling in. Securing your computer Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Security features include hardware and software locks - a security notch and passwords. Using a computer security lock A security keylock notch, located on the rear of the computer, lets you connect a Kensington-compatible computer security lock. Wrap a computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data: • Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See "BIOS utility" on page 59. • User Password secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation for maximum security.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91

53
English
Special considerations
Follow the same special considerations as when traveling with the computer. In
addition, these tips are useful when traveling internationally:
When traveling in another country, check that the local AC voltage and the
AC adaptor power cord specifications are compatible. If not, purchase a
power cord that is compatible with the local AC voltage. Do not use
converter kits sold for appliances to power the computer.
If you are using the modem, check if the modem and connector is
compatible with the telecommunications system of the country you are
traveling in.
Securing your computer
Your computer is a valuable investment that you need to take care of. Learn
how to protect and take care of your computer.
Security features include hardware and software locks — a security notch
and passwords.
Using a computer security lock
A security keylock notch, located on the rear of the computer, lets you connect
a Kensington-compatible computer security lock.
Wrap a computer security lock cable around an immovable object such as a
table or handle of a locked drawer. Insert the lock into the notch and turn the
key to secure the lock. Some keyless models are also available.
Using passwords
Passwords protect your computer from unauthorized access. Setting these
passwords creates several different levels of protection for your computer
and data:
Supervisor Password prevents unauthorized entry into the BIOS utility.
Once set, you must enter this password to gain access to the BIOS utility.
See
"BIOS utility" on page 59
.
User Password secures your computer against unauthorized use. Combine
the use of this password with password checkpoints on boot-up and
resume from Hibernation for maximum security.