HP 14-r100 Ubuntu - Page 46

Securing your wireless network, Backing up your software applications and information

Page 46 highlights

To install Gufw: 1. Click on the Ubuntu Software Center folder located in the Launcher on the left side of the desktop. 2. Enter Gufw in the search bar and press enter. 3. Double-click the Firewall Configuration icon, and then click the Install button. 4. Follow the on-screen instructions. To view or modify firewall settings after installing Gufw: 1. Select Ubuntu Software Center from the Launcher on the left side of the desktop, and then click Gufw. NOTE: When accessing Gufw, you are prompted for the root password. 2. Follow the on-screen instructions. NOTE: Under some circumstances a firewall can block access to Internet games, interfere with printer or file sharing on a network, or block authorized email attachments. To temporarily resolve the problem, disable the firewall, perform the task that you want to perform, and then reenable the firewall immediately. To permanently resolve the problem, you must reconfigure the firewall. Securing your wireless network When you set up your wireless network, always enable security features. For more information, see Protecting your WLAN on page 6. Backing up your software applications and information Regularly back up your software applications and information to protect them from being permanently lost or damaged through a virus attack or a software or hardware failure. For more information, see Backing up, restoring, and recovering on page 43. Using an optional security cable lock A security cable lock, which is purchased separately, is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. Security cable locks are only one of several methods that should be employed as part of a complete security solution to help maximize theft protection. The security cable slot on your computer may look slightly different from the illustration in this section. 1. Loop the security cable lock around a secured object. 2. Insert the key (1) into the security cable lock (2). 38 Chapter 8 Securing your computer and information

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61

To install Gufw:
1.
Click on the
Ubuntu Software Center
folder located in the
Launcher
on the left side of the
desktop.
2.
Enter
Gufw
in the search bar and press
enter
.
3.
Double-click the
Firewall Configuration
icon, and then click the
Install
button.
4.
Follow the on-screen instructions.
To view or modify firewall settings after installing Gufw:
1.
Select
Ubuntu Software Center
from the
Launcher
on the left side of the desktop, and then click
Gufw
.
NOTE:
When accessing Gufw, you are prompted for the root password.
2.
Follow the on-screen instructions.
NOTE:
Under some circumstances a firewall can block access to Internet games, interfere with
printer or file sharing on a network, or block authorized email attachments. To temporarily resolve the
problem, disable the firewall, perform the task that you want to perform, and then reenable the firewall
immediately. To permanently resolve the problem, you must reconfigure the firewall.
Securing your wireless network
When you set up your wireless network, always enable security features. For more information, see
Protecting your WLAN
on page
6
.
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently
lost or damaged through a virus attack or a software or hardware failure. For more information, see
Backing up, restoring, and recovering
on page
43
.
Using an optional security cable lock
A security cable lock, which is purchased separately, is designed to act as a deterrent, but it may not
prevent the computer from being mishandled or stolen. Security cable locks are only one of several
methods that should be employed as part of a complete security solution to help maximize theft
protection.
The security cable slot on your computer may look slightly different from the illustration in this section.
1.
Loop the security cable lock around a secured object.
2.
Insert the key
(1)
into the security cable lock
(2)
.
38
Chapter 8
Securing your computer and information