HP 15-g085nr User Guide - Ubuntu - Page 43
Securing your computer and information, Protecting the computer, Using passwords
View all HP 15-g085nr manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 43 highlights
8 Securing your computer and information Protecting the computer NOTE: Security solutions are designed to act as deterrents, but they may not deter software attacks or prevent the computer from being mishandled or stolen. Security features provided with your computer can protect the computer, personal information, and data from a variety of risks. The way you use your computer will determine which security features you need to use. The operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in Setup Utility. To protect against Use this security feature Unauthorized use of the computer Power-on authentication using passwords Unauthorized access to Setup Utility (f10) Unauthorized access to data Administrator password in Setup Utility* ● Firewall software (not installed in the Ubuntu operating system by default) ● Operating system updates Unauthorized access to Setup Utility settings and other system identification information Administrator password in Setup Utility* Unauthorized removal of the computer Security cable slot (used with an optional security cable) *Setup Utility is a utility accessed by pressing f10 when the computer is turned on or restarted. When using Setup Utility, you must use the keys on your computer to navigate and make selections. Using passwords A password is a group of characters that you choose to secure your computer information. Several types of passwords can be set, depending on how you want to control access to your information. Passwords can be set in the operating system or in Setup Utility, which is preinstalled on the computer. NOTE: To reduce the risk of being locked out of the computer, record each password and store it in a secure place. Protecting the computer 35