HP 15-r022nr User Guide - Ubuntu - Page 47

and then lock the, security cable lock with the key.

Page 47 highlights

methods that should be employed as part of a complete security solution to help maximize theft protection. The security cable slot on your computer may look slightly different from the illustration in this section. 1. Loop the security cable lock around a secured object. 2. Insert the key (1) into the security cable lock (2). 3. Insert the security cable lock into the security cable slot on the computer (3), and then lock the security cable lock with the key. 4. Remove the key and keep it in a safe place. Using an optional security cable lock 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60

methods that should be employed as part of a complete security solution to help maximize theft
protection.
The security cable slot on your computer may look slightly different from the illustration in this section.
1.
Loop the security cable lock around a secured object.
2.
Insert the key
(1)
into the security cable lock
(2)
.
3.
Insert the security cable lock into the security cable slot on the computer
(3)
, and then lock the
security cable lock with the key.
4.
Remove the key and keep it in a safe place.
Using an optional security cable lock
39