HP 6720s HP Notebook PC - Getting Started - Vista - Enhanced for Accessibility - Page 26

Protecting the computer from power surges, Using the computer safely - power supply

Page 26 highlights

To optimize the computer's privacy protection features, follow these guidelines: ● Keep the operating system and software updated. Many software updates contain security enhancements. ● Use a firewall. Firewall software monitors incoming traffic on the computer to block messages that do not meet specific security criteria. Some firewalls also monitor outgoing traffic. Protecting the computer from power surges To protect the computer from the power surges that may be caused by an uncertain power supply or an electrical storm, observe these practices: ● Plug the computer power cord into an optional, high-quality surge protector. Surge protectors are available from most computer or electronics retailers. ● During an electrical storm, either run the computer on battery power or shut down the computer and unplug the power cord. ● If applicable to your location, provide surge protection on the modem cable that connects the modem to a telephone line. Telephone line surge protectors are commonly available from computer or electronics retailers in many regions. Using the computer safely WARNING! To reduce the risk of electric shock or damage to your equipment, observe these practices: Plug the power cord into an AC outlet that is easily accessible at all times. Disconnect power from the computer by unplugging the power cord from the AC outlet (not by unplugging the power cord from the computer). If provided with a 3-pin attachment plug on your power cord, plug the cord into a grounded (earthed) 3-pin outlet. Do not disable the power cord grounding pin, for example, by attaching a 2-pin adapter. The grounding pin is an important safety feature. 20 Chapter 4 Next steps

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56

To optimize the computer’s privacy protection features, follow these
guidelines:
Keep the operating system and software updated. Many software
updates contain security enhancements.
Use a firewall. Firewall software monitors incoming traffic on the
computer to block messages that do not meet specific security criteria.
Some firewalls also monitor outgoing traffic.
Protecting the computer from power surges
To protect the computer from the power surges that may be caused by an
uncertain power supply or an electrical storm, observe these practices:
Plug the computer power cord into an optional, high-quality surge
protector. Surge protectors are available from most computer or
electronics retailers.
During an electrical storm, either run the computer on battery power
or shut down the computer and unplug the power cord.
If applicable to your location, provide surge protection on the modem
cable that connects the modem to a telephone line. Telephone line
surge protectors are commonly available from computer or electronics
retailers in many regions.
Using the computer safely
WARNING!
To reduce the risk of electric shock or damage to your
equipment, observe these practices:
Plug the power cord into an AC outlet that is easily accessible at all times.
Disconnect power from the computer by unplugging the power cord from
the AC outlet (not by unplugging the power cord from the computer).
If provided with a 3-pin attachment plug on your power cord, plug the cord
into a grounded (earthed) 3-pin outlet. Do not disable the power cord
grounding pin, for example, by attaching a 2-pin adapter. The grounding
pin is an important safety feature.
20
Chapter 4
Next steps