HP Mini 210-3040ca HP Mini 110 and Compaq Mini CQ10 User Guide Linux - Page 59

Security, Protecting the computer

Page 59 highlights

10 Security The following sections are included in this chapter: ● Protecting the computer ● Using passwords ● Using firewall software ● Installing an optional security cable Protecting the computer NOTE: Security solutions are designed to act as deterrents, but they may not deter software attacks or prevent the computer from being mishandled or stolen. Security features provided with your computer can protect the computer, personal information, and data from a variety of risks. The way you use your computer will determine which security features you need to use. The operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in Setup Utility. To protect against Use this security feature Unauthorized use of the computer Power-on authentication using passwords Unauthorized access to Setup Utility (f10) Administrator password in Setup Utility* Unauthorized access to the contents of a hard drive DriveLock password in Setup Utility* Unauthorized reset of Setup Utility (f10) passwords Stringent security feature in Setup Utility* Unauthorized startup from an optical drive, diskette drive, or internal network adapter Unauthorized access to data Boot options feature in Setup Utility* ● Firewall software ● Operating system updates Unauthorized access to Setup Utility settings and other system identification information Administrator password in Setup Utility* Unauthorized removal of the computer Security cable slot (used with an optional security cable) *Setup Utility is a utility accessed by pressing f10 when the computer is turned on or restarted. When using Setup Utility, you must use the keys on your computer to navigate and make selections. Protecting the computer 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89

10
Security
The following sections are included in this chapter:
Protecting the computer
Using passwords
Using firewall software
Installing an optional security cable
Protecting the computer
NOTE:
Security solutions are designed to act as deterrents, but they may not deter software attacks
or prevent the computer from being mishandled or stolen.
Security features provided with your computer can protect the computer, personal information, and
data from a variety of risks. The way you use your computer will determine which security features
you need to use.
The operating system offers certain security features. Additional security features are listed in the
following table. Most of these additional security features can be configured in Setup Utility.
To protect against
Use this security feature
Unauthorized use of the computer
Power-on authentication using passwords
Unauthorized access to Setup Utility (
f10
)
Administrator password in Setup Utility*
Unauthorized access to the contents of a hard drive
DriveLock password in Setup Utility*
Unauthorized reset of Setup Utility (
f10
) passwords
Stringent security feature in Setup Utility*
Unauthorized startup from an optical drive, diskette drive, or
internal network adapter
Boot options feature in Setup Utility*
Unauthorized access to data
Firewall software
Operating system updates
Unauthorized access to Setup Utility settings and other
system identification information
Administrator password in Setup Utility*
Unauthorized removal of the computer
Security cable slot (used with an optional security cable)
*Setup Utility is a utility accessed by pressing
f10
when the computer is turned on or restarted. When using Setup Utility, you
must use the keys on your computer to navigate and make selections.
Protecting the computer
49