HP Mini 5103 HP Mini User Gudie - Windows XP, Windows Vista, Windows 7 - Page 61

Security, Protecting the computer - keyboard

Page 61 highlights

5 Security Protecting the computer NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. NOTE: In some countries or regions, the computer supports CompuTrace, which is an online-securitybased tracking and recovery service. If the computer is stolen, CompuTrace can track the computer if the unauthorized user accesses the Internet. You must purchase the software and subscribe to the service in order to use CompuTrace. For information about ordering the CompuTrace software, see the HP Web site at http://www.hpshopping.com. Security features provided with your computer can protect the computer, personal information, and data from a variety of risks. The way you use your computer will determine which security features you need to use. The Windows operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in the Computer Setup utility. To protect against Use this security feature Unauthorized use of the computer Power-on authentication using passwords or smart cards Unauthorized access to Computer Setup (f10) BIOS administrator password in Computer Setup* Unauthorized access to the contents of a hard drive DriveLock password in Computer Setup* Unauthorized startup from an optical drive, diskette drive, or internal network adapter Unauthorized access to data Boot options feature in Computer Setup* ● Firewall software ● Windows updates Unauthorized access to Computer Setup settings and other BIOS administrator password in Computer Setup* system identification information Unauthorized removal of the computer Security cable slot (used with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be used even when the operating system is not working or will not load. You can use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to navigate and make selections in Computer Setup. Protecting the computer 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130

5
Security
Protecting the computer
NOTE:
Security solutions are designed to act as deterrents. These deterrents may not prevent a
product from being mishandled or stolen.
NOTE:
In some countries or regions, the computer supports CompuTrace, which is an online-security-
based tracking and recovery service. If the computer is stolen, CompuTrace can track the computer if
the unauthorized user accesses the Internet. You must purchase the software and subscribe to the
service in order to use CompuTrace. For information about ordering the CompuTrace software, see the
HP Web site at
.
Security features provided with your computer can protect the computer, personal information, and data
from a variety of risks. The way you use your computer will determine which security features you need
to use.
The Windows operating system offers certain security features. Additional security features are listed
in the following table. Most of these additional security features can be configured in the Computer Setup
utility.
To protect against
Use this security feature
Unauthorized use of the computer
Power-on authentication using passwords or smart cards
Unauthorized access to Computer Setup (
f10
)
BIOS administrator password in Computer Setup*
Unauthorized access to the contents of a hard drive
DriveLock password in Computer Setup*
Unauthorized startup from an optical drive, diskette drive, or
internal network adapter
Boot options feature in Computer Setup*
Unauthorized access to data
Firewall software
Windows updates
Unauthorized access to Computer Setup settings and other
system identification information
BIOS administrator password in Computer Setup*
Unauthorized removal of the computer
Security cable slot (used with an optional security cable)
*Computer Setup is a preinstalled, ROM-based utility that can be used even when the operating system is not working or will
not load. You can use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to navigate and make
selections in Computer Setup.
Protecting the computer
51