Toshiba Portege M400 PPM40C-TD30TEF Users Manual Canada; English - Page 127
Security, Bluetooth wireless technology
View all Toshiba Portege M400 PPM40C-TD30TEF manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 127 highlights
Operating Basics ■ The values shown above are the theoretical maximums for Wireless LAN standards. The actual values may differ. ■ The transmission speed over the wireless LAN, and the distance over which the wireless LAN can reach, may vary depending on surrounding electromagnetic environment, obstacles, access point design and configuration, client design and software/hardware configurations. The transmission rate described is the theoretical maximum speed as specified under the appropriate standard - the actual transmission speed will be lower than the theoretical maximum speed. Security ■ TOSHIBA strongly recommend that you enable WEP (encryption) functionality, otherwise your computer will be open to illegal access by an outsider using a wireless connection. If this occurs, the outsider may illegally access your system, eavesdrop, or cause the loss or destruction of stored data. ■ TOSHIBA is not liable for the loss of data due to eavesdropping or illegal access through the wireless LAN and the damage thereof. Bluetooth wireless technology Bluetooth™ wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones. You cannot use the built-in Bluetooth functions and an optional Bluetooth SD card 3 simultaneously. Bluetooth wireless technology has the following features: Worldwide operation The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band, which is license-free and compatible with radio systems in most countries in the world. Radio links You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight. Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. User's Manual 4-45