Toshiba Portege M400 PPM40C-TD30TEF Users Manual Canada; English - Page 127

Security, Bluetooth wireless technology

Page 127 highlights

Operating Basics ■ The values shown above are the theoretical maximums for Wireless LAN standards. The actual values may differ. ■ The transmission speed over the wireless LAN, and the distance over which the wireless LAN can reach, may vary depending on surrounding electromagnetic environment, obstacles, access point design and configuration, client design and software/hardware configurations. The transmission rate described is the theoretical maximum speed as specified under the appropriate standard - the actual transmission speed will be lower than the theoretical maximum speed. Security ■ TOSHIBA strongly recommend that you enable WEP (encryption) functionality, otherwise your computer will be open to illegal access by an outsider using a wireless connection. If this occurs, the outsider may illegally access your system, eavesdrop, or cause the loss or destruction of stored data. ■ TOSHIBA is not liable for the loss of data due to eavesdropping or illegal access through the wireless LAN and the damage thereof. Bluetooth wireless technology Bluetooth™ wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones. You cannot use the built-in Bluetooth functions and an optional Bluetooth SD card 3 simultaneously. Bluetooth wireless technology has the following features: Worldwide operation The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band, which is license-free and compatible with radio systems in most countries in the world. Radio links You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight. Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. User's Manual 4-45

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306

User’s Manual
4-45
Operating Basics
Security
TOSHIBA strongly recommend that you enable WEP (encryption)
functionality, otherwise your computer will be open to illegal access by
an outsider using a wireless connection. If this occurs, the outsider may
illegally access your system, eavesdrop, or cause the loss or
destruction of stored data.
TOSHIBA is not liable for the loss of data due to eavesdropping or
illegal access through the wireless LAN and the damage thereof.
Bluetooth wireless technology
Bluetooth™ wireless technology eliminates the need for cables between
electronic devices such as desktop computers, printers and mobile phones.
You cannot use the built-in Bluetooth functions and an optional Bluetooth
SD card 3 simultaneously.
Bluetooth wireless technology has the following features:
Worldwide operation
The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band,
which is license-free and compatible with radio systems in most countries
in the world.
Radio links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.
The values shown above are the theoretical maximums for Wireless
LAN standards. The actual values may differ.
The transmission speed over the wireless LAN, and the distance over
which the wireless LAN can reach, may vary depending on surrounding
electromagnetic environment, obstacles, access point design and
configuration, client design and software/hardware configurations. The
transmission rate described is the theoretical maximum speed as
specified under the appropriate standard - the actual transmission
speed will be lower than the theoretical maximum speed.