Toshiba Qosmio G40 PQG40C-MM108C Users Manual Canada; English - Page 114

Security, Bluetooth wireless technology, Bluetooth, Stack for Windows, by TOSHIBA, Worldwide operation

Page 114 highlights

Operating Basics 3. Click Set up a connection or network. 4. Follow the wizard. You will need the name of the wireless network together with security settings. Consult the documentation accompanied with your router or ask your wireless network administrator for the settings. Security ■ TOSHIBA strongly recommend that you enable encryption functionality, otherwise your computer will be open to illegal access by an outsider using a wireless connection. If this occurs, the outsider may illegally access your system, eavesdrop, or cause the loss or destruction of stored data. ■ TOSHIBA is not liable for the loss of data due to eavesdropping or illegal access through the wireless LAN and the damage thereof. Bluetooth wireless technology Bluetooth® wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones. You cannot use the computer's built-in Bluetooth functions and an optional Bluetooth devices simultaneously. For reference, Bluetooth wireless technology has the following features: Worldwide operation The Bluetooth radio transmitter and receiver operate in the 2.4GHz band, which is license-free and compatible with radio systems in most countries in the world. Radio links You can easily establish links between two or more devices, with these links being maintained even if the devices are not within a line-of-sight of each other. Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. Bluetooth® Stack for Windows® by TOSHIBA Please note that this software is specifically designed for the following operating systems: ■ Microsoft® Windows VistaTM Information regarding the use of this software with these operating systems is listed below, with further details being contained with the electronic help files supplied with the software. User's Manual 4-35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281

User’s Manual
4-35
Operating Basics
3.
Click
Set up a connection or network
.
4.
Follow the wizard. You will need the name of the wireless network
together with security settings. Consult the documentation
accompanied with your router or ask your wireless network
administrator for the settings.
Security
TOSHIBA strongly recommend that you enable encryption functionality,
otherwise your computer will be open to illegal access by an outsider
using a wireless connection. If this occurs, the outsider may illegally
access your system, eavesdrop, or cause the loss or destruction of
stored data.
TOSHIBA is not liable for the loss of data due to eavesdropping or
illegal access through the wireless LAN and the damage thereof.
Bluetooth wireless technology
Bluetooth
®
wireless technology eliminates the need for cables between
electronic devices such as desktop computers, printers and mobile phones.
You cannot use the computer's built-in Bluetooth functions and an optional
Bluetooth devices simultaneously. For reference, Bluetooth wireless
technology has the following features:
Worldwide operation
The Bluetooth radio transmitter and receiver operate in the 2.4GHz band,
which is license-free and compatible with radio systems in most countries
in the world.
Radio links
You can easily establish links between two or more devices, with these
links being maintained even if the devices are not within a line-of-sight of
each other.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.
Bluetooth
®
Stack for Windows
®
by TOSHIBA
Please note that this software is specifically designed for the following
operating systems:
Microsoft
®
Windows Vista
TM
Information regarding the use of this software with these operating systems
is listed below, with further details being contained with the electronic help
files supplied with the software.