Toshiba Satellite P100-ST1072 User Manual - Page 92

Security, Bluetooth wireless technology

Page 92 highlights

Operating Basics To use the Atheros SuperAG™ or SuperG™ function, your client and access point must support the corresponding feature. Performance of these functions may vary depending on the format of data transmitted. Security 1. Be sure to enable WEP(encryption) function. Otherwise your computer could be left wide open to illicit access via the Wireless LAN and may result in an intrusion leading to the theft or even loss of stored data, among other things. Moreover, the owner of an Internet connection is responsible for all browsing, downloading, and uploading activities on said connection; an unsecure Wireless network connected directly to the Internet is an open invitation for outsiders to abuse your ISP account privileges. Therefore, TOSHIBA strongly recommends that you enable the WEP function. 2. TOSHIBA is not liable for data packet theft due to the use of the Wireless LAN, and any damage thereof. Bluetooth wireless technology Bluetooth™ wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones. You cannot use the built-in Bluetooth functions and an optional Bluetooth device simultaneously. Bluetooth wireless technology has the following features: Worldwide operation The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band, which is license-free and compatible with radio systems in most countries in the world. Radio links You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight. Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. 4-16 User's Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196

4-16
User’s Manual
Operating Basics
To use the Atheros SuperAG™ or SuperG™ function, your client and
access point must support the corresponding feature. Performance of
these functions may vary depending on the format of data transmitted.
Security
1.
Be sure to enable WEP(encryption) function. Otherwise your computer
could be left wide open to illicit access via the Wireless LAN and may
result in an intrusion leading to the theft or even loss of stored data,
among other things. Moreover, the owner of an Internet connection is
responsible for all browsing, downloading, and uploading activities on
said connection; an unsecure Wireless network connected directly to
the Internet is an open invitation for outsiders to abuse your ISP
account privileges. Therefore, TOSHIBA strongly recommends that you
enable the WEP function.
2.
TOSHIBA
is not liable for data packet theft due to the use of the
Wireless LAN, and any damage thereof.
Bluetooth wireless technology
Bluetooth™ wireless technology eliminates the need for cables between
electronic devices such as desktop computers, printers and mobile phones.
You cannot use the built-in Bluetooth functions and an optional Bluetooth
device simultaneously.
Bluetooth wireless technology has the following features:
Worldwide operation
The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band,
which is license-free and compatible with radio systems in most countries
in the world.
Radio links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.