Toshiba Tecra A8 PTA83C-KFT01F Users Manual Canada; English - Page 112

BluetoothTM Stack for Windows® by TOSHIBA, Bluetooth, Stack for Windows, by TOSHIBA

Page 112 highlights

Operating Basics Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. BluetoothTM Stack for Windows® by TOSHIBA Please note that this software is specifically designed for the following operating systems: ■ Microsoft® Windows® 2000 Professional ■ Microsoft® Windows® XP Detailed information regarding the use with these operating systems is listed below. Please refer also to the electronic information which is included with each software. This BluetoothTM Stack is based on BluetoothTM Version 1.1/1.2/2.0+EDR specification. TOSHIBA cannot confirm compatibility between any PC products and/or other electronic devices that use BluetoothTM other than TOSHIBA mobile PCs. Release Notes related to the BluetoothTM Stack for Windows® by TOSHIBA 1. Install: On Windows2000 or Windows XP, BluetoothTM Stack for Windows® by TOSHIBA does not have a digital signature. 2. Fax application software: Regarding FAX application software, there are some software that you cannot use on this BluetoothTM Stack. 3. Multi User: On Windows XP, the use of Bluetooth is not supported in a multi-user environment. This means that, when you use Bluetooth, other users logged onto the same computer will not be able to use its Bluetooth functionality. Product Support: The latest information regarding Operating System support, Language Support or available upgrades can be found on our web site http:// www.toshiba-europe.com/computers/tnt/bluetooth.htm in Europe or www.pcsupport.toshiba.com in the United States. 4-32 User's Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

4-32
User’s Manual
Operating Basics
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.
Bluetooth
TM
Stack for Windows
®
by TOSHIBA
Please note that this software is specifically designed for the following
operating systems:
Microsoft
®
Windows
®
2000 Professional
Microsoft
®
Windows
®
XP
Detailed information regarding the use with these operating systems is
listed below. Please refer also to the electronic information which is
included with each software.
Release Notes related to the Bluetooth
TM
Stack for
Windows
®
by TOSHIBA
1.
Install:
On Windows2000 or Windows XP, Bluetooth
TM
Stack for Windows
®
by
TOSHIBA does not have a digital signature.
2.
Fax application software:
Regarding FAX application software, there are some software that you
cannot use on this Bluetooth
TM
Stack.
3.
Multi User:
On Windows XP, the use of Bluetooth is not supported in a multi-user
environment. This means that, when you use Bluetooth, other users
logged onto the same computer will not be able to use its Bluetooth
functionality.
Product Support:
The latest information regarding Operating System support, Language
Support or available upgrades can be found on our web site http://
www.toshiba-europe.com/computers/tnt/bluetooth.htm in Europe or
www.pcsupport.toshiba.com in the United States.
This Bluetooth
TM
Stack is based on Bluetooth
TM
Version 1.1/1.2/2.0+EDR
specification. TOSHIBA cannot confirm compatibility between any PC
products and/or other electronic devices that use Bluetooth
TM
other than
TOSHIBA mobile PCs.