eMachines W3653 8512780 - eMachines Desktop PC User Guide - Page 64

Hardware security, Data security - bios

Page 64 highlights

Chapter 6: Protecting your computer Hardware security Although you may be able to replace your computer with a call to your insurance agent, you cannot replace the information stored on your computer. Take steps to prevent theft of your computer. Kensington lock slot The first step in computer security is preventing your computer from being stolen. Attach a cable lock to the Kensington lock slot on your computer, then wrap the lock's cable around the leg of a desk or table. You can buy a cable lock at most electronics stores and many department stores. For the location of the Kensington lock slot, see your Reference Guide. Data security The second step in computer security is keeping your data safe and secure. Startup and hard drive password Use a startup and hard drive password to keep other people from using your computer. You have to enter your password when you turn on your computer or access your files. These passwords are set in your computer's BIOS setup utility. Use a password that you can remember but that would be hard for someone else to guess. Tip For instructions on creating a startup and hard drive password, see your computer's Reference Guide. Make sure that you use a password you can remember. The password feature is very secure, and you cannot bypass it. If you forget your password, you will have to return your computer to eMachines so we can reset it. Windows user accounts Windows lets you set up a user account for each person who uses your computer. When you set up user accounts, Windows sets up a Documents folder for each account. You can assign a password to each account so only the account owner can access files in the Documents folder. When you set up a user account, you can also limit the programs that a user can install or run. 58 Help For more information about Windows user accounts, click Start, then click Help and Support. Type user accounts in the Search Help box, then press ENTER.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96

Chapter 6: Protecting your computer
58
Hardware security
Although you may be able to replace your computer with a call to your insurance agent, you cannot
replace the information stored on your computer. Take steps to prevent theft of your computer.
Kensington lock slot
The first step in computer security is preventing your computer from being stolen.
Attach a cable lock to the Kensington lock slot on your computer, then wrap the lock’s cable around
the leg of a desk or table. You can buy a cable lock at most electronics stores and many department
stores.
For the location of the Kensington lock slot, see your
Reference Guide
.
Data security
The second step in computer security is keeping your data safe and secure.
Startup and hard drive password
Use a startup and hard drive password to keep other people from using your computer. You have
to enter your password when you turn on your computer or access your files.
These passwords are set in your computer’s BIOS setup utility. Use a password that you can
remember but that would be hard for someone else to guess.
Windows user accounts
Windows lets you set up a user account for each person who uses your computer. When you set
up user accounts, Windows sets up a Documents folder for each account. You can assign a
password to each account so only the account owner can access files in the Documents folder.
When you set up a user account, you can also limit the programs that a user can install or run.
Tip
For instructions on creating a startup and hard drive password, see your computer’s
Reference Guide
. Make sure that you use a password you can remember. The password
feature is very secure, and you cannot bypass it. If you forget your password, you will have
to return your computer to eMachines so we can reset it.
Help
For more information about Windows user accounts, click
Start
, then click
Help and
Support
. Type
user accounts
in the
Search Help
box, then press
E
NTER
.