74
Securing Your Computer
NOTICE:
Passwords provide a high level of security for data in your computer or
hard drive. However, they are not foolproof. If you require more security, obtain and
use additional forms of protection such as data encryption programs.
Use the
User Accounts
option in the Control Panel in the Microsoft
®
Windows
®
operating system to create user accounts or to change passwords.
Once you create a user password, you must enter it each time you turn on or
unlock your computer. If you do not enter a password within 2 minutes, the
computer returns to its previous operating state. For more information, see
your Windows documentation.
If you forget any of your hardware passwords, such as the hard drive and BIOS
passwords, contact Dell (see "Contacting Dell" on page 132). For your
protection, Dell technical support staff will ask you for proof of your identity
to ensure that only an authorized person can use the computer.
If Your Computer Is Lost or Stolen
•
Call a law enforcement agency to report the lost or stolen computer.
Include the Service Tag in your description of the computer. Ask that a
case number be assigned and write down the number, along with the
name, address, and phone number of the law enforcement agency. If
possible, obtain the name of the investigating officer.
NOTE:
If you know where the computer was lost or stolen, call a law
enforcement agency in that area. If you do not know, call a law enforcement
agency where you live.
•
If the computer belongs to a company, notify the security office of the company.
•
Contact Dell customer service to report the missing computer. Provide the
computer Service Tag, the case number, and the name, address, and phone
number of the law enforcement agency to which you reported the missing
computer. If possible, give the name of the investigating officer.
The Dell customer service representative will log your report under the
computer Service Tag and record the computer as missing or stolen. If someone
calls Dell for technical assistance and gives your Service Tag, the computer is
identified automatically as missing or stolen. The representative will attempt to
get the phone number and address of the caller. Dell will then contact the law
enforcement agency to which you reported the missing computer.
book.book Page 74 Thursday, August 7, 2008 5:00 PM
Downloaded from
www.Manualslib.com
manuals search engine
Summary of Contents for Vostro 500
Page 12: ...12 Contents Downloaded from www Manualslib com manuals search engine ...
Page 18: ...18 Finding Information Downloaded from www Manualslib com manuals search engine ...
Page 38: ...38 Setting Up Your Computer Downloaded from www Manualslib com manuals search engine ...
Page 46: ...46 Using the Keyboard and Touch Pad Downloaded from www Manualslib com manuals search engine ...
Page 54: ...54 Using a Battery Downloaded from www Manualslib com manuals search engine ...
Page 66: ...66 Using Cards Downloaded from www Manualslib com manuals search engine ...
Page 124: ...124 Adding and Replacing Parts Downloaded from www Manualslib com manuals search engine ...
Page 140: ...140 Specifications Downloaded from www Manualslib com manuals search engine ...
Page 170: ...170 Index Downloaded from www Manualslib com manuals search engine ...