background image

30 - 

Quick Start & Troubleshooting Guide

Protect your computer with security software. 

Several types of security software are necessary for basic online security. Security software essentials include 

firewall and antivirus programs. A firewall is usually your computer's first line of defense-it controls who and what 

can communicate with your computer online. You could think of a firewall as a sort of "policeman" that watches all 

the data attempting to flow in and out of your computer on the Internet, allowing communications that it knows 

are safe and blocking "bad" traffic such as attacks from ever reaching your computer. 
The next line of defense many times is your antivirus software, which monitors all online activities such as email 

messages and Web browsing and protects an individual from viruses, worms, Trojan horse and other types of 

malicious programs. Your antivirus and antispyware software should be configured to update itself, and it should 

do so every time you connect to the Internet. 
Integrated  security  suites  such  as  Norton  Internet  Security  combine  firewall,  antivirus,  antispyware  with  other 

features such as antispam and parental controls have become popular as they offer all the security software 

needed for online protection in a single package. Many people find using a security suite an attractive alternative to 

installing and configuring several different types of security software as well as keeping them all up-to-date. 

A complete version of Norton Internet Security™ is pre-installed on your Gateway system. It includes a 

free trial subscription to protection updates. Make sure you Turn it On!

Choose strong passwords and keep them safe. 

Passwords are a fact of life on the Internet today; we use them for everything from ordering flowers and online 

banking to logging into our favorite airline Web site to see how many miles we have accumulated. The following 

tips can help make your online experiences secure: 

Selecting a password that cannot be easily guessed is the first step toward keeping passwords secure and away 

from the wrong hands. Strong passwords have eight characters or more and use a combination of letters, 

numbers and symbols (e.g., # $ % ! ?). Avoid using any of the following as your password: your login name, 

anything based on your personal information such as your last name, and words that can be found in the 

dictionary. Try to select especially strong, unique passwords for protecting activities like online banking. 

Keep your passwords in a safe place and try not to use the same password for every service you use online. 

Change passwords on a regular basis, at least every 90 days. This can limit the damage caused by someone who 

has already gained access to your account. If you notice something suspicious with one of your online accounts, 

one of the first steps you can take is to change your password. 

Protect your personal information. 

Exercise caution when sharing personal information such as your name, home address, phone number, and email 

address online. To take advantage of many online services, you will inevitably have to provide personal information 

in order to handle billing and shipping of purchased goods. Since not divulging any personal information is rarely 

possible, the following list contains some advice for how to share personal information safely online: 

Keep an eye out for phony email messages. 

Things that indicate a message may be fraudulent are 

misspellings, poor grammar, odd phrasings, Web site addresses with strange extensions, Web site addresses 

that are entirely numbers where there are normally words, and anything else out of the ordinary. Additionally, 

phishing messages will often tell you that you have to act quickly to keep your account open, update your 

security, or urge you to provide information immediately or else something bad will happen. Don't take the bait. 

Don't respond to email messages that ask for personal information.

 Legitimate companies will not use 

email messages to ask for your personal information. When in doubt, contact the company by phone or by 

typing in the company Web address into your Web browser. Don't click on the links in these messages as they 

make take you to fraudulent, malicious Web sites. 

Steer clear of fraudulent Web sites used to steal personal information.

 When visiting a Web site, type the 

address (URL) directly into the Web browser rather than following a link within an email or instant message. 

Fraudsters often forge these links to make them look convincing. A shopping, banking or any other Web site 

where sensitive information should have an "S" after the letters "http" (i.e. 

https://www.yourbank.com

 not 

http://www.yourbank.com

). The "s" stands for secure and should appear when you are in an area requesting 

you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock 

icon in the bottom of your web browser (usually the right-hand corner). 

Summary of Contents for EC14

Page 1: ...rnet Security Offer 15 Gateway Recovery Management 16 Your Computer s Documentation 17 Playing Multimedia Files 18 First steps on the Net 20 Protecting your computer 20 Choose an Internet Service Prov...

Page 2: ...ease fill in the information and click Next The second window you ll see contains optional fields that will help us to provide you with a more personable customer service experience Another Option Ano...

Page 3: ...ame state as when you purchased it while giving you an option to retain all settings and personal data for later retrieval see page 45 for details Gateway InfoCentre To discover more about your comput...

Page 4: ...power cable from the computer Three pin power cords are connected to a grounded power outlet The power outlet is easily accessible and as close to the computer as possible do not overload it with too...

Page 5: ...ncrease volume gradually until you can hear clearly and comfortably do not increase the volume level after your ears have adjusted Do not listen to high volumes for extended periods Do not increase th...

Page 6: ...mlock key to switch between the two functions Note To optimise space and weight certain computers use compact keyboards that do not provide a numeric keypad If this is the case you may use the integra...

Page 7: ...Touchpad Lock button toggles the touchpad on or off to avoid unwanted cursor movements when using the keyboard This is most useful if you have connected a mouse to your computer On certain computers...

Page 8: ...Open Guide 6 Open Live TV 7 Direction keys up down left right and OK 8 Volume controls Volume up down and Mute 9 Program Channel up down 10 Back Start Windows key and More information 11 Teletext sele...

Page 9: ...Disc recording software must be used to write information to recordable discs Note Before copying a CD make sure that its content is not protected by Trademarks and Copyrights and that you are authori...

Page 10: ...apter that is supplied with your computer Although other adapters may look similar using them can damage your computer The AC adapter and the underside of the computer can become hot after prolonged u...

Page 11: ...ese ports To view documentation specific to the model you have purchased please check InfoCentre Precautions Before you attach any device check the installation instructions that were supplied with it...

Page 12: ...er Connectors Memory Card Reader Memory cards are used to store and transfer data by a wide selection of digital cameras PDAs MP3 players and mobile phones see page 8 TV Tuner Allows you to connect an...

Page 13: ...low power state so that you may quickly resume working see the Power Options section on page 14 for details Note You may also put your computer into sleep mode without going to the Windows Start menu...

Page 14: ...ng experience as easy and pleasant as possible Because your computing needs may evolve Gateway is here to help you choose the right accessories and make the most of your computer Memory Memory RAM is...

Page 15: ...the screen Windows Welcome Center The first time you turn on your computer the Welcome Center window opens The Welcome Center introduces you to the new features and tools of Windows You can access the...

Page 16: ...by on screen instructions Please read them carefully 1 Click on Start All Programs Gateway then click on Gateway Recovery Management Gateway Recovery Management opens 2 To create recovery discs for th...

Page 17: ...ocess is complete Your Computer s Documentation User s Guide Gateway InfoCentre This guide is not the only reference for information about your computer InfoCentre your electronic user s guide contain...

Page 18: ...tuner Other options allow you to create CDs or DVDs One or more media programs are installed on your computer Windows Media Player and optionally Windows Media Center are provided by Microsoft Other...

Page 19: ...y work with the media programs installed on your computer or may require specific programs Files that include DRM functions may only play in specific programs e g iTunes Windows Media Player or only o...

Page 20: ...the Internet as the connection speed is low and connection time is typically charged per hour DSL e g ADSL DSL Digital Subscriber Line is an always on connection that runs over the phone line As DSL...

Page 21: ...with other computers in your home Installation Speed and Simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cables through walls and ceilings Components o...

Page 22: ...th the members of an ad hoc wireless network This is the method of connection if you do not possess an Access Point router Turning On Off a WiFi Network Connection Most computers feature a WiFi button...

Page 23: ...le browser window by switching from one site to another through tabs at the top of the browser frame 7 Quick tabs Select and navigate through open tabs by displaying thumbnails of them all in a single...

Page 24: ...mation when you want it right on your computer s desktop Simply click on the Google Desktop search icon to start the program Note To learn more about Google products and features visit www google com...

Page 25: ...you tick Scan for and attempt recovery of bad sectors your computer will carry out the physical error checking when you next restart your computer Click on Start to proceed Disk Cleanup The Disk Clean...

Page 26: ...n will automatically appear Free some Space on your Hard Disk Drive 1 Empty the Recycle Bin When you delete a file from your computer Windows places it in the Recycle Bin All the deleted files remain...

Page 27: ...ng Windows System Restore from the Windows desktop Click on Start All Programs Accessories System Tools System Restore If you cannot access the Windows desktop 1 Press the Alt F10 key upon start up wh...

Page 28: ...ered everyday keeping your security applications and operating system up to date is crucial Norton Internet Security combined with other security applications can protect your computer from Internet a...

Page 29: ...acts as a shield to protect your Internet connection from unwanted connections some of which may attempt to take control of your computer to install or re distribute viruses or malicious programs Eac...

Page 30: ...ictionary Try to select especially strong unique passwords for protecting activities like online banking Keep your passwords in a safe place and try not to use the same password for every service you...

Page 31: ...es can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted One of the easiest ways to get the tip off that something has gon...

Page 32: ...ur computer from programs from the internet trying to access your computer this sometimes is necessary to allow access for program updates downloads etc Windows Updates If you have an active Internet...

Page 33: ...ser s security settings to determine how much or how little information you are willing to accept from a Web site To access Internet Explorer security settings 1 In Internet Explorer click on Tools In...

Page 34: ...e issue Also remember to read our recommendations in the Safe Computing section page 25 to get the most of your computer and prevent problems in the future Nothing displays on the screen page 34 The s...

Page 35: ...battery is correctly inserted 2 Check that the battery is sufficiently charged 3 Connect the AC adapter and attempt to start your computer Disconnect or remove additional devices A faulty device or ba...

Page 36: ...ter with a different boot device Press F12 when starting your computer to enter the boot menu this feature may not be available on all computers If your first boot device is HDD change it into CD or D...

Page 37: ...ious software propagated when you are connected To check if your computer has been infected run a check with your antivirus and anti spyware programs To be fully efficient these protection programs mu...

Page 38: ...gram in the list and click on End Task Does this happen with only one application If you notice that a specific program does not work correctly try uninstalling and reinstalling it Click on Start Cont...

Page 39: ...ce noise or distortion depends on your screen s proximity to sources such as TV sets mobile phones other monitors refrigerators large stereo speakers power adapters halogen lighting with built in powe...

Page 40: ...connection ensure that you Connect your modem directly to the phone socket Avoid using telephone extension cables this degrades the signal quality In thunderstorm conditions make sure that you discon...

Page 41: ...Panel Change the View by option to Large icons then select Phone and Modem Make any changes to match your phone configuration and click on OK to finish 4 The modem is used by another program COM port...

Page 42: ...at you have selected the correct ISP for the account you are attempting to use 4 Your Internet account settings may have been changed a Disconnect from the Internet Close Windows Mail and any other ap...

Page 43: ...t to product a Before installing any new program be sure all other applications are closed b Insert the CD or DVD Most CDs or DVDs start automatically and display an installation screen If the disc do...

Page 44: ...mory RAM or Processor CPU please refer to InfoCentre 3 External hardware device Installing a new hardware device such as a printer scanner joystick etc is not a complicated task Each type of device ha...

Page 45: ...ate when everything was working correctly For instructions see Returning to a previous system condition on page 46 4 Reset your system to its factory condition If nothing else has solved the problem a...

Page 46: ...e points to get your system running again Windows automatically creates an additional restore point each day and also each time you install software or device drivers Help For more information about u...

Page 47: ...to Caution Continuing the process will erase all files on your hard drive 4 Click on OK The recovery process begins by restarting your computer then continues by copying files to your hard drive This...

Page 48: ...on of the device UNINTENTIONAL EMITTER PER FCC PART 15 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC rules These limits ar...

Page 49: ...s on how to comply with the fax branding requirement INDUSTRY CANADA IC INTENTIONAL EMITTER PER RSS 210 Caution To prevent radio interference to licensed service or co channel Mobile Satellite systems...

Page 50: ...together This precaution may be particularly important in rural areas The Ringer Equivalence Number REN assigned to each terminal device provides an indication of the maximum number of terminals allo...

Page 51: ...iring regulations in your country In the U K these are the IEE regulations POWER SUPPLY AND CABLES Power Supply The power supply socket inlet and socket outlet if equipped are classified as Hazardous...

Page 52: ...NSIDE THE COMPUTER CAN BECOME HOT AFTER PROLONGED USE You then must close the chassis before you plug in and switch on the equipment LASER COMPLIANCE STATEMENT The optical devices are tested and certi...

Page 53: ...ectronic Equipment WEEE Directive requires that used electrical and electronic products must be disposed of separately from normal household waste in order to promote reuse recycling and other forms o...

Page 54: ...me it is in use then that person may also use the SOFTWARE on a portable or home computer 2 Copyright The SOFTWARE is owned by Gateway or its suppliers and is protected by United States copyright laws...

Page 55: ...ory card reader 8 Optical drives 9 DSL 20 41 DVI port 12 E Electronic Program Guide 19 Email 42 Environment 53 Epilepsy warning 5 Error checking 25 eSATA 12 ExpressCard 11 External hardware devices 44...

Page 56: ...oftware Removing software 26 Software License 54 Speakers 7 Spyware 29 Storage 14 S Video 12 System requirements 43 System Restore 27 38 System tools Disk Cleanup 25 Disk Defragmenter 25 Error checkin...

Reviews: