background image

Internet and online security - 47

use internet security software like Norton Security to scan all of your
devices.

Viruses/Malware

"Virus" is the commonplace word for all malicious software programs
for years now; however, a virus is just one type of malicious threat. A
virus  is  classified  as  a  self-replicating  piece  of  malicious  code  that
travels by inserting itself into files or programs.

What  to  do  if  you're  infected:

  Take  steps  to  avoid  infection  by

staying protected with internet security software like Norton Security.
If you subscribed to Norton Security and think you may have a virus,
contact Norton's on-call technicians to help eliminate the virus.

Take special precautions when using public Wi-Fi

Public Wi-Fi is available just about everywhere, from the local coffee
shop to the hotels and airports you visit while traveling. While public
Wi-Fi has made our lives a little easier, it also poses security risks to
the personal information available on our laptops and smartphones. A
virtual private network (VPN) gives you online privacy and anonymity
by creating a private network from a public internet connection. VPNs
mask  your  internet  protocol  (IP)  address  so  your  online  actions  are
virtually  untraceable  as  well  as  secure.  One  of  the  biggest  security
risks  on  public  Wi-Fi  are  man-in-the-middle  attacks  (MITM).  These
attacks  are  akin  to  eavesdropping.  Data  is  sent  from  point  A
(computer)  to  point  B  (server/website),  and  an  attacker  can  get  in-
between these transmissions. They then set up tools programmed to
"listen in" on transmissions, intercept data that is specifically targeted
as valuable, and capture the data, such as your login credentials and
passwords. 
Use  a  virtual  private  network  (VPN)  to  ensure  your  privacy  and
anonymity  are  protected  when  you  use  public  Wi-Fi.  VPN  services
can encrypt all the data that you send and receive while using a public
Wi-Fi hotspot, securing your information from hackers and other users
of the same connection. 

For more tips on how to stay safe

Good  security  habits  can  reduce  your  exposure  to  online  crime.  By
adopting a few basic behaviors, you can make big strides in reducing
cybercrime risk:

Содержание Z4697G

Страница 1: ... 1 Veriton All in one Computer User s Manual ...

Страница 2: ...mportant This manual contains proprietary information that is protected by copyright laws The information contained in this manual is subject to change without notice Some features described in this manual may not be supported depending on the Operating System version Images provided herein are for reference only and may contain information or features that do not apply to your computer Acer Group...

Страница 3: ...Using a computer security lock 19 Using passwords 19 Entering passwords 20 BIOS utility 21 Boot sequence 21 Setting passwords 21 Power management 22 Saving power 22 Ports and connectors 24 USB 3 2 Gen 1 information 24 USB 3 2 Gen 2 information 25 Rear panel audio ports 25 Universal Serial Bus USB 26 USB Type C port 27 HDMI 28 SD card reader 29 Video and audio connectors 30 Connecting a monitor 30 ...

Страница 4: ...rted In this section you will find Useful information on caring for your computer and your health How to create recovery backups Guidelines for connecting to a network Information on using Acer s bundled software ...

Страница 5: ...ted to the internet you can download updates for your computer from http go acer com id 17883 1 The link will open the Acer Support webpage 2 Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number SNID or product model 3 From this page you can also download and install the Acer identification utility that will automatically detect your com...

Страница 6: ... adapter to power your device Do not expose the computer to direct sunlight Do not place it near sources of heat such as a radiator Do not expose the computer to temperatures below 0º C 32º F or above 50º C 122º F Do not subject the computer to magnetic fields Do not expose the computer to rain or moisture Do not spill water or any liquid on the computer Do not subject the computer to heavy shock ...

Страница 7: ...plug The total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord Also the total current rating of all equipment plugged into a single wall outlet should not exceed the fuse rating Cleaning and servicing When cleaning the computer follow these steps 1 Turn off the computer 2 Disconnect the AC adapter 3 Use a soft moist clot...

Страница 8: ...system installed apps and data 1 From Start select Control Center then Recovery Management 2 Select the Backup tab and click Get started for Create backup to open the Backup window 3 If you would like to backup not only your files but also the entire system select Go to Backup and Restore Windows 7 4 Select Security and Maintenance in the left pane 5 Select Recovery to open the Advanced recovery t...

Страница 9: ...ss and LAN drivers if you install another operating system 1 From Start select Control Center then Recovery Management 2 Select the Backup tab and click Get started for Backup wireless and LAN drivers Choose a folder to save your drivers and select OK Restoring your computer Recovery Management allows you to quickly and easily restore your computer back to its default status You can choose to keep...

Страница 10: ...mpleted the reset process Windows will have been reset back to its factory default settings without removing your personal files Reset this PC and remove everything 1 From Start select Control Center then Recovery Management 2 Select the Restore tab and click Get started to open the Recovery window 3 Click Get started under Reset this PC 4 Select Remove everything to reset your PC back to its fact...

Страница 11: ...process 9 The screen will turn back on when it is installing Windows Your PC will restart several times during the reset process 10 Follow the process until it completes 11 When your PC has completed the reset process Windows will use factory default settings Warning Selecting Data erasure On will remove all of your personal files and accounts along with pre existing drivers that may affect your W...

Страница 12: ...ter is available Enable Bluetooth and add a device Every new device must first be paired with your computer s Bluetooth adapter This means it must first be authenticated for security purposes You only need to pair once After that simply turning on the Bluetooth adapter of both devices will connect them Bluetooth on your computer is disabled by default To enable your computer s Bluetooth adapter do...

Страница 13: ... icon in the lower right hand corner of the screen to open the Notifications pane From here you can enable or disable Bluetooth or right click on Bluetooth Go to Settings to enter the Bluetooth settings Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN In the case of one of the devices not having any inputs as in a headset the passcode is hardco...

Страница 14: ...network Connecting to a wireless LAN A wireless LAN or WLAN is a wireless local area network which can link two or more computers without using wires Once connected to WLAN you can access the internet You can also share files other devices and even your internet connection itself Your computer s wireless connection is turned on by default and Windows will detect and display a list of available net...

Страница 15: ...etwork select Connect 5 If required enter the network s password Connecting with a cable Built in network feature If your computer has a network port plug one end of a network cable into the network port on your computer and the other end into a port on your router refer to the image below Then you ll be ready to get online Note If Wi Fi is turned off please click Wi Fi tile to turn it on ...

Страница 16: ...Keeping your computer and data safe In this section you will find How to secure your computer Setting passwords ...

Страница 17: ...tware Setting up Acer ProShield The first time you run Acer ProShield you will be led through a setup wizard that allows you to set up the parameters for Acer ProShield Click Start to begin You will be required to set a password and can choose to create a Personal Secure Drive Once you have set a password you can click Next to proceed to setting up a Personal Secure Drive or click Finish to exit t...

Страница 18: ...anges Credential Manager Here you can set and manage your ProShield password You can change your ProShield passwords back up or restore credential information Data Protection Here you can select files for encryption or decryption and manage your Personal Secure Drive Data Removal Here you can select files to be completely removed from the hard disk The File Shredder overwrites the data to make rec...

Страница 19: ...authorized access Setting these passwords creates several different levels of protection for your computer and data Supervisor Password prevents unauthorized entry into the BIOS utility Once set you must enter this password to gain access to the BIOS utility See Setting passwords on page 21 User Password secures your computer against unauthorized use Combine the use of this password with password ...

Страница 20: ...ge appears Try again and press Enter When the User Password is set and the password on boot parameter is enabled a prompt appears at boot up Type the User Password and press Enter to use the computer If you enter the password incorrectly a warning message appears Try again and press Enter Important You have three chances to enter a password If you fail to enter the password correctly after three t...

Страница 21: ...layed Boot sequence To set the boot sequence in the BIOS utility activate the BIOS utility then select Boot from the categories listed on the top of the screen Setting passwords To set a password on boot activate the BIOS utility then select Security from the categories listed on the top of the screen Find Set Supervisor Password and enter a password to enable this feature Once you have entered a ...

Страница 22: ...up to start quickly but also uses a small amount of power to check for signals to start If you prefer to reduce your computer s power requirements and environmental impact turn off Fast startup 1 Press the Windows key or select the Windows Start button then select Settings System Power sleep 2 Select Additional power settings 3 Select Choose what the power buttons do 4 Select Change settings that ...

Страница 23: ...In this section you will find Information on the ports and connectors fitted to your computer Ports and connectors ...

Страница 24: ... 3 2 Gen 1 certified devices Defined by the 3 2 Gen 1 specification SuperSpeed USB Note The ports and connectors listed below may not be available on all models Icon Item Icon Item Power button Audio combo jack Microphone jack SD card reader Speaker or headphone jack Line in jack USB port HDMI port RJ 45 Ethernet connector USB port with power off charging Line out speaker out jack DP DisplayPort K...

Страница 25: ...performance use 3 2 Gen 2 certified devices Defined by the 3 2 Gen 2 specification SuperSpeed USB Rear panel audio ports The table below indicates the functions of the audio jacks on the rear panel if available Icon color Headset Stereo Quadrophonic 5 1 channel Blue Rear Rear Green Headset Front Front Front Blue Mic in Mic in Mic in Center woofer ...

Страница 26: ... to a single USB port Note Two USB standards are currently available on Acer computers USB 2 0 High speed USB and USB 3 2 Gen 1 SuperSpeed USB USB 2 0 ports on Acer computers have a black tongue in the port while USB 3 2 Gen 1 ports have a blue tongue For best performance USB 3 2 Gen 1 devices should always be plugged into USB 3 2 Gen 1 ports Consult your device s documentation to see which standa...

Страница 27: ... USB Type C ports support up to USB 3 2 SuperSpeed USB 10 Gbps Other USB devices with a USB Type C connector are supported but transfer speed may be reduced and certain functions will be disabled such as Thunderbolt video support Important When removing a USB storage device you should right click on the USB icon in the Windows task bar and select Eject device to tell the operating system to stop u...

Страница 28: ...y compatible digital audio video source such as your computer a set top box DVD player and audio video receiver to any compatible digital audio and or video monitor such as a digital television DTV with a single cable The single cable keeps everything neat and tidy while ensuring easy connection and the best audio and visual quality ...

Страница 29: ...s depends on the contents of the card and ask you if you wish to use a program to access the contents of the card SD SDHC and SDXC cards Different types of SD cards cover different capacities while using the same overall design SD cards contain up to 4 GB SDHC cards contain up to 32 GB and SDXC cards can contain up to 2048 GB 2 TB Your computer provides an SDHC or SDXC compatible card reader Impor...

Страница 30: ...solution and refresh rate should be detected automatically If necessary change the display settings used by the computer Headphones and microphone One or more 3 5 mm jacks on your computer allow you to connect audio devices Use the headphone port to plug in stereo headphones or powered speakers connecting an audio device to the headphone port disables the built in speakers Use the microphone port ...

Страница 31: ...uestion In this section you will find Frequently asked questions Tips for using Windows 10 Troubleshooting information How to protect yourself while online Where to find Acer service center contact information ...

Страница 32: ...er outlet If power is being supplied to the computer check the following Is a disc in the optical drive Remove it and press Ctrl Alt Del to restart the system Do you have a USB storage device USB drive or smartphone plugged into your computer Unplug it and press Ctrl Alt Del to restart the system Nothing appears on the screen The computer s power management system automatically blanks the screen t...

Страница 33: ...sert the tip of a pen or straightened out paperclip into the hole and push to eject the tray The keyboard does not respond Try attaching an external keyboard to a USB port on the computer If it works contact your dealer or an authorized service center as the internal keyboard cable may be loose The printer does not work Make sure that the printer is connected to a power outlet and that it is turne...

Страница 34: ...mputer when you call With your support we can reduce the amount of time a call takes and help solve your problems efficiently If there are error messages or beeps reported by your computer write them down as they appear on the screen or the number and sequence in the case of beeps You are required to provide the following information Name Address Telephone number Machine and model type Serial numb...

Страница 35: ...leave your computer running but not be disturbed by notifications Tap the Windows Start button and tap Settings System Notifications actions From here you can enable disable notifications for all of your apps or choose which apps to enable disable How do I unlock my computer Swipe the lock screen upwards and tap a user account icon to unlock the computer If your account has a password set you will...

Страница 36: ...n Start that you want it to appear Other tiles will be moved to accommodate the tile in its new location Can I arrange tiles in groups Yes you can Tap and hold a tile until you see the screen dim Drag the tile to arrange Start to your liking Can I make tiles bigger or smaller Yes you can Tap and hold a tile until you see the screen dim Tap Resize and select a size from the menu that appears Can I ...

Страница 37: ... make an app appear on Start If you re in all apps list and you want to make an app appear on Start tap and hold the app until you see the screen dim When you release the app tap Pin to Start from the menu that appears How do I remove a tile from Start Tap and hold a tile until you see the screen dim When you release the tile tap the Unpin icon to remove the tile from Start How do I make an app ap...

Страница 38: ...ur PC to the people files and devices you care about Do I need one You do not need a Microsoft ID to use Windows 10 but it makes life easier because you can sync data across different machines you sign in to using a Microsoft ID How do I get one If you ve already installed Windows 10 and didn t sign in with a Microsoft account or you don t have a Microsoft account and want to get one tap the Windo...

Страница 39: ...ror messages If you receive an error message note the message and take the corrective action The following table lists the error messages in alphabetical order together with the recommended course of action Error messages Corrective action CMOS battery bad Contact your dealer or an authorized service center CMOS checksum error Contact your dealer or an authorized service center Disk boot failure I...

Страница 40: ...ed service center for assistance Keyboard error or no keyboard connected Contact your dealer or an authorized service center Keyboard interface error Contact your dealer or an authorized service center Memory size mismatch Press F2 during POST to enter the BIOS utility then press Exit in the BIOS utility to reboot Error messages Corrective action ...

Страница 41: ...et Service Provider ISP which supplies the connection between your computer and the internet You should research the ISPs available in your region not forgetting to talk to friends and family about their experiences or to check reviews and consumer reports The ISP you select will provide instructions on how to connect to the internet you may need additional software or a special box that connects ...

Страница 42: ...onnection provides fast and always on internet service via a cable television line This service is generally available in large cities You can use your telephone and watch cable TV at the same time you are connected to the internet Network connections A LAN Local Area Network is a group of computers for example within an office building or home that share a common communications line and resources...

Страница 43: ...router Access points routers are two way transceivers that broadcast data into the surrounding environment Access points act as a mediator between wired and wireless network Most routers have a built in DSL modem that will allow you access to a high speed DSL internet connection The ISP Internet Service Provider you have chosen normally supplies a modem router with the subscription to their servic...

Страница 44: ...to a world of online activities and services visit us regularly for the latest information and downloads Internet security software To help you stay ahead of cybercriminals Acer has partnered with Norton to offer you security for all your devices Select Acer computers include protection by Norton Security Norton Security is pre installed on select Acer computers protecting your identity and financ...

Страница 45: ...s The email might be from cybercriminals who are trying to fool you into sending them your credit card number social security number or logging into a fake bank website that looks like yours but really isn t How to stay safe Use a strong antispam filter If an email looks strange don t click on anything and delete it immediately Instead manually launch a browser and type in your bank s website addr...

Страница 46: ...ther online or to a separate external hard drive that is only attached to your computer while performing the backup Ransomware has been known to lock access to external hard drives attached to the computer If you are infected with ransomware think twice before you pay the ransom There is no guarantee the cybercriminal will unlock your files and you ll be funding them to prey upon another innocent ...

Страница 47: ...ops and smartphones A virtual private network VPN gives you online privacy and anonymity by creating a private network from a public internet connection VPNs mask your internet protocol IP address so your online actions are virtually untraceable as well as secure One of the biggest security risks on public Wi Fi are man in the middle attacks MITM These attacks are akin to eavesdropping Data is sen...

Страница 48: ...ions Windows Updates If you have an active internet connection Windows can check for important updates for your computer and install them automatically These updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks How do I know when my computer is at risk If the Action Center reports an alert or ...

Страница 49: ...er the region code DVDs are available for 6 regions Region code Country or region 1 USA Canada 2 Europe Middle East South Africa Japan 3 Southeast Asia Taiwan South Korea 4 Latin America Australia New Zealand 5 Former USSR parts of Africa India 6 People s Republic of China Note To change the region code insert a DVD movie of a different region into the DVD drive Once your DVD drive is set to a reg...

Отзывы: