30
1 Securities
Connect the display, keyboard, and power cord to the PC.
WARNING
●
The security functions do not guarantee the complete check of personal identification.
Fujitsu is not responsible to any damage that is caused by the use of security functions or
no use of them.
The PC owner is responsible to its security.
●
The security is not relieved if it is done once. The PC user needs to make his/her PC the
best security environment routinely.
When the PC is used, the danger of system destruction by computer virus, the leakage of
information, illegal use, burglary and others increases. To protect important information from these
danger, the PC has various security functions.
The following briefly explains the danger that may exist and the preparation useful for problem
solution.
●
Computer virus
This is a program which was made with the PC to cause a trouble. The virus are infected with the
PC through the Internet and e-mails, and the PC suffers a damage to destroy its data.
●
Information leakage
The virus can enter the PC via the network and leak or destroy important data. Also, the information
may be read illegally from the disposed PC by the special software.
Point
Take security measures when disposing floppy disks, CD-R/RW disks and MO disks. We
recommend you to scratch the disk reader head or completely erase the data before
disposal.
●
Illegal use
Use a PC having no authority to use. Although the PC data can be protected by password setup
and others, the possibility of illegal PC use increases if you use the password which can easily
imagined.
●
Burglary
The PC may be taken out and the data held in the PC may be used illegally.
●
Preparing for the trouble
No perfect security of the PC exists. You can minimize the damage by making a backup copy of
data and updating the software to the latest version.
For more information, refer to the “Preparing for the trouble” section of “Troubleshooting.”
CHAPTER 4 Tokyo (29-34)
3/25/05, 8:17 AM
30
Содержание DESKPOWER C600 Series
Страница 15: ...CHAPTER 1 Part Names ...
Страница 22: ...CHAPTER 2 Installation and Connection ...
Страница 42: ...CHAPTER 3 Security ...
Страница 48: ...CHAPTER 4 Hardware ...
Страница 61: ...CHAPTER 5 System Expansion ...
Страница 75: ...CHAPTER 6 Technical Information ...