CHAPTER 6: Protecting Your Notebook
60
Hardware security
You probably purchased your notebook so you can take it with you. Because it’s light-weight
and compact, it’s easy to carry. But these features also make it easy for someone else to steal.
You may be able to replace your notebook with a call to your insurance agent, but you cannot
replace the information stored on your notebook.
Kensington lock slot
The first step in computer security is preventing your notebook from being stolen.
Attach a cable lock to the Kensington lock slot on your notebook, then wrap the cable lock to a
solid object like a desk or table. You can buy a cable lock at most electronics stores and many
department stores.
For the location of the Kensington lock slot, see your reference guide.
CompuTrace
If someone steals your notebook, you may be able to get it back by using tracking software.
Your notebook may be enabled to take advantage of Computrace® Complete, a service you can
purchase to help find your notebook if it is stolen. This program automatically reports the location
of your notebook once a day while it is connected to the Internet. If your notebook is stolen,
the frequency increases to every fifteen minutes. A recovery team can give local law enforcement
agencies tracking information and documentation to get subpoenas and search warrants to
recover your notebook.
Tip
Use Computrace Complete’s online help to get the program up and running.
Содержание MT6709h
Страница 1: ...ORDINATEUR PORTABLE MANUEL DE L UTILISATEUR NOTEBOOK USERGUIDE...
Страница 2: ......
Страница 6: ...Contents iv...
Страница 7: ...CHAPTER1 1 Getting Help Using the Gateway Web site Using Help and Support Using online help...
Страница 26: ...CHAPTER 2 Using Windows 20...
Страница 38: ...CHAPTER 3 Using the Internet and Faxing 32...
Страница 51: ...CHAPTER5 45 Networking Your Notebook Introduction to Networking Ethernet networking Bluetooth networking...
Страница 64: ...CHAPTER 5 Networking Your Notebook 58...
Страница 65: ...CHAPTER6 59 Protecting Your Notebook Hardware security Data security Security updates Traveling securely...
Страница 90: ...CHAPTER 7 Customizing Windows 84...
Страница 108: ...Sommaire iv...
Страница 128: ...CHAPITRE 2 Utilisation de Windows 20...
Страница 154: ...CHAPITRE 4 Lecture et cr ation de fichiers multim dia 46...
Страница 155: ...CHAPITRE5 47 Mise en r seau de votre ordinateur portable Introduction aux r seaux R seau Ethernet R seau Bluetooth...
Страница 209: ......
Страница 210: ...8512806 MAN GW PTB USR GDE CA R1 11 07...