A cover lock is built into the chassis of some computers to prevent the cover from
being removed. Two identical keys for the cover lock are also supplied. A tag
attached to the keys has the key serial number and the address of the key
manufacturer.
Important
Record the serial number and the manufacturer address in the space provided in
Appendix A, “Computer records” on page 151, and store the tag in a safe place.
Because locksmiths are not authorized to duplicate the cover-lock keys, you
must order replacement keys from the key manufacturer. When ordering
replacement keys, you will need the key serial number.
A chassis-intrusion detector inside your computer can be set to alert the system
administrator each time the computer cover is removed. This detector is enabled
after you set an administrator password in the Configuration/Setup Utility
program. After the password is set, and after the computer cover is removed, a
POST error message (176) displays on the computer screen the next time the
computer is plugged in and powered on. You must enter the correct administrator
password in order to start up the computer. For information on setting passwords,
see Chapter 5, “Using the Configuration/Setup Utility program” on page 61.
If you have installed IBM System Management Tools from the software provided
with your computer, a DMI-compliant message will also display on the computer
screen, after the operating system is loaded. (For more information on IBM System
Management Tools, see the Overview section on the Ready-to-Configure Utility
Program CD, or refer to About Your Software.) Also, if your computer uses Alert on
LAN, and you are connected to a network that uses Intel LANDesk
Desktop
Manager or Intel
LANDesk Client Manager, a message is also sent to the network
administrator console notifying that the computer cover has been removed. For
more information, see “Alert on LAN support” on page 49 and contact your
network administrator.
Component protection
Your computer has serialized components that can be registered with a third-party
security company. (You can also register the entire system.) By registering
computer components, you can improve the chances of identifying the components
if they are ever stolen and recovered. For more information about component
registration, see:
http://www.retainagroup.com
54
Using Your Personal Computer
Содержание 300GL Type 6275
Страница 2: ......
Страница 10: ...viii Using Your Personal Computer...
Страница 14: ...xii Using Your Personal Computer...
Страница 18: ...xvi Using Your Personal Computer...
Страница 38: ...20 Using Your Personal Computer...
Страница 78: ...60 Using Your Personal Computer...
Страница 116: ...98 Using Your Personal Computer...
Страница 158: ...140 Using Your Personal Computer...
Страница 207: ......
Страница 208: ...IBM Part Number 00N5979 Printed in U S A N5979...