Taking Care of Your Computer
© 2007-2009, NEC Computers S.A.S. All rights reserved.
Security Features and Passwords
Taking Care of Your Computer
The system has software and mechanical security features that offer protection against unauthorised
access to your system and data.
BIOS Security Features
Refer to
"Setup Utility"
for more information on how to set Supervisor and User passwords.
Security Features in the Windows
®
Operating Systems
For more information on how to set user accounts and passwords refer to:
•
"Tips for Using Microsoft
®
Windows Vista
®
"
Security Cable
Your computer features a security cable slot. This lock prevents your computer from being moved or
stolen.
To locate this slot, see
"Around the Right Side of the System""Around the Left Side of the System"
.
Note:
Your computer does not ship with a security cable lock.
Install an optional security cable as follows:
1.
Select the object in the room to which you will secure your computer. Choose an immovable piece of
furniture or fixture (a table or desk leg with a cross bar).
2.
Take the looped end of the steel cable (optional) and wrap around an immovable object. Choose an
object that prevents an intruder from slipping the cable out from under the object.
3.
Feed the locking device through the looped end of the cable.
4.
To install the security cable, make sure that the lock is in the unlocked position. To do so, insert the
key into the lock and, holding the locking device stable, turn the key clockwise to the unlocked
position.
5.
Insert the locking device into the security cable slot in your computer. Turn the key 90° counter-
clockwise to lock and remove the key. Check that the security cable is secure by gently pulling on the
locking device.
TPM or Trusted Platform Module
The Trusted Platform Module (TPM) is a component on the motherboard that is specifically designed to
enhance platform security above-and-beyond the capabilities of today's software by providing a protected
space for some security critical tasks. Using both software and hardware, the TPM protects encryption and
signature keys at their most vulnerable stages/operations when the keys are being used in unencrypted
forms. The TPM is specifically designed to shield unencrypted keys as well as platform and user
authentication information from software-based attacks.
For more information refer to
"Installing Infineon TPM Professional Package"
.
Password Procedures
A good password should consist of:
94