Securing Your Computer; Using A Computer Security Lock; Using Passwords - Acer Predator Triton 500 SE User Manual

Hide thumbs Also See for Predator Triton 500 SE:
Table of Contents

Advertisement

S
E C U R I N G Y O U R C O M P U T E R
Your computer is a valuable investment that you need to
take care of. Learn how to protect and take care of your
computer.
Security features include hardware and software locks — a
security notch and passwords.

Using a computer security lock

The computer comes with a computer security slot for a
security lock.
Wrap a computer security lock cable around an immovable
object such as a table or handle of a locked drawer. Insert
the lock into the notch and turn the key to secure the lock.
Some keyless models are also available.

Using passwords

Passwords
access. Setting these passwords creates several different
levels of protection for your computer and data:
• Supervisor Password prevents unauthorized entry into the
BIOS utility. Once set, you must enter this password to
gain access to the BIOS utility. See Setting passwords on
page 64.
• User
unauthorized use. Combine the use of this password with
password checkpoints on boot-up and resume from
Hibernation (if available) for maximum security.
• Password on
unauthorized use. Combine the use of this password with
protect
your
Password
secures
Boot
computer from unauthorized
your
secures
your computer

Securing your computer - 57

computer
against
against

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pt516-51s

Table of Contents