8 Drives ............................................................................................................................................................. 57
Handling drives ................................................................................................................................... 57
Using hard drives ............................................................................................................................... 58
Using optical drives ............................................................................................................................ 65
9 Memory modules .......................................................................................................................................... 69
Using passwords ................................................................................................................................ 75
Using the fingerprint reader ................................................................................................................ 77
Installing software updates ................................................................................................................. 79
viii
Using Disk Cleanup ........................................................................................... 58
Removing the hard drive .................................................................................................... 61
Installing a hard drive ......................................................................................................... 63
Inserting an optical disc ..................................................................................................... 65
Removing an optical disc ................................................................................................... 66
Sharing optical drives ........................................................................................................ 68
Registering fingerprints ...................................................................................................... 77
Using antivirus software ..................................................................................................... 78
Using firewall software ....................................................................................................... 78