Password Protection; System Password - Dell Precision Workstation 450 User Manual

Hide thumbs Also See for Precision Workstation 450:
Table of Contents

Advertisement

Use a padlock alone or a padlock and looped security cable with the padlock ring.
A padlock alone prevents the computer from being opened.
A security cable looped around a stationary object is used in conjunction with a
padlock to prevent unauthorized movement of the computer.
Attach a commercially available antitheft device to the security cable slot on the back
of the computer.
NOTE: Before you purchase an antitheft device, ensure that it works with the security cable slot
on your computer.
Antitheft devices usually include a segment of metal-stranded cable with an attached
locking device and key. A Kensington lock is recommended. The documentation that
comes with the locking device contains instructions for installing it.

Password Protection

NOTICE: Although passwords provide security for the data on your computer, they are not
foolproof. If your data requires more security, it is your responsibility to obtain and use
additional forms of protection, such as data encryption programs.

System Password

NOTICE: If you leave your computer running and unattended without having a system
password assigned, or if you leave your computer unlocked so that someone can disable the
password by changing a jumper setting, anyone can access the data stored on your hard drive.
Option Settings
You cannot change or enter a new system password if either of the following two options is
displayed:
Enabled — A system password is assigned.
Disabled — The system password is disabled by a jumper setting on the system board.
You can only assign a system password when the following option is displayed:
Not Enabled — A system password has not been assigned and the password jumper on
the system board is in the enabled position (the default).
Advanced Features
41

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Precision 650

Table of Contents