Securing Your Computer; Using A Computer Security Lock; Using Passwords - Acer Aspire E1-522 User Manual

Hide thumbs Also See for Aspire E1-522:
Table of Contents

Advertisement

S
ECURI NG Y O U R COMPUTER
Your computer is a valuable investment that you need to take care of.
Learn how to protect and take care of your computer.
Security features include hardware and software locks — a security notch
and passwords.

Using a computer security lock

The computer comes with a Kensington-compatible security slot for a
The computer comes with a Kensington-compatible security slot for a
The computer comes with a Kensington-compatible security slot for a
security lock.
Wrap a computer security lock cable around an immovable object such as
Wrap a computer security lock cable around an immovable object such as
Wrap a computer security lock cable around an immovable object such as
a table or handle of a locked drawer. Insert the lock into the notch and turn
or handle of a locked drawer. Insert the lock into the notch and turn
or handle of a locked drawer. Insert the lock into the notch and turn
the key to secure the lock. Some keyless models are also available.
the key to secure the lock. Some keyless models are also available.
the key to secure the lock. Some keyless models are also available.

Using passwords

Using passwords
Using passwords
Passwords protect your computer from unauthorized access. Setting
Passwords protect your computer from unauthorized access. Setting
Passwords protect your computer from unauthorized access. Setting
these passwords creates several different levels of protection for your
these passwords creates several different levels of protection for your
these passwords creates several different levels of protection for your
computer and data:
computer and data:
computer and data:
• Supervisor Password prevents unauthorized entry into the BIOS utility.
Once set, you must enter this password to gain access to the BIOS
utility. See "BIOS utility" on page 80.
• User Password secures your computer against unauthorized use.
Combine the use of this password with password checkpoints on boot-
up and resume from Hibernation (if available) for maximum security.

Securing your computer - 71

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents