Security - Fujitsu DESKPOWER C600 User Manual

Fujitsu deskpower c600 computer box
Hide thumbs Also See for DESKPOWER C600:
Table of Contents

Advertisement

1 Security

Connect the display, keyboard, and power cord to the PC.
WARNING
The security functions do not guarantee the complete check of personal identification. Fujitsu
is not responsible to any damage that is caused by the use of security functions or no use of
them.
The PC owner is responsible to its security.
The PC user needs to regularly maintain the PC security environment in order to minimise
unauthorised access.
When the PC is used, the danger of system destruction by computer virus, the leakage of
information, illegal use, burglary and others increases. To protect important information from these
danger, the PC has various security functions.
The following briefly explains the danger that may exist and the preparation useful for problem
solution.
Computer virus
Computer Virus are made using PCs to corrupt data or destroy data on other users PCs. The
virus infects other PCs thru the Internet ,e-mails and downloads.
Information leakage
Computer viruses can enter PCs via the network to steal or destory important data. Information
may be retrieved illegally from disposed PCs by using special softwares.
Point
Take extra care when disposing floppy disks, CD-R/RW disks and MO disks which contains
sensitive data.We recommend to scratch the disk media or completely erase the data before
disposing.
Illegal use
To prevent unauthorised use of your deskpower,we recommend the use of a password during
setup and general usage.Unauthorized access to your PC can be minimised if you use a password
that is difficult to guess.
Burglary
The PC may be stolen and the data in the PC may be used illegally against the owner.
Preparing for the trouble
No perfect security of the PC exists. You can minimize the damage by making a backup copy of
data and updating the software to the latest version.
For more information, refer to the "Preparing for the trouble" section of "Troubleshooting."
22

Advertisement

Table of Contents
loading

Table of Contents