TravelMate 4020 User's Guide
Page 48
...on screen to disk window, select 01. Re-install bundled software without CD Acer eRecovery stores pre-loaded software internally for easy driver and application re-installation. 1 Boot to Windows XP. 2 Press + to open the Acer eRecovery utility. 3 Enter the password to the Create backup section. Note: ...The "Restore C:" item is enabled only if there is six zeros. 4 In the Acer eRecovery window, select...
...on screen to disk window, select 01. Re-install bundled software without CD Acer eRecovery stores pre-loaded software internally for easy driver and application re-installation. 1 Boot to Windows XP. 2 Press + to open the Acer eRecovery utility. 3 Enter the password to the Create backup section. Note: ...The "Restore C:" item is enabled only if there is six zeros. 4 In the Acer eRecovery window, select...
TravelMate 4020 User's Guide
Page 49
...driver/application and follow the instructions on screen to complete the process. The default password is six zeros. 4 In the Acer eRecovery window, select Recovery settings and click Next. 5 In the Recovery settings window, select Password: Change Acer...to re-install. At first launch, Acer eRecovery prepares all the needed software and may take few seconds to proceed. Change password Acer eRecovery and Acer disk-to restore the factory default ...Windows, you can be changed by a password that can run Acer disk-to-disk recovery to -disk recovery are protected by the user. Follow the ...
...driver/application and follow the instructions on screen to complete the process. The default password is six zeros. 4 In the Acer eRecovery window, select Recovery settings and click Next. 5 In the Recovery settings window, select Password: Change Acer...to re-install. At first launch, Acer eRecovery prepares all the needed software and may take few seconds to proceed. Change password Acer eRecovery and Acer disk-to restore the factory default ...Windows, you can be changed by a password that can run Acer disk-to-disk recovery to -disk recovery are protected by the user. Follow the ...