A4L/G English Hardware User''s Manual(E1701)
Page 5
...PC Use a carrying case such as it from dirt, water, shock, and scratches. Airplane Precautions Contact your Notebook PC and diskettes through security checks), and magnetic wands (hand-held devices used on people or individual items). Most airlines will have restrictions for . The hard disk ...is plugged into the computer and an AC power source. You can send your airline if you want to prevent scratching of airport security devices: X-ray machines (used on items placed on conveyor belts), magnetic detectors (used on people walking through airport Xray machines. ...
...PC Use a carrying case such as it from dirt, water, shock, and scratches. Airplane Precautions Contact your Notebook PC and diskettes through security checks), and magnetic wands (hand-held devices used on people or individual items). Most airlines will have restrictions for . The hard disk ...is plugged into the computer and an AC power source. You can send your airline if you want to prevent scratching of airport security devices: X-ray machines (used on items placed on conveyor belts), magnetic detectors (used on people walking through airport Xray machines. ...
A4L/G English Hardware User''s Manual(E1701)
Page 10
Contents Appendix ...59 Optional Accessories...60 USB Hub (Optional) ...60 USB 2.0 Slim Combo Drive (Optional 60 Wireless LAN Cardbus Card or USB 61 USB Flash Memory Disk 61 USB Communication Cable 61 USB Floppy Disk Drive ...62 USB Keyboard and Mouse 62 Optional Connections ...63 Monitor Out Connection 63 External Audio Connections 63 Printer Connection ...64 IEEE1394 Connection ...64 Securing Your Notebook PC 64 DVD-ROM Drive Information 65 Internal Modem Compliancy 66 Glossary ...68 Notebook PC Information ...74 10
Contents Appendix ...59 Optional Accessories...60 USB Hub (Optional) ...60 USB 2.0 Slim Combo Drive (Optional 60 Wireless LAN Cardbus Card or USB 61 USB Flash Memory Disk 61 USB Communication Cable 61 USB Floppy Disk Drive ...62 USB Keyboard and Mouse 62 Optional Connections ...63 Monitor Out Connection 63 External Audio Connections 63 Printer Connection ...64 IEEE1394 Connection ...64 Securing Your Notebook PC 64 DVD-ROM Drive Information 65 Internal Modem Compliancy 66 Glossary ...68 Notebook PC Information ...74 10
A4L/G English Hardware User''s Manual(E1701)
Page 20
Some security products may also include a motion detector to the Notebook PC and charges the internal battery pack. USB supports hot-swapping of the Notebook PC. Use ... Input Jack (Mic In) The mono microphone jack (1/8 inch) can be removed from audio devices. These security products usually include a metal cable and lock that peripherals can be secured using Kensington® compatible Notebook PC security products. Power (DC) Input The supplied power adapter converts AC power to DC power for video conferencing...
Some security products may also include a motion detector to the Notebook PC and charges the internal battery pack. USB supports hot-swapping of the Notebook PC. Use ... Input Jack (Mic In) The mono microphone jack (1/8 inch) can be removed from audio devices. These security products usually include a metal cable and lock that peripherals can be secured using Kensington® compatible Notebook PC security products. Power (DC) Input The supplied power adapter converts AC power to DC power for video conferencing...
A4L/G English Hardware User''s Manual(E1701)
Page 31
In case the operating system hangs (stops, freezes, crashes), try a "warm boot" by pressing [Ctrl][Alt][Del] keys simultaneously. (You may be prompted to restart the system. Some installation processes will provide a dialog box to allow restart. To restart the system manually: Click the Start button and select Shut Down | and choose Restart. 3 Getting Started Restarting or Rebooting After making changes to your operating system, you may try a few times if there is no response.) The screens are different depending on your security settings. 31
In case the operating system hangs (stops, freezes, crashes), try a "warm boot" by pressing [Ctrl][Alt][Del] keys simultaneously. (You may be prompted to restart the system. Some installation processes will provide a dialog box to allow restart. To restart the system manually: Click the Start button and select Shut Down | and choose Restart. 3 Getting Started Restarting or Rebooting After making changes to your operating system, you may try a few times if there is no response.) The screens are different depending on your security settings. 31
A4L/G English Hardware User''s Manual(E1701)
Page 32
... to 1 second to power ON) after closing applications and exiting operating systems. Holding the power switch for 2 seconds is necessary in order to shutdown your security settings. For operating systems without proper power management (DOS, Windows NT), you must power OFF the Notebook PC by using Start | Shut Down... | Turn off...
... to 1 second to power ON) after closing applications and exiting operating systems. Holding the power switch for 2 seconds is necessary in order to shutdown your security settings. For operating systems without proper power management (DOS, Windows NT), you must power OFF the Notebook PC by using Start | Shut Down... | Turn off...
A4L/G English Hardware User''s Manual(E1701)
Page 49
...be standard or with MS Pro adapter). This Notebook PC has a single built-in memory card reader that can read the following flash memory cards: Secure Digital (SD), Multi-Media Card (MMC), Memory Stick (MS), Memory Stick Select (MS Select), Memory Stick Duo (with MS adapter), Memory Stick ...) Duo/Pro/Duo Pro/MG MS (Memory Stick) Magic Gate (MG) MS (Memory Stick) Select MS (Memory Stick) MMC (Multimedia Card) SD (Secure Digital) SD MS (Memory Stick) IMPORTANT! Memory Sticks may occur. 49 Never remove cards while or immediately after reading, copying, formatting, or deleting data on...
...be standard or with MS Pro adapter). This Notebook PC has a single built-in memory card reader that can read the following flash memory cards: Secure Digital (SD), Multi-Media Card (MMC), Memory Stick (MS), Memory Stick Select (MS Select), Memory Stick Duo (with MS adapter), Memory Stick ...) Duo/Pro/Duo Pro/MG MS (Memory Stick) Magic Gate (MG) MS (Memory Stick) Select MS (Memory Stick) MMC (Multimedia Card) SD (Secure Digital) SD MS (Memory Stick) IMPORTANT! Memory Sticks may occur. 49 Never remove cards while or immediately after reading, copying, formatting, or deleting data on...
A4L/G English Hardware User''s Manual(E1701)
Page 64
IEEE1394 Connection 1394 is also used to secure your Notebook PC physically to secure the lock in place. 64 Securing Your Notebook PC For system and hard disk drive security, see BIOS setup "Security". Up to 63 devices such as hard disk drives, scanners, removable drives, and digital cameras/ video cameras with an 1394 port can...
IEEE1394 Connection 1394 is also used to secure your Notebook PC physically to secure the lock in place. 64 Securing Your Notebook PC For system and hard disk drive security, see BIOS setup "Security". Up to 63 devices such as hard disk drives, scanners, removable drives, and digital cameras/ video cameras with an 1394 port can...
A4L/G English Hardware User''s Manual(E1701)
Page 70
DVD aims to sound an alarm when moved. 70 IEEE1394 Also known as printers, modems, and pointing devices. Some security products may also include a motion detector to encompass home entertainment, computers, and business information with a single digital format, eventually replacing audio CD, ...as well as VGA, audio, Ethernet, printer, or modem. Kensington® Locks Kensington® locks (or compatible) allow the Notebook PC to be secured usually using a metal cable and lock that prevent the Notebook PC to be marked "DV" for Digital Video port. Hardware Hardware is a direct line...
DVD aims to sound an alarm when moved. 70 IEEE1394 Also known as printers, modems, and pointing devices. Some security products may also include a motion detector to encompass home entertainment, computers, and business information with a single digital format, eventually replacing audio CD, ...as well as VGA, audio, Ethernet, printer, or modem. Kensington® Locks Kensington® locks (or compatible) allow the Notebook PC to be secured usually using a metal cable and lock that prevent the Notebook PC to be marked "DV" for Digital Video port. Hardware Hardware is a direct line...
A4L/G English Hardware User''s Manual(E1701)
Page 74
Keep this User's Manual in a secured location if passwords are filled out. A Appendix Notebook PC Information This page is provided for recording information concerning your Notebook PC for future reference or ... 2nd Hard Disk Drive Manufacturer Capacity BIOS Version Date Accessories Serial Number Accessories Serial Number Software Operating System Version Software Serial Number Software Serial Number Security Supervisor Password User Password Network User's Name Password Domain User's Name Password Domain 74
Keep this User's Manual in a secured location if passwords are filled out. A Appendix Notebook PC Information This page is provided for recording information concerning your Notebook PC for future reference or ... 2nd Hard Disk Drive Manufacturer Capacity BIOS Version Date Accessories Serial Number Accessories Serial Number Software Operating System Version Software Serial Number Software Serial Number Security Supervisor Password User Password Network User's Name Password Domain User's Name Password Domain 74
A4L/G Software user''s manual (English Version)E1702
Page 32
... the Administrator name and use one password, then use the Administrator name with another name. NOTE: After clicking "OK", you will perform routing functions and security verifications for the Domain Controller's Administrator password to join the domain in Windows XP. (4b) Workgroup: If your network does not have a domain or you...
... the Administrator name and use one password, then use the Administrator name with another name. NOTE: After clicking "OK", you will perform routing functions and security verifications for the Domain Controller's Administrator password to join the domain in Windows XP. (4b) Workgroup: If your network does not have a domain or you...
A4L/G Software user''s manual (English Version)E1702
Page 37
Enter any name to represent your modem and click Next. 6. Select "Set up number for your ISP. 8. Enter the dial up my connection manually" and click Next. 4. Select your ISP. 7. Selection one of the security preferences and click Next. 37 Select "Connect using a dialup modem" and click Next. 5. Modem Configuration (Cont') Software Drivers 3.
Enter any name to represent your modem and click Next. 6. Select "Set up number for your ISP. 8. Enter the dial up my connection manually" and click Next. 4. Select your ISP. 7. Selection one of the security preferences and click Next. 37 Select "Connect using a dialup modem" and click Next. 5. Modem Configuration (Cont') Software Drivers 3.
A4L/G Software user''s manual (English Version)E1702
Page 56
..., the program behind the interface uses the latest technology and provides you with all the powerful features of the computer • Protect your secure computing needs. Here's what PC-cillin will do "straight out of the box": • Checks for viruses every time you open, copy, move...the home or small office user, the friendly interface lets you connect to PC-cillin 2002 Trend Micro PC-cillin 2002 provides next generation secure computing for macro viruses, using a combination of mind whenever you quickly become familiar with protection from Windows Explorer or My Computer by right...
..., the program behind the interface uses the latest technology and provides you with all the powerful features of the computer • Protect your secure computing needs. Here's what PC-cillin will do "straight out of the box": • Checks for viruses every time you open, copy, move...the home or small office user, the friendly interface lets you connect to PC-cillin 2002 Trend Micro PC-cillin 2002 provides next generation secure computing for macro viruses, using a combination of mind whenever you quickly become familiar with protection from Windows Explorer or My Computer by right...
A4L/G Software user''s manual (English Version)E1702
Page 57
..., easy-to locate your computer. Best of Death, IP conflict, SYN flooding, and others. Software Utilities Personal Firewall PC-cillin 2002 provides secure Internet computing with secure computing on your system). Even computers that are still vulnerable to defend against attacks hackers commonly use antivirus... security for Wireless is bundled with PC-cillin 2002 providing you add these safe sites to operate, the Personal Firewall protects your computer ...
..., easy-to locate your computer. Best of Death, IP conflict, SYN flooding, and others. Software Utilities Personal Firewall PC-cillin 2002 provides secure Internet computing with secure computing on your system). Even computers that are still vulnerable to defend against attacks hackers commonly use antivirus... security for Wireless is bundled with PC-cillin 2002 providing you add these safe sites to operate, the Personal Firewall protects your computer ...
A4L/G Software user''s manual (English Version)E1702
Page 60
..., network server, or the Internet. Ego, revenge, sabotage, and basic disgruntlement have been popping up after which you can view updated Security Alerts and Virus Advisories. In other words, no single, likely profile exists by name and virus type. Viewing the Trend Micro Virus list...typical symptoms of detecting all registered users, after ) viruses. To access the Trend Micro Virus Encyclopedia, on the PC-cillin menu bar click, Security Info > Virus List. In addition, you must purchase renewal maintenance. Software Utilities How viruses are created Until a few years ago, creating a...
..., network server, or the Internet. Ego, revenge, sabotage, and basic disgruntlement have been popping up after which you can view updated Security Alerts and Virus Advisories. In other words, no single, likely profile exists by name and virus type. Viewing the Trend Micro Virus list...typical symptoms of detecting all registered users, after ) viruses. To access the Trend Micro Virus Encyclopedia, on the PC-cillin menu bar click, Security Info > Virus List. In addition, you must purchase renewal maintenance. Software Utilities How viruses are created Until a few years ago, creating a...