A4L/G English Hardware User''s Manual(E1701)
Page 5
...the one supplied with your Notebook PC. Remember that you do not send your airline if you intend to prevent scratching of airport security devices: X-ray machines (used on items placed on conveyor belts), magnetic detectors (used on people walking through airport magnetic detectors or...send your battery pack and any optional battery packs before going on the airplane. Airplane Precautions Contact your Notebook PC or diskettes through security checks), and magnetic wands (hand-held devices used on people or individual items). There are three main types of the hard disk...
...the one supplied with your Notebook PC. Remember that you do not send your airline if you intend to prevent scratching of airport security devices: X-ray machines (used on items placed on conveyor belts), magnetic detectors (used on people walking through airport magnetic detectors or...send your battery pack and any optional battery packs before going on the airplane. Airplane Precautions Contact your Notebook PC or diskettes through security checks), and magnetic wands (hand-held devices used on people or individual items). There are three main types of the hard disk...
A4L/G English Hardware User''s Manual(E1701)
Page 10
Contents Appendix ...59 Optional Accessories...60 USB Hub (Optional) ...60 USB 2.0 Slim Combo Drive (Optional 60 Wireless LAN Cardbus Card or USB 61 USB Flash Memory Disk 61 USB Communication Cable 61 USB Floppy Disk Drive ...62 USB Keyboard and Mouse 62 Optional Connections ...63 Monitor Out Connection 63 External Audio Connections 63 Printer Connection ...64 IEEE1394 Connection ...64 Securing Your Notebook PC 64 DVD-ROM Drive Information 65 Internal Modem Compliancy 66 Glossary ...68 Notebook PC Information ...74 10
Contents Appendix ...59 Optional Accessories...60 USB Hub (Optional) ...60 USB 2.0 Slim Combo Drive (Optional 60 Wireless LAN Cardbus Card or USB 61 USB Flash Memory Disk 61 USB Communication Cable 61 USB Floppy Disk Drive ...62 USB Keyboard and Mouse 62 Optional Connections ...63 Monitor Out Connection 63 External Audio Connections 63 Printer Connection ...64 IEEE1394 Connection ...64 Securing Your Notebook PC 64 DVD-ROM Drive Information 65 Internal Modem Compliancy 66 Glossary ...68 Notebook PC Information ...74 10
A4L/G English Hardware User''s Manual(E1701)
Page 20
... the internal battery pack. Microphone Input Jack (Mic In) The mono microphone jack (1/8 inch) can be secured using Kensington® compatible Notebook PC security products. Power supplied through this jack automatically disables the built-in a series up to be connected or disconnected... without restarting the computer. These security products usually include a metal cable and lock that peripherals can be removed from audio devices. Some security products may also include a motion detector to identify the components on a single ...
... the internal battery pack. Microphone Input Jack (Mic In) The mono microphone jack (1/8 inch) can be secured using Kensington® compatible Notebook PC security products. Power supplied through this jack automatically disables the built-in a series up to be connected or disconnected... without restarting the computer. These security products usually include a metal cable and lock that peripherals can be removed from audio devices. Some security products may also include a motion detector to identify the components on a single ...
A4L/G English Hardware User''s Manual(E1701)
Page 31
To restart the system manually: Click the Start button and select Shut Down | and choose Restart. Some installation processes will provide a dialog box to restart the system. In case the operating system hangs (stops, freezes, crashes), try a few times if there is no response.) The screens are different depending on your security settings. 31 3 Getting Started Restarting or Rebooting After making changes to your operating system, you may try a "warm boot" by pressing [Ctrl][Alt][Del] keys simultaneously. (You may be prompted to allow restart.
To restart the system manually: Click the Start button and select Shut Down | and choose Restart. Some installation processes will provide a dialog box to restart the system. In case the operating system hangs (stops, freezes, crashes), try a few times if there is no response.) The screens are different depending on your security settings. 31 3 Getting Started Restarting or Rebooting After making changes to your operating system, you may try a "warm boot" by pressing [Ctrl][Alt][Del] keys simultaneously. (You may be prompted to allow restart.
A4L/G English Hardware User''s Manual(E1701)
Page 32
... to 1 second to power ON) after closing applications and exiting operating systems. Holding the power switch for 2 seconds is necessary in order to shutdown your security settings.
... to 1 second to power ON) after closing applications and exiting operating systems. Holding the power switch for 2 seconds is necessary in order to shutdown your security settings.
A4L/G English Hardware User''s Manual(E1701)
Page 49
...Memory Stick) Duo/Pro/Duo Pro/MG MS (Memory Stick) Magic Gate (MG) MS (Memory Stick) Select MS (Memory Stick) MMC (Multimedia Card) SD (Secure Digital) SD MS (Memory Stick) IMPORTANT! This Notebook PC has a single built-in memory card reader is not only convenient, but also faster than most... memory card readers because it utilizes the high-bandwidth PCI bus. The built-in memory card reader that can read the following flash memory cards: Secure Digital (SD), Multi-Media Card (MMC), Memory Stick (MS), Memory Stick Select (MS Select), Memory Stick Duo (with MS adapter), Memory Stick Pro,...
...Memory Stick) Duo/Pro/Duo Pro/MG MS (Memory Stick) Magic Gate (MG) MS (Memory Stick) Select MS (Memory Stick) MMC (Multimedia Card) SD (Secure Digital) SD MS (Memory Stick) IMPORTANT! This Notebook PC has a single built-in memory card reader is not only convenient, but also faster than most... memory card readers because it utilizes the high-bandwidth PCI bus. The built-in memory card reader that can read the following flash memory cards: Secure Digital (SD), Multi-Media Card (MMC), Memory Stick (MS), Memory Stick Select (MS Select), Memory Stick Duo (with MS adapter), Memory Stick Pro,...
A4L/G English Hardware User''s Manual(E1701)
Page 64
... One or more 1394 devices can be connected using a 1394 hub). 1394 is also used to secure the lock in high-end digital equipment and should be simultaneously used to secure your Notebook PC physically to 63 devices such as shown in this illustration and a key or combination...video cameras with an 1394 port can all be connected (more USB printers can be purchased from third-parties. Securing Your Notebook PC For system and hard disk drive security, see BIOS setup "Security". Up to an unmovable object. A Appendix Optional Connections (Cont.) These items, if desired, may be used...
... One or more 1394 devices can be connected using a 1394 hub). 1394 is also used to secure the lock in high-end digital equipment and should be simultaneously used to secure your Notebook PC physically to 63 devices such as shown in this illustration and a key or combination...video cameras with an 1394 port can all be connected (more USB printers can be purchased from third-parties. Securing Your Notebook PC For system and hard disk drive security, see BIOS setup "Security". Up to an unmovable object. A Appendix Optional Connections (Cont.) These items, if desired, may be used...
A4L/G English Hardware User''s Manual(E1701)
Page 70
...operating system to 63 units on the drive itself, eliminating the need for a separate adapter card (in high-end digital equipment and should be secured usually using a metal cable and lock that prevent the Notebook PC to each other without a network. Device Driver A device driver is a special... set of 400-1000 Mbits/sec and can handle up to sound an alarm when moved. 70 Some security products may also include a motion detector to 33MB/Sec transfer. IDE (Integrated Drive Electronics) IDE devices integrate the drive control circuitry directly on ...
...operating system to 63 units on the drive itself, eliminating the need for a separate adapter card (in high-end digital equipment and should be secured usually using a metal cable and lock that prevent the Notebook PC to each other without a network. Device Driver A device driver is a special... set of 400-1000 Mbits/sec and can handle up to sound an alarm when moved. 70 Some security products may also include a motion detector to 33MB/Sec transfer. IDE (Integrated Drive Electronics) IDE devices integrate the drive control circuitry directly on ...
A4L/G English Hardware User''s Manual(E1701)
Page 74
... 2nd Hard Disk Drive Manufacturer Capacity BIOS Version Date Accessories Serial Number Accessories Serial Number Software Operating System Version Software Serial Number Software Serial Number Security Supervisor Password User Password Network User's Name Password Domain User's Name Password Domain 74 Keep this User's Manual in...
... 2nd Hard Disk Drive Manufacturer Capacity BIOS Version Date Accessories Serial Number Accessories Serial Number Software Operating System Version Software Serial Number Software Serial Number Security Supervisor Password User Password Network User's Name Password Domain User's Name Password Domain 74 Keep this User's Manual in...
A4L/G Software user''s manual (English Version)E1702
Page 32
NOTE: After clicking "OK", you will perform routing functions and security verifications for the Domain Controller's Administrator password to join the domain in Windows XP. (4b) Workgroup: If your network does not have a domain or you ...
NOTE: After clicking "OK", you will perform routing functions and security verifications for the Domain Controller's Administrator password to join the domain in Windows XP. (4b) Workgroup: If your network does not have a domain or you ...
A4L/G Software user''s manual (English Version)E1702
Page 37
Enter any name to represent your modem and click Next. 6. Select "Set up number for your ISP. 8. Select "Connect using a dialup modem" and click Next. 5. Enter the dial up my connection manually" and click Next. 4. Selection one of the security preferences and click Next. 37 Select your ISP. 7. Modem Configuration (Cont') Software Drivers 3.
Enter any name to represent your modem and click Next. 6. Select "Set up number for your ISP. 8. Select "Connect using a dialup modem" and click Next. 5. Enter the dial up my connection manually" and click Next. 4. Selection one of the security preferences and click Next. 37 Select your ISP. 7. Modem Configuration (Cont') Software Drivers 3.
A4L/G Software user''s manual (English Version)E1702
Page 56
... for macro viruses • Scan your email attachments as they are being downloaded from an Internet (POP3) mail server • Protect your secure computing needs. More than just antivirus software, PC-cillin includes a Personal Firewall, Site filter, Internet mail scanning, and more for macro viruses...56 Designed for today's personal computers. Software Utilities Welcome to PC-cillin 2002 Trend Micro PC-cillin 2002 provides next generation secure computing for the home or small office user, the friendly interface lets you quickly become familiar with all the powerful features of ...
... for macro viruses • Scan your email attachments as they are being downloaded from an Internet (POP3) mail server • Protect your secure computing needs. More than just antivirus software, PC-cillin includes a Personal Firewall, Site filter, Internet mail scanning, and more for macro viruses...56 Designed for today's personal computers. Software Utilities Welcome to PC-cillin 2002 Trend Micro PC-cillin 2002 provides next generation secure computing for the home or small office user, the friendly interface lets you quickly become familiar with all the powerful features of ...
A4L/G Software user''s manual (English Version)E1702
Page 57
...Palm, Pocket PC, or EPOC device during beaming, synchronization, or Internet access. Trend Micro PC-cillin for wireless devices; to -use antivirus security for Wireless provides portable, easy-to defend against attacks hackers commonly use your computer to a list. Cloaking hides the entry points (ports) ...may be Web sites that only connect to the Internet for Wireless is comprised of time are safe and will be filtered. With adjustable security levels, a trusted site list, and a port blocking function, the Personal Firewall gives you with its new Personal Firewall feature. The ...
...Palm, Pocket PC, or EPOC device during beaming, synchronization, or Internet access. Trend Micro PC-cillin for wireless devices; to -use antivirus security for Wireless provides portable, easy-to defend against attacks hackers commonly use your computer to a list. Cloaking hides the entry points (ports) ...may be Web sites that only connect to the Internet for Wireless is comprised of time are safe and will be filtered. With adjustable security levels, a trusted site list, and a port blocking function, the Personal Firewall gives you with its new Personal Firewall feature. The ...
A4L/G Software user''s manual (English Version)E1702
Page 60
...to cause widespread, random damage to receive technical support. 60 To access the Trend Micro Virus list, on the PC-cillin menu bar, click Security Info > Encyclopedia.. Of course, PC-cillin, which you can create a virus. To access the Trend Micro Virus Encyclopedia, on the PC-...cillin menu bar click, Security Info > Virus List. In the typical scenario, it onto a single computer, network server, or the Internet. Recently, do-it to be described ...
...to cause widespread, random damage to receive technical support. 60 To access the Trend Micro Virus list, on the PC-cillin menu bar, click Security Info > Encyclopedia.. Of course, PC-cillin, which you can create a virus. To access the Trend Micro Virus Encyclopedia, on the PC-...cillin menu bar click, Security Info > Virus List. In the typical scenario, it onto a single computer, network server, or the Internet. Recently, do-it to be described ...