Wireless Security
Page 3
...security layers to security breaches. Wireless access technologies have no single measure may be adequate to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for ... security whatsoever. Many of the wireless networks in General It is so in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of access from the outset that most dangerous security holes in U.S. Security in ...
...security layers to security breaches. Wireless access technologies have no single measure may be adequate to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for ... security whatsoever. Many of the wireless networks in General It is so in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of access from the outset that most dangerous security holes in U.S. Security in ...
Wireless Security
Page 6
...solution. Companies treat the devices as handheld computers, PDAs, and cellular telephones have in the pipe on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. The exposure to such devices. The security tenets of privacy, authentication, and integrity...accomplished when both access devices and portals themselves are protected by their surroundings are precautions that notebook computers address. The following subsections describe security problems specific to mobile access devices, the first link in place the usage and security policies appropriate...
...solution. Companies treat the devices as handheld computers, PDAs, and cellular telephones have in the pipe on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. The exposure to such devices. The security tenets of privacy, authentication, and integrity...accomplished when both access devices and portals themselves are protected by their surroundings are precautions that notebook computers address. The following subsections describe security problems specific to mobile access devices, the first link in place the usage and security policies appropriate...
Wireless Security
Page 7
... connects to the smart card reader through an internal antenna. This practice substantially reduces the number of possible passwords. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are connected to an integrated circuit sandwiched between layers of plastic inside the card. The smart card is most effective...
... connects to the smart card reader through an internal antenna. This practice substantially reduces the number of possible passwords. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are connected to an integrated circuit sandwiched between layers of plastic inside the card. The smart card is most effective...
Wireless Security
Page 9
... PDA device at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with the server. It generates a unique code every sixty seconds in strict synchronicity with F-Secure today. either because ...devices or through a wireless VPN connection. Software-based firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the Internet, especially through lack of a corporate security...
... PDA device at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with the server. It generates a unique code every sixty seconds in strict synchronicity with F-Secure today. either because ...devices or through a wireless VPN connection. Software-based firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the Internet, especially through lack of a corporate security...
Wireless Security
Page 11
... for CDMA and TDMA are widely used there. They can use Bluetooth, a radio frequency (RF) specification for point-to peripheral devices such as printers or other personal devices. A WPAN permits personal devices such as handheld PCs to connect wirelessly to -multipoint voice and data transfer. Figure 3: Wireless Personal-area Network Wireless Wide...
... for CDMA and TDMA are widely used there. They can use Bluetooth, a radio frequency (RF) specification for point-to peripheral devices such as printers or other personal devices. A WPAN permits personal devices such as handheld PCs to connect wirelessly to -multipoint voice and data transfer. Figure 3: Wireless Personal-area Network Wireless Wide...
Wireless Security
Page 13
... may need to the network technology; It is , the airtime provider supplies the user with WWAN connectivity. and Entrust do not have point solutions to specific applications that is necessary at this juncture, however, to be rendered unreadable or invisible to a certain degree on which information must be clear that technologies...
... may need to the network technology; It is , the airtime provider supplies the user with WWAN connectivity. and Entrust do not have point solutions to specific applications that is necessary at this juncture, however, to be rendered unreadable or invisible to a certain degree on which information must be clear that technologies...
Wireless Security
Page 19
...weaknesses in the technique. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by performing packet... switching at remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific...
...weaknesses in the technique. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by performing packet... switching at remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific...
Wireless Security
Page 20
... transmissions over a WWAN. However, their limited processing power, memory capacity, and bandwidth. WAP 2.0 was developed to solve problems specific to making interception more on standard Internet TLS, and designed so as a result of a signed digital certificate. The encryption techniques...spectrum deliberately varies the frequency of authentication: • Class 1 authentication is anonymous, meaning neither party to the link is designed specifically for WAP applications. WAP 1.2 adds support for WTLS client certificates, which to eliminate the "WAP gap." (See below for ...
... transmissions over a WWAN. However, their limited processing power, memory capacity, and bandwidth. WAP 2.0 was developed to solve problems specific to making interception more on standard Internet TLS, and designed so as a result of a signed digital certificate. The encryption techniques...spectrum deliberately varies the frequency of authentication: • Class 1 authentication is anonymous, meaning neither party to the link is designed specifically for WAP applications. WAP 1.2 adds support for WTLS client certificates, which to eliminate the "WAP gap." (See below for ...
Wireless Security
Page 21
... (SSL), as it continues to the WAP gateway. The wireless transport layer security (WTLS) on the market. The newest ratified version of convergence with wireless-specific profiles. This characteristic is effectively a profile of WAP 2.0 appear on which WAP is radically different from previous versions and represents a strong flow of WAP is...
... (SSL), as it continues to the WAP gateway. The wireless transport layer security (WTLS) on the market. The newest ratified version of convergence with wireless-specific profiles. This characteristic is effectively a profile of WAP 2.0 appear on which WAP is radically different from previous versions and represents a strong flow of WAP is...
Wireless Security
Page 24
... by intruders using similar WLAN equipment and to communicate with the attacking server, or alternatively impersonating this IP address on the Internet. Compaq is a piece of both the IStack transport layer (Infowave proprietary) and the WBE authentication and session protocols (also Infowave proprietary) in... of a wired LAN without privacy-enhancing encryption techniques. A fully secure solution will be remedied in IEEE extensions to the WEP specification that can be included in order to perform the above attack is not limited to the local area network via an Ethernet connection...
... by intruders using similar WLAN equipment and to communicate with the attacking server, or alternatively impersonating this IP address on the Internet. Compaq is a piece of both the IStack transport layer (Infowave proprietary) and the WBE authentication and session protocols (also Infowave proprietary) in... of a wired LAN without privacy-enhancing encryption techniques. A fully secure solution will be remedied in IEEE extensions to the WEP specification that can be included in order to perform the above attack is not limited to the local area network via an Ethernet connection...
Wireless Security
Page 27
...device user. It does not encrypt the over-the-air transmission. WWAN Access Points Telecommunications companies are several firewall screening methods. Specific security provided for controlling the firewall. A firewall is described above , 802.1x only provides authentication. There are responsible for ... (GUI) for WWAN technologies is often installed on procedures and authentication certificates. As mentioned above under the section titled "Security Specific to make firewall products. A firewall, working for WEP in an 802.11b LAN. This level of the network so that...
...device user. It does not encrypt the over-the-air transmission. WWAN Access Points Telecommunications companies are several firewall screening methods. Specific security provided for controlling the firewall. A firewall is described above , 802.1x only provides authentication. There are responsible for ... (GUI) for WWAN technologies is often installed on procedures and authentication certificates. As mentioned above under the section titled "Security Specific to make firewall products. A firewall, working for WEP in an 802.11b LAN. This level of the network so that...
Windows XP SP1 on Compaq Evo Notebooks
Page 6
...Cross check the revision described in the previous step with the release listed in Table 1 and on the Compaq Web site for your BIOS before installing Windows XP. 1. Check the Compaq Web site for instructions if no OS is installed.) 2. Table 1 lists the minimum versions of ROM,... The main areas addressed by SP1 are normally stored on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is booted 3. For details see Space Requirements for known Windows XP security issues For more information regarding specific fixes in the htm file on whether you install the ...
...Cross check the revision described in the previous step with the release listed in Table 1 and on the Compaq Web site for your BIOS before installing Windows XP. 1. Check the Compaq Web site for instructions if no OS is installed.) 2. Table 1 lists the minimum versions of ROM,... The main areas addressed by SP1 are normally stored on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is booted 3. For details see Space Requirements for known Windows XP security issues For more information regarding specific fixes in the htm file on whether you install the ...
Windows XP SP1 on Compaq Evo Notebooks
Page 10
... for all customers. No, unlike Windows NT you do not need to deploy SP1 based on Compaq Evo Notebooks 10 Frequently Asked Questions Should I upgrade to reinstall the Service Pack if I need to Service Pack...Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Each customer's computing environment is different. Compaq and Microsoft recommend that each customer review SP1's documentation, and then determine whether to reinstall the service pack after changing system drivers or network protocols. Microsoft Windows XP Service Pack 1 on specific...
... for all customers. No, unlike Windows NT you do not need to deploy SP1 based on Compaq Evo Notebooks 10 Frequently Asked Questions Should I upgrade to reinstall the Service Pack if I need to Service Pack...Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Each customer's computing environment is different. Compaq and Microsoft recommend that each customer review SP1's documentation, and then determine whether to reinstall the service pack after changing system drivers or network protocols. Microsoft Windows XP Service Pack 1 on specific...
Evo Notebook N600c Software Overview
Page 10
..., system administrators, and technical support providers. 15KR-0901A-WWEN Windows 98 ! With Configuration Record, users can locally retrieve detailed information specific to enable Compaq specific features of the system hardware and software configuration. Evo Notebook N600c Software Overview 10 Software Enhancements This section discusses the following software enhancements: • Setup and Diagnostics • Intelligent Manageability...
..., system administrators, and technical support providers. 15KR-0901A-WWEN Windows 98 ! With Configuration Record, users can locally retrieve detailed information specific to enable Compaq specific features of the system hardware and software configuration. Evo Notebook N600c Software Overview 10 Software Enhancements This section discusses the following software enhancements: • Setup and Diagnostics • Intelligent Manageability...
Hard Drive White Paper
Page 2
...powering off (non-operational shock). - The hard drive in symptoms such as a clicking noise, the failure to shock events beyond the set specifications, the hard drive can fail. Shock events can also be degraded if file fragmentation is not stored contiguously on a "first available space" ... system bugs, and/or file corruption. Fragmentation occurs when all is turned off the notebook before the operating system shuts down can create corrupted boot files, resulting in the notebook is reading or writing data (operational shock). Other types of hard drive performance issues that...
...powering off (non-operational shock). - The hard drive in symptoms such as a clicking noise, the failure to shock events beyond the set specifications, the hard drive can fail. Shock events can also be degraded if file fragmentation is not stored contiguously on a "first available space" ... system bugs, and/or file corruption. Fragmentation occurs when all is turned off the notebook before the operating system shuts down can create corrupted boot files, resulting in the notebook is reading or writing data (operational shock). Other types of hard drive performance issues that...
Compaq Notebook Series Software Guide
Page 82
... from floppy Restore defaults Ignore changes and exit Save changes and exit To Do This ■ View identification information about the notebook, a port replicator, and any battery packs in the system. ■ View specification information about the processor, memory and cache size, and system ROM. Replace configuration settings in effect when the...
... from floppy Restore defaults Ignore changes and exit Save changes and exit To Do This ■ View identification information about the notebook, a port replicator, and any battery packs in the system. ■ View specification information about the processor, memory and cache size, and system ROM. Replace configuration settings in effect when the...
Hardware Guide, Compaq Notebook Series
Page 1
b Hardware Guide Compaq Notebook Series Document Part Number: 265656-001 June 2002 This guide explains how to identify and use notebook hardware features, including connectors for external devices. It also includes power and environmental specifications, which may be helpful when traveling with the notebook.
b Hardware Guide Compaq Notebook Series Document Part Number: 265656-001 June 2002 This guide explains how to identify and use notebook hardware features, including connectors for external devices. It also includes power and environmental specifications, which may be helpful when traveling with the notebook.
Hardware Guide, Compaq Notebook Series
Page 7
Contents Increasing Memory 7-4 Displaying Memory Information 7-4 Removing or Inserting a Memory Board 7-5 Replacing the Primary Hard Drive 7-10 Finding Mini PCI and MultiPort Information 7-12 8 Specifications Regulatory Agency Series Numbers 8-1 Notebook Dimensions 8-2 Operating Environment 8-2 Rated Input Power 8-3 Modem Specifications 8-3 Finding More Environmental Information 8-4 Index Hardware Guide vii
Contents Increasing Memory 7-4 Displaying Memory Information 7-4 Removing or Inserting a Memory Board 7-5 Replacing the Primary Hard Drive 7-10 Finding Mini PCI and MultiPort Information 7-12 8 Specifications Regulatory Agency Series Numbers 8-1 Notebook Dimensions 8-2 Operating Environment 8-2 Rated Input Power 8-3 Modem Specifications 8-3 Finding More Environmental Information 8-4 Index Hardware Guide vii
Hardware Guide, Compaq Notebook Series
Page 26
Cord and Cables Identifying External Hardware Additional Standard Components: Cord and Cables 1 Power cord* Connects the AC Adapter to an AC electrical outlet. 2 Modem cable Connects the modem to an RJ-11 telephone jack or to a country-specific modem adapter. ✎ The modem cable has a 6-pin RJ-11 telephone connector at each end. 3 Network cable (select models only) Connects the notebook to an Ethernet network jack. ✎ The network cable has an 8-pin RJ-45 network connector at each end. *Power cords vary in appearance by region. Hardware Guide 1-19
Cord and Cables Identifying External Hardware Additional Standard Components: Cord and Cables 1 Power cord* Connects the AC Adapter to an AC electrical outlet. 2 Modem cable Connects the modem to an RJ-11 telephone jack or to a country-specific modem adapter. ✎ The modem cable has a 6-pin RJ-11 telephone connector at each end. 3 Network cable (select models only) Connects the notebook to an Ethernet network jack. ✎ The network cable has an 8-pin RJ-45 network connector at each end. *Power cords vary in appearance by region. Hardware Guide 1-19
Hardware Guide, Compaq Notebook Series
Page 27
... and Accessories 1 AC Adapter* Converts AC power to DC power. 2 Country-specific modem adapter (included by region as required) Adapts the modem cable to a non-RJ-11 telephone jack. 3 Japan-specific outlet adapter (Japan only) Connects the AC Adapter to a 2-prong electrical outlet.... 4 Spare pointing stick cap (dual device models only) Replaces a worn pointing stick cap. 5 Weight saver (may ship in MultiBay) Can replace an optional MultiBay device to protect the MultiBay and reduce notebook...
... and Accessories 1 AC Adapter* Converts AC power to DC power. 2 Country-specific modem adapter (included by region as required) Adapts the modem cable to a non-RJ-11 telephone jack. 3 Japan-specific outlet adapter (Japan only) Connects the AC Adapter to a 2-prong electrical outlet.... 4 Spare pointing stick cap (dual device models only) Replaces a worn pointing stick cap. 5 Weight saver (may ship in MultiBay) Can replace an optional MultiBay device to protect the MultiBay and reduce notebook...