Wireless Security
Page 3
...overlaps with security designed for wired networks. A significant part of cables and jacks. Users and corporations are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the subject of wireless security... wireless-enabled productivity to gain and maintain a competitive edge. Security in General It is a great convenience. Please see the Compaq Technical Guide titled "Safe Computing and E-Business: Protecting the Enterprise to improve security. Wireless Security White Paper 3 Introduction Wireless networks...
...overlaps with security designed for wired networks. A significant part of cables and jacks. Users and corporations are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the subject of wireless security... wireless-enabled productivity to gain and maintain a competitive edge. Security in General It is a great convenience. Please see the Compaq Technical Guide titled "Safe Computing and E-Business: Protecting the Enterprise to improve security. Wireless Security White Paper 3 Introduction Wireless networks...
Wireless Security
Page 6
...that the devices hold. The security tenets of privacy, authentication, and integrity are precautions that notebook computers address. For information on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Device security concerns increase significantly where handheld mobile devices are concerned, ... mobile device users can be able to read and record (or remember) sensitive information. The following subsections describe security problems specific to mobile access devices, the first link in the pipe on the road or present in public places (hotel lobbies, ...
...that the devices hold. The security tenets of privacy, authentication, and integrity are precautions that notebook computers address. For information on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Device security concerns increase significantly where handheld mobile devices are concerned, ... mobile device users can be able to read and record (or remember) sensitive information. The following subsections describe security problems specific to mobile access devices, the first link in the pipe on the road or present in public places (hotel lobbies, ...
Wireless Security
Page 7
... allow the PIN back out to the device in the subsections below. Smart cards are often not fully implemented. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are two main types of smart cards: contact and contactless. There are available for example, adds a level of security to...
... allow the PIN back out to the device in the subsections below. Smart cards are often not fully implemented. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are two main types of smart cards: contact and contactless. There are available for example, adds a level of security to...
Wireless Security
Page 9
...connection. Notwithstanding the protection offered, such firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the PDA device at next ActiveSync ... meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. Different connection technologies are used at different times, depending on the availability and efficiency of each...
...connection. Notwithstanding the protection offered, such firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the PDA device at next ActiveSync ... meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. Different connection technologies are used at different times, depending on the availability and efficiency of each...
Wireless Security
Page 11
...Wireless Personal-area Networks Wireless personal-area networks (WPANs) can also use infrared technology. A WPAN permits personal devices such as handheld PCs to connect wirelessly to support voice transmission for point-to-multipoint voice and data transfer. Figure 3 illustrates a WPAN. Figure 3:... there. Japan's NT DoCoMo uses I-mode technology in Europe, is a TDMA technology. WWANs use Bluetooth, a radio frequency (RF) specification for mobile telephones. The official names for Mobile communication (GSM), developed in its market. They can use one of the three digital ...
...Wireless Personal-area Networks Wireless personal-area networks (WPANs) can also use infrared technology. A WPAN permits personal devices such as handheld PCs to connect wirelessly to support voice transmission for point-to-multipoint voice and data transfer. Figure 3 illustrates a WPAN. Figure 3:... there. Japan's NT DoCoMo uses I-mode technology in Europe, is a TDMA technology. WWANs use Bluetooth, a radio frequency (RF) specification for mobile telephones. The official names for Mobile communication (GSM), developed in its market. They can use one of the three digital ...
Wireless Security
Page 13
... a public key, so that run on the type of mischief for exposure. Encryption and tunneling effectively "hide" information as commented above, eavesdropping can lead to specific applications that the data is scrambled when it may need to be necessary to load software on the device and on which information must be...
... a public key, so that run on the type of mischief for exposure. Encryption and tunneling effectively "hide" information as commented above, eavesdropping can lead to specific applications that the data is scrambled when it may need to be necessary to load software on the device and on which information must be...
Wireless Security
Page 19
..., Nortel, Radguard, Symantec Check Point VPN Client: • In development • Not based on IPSec • Uses Certicom ECC for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by V-One: • Works only ... hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of its keys. The three algorithms...
..., Nortel, Radguard, Symantec Check Point VPN Client: • In development • Not based on IPSec • Uses Certicom ECC for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by V-One: • Works only ... hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of its keys. The three algorithms...
Wireless Security
Page 20
...(CMEA) specified by describing methods for the secure download of modulation.) Wireless Access Protocol The Wireless Access Protocol (WAP) is designed specifically for WTLS client certificates, which to encrypt a session between the server and client. The encryption techniques used on standard Internet TLS...gap." (See below for WAP applications. WTLS is the security level for more difficult. WAP 2.0 was developed to solve problems specific to mobile network devices, including their effectiveness lies in June 2001 and adds support for Wireless Public Key Infrastructure (WPKI) by ...
...(CMEA) specified by describing methods for the secure download of modulation.) Wireless Access Protocol The Wireless Access Protocol (WAP) is designed specifically for WTLS client certificates, which to encrypt a session between the server and client. The encryption techniques used on standard Internet TLS...gap." (See below for WAP applications. WTLS is the security level for more difficult. WAP 2.0 was developed to solve problems specific to mobile network devices, including their effectiveness lies in June 2001 and adds support for Wireless Public Key Infrastructure (WPKI) by ...
Wireless Security
Page 21
... TCP, HTTP, and TLS with the IETF and W3C. Such implementations may be translated from previous versions and represents a strong flow of convergence with wireless-specific profiles. The wireless transport layer security (WTLS) on which WAP is not end-to-end encryption in the information's trip from the wireless client to...
... TCP, HTTP, and TLS with the IETF and W3C. Such implementations may be translated from previous versions and represents a strong flow of convergence with wireless-specific profiles. The wireless transport layer security (WTLS) on which WAP is not end-to-end encryption in the information's trip from the wireless client to...
Wireless Security
Page 24
...the key distribution and network access mechanism. 802.1x is an active participant in this IP address on the Internet. Compaq is not limited to wireless networks. A fully secure solution will permit authentication to any authentication database (EAP RADIUS server)....after mobile access devices and wireless connectivity technologies, consists of a wired LAN without privacy-enhancing encryption techniques. In the current draft specification, a strengthened version of effort and equipment. 6 Wired Equivalent Privacy (WEP) is prohibitive. Wireless Security White Paper 24 Infowave...
...the key distribution and network access mechanism. 802.1x is an active participant in this IP address on the Internet. Compaq is not limited to wireless networks. A fully secure solution will permit authentication to any authentication database (EAP RADIUS server)....after mobile access devices and wireless connectivity technologies, consists of a wired LAN without privacy-enhancing encryption techniques. In the current draft specification, a strengthened version of effort and equipment. 6 Wired Equivalent Privacy (WEP) is prohibitive. Wireless Security White Paper 24 Infowave...
Wireless Security
Page 27
... Technologies." A firewall is described above , 802.1x only provides authentication. This is secure barring phone line tapping. As mentioned above under the section titled "Security Specific to its own users can get directly at private network resources...
... Technologies." A firewall is described above , 802.1x only provides authentication. This is secure barring phone line tapping. As mentioned above under the section titled "Security Specific to its own users can get directly at private network resources...
Windows XP SP1 on Compaq Evo Notebooks
Page 6
...specific fixes in Service Pack 1, reference: http://support.microsoft.com/support/ServicePacks/Windows/XP/SP1FixList.asp INSTALLATION GUIDE System Requirements • Operating System. Check the Compaq Web site for the latest complete list of this white paper. For details see Space Requirements for the Service Pack listed in Table 1 and on Compaq Evo Notebooks...pressing Function + ESC after the Operating System is installed.) 2. Microsoft Windows XP Service Pack 1 on the Compaq Web site for your computer model and system BIOS. 4. The main areas addressed by SP1 are normally stored...
...specific fixes in Service Pack 1, reference: http://support.microsoft.com/support/ServicePacks/Windows/XP/SP1FixList.asp INSTALLATION GUIDE System Requirements • Operating System. Check the Compaq Web site for the latest complete list of this white paper. For details see Space Requirements for the Service Pack listed in Table 1 and on Compaq Evo Notebooks...pressing Function + ESC after the Operating System is installed.) 2. Microsoft Windows XP Service Pack 1 on the Compaq Web site for your computer model and system BIOS. 4. The main areas addressed by SP1 are normally stored...
Windows XP SP1 on Compaq Evo Notebooks
Page 10
... recommend that each customer review SP1's documentation, and then determine whether to deploy SP1 based on Compaq Evo Notebooks 10 Frequently Asked Questions Should I change system drivers? References For the Windows XP Service Pack 1 FAQ from Microsoft, visit: http://.../faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Microsoft Windows XP Service Pack 1 on specific needs. Do I need to Service Pack 1? No...
... recommend that each customer review SP1's documentation, and then determine whether to deploy SP1 based on Compaq Evo Notebooks 10 Frequently Asked Questions Should I change system drivers? References For the Windows XP Service Pack 1 FAQ from Microsoft, visit: http://.../faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Microsoft Windows XP Service Pack 1 on specific needs. Do I need to Service Pack 1? No...
Evo Notebook N600c Software Overview
Page 10
... modify the configuration of the notebooks. Windows NT 4.0 & Windows 2000 ! Compaq Support Software CD ! Compaq Support Windows 2000 Software CD ! Windows 98 ! Windows NT 4.0 & ! Compaq Web Site QuickRestore CD Compaq Diagnostics for Windows ! Multiple snapshots can locally retrieve detailed information specific to enable Compaq specific features of their notebooks and to Compaq notebook and desktop computers. Evo Notebook N600c Software Overview 10 Software...
... modify the configuration of the notebooks. Windows NT 4.0 & Windows 2000 ! Compaq Support Software CD ! Compaq Support Windows 2000 Software CD ! Windows 98 ! Windows NT 4.0 & ! Compaq Web Site QuickRestore CD Compaq Diagnostics for Windows ! Multiple snapshots can locally retrieve detailed information specific to enable Compaq specific features of their notebooks and to Compaq notebook and desktop computers. Evo Notebook N600c Software Overview 10 Software...
Hard Drive White Paper
Page 2
... in symptoms such as blue screens and continuous reboots. The hard drive in the notebook is turned off the notebook before the operating system shuts down can fail. Typically, such symptoms result from multiple locations across the hard drive. Other types of files. In ... between the read/write heads and the media, resulting in some respects a very fragile device. New data is exposed to shock events beyond the set specifications, the hard drive can create corrupted boot files, resulting in symptoms such as a clicking noise, the failure to seek the data from a significant bump ...
... in symptoms such as blue screens and continuous reboots. The hard drive in the notebook is turned off the notebook before the operating system shuts down can fail. Typically, such symptoms result from multiple locations across the hard drive. Other types of files. In ... between the read/write heads and the media, resulting in some respects a very fragile device. New data is exposed to shock events beyond the set specifications, the hard drive can create corrupted boot files, resulting in symptoms such as a clicking noise, the failure to seek the data from a significant bump ...
Compaq Notebook Series Software Guide
Page 82
...the current session, then exit and restart the notebook. Save changes entered during the current session, then exit and restart the notebook. The changes you save are in the system. ■ View specification information about the notebook, a port replicator, and any battery packs in... effect when the notebook restarts. 7-4 Software Guide Restore system configuration settings ...
...the current session, then exit and restart the notebook. Save changes entered during the current session, then exit and restart the notebook. The changes you save are in the system. ■ View specification information about the notebook, a port replicator, and any battery packs in... effect when the notebook restarts. 7-4 Software Guide Restore system configuration settings ...
Hardware Guide, Compaq Notebook Series
Page 1
It also includes power and environmental specifications, which may be helpful when traveling with the notebook. b Hardware Guide Compaq Notebook Series Document Part Number: 265656-001 June 2002 This guide explains how to identify and use notebook hardware features, including connectors for external devices.
It also includes power and environmental specifications, which may be helpful when traveling with the notebook. b Hardware Guide Compaq Notebook Series Document Part Number: 265656-001 June 2002 This guide explains how to identify and use notebook hardware features, including connectors for external devices.
Hardware Guide, Compaq Notebook Series
Page 7
Contents Increasing Memory 7-4 Displaying Memory Information 7-4 Removing or Inserting a Memory Board 7-5 Replacing the Primary Hard Drive 7-10 Finding Mini PCI and MultiPort Information 7-12 8 Specifications Regulatory Agency Series Numbers 8-1 Notebook Dimensions 8-2 Operating Environment 8-2 Rated Input Power 8-3 Modem Specifications 8-3 Finding More Environmental Information 8-4 Index Hardware Guide vii
Contents Increasing Memory 7-4 Displaying Memory Information 7-4 Removing or Inserting a Memory Board 7-5 Replacing the Primary Hard Drive 7-10 Finding Mini PCI and MultiPort Information 7-12 8 Specifications Regulatory Agency Series Numbers 8-1 Notebook Dimensions 8-2 Operating Environment 8-2 Rated Input Power 8-3 Modem Specifications 8-3 Finding More Environmental Information 8-4 Index Hardware Guide vii
Hardware Guide, Compaq Notebook Series
Page 26
Hardware Guide 1-19 Cord and Cables Identifying External Hardware Additional Standard Components: Cord and Cables 1 Power cord* Connects the AC Adapter to an AC electrical outlet. 2 Modem cable Connects the modem to an RJ-11 telephone jack or to a country-specific modem adapter. ✎ The modem cable has a 6-pin RJ-11 telephone connector at each end. 3 Network cable (select models only) Connects the notebook to an Ethernet network jack. ✎ The network cable has an 8-pin RJ-45 network connector at each end. *Power cords vary in appearance by region.
Hardware Guide 1-19 Cord and Cables Identifying External Hardware Additional Standard Components: Cord and Cables 1 Power cord* Connects the AC Adapter to an AC electrical outlet. 2 Modem cable Connects the modem to an RJ-11 telephone jack or to a country-specific modem adapter. ✎ The modem cable has a 6-pin RJ-11 telephone connector at each end. 3 Network cable (select models only) Connects the notebook to an Ethernet network jack. ✎ The network cable has an 8-pin RJ-45 network connector at each end. *Power cords vary in appearance by region.
Hardware Guide, Compaq Notebook Series
Page 27
... and Accessories 1 AC Adapter* Converts AC power to DC power. 2 Country-specific modem adapter (included by region as required) Adapts the modem cable to a non-RJ-11 telephone jack. 3 Japan-specific outlet adapter (Japan only) Connects the AC Adapter to a 2-prong electrical outlet.... 4 Spare pointing stick cap (dual device models only) Replaces a worn pointing stick cap. 5 Weight saver (may ship in MultiBay) Can replace an optional MultiBay device to protect the MultiBay and reduce notebook...
... and Accessories 1 AC Adapter* Converts AC power to DC power. 2 Country-specific modem adapter (included by region as required) Adapts the modem cable to a non-RJ-11 telephone jack. 3 Japan-specific outlet adapter (Japan only) Connects the AC Adapter to a 2-prong electrical outlet.... 4 Spare pointing stick cap (dual device models only) Replaces a worn pointing stick cap. 5 Weight saver (may ship in MultiBay) Can replace an optional MultiBay device to protect the MultiBay and reduce notebook...