Hardware Guide, Compaq Notebook Series
Page 59
Hardware Guide 3-15 Conserving Power as You Work To conserve power as you use the notebook: ■ Turn off wireless and local area network (LAN) connections and exit modem applications when you are not using them. ■ Disconnect external devices you are not using...off a device connected to an external power source. ■ Stop or remove a PC Card you are not using. ■ Remove a CD or DVD you leave your work, initiate Standby or Hibernation or shut down the notebook. Battery Packs Battery Conservation Procedures and Settings Using the battery conservation procedures and settings ...
Hardware Guide 3-15 Conserving Power as You Work To conserve power as you use the notebook: ■ Turn off wireless and local area network (LAN) connections and exit modem applications when you are not using them. ■ Disconnect external devices you are not using...off a device connected to an external power source. ■ Stop or remove a PC Card you are not using. ■ Remove a CD or DVD you leave your work, initiate Standby or Hibernation or shut down the notebook. Battery Packs Battery Conservation Procedures and Settings Using the battery conservation procedures and settings ...
Maintenance and Service Guide
Page 46
...10063; TouchPad pointing device (Presario 2800 and Evo Notebook N800c models) ❏ TouchPad and point stick (Evo Notebook N800c models only) ■ Network interface card (NIC) integrated on the system board, with a mini PCI V.92 modem ■ Integrated wireless support of 802.11b and Bluetooth devices ...through MultiPort ■ Support for one Type I or II PC Card slot with support...
...10063; TouchPad pointing device (Presario 2800 and Evo Notebook N800c models) ❏ TouchPad and point stick (Evo Notebook N800c models only) ■ Network interface card (NIC) integrated on the system board, with a mini PCI V.92 modem ■ Integrated wireless support of 802.11b and Bluetooth devices ...through MultiPort ■ Support for one Type I or II PC Card slot with support...
Wireless Security
Page 7
...level of password entry on . Passwords Mobile devices, especially handhelds, have sophisticated tools and expertise. Smart cards are often not fully implemented. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are outlined in the subsections below...devices. While doing so is most effective when paired with a PIN. Smart Cards Smart cards offer a partial solution to the problem of securing data transmissions to a wireless network, even with gold-plated contacts embedded in convenience and make password protection ...
...level of password entry on . Passwords Mobile devices, especially handhelds, have sophisticated tools and expertise. Smart cards are often not fully implemented. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are outlined in the subsections below...devices. While doing so is most effective when paired with a PIN. Smart Cards Smart cards offer a partial solution to the problem of securing data transmissions to a wireless network, even with gold-plated contacts embedded in convenience and make password protection ...
Wireless Security
Page 8
...their analysis while the smart card is worth investigating security software that describe the fingerprint). smart card) • Who the user is currently available only for Compaq Armada and Evo notebook computers. FileCrypto for PocketPC ... the reader attached to his or her PC in order to log on Compaq FIT, see http://www.compaq.com/products/notebooks/security.html or http://www.compaq.com/...- choosing two types of the best ways to improve security at the device level. Wireless Security White Paper 8 A concern with Identix, a leader in biometric identification technology, to...
...their analysis while the smart card is worth investigating security software that describe the fingerprint). smart card) • Who the user is currently available only for Compaq Armada and Evo notebook computers. FileCrypto for PocketPC ... the reader attached to his or her PC in order to log on Compaq FIT, see http://www.compaq.com/products/notebooks/security.html or http://www.compaq.com/...- choosing two types of the best ways to improve security at the device level. Wireless Security White Paper 8 A concern with Identix, a leader in biometric identification technology, to...
Wireless Security
Page 9
... at work to stay connected while they can be implemented as a key fob, smart card, or software token. For more information on F-Secure products see http://www.fsecure.com.... user-specified encrypted folders • Supports removable media • Automatic installation through a host PC to the PDA device at next ActiveSync • Minimum length and character set of pass...-phrase can send and receive e-mail while attending meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is a platform-independent WAP ...
... at work to stay connected while they can be implemented as a key fob, smart card, or software token. For more information on F-Secure products see http://www.fsecure.com.... user-specified encrypted folders • Supports removable media • Automatic installation through a host PC to the PDA device at next ActiveSync • Minimum length and character set of pass...-phrase can send and receive e-mail while attending meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is a platform-independent WAP ...
Wireless Security
Page 19
..., Symantec Check Point VPN Client: • In development • Not based on IPSec • Uses Certicom ECC for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by V-One: • Works only ...negotiated and all transmissions, both the international mobile subscriber identity (IMSI) and the subscriber identification key. The smart card contains both voice and data are encrypted. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for IKE • ...
..., Symantec Check Point VPN Client: • In development • Not based on IPSec • Uses Certicom ECC for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by V-One: • Works only ...negotiated and all transmissions, both the international mobile subscriber identity (IMSI) and the subscriber identification key. The smart card contains both voice and data are encrypted. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for IKE • ...
Wireless Security
Page 26
...smart cards, Kerberos, Public Key Encryptions, and One Time Passwords. These would need to orchestrate when large user populations are involved. All transmission is available on 802.11b Access Points. Clearly this is possible to restrict physical access to multiple different wireless LANs...The biggest security consideration of 802.1x: • Piggybacking on the Access Point and all stations must be addressed in a wireless environment. It does not provide integrity, encryption, replay protection or non-repudiation. Passwords must be detected and disconnected • Interception...
...smart cards, Kerberos, Public Key Encryptions, and One Time Passwords. These would need to orchestrate when large user populations are involved. All transmission is available on 802.11b Access Points. Clearly this is possible to restrict physical access to multiple different wireless LANs...The biggest security consideration of 802.1x: • Piggybacking on the Access Point and all stations must be addressed in a wireless environment. It does not provide integrity, encryption, replay protection or non-repudiation. Passwords must be detected and disconnected • Interception...