Bluetooth Wireless Technology Basics
Page 2
...of BWT, describes the requirements for establishing a BWT connection, and provides information about HP products that lead to use an inexpensive, low-power radio built into a radio technology...name Bluetooth come from different manufacturers can run your presentation on your BWT-enabled mobile phone-without a cable connection. What does this mean for proprietary cabling between ... wireless technology is an inexpensive, short-range radio technology that devices from ? The specification standardized the development of where they are available today. Use your BWT-enabled PDA or...
...of BWT, describes the requirements for establishing a BWT connection, and provides information about HP products that lead to use an inexpensive, low-power radio built into a radio technology...name Bluetooth come from different manufacturers can run your presentation on your BWT-enabled mobile phone-without a cable connection. What does this mean for proprietary cabling between ... wireless technology is an inexpensive, short-range radio technology that devices from ? The specification standardized the development of where they are available today. Use your BWT-enabled PDA or...
Bluetooth Wireless Technology Basics
Page 5
... the same encryption key. anyone can be paired before they can allow another device to exchange electronic business cards and deny the device access to a specific service. With your PDA, for users to access your device is complete, your device. Figure 3. After authentication is dependent on the service(s) you can establish...
... the same encryption key. anyone can be paired before they can allow another device to exchange electronic business cards and deny the device access to a specific service. With your PDA, for users to access your device is complete, your device. Figure 3. After authentication is dependent on the service(s) you can establish...
Bluetooth Wireless Technology Basics
Page 7
... Start the Bluetooth Device. Set up the BWT software. Right-click the Bluetooth icon, and then select Explore My Bluetooth Places. 2. For specific instructions about discovering and connecting to other BWT-enabled devices, refer to your BWT-enabled notebook PC: 1. Set up the BWT software After ... Bluetooth status Disabled Enabled Connected Blue with red logo Blue with white logo Blue with green logo If BWT is off, turn on HP notebook PCs; Then you can use the Bluetooth Setup wizard to Bluetooth operations. Install the BWT software The required BWT software comes preloaded...
... Start the Bluetooth Device. Set up the BWT software. Right-click the Bluetooth icon, and then select Explore My Bluetooth Places. 2. For specific instructions about discovering and connecting to other BWT-enabled devices, refer to your BWT-enabled notebook PC: 1. Set up the BWT software After ... Bluetooth status Disabled Enabled Connected Blue with red logo Blue with white logo Blue with green logo If BWT is off, turn on HP notebook PCs; Then you can use the Bluetooth Setup wizard to Bluetooth operations. Install the BWT software The required BWT software comes preloaded...
Bluetooth Wireless Technology Basics
Page 8
... Deskjet printer feature integrated BWT capability. Detailed instructions on performing the functions listed in this profile does not require specific printer drivers. Also, visit http://www.hp.com/products/wireless/ for a summary of available profiles and the services they enable. Table 2. The iPAQ Pocket PC ... pressing Menu > Connect > Bluetooth. Bluetooth wireless technology profiles supported by other BWT-enabled products, such as PrintPocketCE or HP Mobile Printing. After you have an iPAQ that accompanies each BWT-enabled device. To see the full line of the BWT profiles built ...
... Deskjet printer feature integrated BWT capability. Detailed instructions on performing the functions listed in this profile does not require specific printer drivers. Also, visit http://www.hp.com/products/wireless/ for a summary of available profiles and the services they enable. Table 2. The iPAQ Pocket PC ... pressing Menu > Connect > Bluetooth. Bluetooth wireless technology profiles supported by other BWT-enabled products, such as PrintPocketCE or HP Mobile Printing. After you have an iPAQ that accompanies each BWT-enabled device. To see the full line of the BWT profiles built ...
ProtectTools (Select Models Only) - Windows Vista
Page 6
Denying access to a user or group 66 Allowing access to a device class for one user of a group 66 Allowing access to a specific device for one user of a group 67 Glossary ...68 Index ...70 vi ENWW
Denying access to a user or group 66 Allowing access to a device class for one user of a group 66 Allowing access to a specific device for one user of a group 67 Glossary ...68 Index ...70 vi ENWW
ProtectTools (Select Models Only) - Windows Vista
Page 11
ENWW Managing HP ProtectTools passwords 5 For example, you can use your name for letters in a file, such as birth date, pet names, or mother's maiden name, even if ... password. ● Whenever possible, mix alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for the password, or any specifications that increment. ● If you write down your password. Creating a secure password When creating passwords, you must first follow any other personal information, such as...
ENWW Managing HP ProtectTools passwords 5 For example, you can use your name for letters in a file, such as birth date, pet names, or mother's maiden name, even if ... password. ● Whenever possible, mix alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for the password, or any specifications that increment. ● If you write down your password. Creating a secure password When creating passwords, you must first follow any other personal information, such as...
ProtectTools (Select Models Only) - Windows Vista
Page 72
... to configure in the device list. 66 Chapter 7 Device Access Manager for users or groups to be denied access. 5. Select Start > All Programs > HP ProtectTools Security Manager. 2. The Select Users or Groups dialog box opens. 5. Click OK. In the left pane, click Device Access Manager, and then click.... 4. Click Deny next to the user or group to types of devices. Device class configuration (advanced) More selections are available to allow specific users or groups of users to be granted or denied access to be denied access. 6. Removing a user or a group 1. Select Start > All Programs...
... to configure in the device list. 66 Chapter 7 Device Access Manager for users or groups to be denied access. 5. Select Start > All Programs > HP ProtectTools Security Manager. 2. The Select Users or Groups dialog box opens. 5. Click OK. In the left pane, click Device Access Manager, and then click.... 4. Click Deny next to the user or group to types of devices. Device class configuration (advanced) More selections are available to allow specific users or groups of users to be granted or denied access to be denied access. 6. Removing a user or a group 1. Select Start > All Programs...
ProtectTools (Select Models Only) - Windows Vista
Page 73
..., and then click OK. 10. In the left pane, click Device Access Manager, and then click Device Class Configuration. 3. Navigate to the specific device to add. 9. Click Apply, and then click OK. Navigate to all other members of that user's group for the user in the class...Now to search for users or groups to be denied access. 6. ENWW Device class configuration (advanced) 67 Click Add. Select Start > All Programs > HP ProtectTools Security Manager. 2. Click Allow to grant this user access. 11. The Select Users or Groups dialog box opens. 8. Click Apply, and then click...
..., and then click OK. 10. In the left pane, click Device Access Manager, and then click Device Class Configuration. 3. Navigate to the specific device to add. 9. Click Apply, and then click OK. Navigate to all other members of that user's group for the user in the class...Now to search for users or groups to be denied access. 6. ENWW Device class configuration (advanced) 67 Click Add. Select Start > All Programs > HP ProtectTools Security Manager. 2. Click Allow to grant this user access. 11. The Select Users or Groups dialog box opens. 8. Click Apply, and then click...
ProtectTools (Select Models Only) - Windows Vista
Page 74
... are the basis of common rules and procedures. Cryptographic service provider (CSP) Provider or library of cryptographic algorithms that can be generated and protected by specific individuals. Cryptography Practice of encrypting and decrypting data so that , when enabled, requires the use a physical feature, such as use of an algorithm, employed in...
... are the basis of common rules and procedures. Cryptographic service provider (CSP) Provider or library of cryptographic algorithms that can be generated and protected by specific individuals. Cryptography Practice of encrypting and decrypting data so that , when enabled, requires the use a physical feature, such as use of an algorithm, employed in...
ProtectTools (Select Models Only) - Windows Vista
Page 75
...to log on to a network or to complete the authentication. Virtual token Security feature that meets the Trusted Computing Group (TCG) specifications. Used to authenticate the owner to a computer. Single Sign On Feature that stores authentication information and allows you are asked for ...in size and shape to a computer. Migration A task that allows the management, restoration, and transfer of restarting the computer. Identity In the HP ProtectTools Credential Manager, a group of credentials and settings that is handled like a smart card and reader. When you log on a domain....
...to log on to a network or to complete the authentication. Virtual token Security feature that meets the Trusted Computing Group (TCG) specifications. Used to authenticate the owner to a computer. Single Sign On Feature that stores authentication information and allows you are asked for ...in size and shape to a computer. Migration A task that allows the management, restoration, and transfer of restarting the computer. Identity In the HP ProtectTools Credential Manager, a group of credentials and settings that is handled like a smart card and reader. When you log on a domain....
ProtectTools (Select Models Only) - Windows Vista
Page 76
...Computer Setup administrator password 3 Computer Setup passwords, managing 40 Computer Setup setup password changing 42 setting 41 Credential Manager for HP ProtectTools account, adding 53 account, removing 53 administrator tasks 59 application protection 57 70 Index application protection, removing 57 changing... 51 identity, removing 51 identity, restoring 51 Java Card, registering 47 locking 52 logging on 45 logon password 4 logon specifications 59 logon wizard 45 new account, creating 46 recovery file password 4 registering fingerprints 46 registering other credentials 48 registering smart ...
...Computer Setup administrator password 3 Computer Setup passwords, managing 40 Computer Setup setup password changing 42 setting 41 Credential Manager for HP ProtectTools account, adding 53 account, removing 53 administrator tasks 59 application protection 57 70 Index application protection, removing 57 changing... 51 identity, removing 51 identity, restoring 51 Java Card, registering 47 locking 52 logging on 45 logon password 4 logon specifications 59 logon wizard 45 new account, creating 46 recovery file password 4 registering fingerprints 46 registering other credentials 48 registering smart ...
Software Update, Backup and Recovery - Windows Vista
Page 3
Table of contents 1 Software updates Updating the software ...1 Downloading software updates from the HP Web site 2 Accessing computer information 2 Downloading a BIOS update 3 Installing a BIOS update ...4 Downloading and installing other software 5 2 Backup Safeguarding your data ...6 Backing up the system ...7 Backing up specific files or folders 7 Backing up the entire hard drive 8 Backing up modifications...
Table of contents 1 Software updates Updating the software ...1 Downloading software updates from the HP Web site 2 Accessing computer information 2 Downloading a BIOS update 3 Installing a BIOS update ...4 Downloading and installing other software 5 2 Backup Safeguarding your data ...6 Backing up the system ...7 Backing up specific files or folders 7 Backing up the entire hard drive 8 Backing up modifications...
Software Update, Backup and Recovery - Windows Vista
Page 11
..., depending on -screen instructions. Select Start > All Programs > HP Backup & Recovery > HP Backup and Recovery Manager. 2. Click Next. 3. Click Backup selected files from most common locations (Recommended). - Click Advanced Backup (Experienced users) to discs. Backing up specific files or folders You can ● Back up specific files and folders. ● Back up the entire...
..., depending on -screen instructions. Select Start > All Programs > HP Backup & Recovery > HP Backup and Recovery Manager. 2. Click Next. 3. Click Backup selected files from most common locations (Recommended). - Click Advanced Backup (Experienced users) to discs. Backing up specific files or folders You can ● Back up specific files and folders. ● Back up the entire...
Software Update, Backup and Recovery - Windows Vista
Page 13
...and then click Next. The "Backup Scheduler" page opens. 2. Schedule system recovery points at specific intervals (now, daily, weekly, or monthly) or at specific events, such as at a specific point in your system. Backing up modifications made to an earlier recovery point does not affect...select models only), by clicking one of your system recovery point settings is displayed. 4. The "Recovery Point Manager" page opens. 5. HP recommends that you create recovery points ● Before you add or extensively modify software or hardware. ● Periodically, whenever the system ...
...and then click Next. The "Backup Scheduler" page opens. 2. Schedule system recovery points at specific intervals (now, daily, weekly, or monthly) or at specific events, such as at a specific point in your system. Backing up modifications made to an earlier recovery point does not affect...select models only), by clicking one of your system recovery point settings is displayed. 4. The "Recovery Point Manager" page opens. 5. HP recommends that you create recovery points ● Before you add or extensively modify software or hardware. ● Periodically, whenever the system ...
External Devices
Page 5
.... 3. To enable or disable USB legacy support: 1. Use the arrow keys to the user guide for the device. External Devices 1-3 For more information about device-specific software, refer to enable or disable USB legacy support. 4. USB legacy support USB legacy support (enabled by turning on the screen.
.... 3. To enable or disable USB legacy support: 1. Use the arrow keys to the user guide for the device. External Devices 1-3 For more information about device-specific software, refer to enable or disable USB legacy support. 4. USB legacy support USB legacy support (enabled by turning on the screen.
External Devices
Page 7
The operating system will issue a sound to the 1394 port. For more information about device-specific software, refer to connect a 1394 device. Click the 1394 device listing. ✎ To display the Safely Remove Hardware icon, click Show Hidden Icons in the ...
The operating system will issue a sound to the 1394 port. For more information about device-specific software, refer to connect a 1394 device. Click the 1394 device listing. ✎ To display the Safely Remove Hardware icon, click Show Hidden Icons in the ...
External Devices - Windows Vista
Page 5
... turning on the screen. To enable or disable USB legacy support: 1. Your preferences go into effect when the computer restarts. For more information about device-specific software, refer to select System configuration > Device Configurations, and then press Enter. 3. Use the arrow keys to the user guide for the device. Then follow...
... turning on the screen. To enable or disable USB legacy support: 1. Your preferences go into effect when the computer restarts. For more information about device-specific software, refer to select System configuration > Device Configurations, and then press Enter. 3. Use the arrow keys to the user guide for the device. Then follow...
External Devices - Windows Vista
Page 7
... do not have to the 1394 port. Click Stop, and then click OK. To stop the device before removing it . 3. For more information about device-specific software, refer to the user guide for the device to stop a 1394 device: 1. Stopping a 1394 device Ä CAUTION: To prevent loss of the taskbar. ✎...
... do not have to the 1394 port. Click Stop, and then click OK. To stop the device before removing it . 3. For more information about device-specific software, refer to the user guide for the device to stop a 1394 device: 1. Stopping a 1394 device Ä CAUTION: To prevent loss of the taskbar. ✎...
External Media Cards
Page 6
... 16-bit PC Cards. ■ Type I or Type II cards. ✎ Zoomed video PC Cards are instructed by the PC Card manufacturer to the standard specifications of support for the device. 2 PC Cards A PC Card is a credit card-sized accessory designed to conform to install device drivers: ■ Install only the...
... 16-bit PC Cards. ■ Type I or Type II cards. ✎ Zoomed video PC Cards are instructed by the PC Card manufacturer to the standard specifications of support for the device. 2 PC Cards A PC Card is a credit card-sized accessory designed to conform to install device drivers: ■ Install only the...
External Media Cards - Windows Vista
Page 6
... 16-bit PC Cards. ■ Type I or Type II cards. ✎ Zoomed video PC Cards are instructed by the PC Card manufacturer to the standard specifications of support for the device. 2 PC Cards A PC Card is a credit card-sized accessory designed to conform to install device drivers: ■ Install only the...
... 16-bit PC Cards. ■ Type I or Type II cards. ✎ Zoomed video PC Cards are instructed by the PC Card manufacturer to the standard specifications of support for the device. 2 PC Cards A PC Card is a credit card-sized accessory designed to conform to install device drivers: ■ Install only the...