Compaq Tablet PC TC1100 Series Software Guide
Page 87
Setup, Restore and Support Utilities Using the Setup Utility The Setup utility is a preinstalled, ROM-based utility, which can be helpful to advanced users who prefer to set a password, in the ... select by -step procedures. 7-2 Software Guide Because the Setup utility is not Windows-based, it does not support the pen, the on-screen keyboard, or the pointing device on a tablet PC keyboard. ■ To make selections when an external keyboard is in the system, ...selections when an external keyboard is in the system. If the operating system is not working , the tablet PC will not load.
Setup, Restore and Support Utilities Using the Setup Utility The Setup utility is a preinstalled, ROM-based utility, which can be helpful to advanced users who prefer to set a password, in the ... select by -step procedures. 7-2 Software Guide Because the Setup utility is not Windows-based, it does not support the pen, the on-screen keyboard, or the pointing device on a tablet PC keyboard. ■ To make selections when an external keyboard is in the system, ...selections when an external keyboard is in the system. If the operating system is not working , the tablet PC will not load.
Cleaning Guidelines
Page 11
... to the following sections for procedures on: ■ Cleaning and disinfecting the Tablet PC screen and base ■ Cleaning the pen and pen holder area ■ Cleaning the Tablet PC keyboard, optional keyboard, or optional mouse ■ Cleaning accessories, such as the...avoid aromatic solvents. ✎ If the Tablet PC requires cleaning daily or more frequently, HP strongly recommends that you ■ Shut down the Tablet PC. ■ Disconnect the Tablet PC from external power. ■ Disconnect all powered external devices from the Tablet PC. Ä CAUTION: Do not spray liquids...
... to the following sections for procedures on: ■ Cleaning and disinfecting the Tablet PC screen and base ■ Cleaning the pen and pen holder area ■ Cleaning the Tablet PC keyboard, optional keyboard, or optional mouse ■ Cleaning accessories, such as the...avoid aromatic solvents. ✎ If the Tablet PC requires cleaning daily or more frequently, HP strongly recommends that you ■ Shut down the Tablet PC. ■ Disconnect the Tablet PC from external power. ■ Disconnect all powered external devices from the Tablet PC. Ä CAUTION: Do not spray liquids...
HP Compaq tc1100 Tablet PC - Maintenance and Service Guide
Page 80
...Description Keyboard for use in Taiwan Keyboard for use in Korea Keyboard for use in Sweden and Finland Keyboard for use in French Canada Base enclosure with shield Bridge battery RTC battery Power/standby switch System board with 800-MHz Intel Celeron M processor, without memory System board... with 1.0-GHz Intel Pentium M processor, without memory Battery pack, Li-Ion, 3.6-AHr Bluetooth wireless device Miscellaneous Cable Kit Top case with inverter Digitizer Docking station Hard drive, 30-GB, 4200-rpm Hard drive, 40-GB, 4200-rpm Hard drive,...
...Description Keyboard for use in Taiwan Keyboard for use in Korea Keyboard for use in Sweden and Finland Keyboard for use in French Canada Base enclosure with shield Bridge battery RTC battery Power/standby switch System board with 800-MHz Intel Celeron M processor, without memory System board... with 1.0-GHz Intel Pentium M processor, without memory Battery pack, Li-Ion, 3.6-AHr Bluetooth wireless device Miscellaneous Cable Kit Top case with inverter Digitizer Docking station Hard drive, 30-GB, 4200-rpm Hard drive, 40-GB, 4200-rpm Hard drive,...
HP Compaq tc1100 Tablet PC - Maintenance and Service Guide
Page 96
d. Removal and Replacement Procedures c. Press the PC Card release button 1 to release the button from the card slot. ✎ The PC Card slot space saver and SD Card slot space saver are included in the Miscellaneous Plastics/Hardware Kit, spare part number 348350-001. Press the PC Card release button again to eject the contents of the PC Card slot. Press the button a second time to reset it 1. Remove the PC Card slot device 2 from the base enclosure. Removing the PC Card Device (space saver shown) 5-6 Maintenance and Service Guide e.
d. Removal and Replacement Procedures c. Press the PC Card release button 1 to release the button from the card slot. ✎ The PC Card slot space saver and SD Card slot space saver are included in the Miscellaneous Plastics/Hardware Kit, spare part number 348350-001. Press the PC Card release button again to eject the contents of the PC Card slot. Press the button a second time to reset it 1. Remove the PC Card slot device 2 from the base enclosure. Removing the PC Card Device (space saver shown) 5-6 Maintenance and Service Guide e.
HP ProtectTools Security Manager
Page 2
...offer new technologies as complexity. If a technology is a security platform that could be used . Client device security options feature a number of capabilities based on a variety of vulnerability that addresses these features from being widely deployed and used to threaten the entire...become more important as : • Pre-boot authentication - The security dilemma Businesses trying to implement client device security face a dizzying number of HP products • Biometrics and RFID (Radio Frequency Identification) are keeping these challenges by installing new modules. These...
...offer new technologies as complexity. If a technology is a security platform that could be used . Client device security options feature a number of capabilities based on a variety of vulnerability that addresses these features from being widely deployed and used to threaten the entire...become more important as : • Pre-boot authentication - The security dilemma Businesses trying to implement client device security face a dizzying number of HP products • Biometrics and RFID (Radio Frequency Identification) are keeping these challenges by installing new modules. These...
Wireless Security
Page 3
... security solutions very early, and started devoting resources to addressing this proactive effort, HP has developed a solution - In addition, many client devices include security features that may be added easily by using it. or TPM -...Device Security and HP Protect Tools HP saw the need to span multiple technologies • Extensibility: solutions must adapt as they become available. the HP ProtectTools Security Manager - In addition, security solutions can be difficult to deploy and use , all-in enabling product-based security attributes is often expensive and complex The HP...
... security solutions very early, and started devoting resources to addressing this proactive effort, HP has developed a solution - In addition, many client devices include security features that may be added easily by using it. or TPM -...Device Security and HP Protect Tools HP saw the need to span multiple technologies • Extensibility: solutions must adapt as they become available. the HP ProtectTools Security Manager - In addition, security solutions can be difficult to deploy and use , all-in enabling product-based security attributes is often expensive and complex The HP...
Wireless Security
Page 4
...and IP networks are difficult to manage. Virtual Private Network Implementations HP solutions: HP Production WLAN HP Wireless Internet Access Vendor Solutions for WEP Vulnerability Although VPN provides adequate security, there may be summarized in to all HP devices will not have enough data to crack the web key. ...WEP Key (40-64 bit WEB) Lucent 128 bit Agere 152 bit WEB US Robotics 256 bit WEP MAC Address Filtering Server based Access point based This extension of data integrity • Poor key management and • Access Point association All wireless vendors have taken steps to...
...and IP networks are difficult to manage. Virtual Private Network Implementations HP solutions: HP Production WLAN HP Wireless Internet Access Vendor Solutions for WEP Vulnerability Although VPN provides adequate security, there may be summarized in to all HP devices will not have enough data to crack the web key. ...WEP Key (40-64 bit WEB) Lucent 128 bit Agere 152 bit WEB US Robotics 256 bit WEP MAC Address Filtering Server based Access point based This extension of data integrity • Poor key management and • Access Point association All wireless vendors have taken steps to...
Wireless Security
Page 5
....11i solution - is a robust security solution with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to increase the level of security for new wireless LANs, and manage existing solutions with enhancement of hardware and introduction of ...802.11g and a, we are gaining greater performance 5 Previous methods authenticated the device, but not the source, for less security • Supports better authentication technologies such as 802.1X, EAP, RADIUS and Pre-shared...
....11i solution - is a robust security solution with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to increase the level of security for new wireless LANs, and manage existing solutions with enhancement of hardware and introduction of ...802.11g and a, we are gaining greater performance 5 Previous methods authenticated the device, but not the source, for less security • Supports better authentication technologies such as 802.1X, EAP, RADIUS and Pre-shared...
Wireless Security
Page 6
... screen shot below shows that EAP authentication can be extended or certificate-based, in development and will be available on all the WPA features - In these instances, most available consumer devices offer authentication within the device with a WPA pre-shared key. It offers a straightforward replacement to develop the ...as the future benchmark for certificate authentication. This makes a great solution for wireless LANs. "I"- IEEE 802.11i products are focused on HP notebook PCs. The group was approved and ratified June 25, 2004, for home users. TKIP, AES, and others.
... screen shot below shows that EAP authentication can be extended or certificate-based, in development and will be available on all the WPA features - In these instances, most available consumer devices offer authentication within the device with a WPA pre-shared key. It offers a straightforward replacement to develop the ...as the future benchmark for certificate authentication. This makes a great solution for wireless LANs. "I"- IEEE 802.11i products are focused on HP notebook PCs. The group was approved and ratified June 25, 2004, for home users. TKIP, AES, and others.
Wireless Security
Page 9
... on this access method. 9 The 802.11i standard was developed for an authentication server. Users should ensure all HP mobile devices. and connectivity in Wired Equivalent Privacy. WPA, an interim solution to develop new levels of security standards. Products ...designed to be interoperate with other products designed to address the vulnerabilities in general. In addition, WPA-Pre-Shared Key was released June 25th, 2004, and products based...
... on this access method. 9 The 802.11i standard was developed for an authentication server. Users should ensure all HP mobile devices. and connectivity in Wired Equivalent Privacy. WPA, an interim solution to develop new levels of security standards. Products ...designed to be interoperate with other products designed to address the vulnerabilities in general. In addition, WPA-Pre-Shared Key was released June 25th, 2004, and products based...