User Manual
Page 3
... Connection 47 Network Connection 48 Wireless LAN Connection (on selected models 49 Windows Wireless Network Connection 50 Bluetooth Wireless Connection (on selected models 51 Trusted Platform Module (TPM) (on selected models 52 Appendix Optional Accessories A-2 Optional Connections A-3 Bluetooth Mouse Setup (optional A-4 Operating System and Software A-6 System BIOS Settings A-7 Common Problems and...
... Connection 47 Network Connection 48 Wireless LAN Connection (on selected models 49 Windows Wireless Network Connection 50 Bluetooth Wireless Connection (on selected models 51 Trusted Platform Module (TPM) (on selected models 52 Appendix Optional Accessories A-2 Optional Connections A-3 Bluetooth Mouse Setup (optional A-4 Operating System and Software A-6 System BIOS Settings A-7 Common Problems and...
User Manual
Page 37
4. Using the Notebook PC Pointing Device Storage Devices Expansion Card Optical drive Flash memory card reader Hard disk drive Memory (RAM) Connections Modem Connection Network Connection Wireless LAN Connection (on selected models) Bluetooth Wireless Connection (on selected models) Trusted Platform Module (TPM) (on selected models) NOTE: Photos and icons in this manual are used for artistic purposes only and do not show what is actually used in the product itself. 37
4. Using the Notebook PC Pointing Device Storage Devices Expansion Card Optical drive Flash memory card reader Hard disk drive Memory (RAM) Connections Modem Connection Network Connection Wireless LAN Connection (on selected models) Bluetooth Wireless Connection (on selected models) Trusted Platform Module (TPM) (on selected models) NOTE: Photos and icons in this manual are used for artistic purposes only and do not show what is actually used in the product itself. 37
User Manual
Page 52
... layer of each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. 4 Using the Notebook PC Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is a hardware-based solution that an help avoid attacks by hackers looking to capture passwords and encryption keys to sensitive...
... layer of each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. 4 Using the Notebook PC Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is a hardware-based solution that an help avoid attacks by hackers looking to capture passwords and encryption keys to sensitive...
User Manual
Page 72
... card to a host (generally a Hub or Switch) is stopped and most of the Notebook PC devices are called a straightthrough Twisted Pair Ethernet (TPE). TPM (Trusted Platform Module) (on the system board that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be automatically...
... card to a host (generally a Hub or Switch) is stopped and most of the Notebook PC devices are called a straightthrough Twisted Pair Ethernet (TPE). TPM (Trusted Platform Module) (on the system board that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be automatically...