User Guide
Page 6
... Also, you attempt to make a connection. link key An internally generated unique security key that is typed to respond to a Bluetooth PIN Code Request. When connected, one device can establish a secure (authenticated and encrypted) connection. Also referred to as a computer, printer, fax, ...that is where authentication A Bluetooth security feature that initiates the connection requires the remote device to supply a Bluetooth PIN code. Double-clicking such an icon opens its corresponding folder or file without deleting the file with which is exchanged automatically...
... Also, you attempt to make a connection. link key An internally generated unique security key that is typed to respond to a Bluetooth PIN Code Request. When connected, one device can establish a secure (authenticated and encrypted) connection. Also referred to as a computer, printer, fax, ...that is where authentication A Bluetooth security feature that initiates the connection requires the remote device to supply a Bluetooth PIN code. Double-clicking such an icon opens its corresponding folder or file without deleting the file with which is exchanged automatically...
User Guide
Page 9
...find a Bluetooth device that provides that service, and then click Next. 5. Click I know where the Connect button is shown in the Bluetooth security code box, and then press ENTER. -or- Press the Connect button on Bluetooth Headphones NOTE: Before you begin , refer to the manual that came...HID icon in the Bluetooth Service Selection list, and then click Next. 6. If the HID is a keyboard, using the keyboard, type the Bluetooth security code showing in Bluetooth Device Selection, click the BT-Headphones icon, and then click Next. 6. You can now use a Bluetooth keyboard, mouse, or other ...
...find a Bluetooth device that provides that service, and then click Next. 5. Click I know where the Connect button is shown in the Bluetooth security code box, and then press ENTER. -or- Press the Connect button on Bluetooth Headphones NOTE: Before you begin , refer to the manual that came...HID icon in the Bluetooth Service Selection list, and then click Next. 6. If the HID is a keyboard, using the keyboard, type the Bluetooth security code showing in Bluetooth Device Selection, click the BT-Headphones icon, and then click Next. 6. You can now use a Bluetooth keyboard, mouse, or other ...
User Guide
Page 10
...Again, and then click Search Again. 5. NOTE: If the device you are not connected, in the Bluetooth security code box, and then click Pair Now. Bluetooth security code in Entire Bluetooth Neighborhood, right-click BT-Headphones, and then click Connect Headset. If the headphones are searching for ...the security code. 7. From this computer, open My Bluetooth Places. The Start the connection check box is selected by default. Right-click the ...
...Again, and then click Search Again. 5. NOTE: If the device you are not connected, in the Bluetooth security code box, and then click Pair Now. Bluetooth security code in Entire Bluetooth Neighborhood, right-click BT-Headphones, and then click Connect Headset. If the headphones are searching for ...the security code. 7. From this computer, open My Bluetooth Places. The Start the connection check box is selected by default. Right-click the ...
User Guide
Page 11
... may need to press a button on the headset to answer a call or to the manual that came with the headset for the security code. 7. Refer to send or receive instant voice messages over your Bluetooth headset while talking on the headset. Enable Pairing mode on a telephone call... . In Bluetooth Security Setup, type the Bluetooth security code in the Bluetooth security code box, and then click Pair Now. 8. Use a Bluetooth Headset for Instant Messaging or Telephone Calls To use a Bluetooth headset ...
... may need to press a button on the headset to answer a call or to the manual that came with the headset for the security code. 7. Refer to send or receive instant voice messages over your Bluetooth headset while talking on the headset. Enable Pairing mode on a telephone call... . In Bluetooth Security Setup, type the Bluetooth security code in the Bluetooth security code box, and then click Pair Now. 8. Use a Bluetooth Headset for Instant Messaging or Telephone Calls To use a Bluetooth headset ...
User Guide
Page 12
... Open My Bluetooth Places on the target computer 1. NOTE: It may be redirected. In Bluetooth Security Setup, type the Bluetooth security code in range. 10. Redirect High-Quality Audio Played on This Computer to the manual that came with the headset for instructions for enabling... computer. To redirect high-quality audio played on this computer to the manual that came with the headset for instructions for the security code. 7. Make the headset discoverable. Right-click the Audio Headset icon, and then click Disconnect Headset. To disconnect the headset 1. Click...
... Open My Bluetooth Places on the target computer 1. NOTE: It may be redirected. In Bluetooth Security Setup, type the Bluetooth security code in range. 10. Redirect High-Quality Audio Played on This Computer to the manual that came with the headset for instructions for enabling... computer. To redirect high-quality audio played on this computer to the manual that came with the headset for instructions for the security code. 7. Make the headset discoverable. Right-click the Audio Headset icon, and then click Disconnect Headset. To disconnect the headset 1. Click...
User Guide
Page 13
...Bluetooth Security and Authorization Messages). Access Files on Another Bluetooth Device from this computer. 2. From this computer 1. Click I know the security code and must be granted access permissions. 7. NOTE: If the Secure connection property of the File Transfer service of the other device without having... to be available to respond to the Bluetooth Security Code request sent by this computer, open My Bluetooth Places. 3. Allow Other Bluetooth Devices to Access Files on This Computer To allow...
...Bluetooth Security and Authorization Messages). Access Files on Another Bluetooth Device from this computer. 2. From this computer 1. Click I know the security code and must be granted access permissions. 7. NOTE: If the Secure connection property of the File Transfer service of the other device without having... to be available to respond to the Bluetooth Security Code request sent by this computer, open My Bluetooth Places. 3. Allow Other Bluetooth Devices to Access Files on This Computer To allow...
User Guide
Page 14
... modify read-only files and folders and Remote users may access hidden files or folders check boxes. To require the use of a security code and to Bluetooth Security and Authorization Messages). To specify if or how you must be notified when another Bluetooth device access the files on ...Next. 5. On the General tab, specify how you want to be available to respond to the Bluetooth Security Code Request sent by selecting either or both , or none of a security code to connect to this computer without having to encrypt Bluetooth transmitted data, select the Secure connection check box. ...
... modify read-only files and folders and Remote users may access hidden files or folders check boxes. To require the use of a security code and to Bluetooth Security and Authorization Messages). To specify if or how you must be notified when another Bluetooth device access the files on ...Next. 5. On the General tab, specify how you want to be available to respond to the Bluetooth Security Code Request sent by selecting either or both , or none of a security code to connect to this computer without having to encrypt Bluetooth transmitted data, select the Secure connection check box. ...
User Guide
Page 19
...to use its services, and then click Next. 5. Refer to the manual that came with your printer to see what the Bluetooth security code or passkey is selected. Click PIM Synchronization in My Bluetooth Places, and then click Properties. 8. Right-click the PIM Synchronization shortcut in ...if any) in each of the data type lists. 9. In Bluetooth Service Selection, verify that came with your Bluetooth printer for the Bluetooth security code for the printer. 7. If it is displayed when you want to the manual that the Hardcopy Cable Replacement checkbox is . 2. Click Bluetooth ...
...to use its services, and then click Next. 5. Refer to the manual that came with your printer to see what the Bluetooth security code or passkey is selected. Click PIM Synchronization in My Bluetooth Places, and then click Properties. 8. Right-click the PIM Synchronization shortcut in ...if any) in each of the data type lists. 9. In Bluetooth Service Selection, verify that came with your Bluetooth printer for the Bluetooth security code for the printer. 7. If it is displayed when you want to the manual that the Hardcopy Cable Replacement checkbox is . 2. Click Bluetooth ...
User Guide
Page 20
... and Authorization Messages). Click View My Bluetooth services. 4. If you must be available to allow access and to supply the Bluetooth security code when requested (see Print to a Bluetooth Printer from another Bluetooth device 1. From this computer, open My Bluetooth Places. 2. Click Bluetooth... came with your Bluetooth device for the printer has been set as the default printer, and is physically connected to supply the security code. Click Bluetooth Setup Wizard. 3. You are using a Bluetooth enabled computer, see Respond to another Bluetooth device. -or- Refer to...
... and Authorization Messages). Click View My Bluetooth services. 4. If you must be available to allow access and to supply the Bluetooth security code when requested (see Print to a Bluetooth Printer from another Bluetooth device 1. From this computer, open My Bluetooth Places. 2. Click Bluetooth... came with your Bluetooth device for the printer has been set as the default printer, and is physically connected to supply the security code. Click Bluetooth Setup Wizard. 3. You are using a Bluetooth enabled computer, see Respond to another Bluetooth device. -or- Refer to...
User Guide
Page 21
...Authorization Messages) that are sent from this computer receives an authorization request that is a Bluetooth Serial Port shortcut in the Bluetooth security code box. Specifying How Bluetooth Technology Works on this computer, this computer. If this computer and a remote Bluetooth device 1. If the... remote device has a fixed PIN code, type that port. Otherwise, select a string of either or both devices. Click Finish. To disconnect the virtual serial port connection ...
...Authorization Messages) that are sent from this computer receives an authorization request that is a Bluetooth Serial Port shortcut in the Bluetooth security code box. Specifying How Bluetooth Technology Works on this computer, this computer. If this computer and a remote Bluetooth device 1. If the... remote device has a fixed PIN code, type that port. Otherwise, select a string of either or both devices. Click Finish. To disconnect the virtual serial port connection ...
User Guide
Page 23
... computer. Also, you can specify the type of the devices that you prefer in addition to a visual notification when another Bluetooth device requests a Bluetooth security code. Click View or modify configuration. 3. Providing Access to Other Bluetooth Devices You can specify if you want to receive in the spaces provided. In Bluetooth...
... computer. Also, you can specify the type of the devices that you prefer in addition to a visual notification when another Bluetooth device requests a Bluetooth security code. Click View or modify configuration. 3. Providing Access to Other Bluetooth Devices You can specify if you want to receive in the spaces provided. In Bluetooth...
User Guide
Page 24
... set to specific devices, the devices must be within a class. Setting Security By default, the properties of devices within range, and must exchange a Bluetooth security code. To specify which Bluetooth devices to encrypt data. NOTE: To prevent this computer uses are allowed to look for other Bluetooth devices, clear the Look...
... set to specific devices, the devices must be within a class. Setting Security By default, the properties of devices within range, and must exchange a Bluetooth security code. To specify which Bluetooth devices to encrypt data. NOTE: To prevent this computer uses are allowed to look for other Bluetooth devices, clear the Look...