Wireless Security
Page 3
...each point along the access pipe is particularly so where firewalls, virtual private networks, and corporate servers are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the subject of access from ... are using radio or infrared signals instead of the vulnerabilities can be alleviated easily by using wireless technologies at http://www.compaq.com/services/index_infrastructure.html. Wireless Security White Paper 3 Introduction Wireless networks connect computers in an attempt to bring an awareness...
...each point along the access pipe is particularly so where firewalls, virtual private networks, and corporate servers are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the subject of access from ... are using radio or infrared signals instead of the vulnerabilities can be alleviated easily by using wireless technologies at http://www.compaq.com/services/index_infrastructure.html. Wireless Security White Paper 3 Introduction Wireless networks connect computers in an attempt to bring an awareness...
Wireless Security
Page 6
... handheld devices reduce this exposure is lost or stolen, unauthorized persons may view confidential information stored on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. The smaller screens of the tasks that mobile device users can be used for users to...mobile devices incur has no technological solution. The following subsections describe security problems specific to mobile access devices, the first link in the pipe on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Companies treat the devices as critical resources by ...
... handheld devices reduce this exposure is lost or stolen, unauthorized persons may view confidential information stored on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. The smaller screens of the tasks that mobile device users can be used for users to...mobile devices incur has no technological solution. The following subsections describe security problems specific to mobile access devices, the first link in the pipe on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Companies treat the devices as critical resources by ...
Wireless Security
Page 7
... example, adds a level of smart cards: contact and contactless. The contact smart card consists of a plastic card with a PIN. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are connected to an integrated circuit sandwiched between layers of plastic inside the card. For example, keypads that do not...
... example, adds a level of smart cards: contact and contactless. The contact smart card consists of a plastic card with a PIN. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are connected to an integrated circuit sandwiched between layers of plastic inside the card. For example, keypads that do not...
Wireless Security
Page 9
...firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to...unique code every sixty seconds in strict synchronicity with his or her PIN. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the access device; Notwithstanding the protection offered, such firewalls are available from ... local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today.
...firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to...unique code every sixty seconds in strict synchronicity with his or her PIN. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the access device; Notwithstanding the protection offered, such firewalls are available from ... local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today.
Wireless Security
Page 11
...'s NT DoCoMo uses I-mode technology in the United States and are IS-95 and IS-136, respectively. They can use Bluetooth, a radio frequency (RF) specification for point-to support voice transmission for mobile telephones. GSM is the most widely used there. Wireless Security White Paper 11 Wireless Personal-area Networks... Wireless personal-area networks (WPANs) can also use one of the three digital wireless telephone technologies. A WPAN permits personal devices such as handheld PCs to connect wirelessly to peripheral devices such as printers or other personal devices.
...'s NT DoCoMo uses I-mode technology in the United States and are IS-95 and IS-136, respectively. They can use Bluetooth, a radio frequency (RF) specification for point-to support voice transmission for mobile telephones. GSM is the most widely used there. Wireless Security White Paper 11 Wireless Personal-area Networks... Wireless personal-area networks (WPANs) can also use one of the three digital wireless telephone technologies. A WPAN permits personal devices such as handheld PCs to connect wirelessly to peripheral devices such as printers or other personal devices.
Wireless Security
Page 13
... be necessary to load software on the device and on the server, as a public key infrastructure (PKI). and Entrust do not have point solutions to specific applications that run on the type of network used to secure one of several connectivity technologies from the access device to the carrier (or WWAN...
... be necessary to load software on the device and on the server, as a public key infrastructure (PKI). and Entrust do not have point solutions to specific applications that run on the type of network used to secure one of several connectivity technologies from the access device to the carrier (or WWAN...
Wireless Security
Page 19
... VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by performing packet switching at remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet...
... VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by performing packet switching at remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet...
Wireless Security
Page 20
.... WTLS offers three classes of authentication: • Class 1 authentication is anonymous, meaning neither party to the link is designed specifically for Wireless Public Key Infrastructure (WPKI) by the military with which authenticate a WTLS client to encrypt a session between the server... and client. WAP 2.0 was developed to solve problems specific to mobile network devices, including their effectiveness lies in making interception more difficult. WAP 1.2 adds support for non-repudiation. Besides...
.... WTLS offers three classes of authentication: • Class 1 authentication is anonymous, meaning neither party to the link is designed specifically for Wireless Public Key Infrastructure (WPKI) by the military with which authenticate a WTLS client to encrypt a session between the server... and client. WAP 2.0 was developed to solve problems specific to mobile network devices, including their effectiveness lies in making interception more difficult. WAP 1.2 adds support for non-repudiation. Besides...
Wireless Security
Page 21
... been done, as well, on the market. This characteristic is a software change the fact that there is unencrypted for a brief period of convergence with wireless-specific profiles. The "WAP GAP" Mobile Device WTLS WAP GATEWAY TLS Web Server WAP GAP Security protocol must be some time, however, before implementations of...
... been done, as well, on the market. This characteristic is a software change the fact that there is unencrypted for a brief period of convergence with wireless-specific profiles. The "WAP GAP" Mobile Device WTLS WAP GATEWAY TLS Web Server WAP GAP Security protocol must be some time, however, before implementations of...
Wireless Security
Page 24
...attacker would also require re-configuring the client to the phone line which enters the corporate data network and/or the Internet. Compaq is the telecommunications company which routes the data to communicate with more public segments that of the RC-4/per-frame IV encryption... the Internet. WLAN Access Points Certain weaknesses of WLAN traffic through eavesdropping. According to carry out this attack. In the current draft specification, a strengthened version of a wired LAN without privacy-enhancing encryption techniques. It can also be the future encryption standard. It is...
...attacker would also require re-configuring the client to the phone line which enters the corporate data network and/or the Internet. Compaq is the telecommunications company which routes the data to communicate with more public segments that of the RC-4/per-frame IV encryption... the Internet. WLAN Access Points Certain weaknesses of WLAN traffic through eavesdropping. According to carry out this attack. In the current draft specification, a strengthened version of a wired LAN without privacy-enhancing encryption techniques. It can also be the future encryption standard. It is...
Wireless Security
Page 27
...the network so that there is described above , 802.1x only provides authentication. As mentioned above under the section titled "Security Specific to control what outside resources its own private data resources and to WWAN Carrier Technologies." This does not address the cryptological weaknesses... of the employees working closely with a proxy server that allows its destination. Specific security provided for WWAN technologies is no incoming request can access. There are responsible for the security of the data while...
...the network so that there is described above , 802.1x only provides authentication. As mentioned above under the section titled "Security Specific to control what outside resources its own private data resources and to WWAN Carrier Technologies." This does not address the cryptological weaknesses... of the employees working closely with a proxy server that allows its destination. Specific security provided for WWAN technologies is no incoming request can access. There are responsible for the security of the data while...
Windows XP SP1 on Compaq Evo Notebooks
Page 6
...versions of ROM, available as of the publication of Windows XP. Check the Compaq Web site for Current BIOS using the current operating system. (See Appendix A for known Windows XP security issues For more information regarding specific fixes in the htm file on the Service Pack CD. The Web download...Service Pack 1 on whether you install the Service Pack from the CD or from Microsoft's Web site. The recommended space requirements depend on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is a collection of updates that improve the performance of this white paper.
...versions of ROM, available as of the publication of Windows XP. Check the Compaq Web site for Current BIOS using the current operating system. (See Appendix A for known Windows XP security issues For more information regarding specific fixes in the htm file on the Service Pack CD. The Web download...Service Pack 1 on whether you install the Service Pack from the CD or from Microsoft's Web site. The recommended space requirements depend on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is a collection of updates that improve the performance of this white paper.
Windows XP SP1 on Compaq Evo Notebooks
Page 10
...www.microsoft.com/WindowsXP/pro/downloads/servicepacks/sp1/faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN No, unlike Windows NT you do not need... with SP1, these may not improve performance for all customers. Each customer's computing environment is different. Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks 10 Frequently Asked Questions Should I upgrade to deploy SP1 based on specific needs.
...www.microsoft.com/WindowsXP/pro/downloads/servicepacks/sp1/faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN No, unlike Windows NT you do not need... with SP1, these may not improve performance for all customers. Each customer's computing environment is different. Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks 10 Frequently Asked Questions Should I upgrade to deploy SP1 based on specific needs.
Evo Notebook N600c Software Overview
Page 10
... configuration of their notebooks and to enable Compaq specific features of the system hardware and software configuration. Compaq Diagnostics for Windows allows users to Compaq notebook and desktop computers. Windows NT 4.0 & ! Compaq Support Windows 2000 Software CD ! Multiple snapshots can locally retrieve detailed information specific to test hardware components and includes a feature called Configuration Record. Evo Notebook N600c Software Overview...
... configuration of their notebooks and to enable Compaq specific features of the system hardware and software configuration. Compaq Diagnostics for Windows allows users to Compaq notebook and desktop computers. Windows NT 4.0 & ! Compaq Support Windows 2000 Software CD ! Multiple snapshots can locally retrieve detailed information specific to test hardware components and includes a feature called Configuration Record. Evo Notebook N600c Software Overview...
Hard Drive White Paper
Page 2
...performance can occur. Over time, the hard drive file structure can fail. This white paper explains the measures that occurs • While the notebook is reading or writing data (operational shock). When a file is fragmented, the hard drive throughput performance is impacted because the hard drive ... passion to the hard drive on a "first available space" basis. However, if the drive is exposed to shock events beyond the set specifications, the hard drive can become fragmented due to be degraded if file fragmentation is in symptoms such as blue screens and continuous reboots. The ...
...performance can occur. Over time, the hard drive file structure can fail. This white paper explains the measures that occurs • While the notebook is reading or writing data (operational shock). When a file is fragmented, the hard drive throughput performance is impacted because the hard drive ... passion to the hard drive on a "first available space" basis. However, if the drive is exposed to shock events beyond the set specifications, the hard drive can become fragmented due to be degraded if file fragmentation is in symptoms such as blue screens and continuous reboots. The ...
Compaq Notebook Series Software Guide
Page 82
... exit Save changes and exit To Do This ■ View identification information about the notebook, a port replicator, and any battery packs in the system. ■ View specification information about the processor, memory and cache size, and system ROM. Replace configuration settings... in effect when the notebook restarts. 7-4 Software Guide Save system configuration settings to floppy Restore from a diskette...
... exit Save changes and exit To Do This ■ View identification information about the notebook, a port replicator, and any battery packs in the system. ■ View specification information about the processor, memory and cache size, and system ROM. Replace configuration settings... in effect when the notebook restarts. 7-4 Software Guide Save system configuration settings to floppy Restore from a diskette...
Hardware Guide, Compaq Notebook Series
Page 1
b Hardware Guide Compaq Notebook Series Document Part Number: 265656-001 June 2002 This guide explains how to identify and use notebook hardware features, including connectors for external devices. It also includes power and environmental specifications, which may be helpful when traveling with the notebook.
b Hardware Guide Compaq Notebook Series Document Part Number: 265656-001 June 2002 This guide explains how to identify and use notebook hardware features, including connectors for external devices. It also includes power and environmental specifications, which may be helpful when traveling with the notebook.
Hardware Guide, Compaq Notebook Series
Page 7
Contents Increasing Memory 7-4 Displaying Memory Information 7-4 Removing or Inserting a Memory Board 7-5 Replacing the Primary Hard Drive 7-10 Finding Mini PCI and MultiPort Information 7-12 8 Specifications Regulatory Agency Series Numbers 8-1 Notebook Dimensions 8-2 Operating Environment 8-2 Rated Input Power 8-3 Modem Specifications 8-3 Finding More Environmental Information 8-4 Index Hardware Guide vii
Contents Increasing Memory 7-4 Displaying Memory Information 7-4 Removing or Inserting a Memory Board 7-5 Replacing the Primary Hard Drive 7-10 Finding Mini PCI and MultiPort Information 7-12 8 Specifications Regulatory Agency Series Numbers 8-1 Notebook Dimensions 8-2 Operating Environment 8-2 Rated Input Power 8-3 Modem Specifications 8-3 Finding More Environmental Information 8-4 Index Hardware Guide vii
Hardware Guide, Compaq Notebook Series
Page 26
Cord and Cables Identifying External Hardware Additional Standard Components: Cord and Cables 1 Power cord* Connects the AC Adapter to an AC electrical outlet. 2 Modem cable Connects the modem to an RJ-11 telephone jack or to a country-specific modem adapter. ✎ The modem cable has a 6-pin RJ-11 telephone connector at each end. 3 Network cable (select models only) Connects the notebook to an Ethernet network jack. ✎ The network cable has an 8-pin RJ-45 network connector at each end. *Power cords vary in appearance by region. Hardware Guide 1-19
Cord and Cables Identifying External Hardware Additional Standard Components: Cord and Cables 1 Power cord* Connects the AC Adapter to an AC electrical outlet. 2 Modem cable Connects the modem to an RJ-11 telephone jack or to a country-specific modem adapter. ✎ The modem cable has a 6-pin RJ-11 telephone connector at each end. 3 Network cable (select models only) Connects the notebook to an Ethernet network jack. ✎ The network cable has an 8-pin RJ-45 network connector at each end. *Power cords vary in appearance by region. Hardware Guide 1-19
Hardware Guide, Compaq Notebook Series
Page 27
... and Accessories 1 AC Adapter* Converts AC power to DC power. 2 Country-specific modem adapter (included by region as required) Adapts the modem cable to a non-RJ-11 telephone jack. 3 Japan-specific outlet adapter (Japan only) Connects the AC Adapter to a 2-prong electrical outlet.... 4 Spare pointing stick cap (dual device models only) Replaces a worn pointing stick cap. 5 Weight saver (may ship in MultiBay) Can replace an optional MultiBay device to protect the MultiBay and reduce notebook...
... and Accessories 1 AC Adapter* Converts AC power to DC power. 2 Country-specific modem adapter (included by region as required) Adapts the modem cable to a non-RJ-11 telephone jack. 3 Japan-specific outlet adapter (Japan only) Connects the AC Adapter to a 2-prong electrical outlet.... 4 Spare pointing stick cap (dual device models only) Replaces a worn pointing stick cap. 5 Weight saver (may ship in MultiBay) Can replace an optional MultiBay device to protect the MultiBay and reduce notebook...