Wireless Security
Page 3
... the "pipe" of access from the outset that no security whatsoever. For complete wireless and mobile security solutions, please contact Compaq Global Services at astonishing rates to take advantage of the benefits of access is examined. 1 Lee Gomes, "Often unguarded wireless...easily by using wireless technologies at http://www.compaq.com/services/index_infrastructure.html. This ability to function in "untethered" mode is particularly so where firewalls, virtual private networks, and corporate servers are not aware of specific security vulnerabilities or don't understand the magnitude ...
... the "pipe" of access from the outset that no security whatsoever. For complete wireless and mobile security solutions, please contact Compaq Global Services at astonishing rates to take advantage of the benefits of access is examined. 1 Lee Gomes, "Often unguarded wireless...easily by using wireless technologies at http://www.compaq.com/services/index_infrastructure.html. This ability to function in "untethered" mode is particularly so where firewalls, virtual private networks, and corporate servers are not aware of specific security vulnerabilities or don't understand the magnitude ...
Wireless Security
Page 6
... devices reduce this exposure is lost or stolen, unauthorized persons may view confidential information stored on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. If a device is to -all potentially breached in such a situation. Vulnerability to Hacking... device. The following subsections describe security problems specific to mobile access devices, the first link in the pipe on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Often firewalls are precautions that notebook computers address. Mobile devices such as opposed...
... devices reduce this exposure is lost or stolen, unauthorized persons may view confidential information stored on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. If a device is to -all potentially breached in such a situation. Vulnerability to Hacking... device. The following subsections describe security problems specific to mobile access devices, the first link in the pipe on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Often firewalls are precautions that notebook computers address. Mobile devices such as opposed...
Wireless Security
Page 7
... of password entry on from being intercepted via the serial port. A smart card is more robust by a given key. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are outlined in the subsections below. Some of a plastic card with a PIN. Users often choose passwords that intruders may penetrate...
... of password entry on from being intercepted via the serial port. A smart card is more robust by a given key. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are outlined in the subsections below. Some of a plastic card with a PIN. Users often choose passwords that intruders may penetrate...
Wireless Security
Page 9
...user login. Notwithstanding the protection offered, such firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use . One such product is a range of wireless connectivity technologies. Connectivity Technologies The ...attending meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the...
...user login. Notwithstanding the protection offered, such firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use . One such product is a range of wireless connectivity technologies. Connectivity Technologies The ...attending meetings in conference rooms. Generally, wireless local area networks (WLANs) will facilitate this usage. 3 EzWAP 2.0 is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the...
Wireless Security
Page 11
... CDMA and TDMA are widely used there. A WPAN permits personal devices such as printers or other personal devices. They can use Bluetooth, a radio frequency (RF) specification for mobile telephones. WWANs use one of the three digital wireless telephone technologies. Japan's NT DoCoMo uses I-mode technology in Europe, is a TDMA technology. Figure...
... CDMA and TDMA are widely used there. A WPAN permits personal devices such as printers or other personal devices. They can use Bluetooth, a radio frequency (RF) specification for mobile telephones. WWANs use one of the three digital wireless telephone technologies. Japan's NT DoCoMo uses I-mode technology in Europe, is a TDMA technology. Figure...
Wireless Security
Page 13
... the pipe. Popular PKI vendors like Baltimore Technologies, Inc. that is titled "Eavesdropping," but with WWAN connectivity. and Entrust do not have point solutions to specific applications that run on which information must be deployed across multiple points in an inherently more detail and suggest solutions to the network technology; Smaller...
... the pipe. Popular PKI vendors like Baltimore Technologies, Inc. that is titled "Eavesdropping," but with WWAN connectivity. and Entrust do not have point solutions to specific applications that run on which information must be deployed across multiple points in an inherently more detail and suggest solutions to the network technology; Smaller...
Wireless Security
Page 19
...given only to protect its keys. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Uses Certicom ECC for IKE • Connects to back-end... remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. the base station is equipped ...
...given only to protect its keys. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Uses Certicom ECC for IKE • Connects to back-end... remote hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. the base station is equipped ...
Wireless Security
Page 20
.... WTLS offers three classes of authentication: • Class 1 authentication is anonymous, meaning neither party to the link is designed specifically for generating a key with a view to encrypt a session between the server and client. WAP 1.2 also adds a function that was developed ...to solve problems specific to a WTLS server. Besides encryption, the IS-95 standard of modulation.) Wireless Access Protocol The Wireless Access Protocol (WAP) is authenticated;...
.... WTLS offers three classes of authentication: • Class 1 authentication is anonymous, meaning neither party to the link is designed specifically for generating a key with a view to encrypt a session between the server and client. WAP 1.2 also adds a function that was developed ...to solve problems specific to a WTLS server. Besides encryption, the IS-95 standard of modulation.) Wireless Access Protocol The Wireless Access Protocol (WAP) is authenticated;...
Wireless Security
Page 21
... done, as well, on which WAP is based encrypts information only as it travels from previous versions and represents a strong flow of convergence with wireless-specific profiles. Such implementations may be translated from wireless client device to standard Internet "TLS" Data is unencrypted for a brief period of WAP 2.0 appear on...
... done, as well, on which WAP is based encrypts information only as it travels from previous versions and represents a strong flow of convergence with wireless-specific profiles. Such implementations may be translated from wireless client device to standard Internet "TLS" Data is unencrypted for a brief period of WAP 2.0 appear on...
Wireless Security
Page 24
...building. A fully secure solution will be made available to customers. Compaq is not limited to wireless networks. One of these two networks, which enters the corporate data network and/or the Internet. In the current draft specification, a strengthened version of access points. Wireless Security White Paper 24...piece of hardware, a hub, which transfers data to the local area network via an Ethernet connection in IEEE extensions to the WEP specification that include 802.11i and 802.1x. 802.1x can be necessary to isolate these servers would need to build working to specify ...
...building. A fully secure solution will be made available to customers. Compaq is not limited to wireless networks. One of these two networks, which enters the corporate data network and/or the Internet. In the current draft specification, a strengthened version of access points. Wireless Security White Paper 24...piece of hardware, a hub, which transfers data to the local area network via an Ethernet connection in IEEE extensions to the WEP specification that include 802.11i and 802.1x. 802.1x can be necessary to isolate these servers would need to build working to specify ...
Wireless Security
Page 27
... protects the resources of a private network from users from the rest of WEP; As mentioned above under the section titled "Security Specific to its own users can get directly at given thresholds of the data while the data passes through secure log-on privacy rather ...than authentication. however, it to WWAN Carrier Technologies." Specific security provided for the carrier itself. A firewall, working for WWAN technologies is no incoming request can access. This level of security ...
... protects the resources of a private network from users from the rest of WEP; As mentioned above under the section titled "Security Specific to its own users can get directly at given thresholds of the data while the data passes through secure log-on privacy rather ...than authentication. however, it to WWAN Carrier Technologies." Specific security provided for the carrier itself. A firewall, working for WWAN technologies is no incoming request can access. This level of security ...
Windows XP SP1 on Compaq Evo Notebooks
Page 6
... for Current BIOS using the current operating system. (See Appendix A for instructions if no OS is booted 3. Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is a collection of updates that improve the performance of this white paper. Windows XP Professional... lists the minimum versions of ROM, available as of the publication of Windows XP. Check the Compaq Web site for known Windows XP security issues For more information regarding specific fixes in the htm file on whether you install the Service Pack from the CD or from ...
... for Current BIOS using the current operating system. (See Appendix A for instructions if no OS is booted 3. Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks 6 UPDATES IN SP1 Summary: Service Pack 1 (SP1) is a collection of updates that improve the performance of this white paper. Windows XP Professional... lists the minimum versions of ROM, available as of the publication of Windows XP. Check the Compaq Web site for known Windows XP security issues For more information regarding specific fixes in the htm file on whether you install the Service Pack from the CD or from ...
Windows XP SP1 on Compaq Evo Notebooks
Page 10
...NT you do not need to reinstall the Service Pack if I upgrade to deploy SP1 based on Compaq Evo Notebooks 10 Frequently Asked Questions Should I change system drivers? Compaq and Microsoft recommend that each customer review SP1's documentation, and then determine whether to Service Pack 1?.../sp1/faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Microsoft Windows XP Service Pack 1 on specific needs.
...NT you do not need to reinstall the Service Pack if I upgrade to deploy SP1 based on Compaq Evo Notebooks 10 Frequently Asked Questions Should I change system drivers? Compaq and Microsoft recommend that each customer review SP1's documentation, and then determine whether to Service Pack 1?.../sp1/faq.asp For comprehensive online support, visit the Compaq Web site at: http://www.compaq.com For international information, visit the Compaq Web site at: http://www.compaq.com/corporate/overview/world_offices.html 17A8-0902A-WWEN Microsoft Windows XP Service Pack 1 on specific needs.
Evo Notebook N600c Software Overview
Page 10
... only application that allows customers to modify the configuration of their notebooks and to enable Compaq specific features of the system hardware and software configuration. Diagnostics for Windows is an operating system-independent utility that can be recorded for Windows ! Windows 98 ! Evo Notebook N600c Software Overview 10 Software Enhancements This section discusses the following...
... only application that allows customers to modify the configuration of their notebooks and to enable Compaq specific features of the system hardware and software configuration. Diagnostics for Windows is an operating system-independent utility that can be recorded for Windows ! Windows 98 ! Evo Notebook N600c Software Overview 10 Software Enhancements This section discusses the following...
Compaq Evo N115 Series Maintenance and Service Guide
Page 61
... expansion boards 256 MB 128 MB 244399-001 239190-001 3-12 Maintenance and Service Guide refer to Appendix C, "Screw Listing," for more information on screw specifications and usage.) 254122-001 I PM2.0 x 7.0 I PM2.5 x 3.5 I PM2.0 x 5.0 I TM2.0 x 7.5 I TM2.0 x 5.0 I TM2.0 x 8.0 I TM2.0 x 20.0 I HM5.0 x 13.0 standoff I HM5.0 x 17.5 standoff I HM5.0 x 9.0 standoff I HM5.0 x 10.5 screwlock AC adapters...
... expansion boards 256 MB 128 MB 244399-001 239190-001 3-12 Maintenance and Service Guide refer to Appendix C, "Screw Listing," for more information on screw specifications and usage.) 254122-001 I PM2.0 x 7.0 I PM2.5 x 3.5 I PM2.0 x 5.0 I TM2.0 x 7.5 I TM2.0 x 5.0 I TM2.0 x 8.0 I TM2.0 x 20.0 I HM5.0 x 13.0 standoff I HM5.0 x 17.5 standoff I HM5.0 x 9.0 standoff I HM5.0 x 10.5 screwlock AC adapters...
Compaq Evo N115 Series Maintenance and Service Guide
Page 132
....7° C) maximum wet bulb temperature Altitude (unpressurized) Operating Nonoperating 0 to 10,000 ft 0 to 30,000 ft 0 to 3,048 m 0 to 9,144 m Maintenance and Service Guide 6-1 6 Specifications This chapter provides physical and performance...
....7° C) maximum wet bulb temperature Altitude (unpressurized) Operating Nonoperating 0 to 10,000 ft 0 to 30,000 ft 0 to 3,048 m 0 to 9,144 m Maintenance and Service Guide 6-1 6 Specifications This chapter provides physical and performance...
Compaq Evo N115 Series Maintenance and Service Guide
Page 133
Specifications Shock Operating Nonoperating Vibration Operating Nonoperating Table 6-1 Computer (Continued) 10 G, 11 ms, half-sine 60 G, 11 ms, half-sine 0.5 G zero-to-peak, 10 to 500 Hz, at 0.5 oct/min sweep rate 1.0 G zero-to-peak, 10 to 500 Hz, at 0.5 oct/min sweep rate ✎ Applicable product safety standards specify thermal limits for plastic surfaces. The computer operates well within this range of temperatures. 6-2 Maintenance and Service Guide
Specifications Shock Operating Nonoperating Vibration Operating Nonoperating Table 6-1 Computer (Continued) 10 G, 11 ms, half-sine 60 G, 11 ms, half-sine 0.5 G zero-to-peak, 10 to 500 Hz, at 0.5 oct/min sweep rate 1.0 G zero-to-peak, 10 to 500 Hz, at 0.5 oct/min sweep rate ✎ Applicable product safety standards specify thermal limits for plastic surfaces. The computer operates well within this range of temperatures. 6-2 Maintenance and Service Guide
Compaq Evo N115 Series Maintenance and Service Guide
Page 134
Specifications Table 6-2 14.1-inch XGA, TFT Display Dimensions Height Depth Diagonal Number of colors Contrast ratio Brightness Pixel resolution Pitch Format Configuration Backlight Character display Refresh Total power consumption 8.97 in 11.76 in 14.1 in 256K 150:1 120+ nit 22.8 cm 29.9 cm 35.81 cm 0.279 × 0.279 mm 1024 × 768 RGB vertical stripe Cold cathode fluorescent, 1 tube 80 × 25 60 Hz 4.75 W Maintenance and Service Guide 6-3
Specifications Table 6-2 14.1-inch XGA, TFT Display Dimensions Height Depth Diagonal Number of colors Contrast ratio Brightness Pixel resolution Pitch Format Configuration Backlight Character display Refresh Total power consumption 8.97 in 11.76 in 14.1 in 256K 150:1 120+ nit 22.8 cm 29.9 cm 35.81 cm 0.279 × 0.279 mm 1024 × 768 RGB vertical stripe Cold cathode fluorescent, 1 tube 80 × 25 60 Hz 4.75 W Maintenance and Service Guide 6-3
Compaq Evo N115 Series Maintenance and Service Guide
Page 135
Specifications Table 6-3 13.3-inch XGA, TFT Display Dimensions Height Depth Width Number of colors Contrast ratio Brightness Pixel resolution Pitch Format Configuration Backlight Character display Refresh Total power consumption 7.98 in 10.64 in 13.30 in 20.28 mm 27.03 mm 33.79 mm Up to 16.8 million 150:1 120 nits minimum, 150 nits typical 0.264 × 0.264 mm 1024 × 768 RGB stripe Edge lit, bottom 80 × 25 60 Hz 4.0 W 6-4 Maintenance and Service Guide
Specifications Table 6-3 13.3-inch XGA, TFT Display Dimensions Height Depth Width Number of colors Contrast ratio Brightness Pixel resolution Pitch Format Configuration Backlight Character display Refresh Total power consumption 7.98 in 10.64 in 13.30 in 20.28 mm 27.03 mm 33.79 mm Up to 16.8 million 150:1 120 nits minimum, 150 nits typical 0.264 × 0.264 mm 1024 × 768 RGB stripe Edge lit, bottom 80 × 25 60 Hz 4.0 W 6-4 Maintenance and Service Guide
Compaq Evo N115 Series Maintenance and Service Guide
Page 136
Consult the Compaq Customer Support Center for details. Maintenance and Service Guide 6-5 Specifications Table 6-3 Hard Drives 30 GB 20 GB 15 GB 10 GB User capacity per 30.0 GB drive1 20.0 GB 15.0 GB 10.0 GB Drive height 9.5 ... 63 16,283 16 63 16,683 16 63 16,283 16 63 11 GB = 1,000,000,000 bytes. 2System capability may differ. 3Actual drive specifications may differ slightly. Certain restrictions and exclusions apply.
Consult the Compaq Customer Support Center for details. Maintenance and Service Guide 6-5 Specifications Table 6-3 Hard Drives 30 GB 20 GB 15 GB 10 GB User capacity per 30.0 GB drive1 20.0 GB 15.0 GB 10.0 GB Drive height 9.5 ... 63 16,283 16 63 16,683 16 63 16,283 16 63 11 GB = 1,000,000,000 bytes. 2System capability may differ. 3Actual drive specifications may differ slightly. Certain restrictions and exclusions apply.