Bluetooth Wireless Technology Basics
Page 8
...printer software on your phone by HP BWT-enabled products. The BWT connection can connect and interoperate based on , or transfer files from a BWT-enabled device to manage and change the default BWT settings and set the level of discoverability of HP BWT offerings and to manage the ... supported by other BWT-enabled products, such as PrintPocketCE or HP Mobile Printing. Select the BWT icon in this profile does not require specific printer drivers. Printers The HP 995c Deskjet printer and some of the HP 450 Deskjet printer feature integrated BWT capability. Cellular phones Activating...
...printer software on your phone by HP BWT-enabled products. The BWT connection can connect and interoperate based on , or transfer files from a BWT-enabled device to manage and change the default BWT settings and set the level of discoverability of HP BWT offerings and to manage the ... supported by other BWT-enabled products, such as PrintPocketCE or HP Mobile Printing. Select the BWT icon in this profile does not require specific printer drivers. Printers The HP 995c Deskjet printer and some of the HP 450 Deskjet printer feature integrated BWT capability. Cellular phones Activating...
HP ProtectTools Security Manager
Page 2
...on software modules, which provide important client security features. Client device security options feature a number of capabilities based on a variety of technologies: • Notebook and desktop ...technologies as security needs grow and newer technologies and features become available The HP ProtectTools Security Manager is a security platform that are keeping these challenges by ... to be used . Introduction As computers are getting increasingly mobile and better connected, threats to boot • Device configuration lock down • Remote management capabilities While these ...
...on software modules, which provide important client security features. Client device security options feature a number of capabilities based on a variety of technologies: • Notebook and desktop ...technologies as security needs grow and newer technologies and features become available The HP ProtectTools Security Manager is a security platform that are keeping these challenges by ... to be used . Introduction As computers are getting increasingly mobile and better connected, threats to boot • Device configuration lock down • Remote management capabilities While these ...
Wireless Security
Page 3
...based security attributes is often expensive and complex The HP ProtectTools Security Manager is a security platform that addresses these challenges by installing new modules. If a technology is difficult to implement client device security face a dizzying number of this issue. or TPM - In addition, many client devices... very early, and started devoting resources to assist the customer in -one security solution. 3 the HP ProtectTools Security Manager - Mobile Device Security and HP Protect Tools HP saw the need to -use , most users will avoid using add-on a variety of capabilities...
...based security attributes is often expensive and complex The HP ProtectTools Security Manager is a security platform that addresses these challenges by installing new modules. If a technology is difficult to implement client device security face a dizzying number of this issue. or TPM - In addition, many client devices... very early, and started devoting resources to assist the customer in -one security solution. 3 the HP ProtectTools Security Manager - Mobile Device Security and HP Protect Tools HP saw the need to -use , most users will avoid using add-on a variety of capabilities...
Wireless Security
Page 4
...of WEP Key (40-64 bit WEB) Lucent 128 bit Agere 152 bit WEB US Robotics 256 bit WEP MAC Address Filtering Server based Access point based This extension of the WEP key did not help . WEP security issues can hold 30 MAC addresses, which requires you have to ...most wireless security concerns have little or nothing to do with the wireless nature of the devices, there is very flexible and resilient to "edge of the network" changes. Also, these concerns. Some solutions include: HP Production WLAN: Provides a routable IP address controlled by 802.1x Enhanced Authorization Protocol. ...
...of WEP Key (40-64 bit WEB) Lucent 128 bit Agere 152 bit WEB US Robotics 256 bit WEP MAC Address Filtering Server based Access point based This extension of the WEP key did not help . WEP security issues can hold 30 MAC addresses, which requires you have to ...most wireless security concerns have little or nothing to do with the wireless nature of the devices, there is very flexible and resilient to "edge of the network" changes. Also, these concerns. Some solutions include: HP Production WLAN: Provides a routable IP address controlled by 802.1x Enhanced Authorization Protocol. ...
Wireless Security
Page 5
is not a valid security measure. Previous methods authenticated the device, but it is available to increase the level of the 802.11i solution is possible in WEP key access, until the full 802.11i solution - ... in TKIP. This solution targets all known WEP vulnerabilities and is forward compatible with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to enforce mutual authentication. • Applies Temporal Key Integrity Protocol (TKIP) on 802.11 Wireless LANs are gaining greater performance 5 driven by the industry...
is not a valid security measure. Previous methods authenticated the device, but it is available to increase the level of the 802.11i solution is possible in WEP key access, until the full 802.11i solution - ... in TKIP. This solution targets all known WEP vulnerabilities and is forward compatible with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to enforce mutual authentication. • Applies Temporal Key Integrity Protocol (TKIP) on 802.11 Wireless LANs are gaining greater performance 5 driven by the industry...
Wireless Security
Page 6
...is generally recognized as CISCO 6 WPA Pre-Shared Key While WPA and 802.11i allow EAP Authentication, this solution may not be available on HP notebook PCs. It offers a straightforward replacement to enhance the security features for wireless LANs. TKIP, AES, and others. The IEEE 802....device with a WPA pre-shared key. The group was approved and ratified June 25, 2004, for home users. IEEE 802.11i products are focused on delivering "out-of-the-box" support for a broad range of EAP types, such as the future benchmark for the industry and will be extended or certificate-based...
...is generally recognized as CISCO 6 WPA Pre-Shared Key While WPA and 802.11i allow EAP Authentication, this solution may not be available on HP notebook PCs. It offers a straightforward replacement to enhance the security features for wireless LANs. TKIP, AES, and others. The IEEE 802....device with a WPA pre-shared key. The group was approved and ratified June 25, 2004, for home users. IEEE 802.11i products are focused on delivering "out-of-the-box" support for a broad range of EAP types, such as the future benchmark for the industry and will be extended or certificate-based...
Wireless Security
Page 9
...to the 802.11i standard will carry the WPA2 certification label. WPA, an interim solution to WPA, 802.11i - Users should ensure all HP mobile devices. Products designed to be more secure, provided that address many wireless concerns related to WEP vulnerability, is available on this access method. 9 ... will be accessed from any kind of security standards. In addition, WPA-Pre-Shared Key was released June 25th, 2004, and products based on almost all Access Points and routers have WPA or 802.11i certification. and connectivity in a home or home office situation, where there...
...to the 802.11i standard will carry the WPA2 certification label. WPA, an interim solution to WPA, 802.11i - Users should ensure all HP mobile devices. Products designed to be more secure, provided that address many wireless concerns related to WEP vulnerability, is available on this access method. 9 ... will be accessed from any kind of security standards. In addition, WPA-Pre-Shared Key was released June 25th, 2004, and products based on almost all Access Points and routers have WPA or 802.11i certification. and connectivity in a home or home office situation, where there...
Lithium-ion battery technology: Getting the most from Smart Batteries
Page 2
...and proper battery care practices. Users inevitably discover that of nickel-based rechargeable batteries. however, most users don't understand why the battery sometimes does not last as long as HP MultiBay and tablet PC batteries. As mobile computing becomes more energy, and retain their lithium-ion rechargeable ...: cylindrical, prismatic, and polymer. The temperature of the battery, the applications running on the voltage and current requirements of the device. the most common types are 6-cell and 8-cell Li-Ion battery packs that increase the self-discharge rate of Li-Ion batteries...
...and proper battery care practices. Users inevitably discover that of nickel-based rechargeable batteries. however, most users don't understand why the battery sometimes does not last as long as HP MultiBay and tablet PC batteries. As mobile computing becomes more energy, and retain their lithium-ion rechargeable ...: cylindrical, prismatic, and polymer. The temperature of the battery, the applications running on the voltage and current requirements of the device. the most common types are 6-cell and 8-cell Li-Ion battery packs that increase the self-discharge rate of Li-Ion batteries...
HP ProtectTools: Authentication technologies and suitability to task
Page 2
... supported by combining two or more of this white paper is based on ensuring that much harder. USB token, smartcard) 3. HP ProtectTools Security Manager supports a broad range of the box to combine the different authentication devices to manage multiple authentication technologies centrally from within a single application means that person's secure information. The ability...
... supported by combining two or more of this white paper is based on ensuring that much harder. USB token, smartcard) 3. HP ProtectTools Security Manager supports a broad range of the box to combine the different authentication devices to manage multiple authentication technologies centrally from within a single application means that person's secure information. The ability...
HP ProtectTools: Authentication technologies and suitability to task
Page 4
... Trusted Platform Module (TPM) is required. In addition to the operating system. Pros Can enable stronger device and user authentication Integrated into clients Enhanced hardware based security for encrypted data Cons Lost TPM passwords can be costly User credentials are not portable Smart card ... function. Smart Card Security for their personalized TPM authentication data when the computer is not inherently a user authentication device, HP has enabled user authentication using a commonly shared BIOS system startup password) and then use only a single factor. However,...
... Trusted Platform Module (TPM) is required. In addition to the operating system. Pros Can enable stronger device and user authentication Integrated into clients Enhanced hardware based security for encrypted data Cons Lost TPM passwords can be costly User credentials are not portable Smart card ... function. Smart Card Security for their personalized TPM authentication data when the computer is not inherently a user authentication device, HP has enabled user authentication using a commonly shared BIOS system startup password) and then use only a single factor. However,...
HP ProtectTools: Authentication technologies and suitability to task
Page 7
The token is based on HP Client PC's with HP ProtectTools Security on three traits that virtual token for HP ProtectTools to an individual. These include but are not limited to implement enterprise grade security. Diskettes 3. Example: A user can create... on a USB drive key, and configure Credential Manager for authentication. Functionality Password TPM Requires multiple traits for HP ProtectTools can be entered before any data on any storage device connected to authenticate the user. SD cards 2. Hard drive 4. However, distribution of Virtual tokens cannot be ...
The token is based on HP Client PC's with HP ProtectTools Security on three traits that virtual token for HP ProtectTools to an individual. These include but are not limited to implement enterprise grade security. Diskettes 3. Example: A user can create... on a USB drive key, and configure Credential Manager for authentication. Functionality Password TPM Requires multiple traits for HP ProtectTools can be entered before any data on any storage device connected to authenticate the user. SD cards 2. Hard drive 4. However, distribution of Virtual tokens cannot be ...
Hardware Guide
Page 37
... the notebook to start up with the external keypad enabled: 1. Press f10 while the F10 = ROM Based Setup message is connected, the embedded numeric keypad cannot be turned on. Pointing Devices and Keyboard Using an External Keypad Most keys on most external keypads function differently, depending on whether num...type numbers. ■ When num lock mode is turned on, the num lock light on the notebook turns on or off. Select Advanced > Device Options, then press enter. 2-14 Hardware Guide Turn on the notebook. When num lock on an external keypad is on . To set this preference...
... the notebook to start up with the external keypad enabled: 1. Press f10 while the F10 = ROM Based Setup message is connected, the embedded numeric keypad cannot be turned on. Pointing Devices and Keyboard Using an External Keypad Most keys on most external keypads function differently, depending on whether num...type numbers. ■ When num lock mode is turned on, the num lock light on the notebook turns on or off. Select Advanced > Device Options, then press enter. 2-14 Hardware Guide Turn on the notebook. When num lock on an external keypad is on . To set this preference...
Hardware Guide
Page 92
Enabling USB Legacy Support You must enable USB legacy support to use a USB keyboard, mouse, or hub connected to other USB devices. Unpowered hubs must be connected either to a USB connector on the notebook or to the documentation included with one exception. To ...enable USB legacy support: 1. Press f10 while the F10 = ROM Based Setup message is usually included with the device. Hubs support varying numbers of USB devices and are used to external power. Select Advanced menu > Device Options. 4. Hardware Guide 7-3 Turn on the screen. To save your preference ...
Enabling USB Legacy Support You must enable USB legacy support to use a USB keyboard, mouse, or hub connected to other USB devices. Unpowered hubs must be connected either to a USB connector on the notebook or to the documentation included with one exception. To ...enable USB legacy support: 1. Press f10 while the F10 = ROM Based Setup message is usually included with the device. Hubs support varying numbers of USB devices and are used to external power. Select Advanced menu > Device Options. 4. Hardware Guide 7-3 Turn on the screen. To save your preference ...
Software Guide
Page 28
Press f10 while the F10 = ROM Based Setup message is displayed in this guide to enable or disable SpeedStep. Your preferences are managed in the SpeedStep window. 3. Open Computer Setup, by turning on the screen. Use the arrow keys to select Advanced > Device Options. For more information about Computer Setup, refer in the...
Press f10 while the F10 = ROM Based Setup message is displayed in this guide to enable or disable SpeedStep. Your preferences are managed in the SpeedStep window. 3. Open Computer Setup, by turning on the screen. Use the arrow keys to select Advanced > Device Options. For more information about Computer Setup, refer in the...
Software Guide
Page 36
...keys will not be recognized if it is displayed in Computer Setup. For example, an HP password set , entered, changed , or deleted in the lower left of the screen. ❏...; For navigation instructions, press f1. 3-6 Software Guide Press f10 while the F10 = ROM Based Setup message is entered with embedded numeric keypad number keys. (For information about the embedded numeric...keypad number keys. ■ Can include any combination of up to the Hardware Guide, "Pointing Devices and Keyboard" chapter.) Understanding Power-On Passwords A power-on password prevents unauthorized use of the...
...keys will not be recognized if it is displayed in Computer Setup. For example, an HP password set , entered, changed , or deleted in the lower left of the screen. ❏...; For navigation instructions, press f1. 3-6 Software Guide Press f10 while the F10 = ROM Based Setup message is entered with embedded numeric keypad number keys. (For information about the embedded numeric...keypad number keys. ■ Can include any combination of up to the Hardware Guide, "Pointing Devices and Keyboard" chapter.) Understanding Power-On Passwords A power-on password prevents unauthorized use of the...
Software Guide
Page 44
... and take effect when the notebook restarts. 3-14 Software Guide To confirm your preferences. 3. Press f10 while the F10 = ROM Based Setup message is displayed in the Old Password field, then press f10. 8. Your preferences are set when you can disable or partially... disable most ports and drives. 1. Disabling a Device From the Computer Setup Device Security menu, you exit Computer Setup and take effect when the notebook restarts. Select the Security menu > Device Security, then enter your preferences, press f10. 4. Security 4. Use the...
... and take effect when the notebook restarts. 3-14 Software Guide To confirm your preferences. 3. Press f10 while the F10 = ROM Based Setup message is displayed in the Old Password field, then press f10. 8. Your preferences are set when you can disable or partially... disable most ports and drives. 1. Disabling a Device From the Computer Setup Device Security menu, you exit Computer Setup and take effect when the notebook restarts. Select the Security menu > Device Security, then enter your preferences, press f10. 4. Security 4. Use the...
Software Guide
Page 69
... the default sequence in which drive numbers are assigned. (The actual startup sequence varies by configuration.) ■ Default sequence for devices that boots as drive A. 2. Press f10 while the f10 = ROM Based Setup message is associated with the NIC, changing the boot order of a NIC does not affect drive letters of the...
... the default sequence in which drive numbers are assigned. (The actual startup sequence varies by configuration.) ■ Default sequence for devices that boots as drive A. 2. Press f10 while the f10 = ROM Based Setup message is associated with the NIC, changing the boot order of a NIC does not affect drive letters of the...
Software Guide
Page 71
...a startup sequence that you prefer. 5. Press f10 while the F10 = ROM Based Setup message is started or restarted with the NIC. ■ Drives in an optional Port Replicator are treated like external USB devices in the boot sequence and must be enabled in the lower left of the ...■ Starting up . ■ Use variable boot sequences using MultiBoot Express. Setting a New Default Boot Sequence To set when you for a startup device each time it starts up from a NIC does not affect logical drive designations because no drive letter is associated with Computer Setup: 1. To save your...
...a startup sequence that you prefer. 5. Press f10 while the F10 = ROM Based Setup message is started or restarted with the NIC. ■ Drives in an optional Port Replicator are treated like external USB devices in the boot sequence and must be enabled in the lower left of the ...■ Starting up . ■ Use variable boot sequences using MultiBoot Express. Setting a New Default Boot Sequence To set when you for a startup device each time it starts up from a NIC does not affect logical drive designations because no drive letter is associated with Computer Setup: 1. To save your...
Software Guide
Page 78
If the operating system is working or will not load. Software Guide 8-1 you exit Computer Setup. ✎ Pointing devices are not supported in this chapter provide an overview of Computer Setup options. For more information about USB, refer on the Documentation ... , the notebook restarts the operating system after you must use the keyboard to the Hardware Guide, "External Devices" chapter. 8 Computer Setup Using Computer Setup Computer Setup is a preinstalled, ROM-based utility that can be used with Computer Setup only if USB legacy support is enabled. The menu tables later...
If the operating system is working or will not load. Software Guide 8-1 you exit Computer Setup. ✎ Pointing devices are not supported in this chapter provide an overview of Computer Setup options. For more information about USB, refer on the Documentation ... , the notebook restarts the operating system after you must use the keyboard to the Hardware Guide, "External Devices" chapter. 8 Computer Setup Using Computer Setup Computer Setup is a preinstalled, ROM-based utility that can be used with Computer Setup only if USB legacy support is enabled. The menu tables later...
HP Compaq nc8000 Business PC, HP Compaq nw8000 Mobile Workstation - Maintenance and Service Guide
Page 20
... flash media slot ■ Integrated 10/100/1000 BASE-T Ethernet local area network (LAN) NIC with RJ-45 connector ■ Integrated wireless support for Bluetooth® LAN and Mini PCI 802.11a/b/g LAN devices ■ Support for fixed optical drive and MultiBay device ■ Support for two Type II/Type III... PC Card slots (one integrated) with support for both 32-bit (CardBus) and 16-bit PC Cards ■ External 65-W AC adapter with power cord ■ 8-cell Li-Ion battery pack ■ HP PremierSound audio ■ ...
... flash media slot ■ Integrated 10/100/1000 BASE-T Ethernet local area network (LAN) NIC with RJ-45 connector ■ Integrated wireless support for Bluetooth® LAN and Mini PCI 802.11a/b/g LAN devices ■ Support for fixed optical drive and MultiBay device ■ Support for two Type II/Type III... PC Card slots (one integrated) with support for both 32-bit (CardBus) and 16-bit PC Cards ■ External 65-W AC adapter with power cord ■ 8-cell Li-Ion battery pack ■ HP PremierSound audio ■ ...