eMachines EL1200 Series manual Hardware security, Data security, Kensington lock slot

Page 64

Chapter 6: Protecting your computer

Hardware security

Although you may be able to replace your computer with a call to your insurance agent, you cannot replace the information stored on your computer. Take steps to prevent theft of your computer.

Kensington lock slot

The first step in computer security is preventing your computer from being stolen.

Attach a cable lock to the Kensington lock slot on your computer, then wrap the lock’s cable around the leg of a desk or table. You can buy a cable lock at most electronics stores and many department stores.

For the location of the Kensington lock slot, see your Reference Guide.

Data security

The second step in computer security is keeping your data safe and secure.

Startup and hard drive password

Use a startup and hard drive password to keep other people from using your computer. You have to enter your password when you turn on your computer or access your files.

These passwords are set in your computer’s BIOS setup utility. Use a password that you can remember but that would be hard for someone else to guess.

Tip

For instructions on creating a startup and hard drive password, see your computer’s Reference Guide. Make sure that you use a password you can remember. The password feature is very secure, and you cannot bypass it. If you forget your password, you will have to return your computer to eMachines so we can reset it.

Windows user accounts

Windows lets you set up a user account for each person who uses your computer. When you set up user accounts, Windows sets up a Documents folder for each account. You can assign a password to each account so only the account owner can access files in the Documents folder.

When you set up a user account, you can also limit the programs that a user can install or run.

Help

For more information about Windows user accounts, click Start, then click Help and

Support. Type user accounts in the Search Help box, then press ENTER.

58

Image 64
Contents Desktop PC User Guide Page Contents Networking Your Computer Iii Contents Chapter Thank you for purchasing our computer Using the eMachines Web site Using Help and SupportTip Contacting eMachines Using online helpGetting help for Windows Media Center Getting Help Using Windows Using the Windows desktop HelpUsing the Start menu ShortcutAdding icons to the desktop Identifying window itemsWindow item Description Viewing drives Working with files and foldersCreating folders Copying and moving files and folders Deleting files and folders Using the Windows Search Searching for filesUsing advanced search options Browsing for files and foldersCreating a new document Working with documentsSaving a document Opening a document Printing a documentShortcuts Do thisUsing Windows Using the Internet and Faxing Setting up an Internet account Learning about the InternetAccessing your Internet account Using the World Wide WebConnecting to a Web site Using e-mail Downloading filesSending e-mail Click Create MailUsing Windows Fax and Scan Checking your e-mailSending a fax Click Send/ReceiveUsing the Internet and Faxing Page Setting up your cover page template Canceling a fax Faxing a scanned document or from programsReceiving and viewing a fax Playing and Creating Media Files Playing music and movies Playing audio and video filesPlaying an optical disc using Windows Media Player Playing optical discsIf the disc is not already playing, click play Creating music files Creating audio files and music librariesRecording audio files Creating WMA and MP3 music files Building a music library Editing track informationCreating music CDs and video DVDs Creating a music CD using Windows Media PlayerCreating a music CD Creating a video DVD using Windows DVD Maker Creating a video DVDPlaying and Creating Media Files Creating and copying data discs Creating a data discUsing Windows Media Center Starting Windows Media CenterPage Using the Media Center remote control Buttons FunctionsNetworking Your Computer Wired Ethernet networking Introduction to NetworkingEthernet networking Networking terms you should knowClick System and Maintenance, then click System Equipment you need for a router-based Ethernet networkSetting up wired Ethernet network hardware Making sure your broadband connection worksWireless Ethernet networking Using an access point Wireless Ethernet standardsEquipment you need for an access point-based network Establishing your Ethernet network connection Setting up wireless Ethernet network hardwareNaming the computers and the workgroup Configuring the TCP/IP protocol Connecting to a wireless Ethernet networkPage Testing your network Wireless securityAdding a printer to your network Sharing resourcesPage Using the network Viewing shared drives and foldersCreating a shortcut to a network drive Opening files across the networkCopying files across the network Bluetooth networkingPrinting files across the network Help Protecting your computer Startup and hard drive password Hardware securityData security Kensington lock slotProtecting your computer from viruses Using NortonRemoving viruses and spyware Protecting your computer Updating your virus and spyware definitions Modifying security settings Using Windows Security CenterClick Start, Control Panel, then Click Security Security updates Windows UpdateClick Windows Update Scheduling automatic updatesBigFix Customizing Windows Changing color depth and screen resolution Changing screen settingsLow 8-bit = 256 colors Medium 16-bit = 65,500 colors Changing the appearance of windows and backgrounds To change the Windows desktop backgroundSelecting a screen saver Changing gadgets Using a gadget’s control panel Configuring the gadget SidebarSetting up multiple monitors Changing system sounds Adding and modifying user accounts Changing mouse settingsUser account tips To add, delete, or modify user accounts Changing power-saving settings Changing the power planClick Save changes Changing accessibility settings Using the Ease of Access CenterSetting up parental controls Using voice recognitionFiltering Internet access Restricting game access Scheduling computer and Internet usePage Restricting specific programs Creating activity reportsAll Rights Reserved Trademark acknowledgmentsChapter Index See DVD HD-DVD Sending fax Page MAN Ecooper USR GDE 11/08