To use the EISA Configuration Utility in modeling mode, start the utility from your hard-disk drive by typing at the operating system prompt and pressing <Enter>. (To use the advanced options in modeling mode, type

at the operating system prompt and press

<Enter>.)

A dialog box appears with two options—Open As. . .

(to load an existing system configuration file) and New (to create a new file). Highlight the option you want, and press <Enter>. The screen shows a list of Dell EISA sys- tems. Choose the system you want to configure, and press <Enter>. At this point, you can modify or create a configuration file just as you would with the Configure Computer option.

Modeling mode also provides access to advanced system board and expansion-card features, such as enabling or disabling NMIs (see “Advanced Menu” found earlier in this chapter). Ordinarily, you do not need to adjust these features unless a Dell service technician instructs you to do so.

When you finish modifying or creating a system configu- ration file in modeling mode, select Step 5: Save and Exit from the Steps in Configuring Your Computer menu. A dialog box appears, offering two choices: to save the con- figuration file and restart the computer or to discard the configuration file and return to the Main Menu. If you choose to save the configuration file, you are prompted to type a filename for the new configuration file. Then you are prompted to type a description of the configuration file, which is stored with the configuration file.

Using the Password Features

CAUTION: The password features provide a basic level of security for the data on your system. However, they are not foolproof. If your data requires more security, it is your responsibility to obtain and use additional forms of protection, such as data encryption programs.

Your Dell system is shipped to you with the supervisor and user password features ready to use but without passwords assigned. If system security is a concern, you should operate your system with password protection.

You can assign a supervisor and/or user password through the EISA Configuration Utility (as described later in “Assigning a User Password” or “Assigning a Supervisor Password”) or through the System Setup program (as described in Chapter 4, “Using the System Setup Program”). Once you assign a supervisor and/or user password, only those who know the password(s) have full use of the system.

NOTE: You can also use the System Setup program to assign, change, or delete a user or supervisor password. See the appropriate sections in Chapter 4, “Using the System Setup Program,” for more information.

How Password Security Works

When a supervisor password is assigned and the Password On Boot category is set to Enabled, the system prompts you for the supervisor password every time you start or reboot your computer. After a supervisor password is assigned, the EISA Configuration Utility prompts you for the supervisor password if you select Configure Com- puter from the Main Menu. You must enter a supervisor password to be able to change any of the system configura- tion parameters. Entering a user password allows you to view, but not change any of the system configuration parameters.

To delete or change an existing supervisor or user password, you must know the supervisor password. See “Deleting an Existing User Password” or “Deleting an Existing Supervi- sor Password” found later in this section for more information.

NOTE: A user password can only be assigned after a supervisor password has been assigned.

If you assign and then forget a password, you must remove the cover of the computer (which may require unlocking the computer’s keylock) and change a jumper setting to tempo- rarily disable the password features (see “Disabling a Forgotten Password” found later in this section).

CAUTION: If you leave your system running and unattended, anyone can access the data stored in your system even with a password assigned. To protect your system while it is running, you must use additional forms of protection, such as screen- saver software protected by a password.

Using the EISA Configuration Utility

5-71

Page 71
Image 71
Dell 2100/200, 2100/180 manual Using the Password Features, How Password Security Works

2100/180, 2100/200 specifications

The Dell 2100/200 and Dell 2100/180 are innovative offerings from Dell that cater to the demands of a variety of users, ranging from small businesses to larger enterprises. Both models are designed to deliver high performance and reliability, making them indispensable tools in the modern computing environment.

The Dell 2100/200 features an impressive Intel processor that ensures fast and efficient performance, making it suitable for multitasking and handling complex applications. Coupled with a generous RAM configuration, this model can easily manage demanding workloads, resulting in smoother performance and faster processing times. In contrast, the Dell 2100/180, while slightly less powerful, still maintains robust performance levels that are well-suited for general productivity tasks and everyday use.

Both models come equipped with ample storage options, featuring hard disk drives that provide significant space for data and application storage. Users can choose between traditional HDDs and solid-state drives (SSDs), allowing them to prioritize speed and performance based on their specific needs. The flexibility in storage options ensures that users can customize their systems according to their requirements, enhancing the overall user experience.

Connectivity is another area where the Dell 2100 series excels. Both models come with a range of ports including USB, HDMI, and Ethernet, allowing for seamless connectivity with various peripherals and networks. This versatility makes the machines ideal for environments where multiple devices need to be connected simultaneously, whether for presentations, data transfer, or internet access.

In terms of energy efficiency, both the Dell 2100/200 and Dell 2100/180 incorporate advanced cooling technologies that minimize energy consumption while maximizing performance. This not only helps reduce operational costs but also contributes to a more sustainable computing environment.

The design of these models is another distinguishing feature. With a compact form factor, they fit easily into office spaces while maintaining a professional appearance. Their durable build quality ensures longevity, making them a worthwhile investment for businesses.

Overall, the Dell 2100/200 and Dell 2100/180 serve as powerful and reliable machines that combine advanced technologies and user-centric designs. Whether for business or personal use, these models provide a solid foundation for effective computing, ensuring that users can achieve their goals efficiently and effectively.