Using your registered fingerprint to log on to Windows
To log on to Windows using your fingerprint:
1.After you register your fingerprints, restart Windows.
2.Swipe any of your registered fingerprints to log on to Windows.
Using Internet security software
When you use your computer to access email, a network, or the Internet, you potentially expose your computer to computer viruses, spyware, and other online threats. To help protect your computer, Internet security software that includes antivirus and firewall features may be preinstalled on your computer as a trial offer. To provide ongoing protection against newly discovered viruses and other security risks, security software must be kept up to date. It is strongly recommended that you upgrade the security software trial offer or purchase the software of your choice in order to fully protect your computer.
Using antivirus software
Computer viruses can disable programs, utilities, or the operating system, or cause them to function abnormally. Antivirus software can detect most viruses, destroy them, and in most cases, repair any damage they have caused.
Antivirus software can detect most viruses, destroy them, and, in most cases, repair any damage they have caused. To provide ongoing protection against newly discovered viruses, antivirus software must be kept up to date.
An antivirus program may be preinstalled on your computer. It is strongly recommended that you use the antivirus program of your choice in order to fully protect your computer.
For more information about computer viruses, from the Start screen, type support, and then select
the HP Support Assistant app.
Using firewall software
Firewalls are designed to prevent unauthorized access to a system or network. A firewall can be software you install on your computer and/or network, or it can be a combination of both hardware and software.
There are two types of firewalls to consider:
●
●
When a firewall is installed on a system, all data sent to and from the system is monitored and compared with a set of
74 Chapter 9 Securing your computer and information