Chapter 3. Protecting your computer

This chapter provides information about how to protect your com- puter from theft or unauthorized use.

Using passwords . . . . . . . . . . . . . 72. . . . . . .

Entering a password. . . . . . . . . . . . . . . . . . 73. . . . .

Setting a password. . . . . . . . . . . . . . . . . . .74. . . . .

Changing or removing a password. . . . . . . . . . . . .75 . .

Using locks . . . . . . . . . . . . . . 76. . . . . . .

Copyright IBM Corporation 1999

71

Page 83
Image 83
IBM 240 manual Protecting your computer