Chapter 3. Protecting your computer
This chapter provides information about how to protect your com- puter from theft or unauthorized use.
Using passwords . . . . . . . . . . . . . 72. . . . . . .
Entering a password. . . . . . . . . . . . . . . . . . 73. . . . .
Setting a password. . . . . . . . . . . . . . . . . . .74. . . . .
Changing or removing a password. . . . . . . . . . . . .75 . .
Using locks . . . . . . . . . . . . . . 76. . . . . . .
Copyright IBM Corporation 1999 | 71 |