Chapter 3. Protecting your computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Entering a password ....................... 73
Setting a password ........................ 74
Changing or removing a password ............... 75
Using locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Copyright IBM Corporation 1999 71