Title: C79EGMST CreationDate: 02/10/98 09:24:42
Chapter 3. Protecting Your Computer
This chapter provides information about how to protect your computer from theft or unauthorized use. It also describe display your personal information, such as your name or add the password prompt screen.
Using Passwords . . . . . . . . . . . . . 86 . . . .
Entering | a Password. . . . . . . . . . . . . . . . . . 87 | ||||||
Setting | a Password. . . . . . . . . . . . . . . . . . .88 | ||||||
Changing | and Removing a Password. . . . . . . . . . . 92. . | ||||||
For a | Password or | Hard | Disk | Password. . . . 92 | |||
For a Supervisor Password. . . . . . . . . . . . . . .94. . . | |||||||
Password | with | Supervisor | Authority. . . . . . . .96 | ||||
Using the Personalization .Editor. . . . . . . . . . . . . .98 . . . | |||||||
Entering | Your Personal | Data. . . . . . . . . . . . . . .98 . . . | |||||
Deleting the Personalization Window. . . . . . . . . . . 101. . . | |||||||
Using Locks | . . . | . . | . . | . | . | . . | . . . 102 |
Copyright IBM Corp. 1998 | 85 |