Title: C79EGMST CreationDate: 02/10/98 09:24:42

Chapter 3. Protecting Your Computer

This chapter provides information about how to protect your computer from theft or unauthorized use. It also describe display your personal information, such as your name or add the password prompt screen.

Using Passwords . . . . . . . . . . . . . 86 . . . .

Entering

a Password. . . . . . . . . . . . . . . . . . 87

Setting

a Password. . . . . . . . . . . . . . . . . . .88

Changing

and Removing a Password. . . . . . . . . . . 92. .

For a

Power-On

Password or

Hard

Disk

Password. . . . 92

For a Supervisor Password. . . . . . . . . . . . . . .94. . .

Power-On

Password

with

Supervisor

Authority. . . . . . . .96

Using the Personalization .Editor. . . . . . . . . . . . . .98 . . .

Entering

Your Personal

Data. . . . . . . . . . . . . . .98 . . .

Deleting the Personalization Window. . . . . . . . . . . 101. . .

Using Locks

. . .

. .

. .

.

.

. .

. . . 102

Copyright IBM Corp. 1998

85

Page 103
Image 103
IBM C79EGMST manual Protecting Your Computer