Owner manual
Table Of Contents
- Using HP QuickWeb (select models only)
- Features
- Wireless, local area network, and modem
- Pointing devices and keyboard
- Using the TouchPad
- Using keyboard hotkeys
- Displaying system information
- Opening Help and Support
- Opening the Print Options window
- Opening a Web browser
- Switching the screen image
- Initiating Sleep
- Initiating QuickLock
- Decreasing screen brightness
- Increasing screen brightness
- Playing, pausing or resuming an audio CD or a DVD
- Stopping an audio CD or a DVD
- Playing previous track or section of an audio CD or a DVD
- Playing next track or section of an audio CD or a DVD
- Using keypads
- Cleaning the TouchPad and keyboard
- Multimedia
- Multimedia features
- Multimedia software
- Audio
- Video
- Webcam
- Troubleshooting
- The optical disc tray does not open for removal of a CD, DVD, or BD
- The computer does not detect the optical drive
- A disc does not play
- A disc does not play automatically
- A DVD movie stops, skips, or plays erratically
- A DVD movie is not visible on an external display
- The process of burning a disc does not begin, or it stops before completion
- A DVD playing in Windows Media Player produces no sound or display
- A device driver must be reinstalled
- HP Mobile Remote Control (Select Models Only)
- HP Media Remote Control (Select Models Only)
- Power management
- Setting power options
- Switching between graphics modes (select models only)
- Using external AC power
- Using battery power
- Finding battery information in Help and Support
- Using Battery Check
- Displaying the remaining battery charge
- Inserting or removing the battery
- Charging a battery
- Maximizing battery discharge time
- Managing low battery levels
- Calibrating a battery
- Conserving battery power
- Storing a battery
- Disposing of a used battery
- Replacing the battery
- Shutting down the computer
- Drives
- Handling drives
- Optical drive
- Using external drives
- Improving hard drive performance
- Using HP ProtectSmart Hard Drive Protection (select models only)
- Replacing the hard drive
- Replacing a drive in the SmartBay
- External devices
- External media cards
- Memory modules
- Security
- Setup Utility (BIOS)
- Software updates
- Backup and recovery
- Index
Protecting your WLAN
Because the WLAN standard was designed with only limited security capabilities—basically to foil casual
eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are
vulnerable to well-known and well-documented security weaknesses.
WLANs in public areas, or “hotspots,” like coffee shops and airports may not provide any security. New
technologies are being developed by wireless manufacturers and hotspot service providers that make
the public environment more secure and anonymous. If you are concerned about the security of your
computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA)-
Personal and Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the
network, other WLAN devices can pick up unprotected signals and either connect to your network
(uninvited) or capture information being sent across it. However, you can take precautions to protect
your WLAN:
●
Use a wireless transmitter with built-in security
Many wireless base stations, gateways, or routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
●
Work behind a firewall
A firewall is a barrier that checks both data and requests for data that are sent to your network,
and discards any suspicious items. Firewalls are available in many varieties, both software and
hardware. Some networks use a combination of both types.
●
Use wireless encryption
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
◦
Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all
network data before it is transmitted using a WEP key. Usually, you can allow the network to
assign the WEP key. Alternatively, you can set up your own key, generate a different key, or
choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
◦
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses “temporal key integrity protocol” (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
22 Chapter 3 Wireless, local area network, and modem