User Manual
Protecting your computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Power-on password . . . . . . . . . . . . . . . . . . . . . . . . 10
Screen-saver password . . . . . . . . . . . . . . . . . . . . . 10
Hard-disk password . . . . . . . . . . . . . . . . . . . . . . . . 11
Windows password . . . . . . . . . . . . . . . . . . . . . . . . 11
Setup password . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Network password . . . . . . . . . . . . . . . . . . . . . . . . . 12
Using locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Copyright IBM Corporation 2000 9