User's Manual

Chapter 3. Protecting your computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Power-on password . . . . . . . . . . . . . . . . . . . . . . . . 16
Screen-saver password . . . . . . . . . . . . . . . . . . . . . 16
Hard-disk password . . . . . . . . . . . . . . . . . . . . . . . . 17
Windows password . . . . . . . . . . . . . . . . . . . . . . . . 17
Setup password . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Network password . . . . . . . . . . . . . . . . . . . . . . . . . 18
Using locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Copyright IBM Corporation 2000 15