EasyManuals Logo

Acer PREDATOR TRITON 700 User Manual

Acer PREDATOR TRITON 700
86 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #44 background imageLoading...
Page #44 background image
44 - Securing your computer
SECURING YOUR COMPUTER
Your computer is a valuable investment that you need to
take care of. Learn how to protect and take care of your
computer.
Security features include hardware and software locks — a
security notch and passwords.
Using a computer security lock
The computer comes with a computer security slot for a
security lock.
Wrap a computer security lock cable around an immovable
object such as a table or handle of a locked drawer. Insert
the lock into the notch and turn the key to secure the lock.
Some keyless models are also available.
Using passwords
Passwords protect your computer from unauthorized
access. Setting these passwords creates several different
levels of protection for your computer and data:
Supervisor Password prevents unauthorized entry into the
BIOS utility. Once set, you must enter this password to
gain access to the BIOS utility. See Setting passwords on
page 46.
User Password secures your computer against
unauthorized use. Combine the use of this password with
password checkpoints on boot-up and resume from
Hibernation (if available) for maximum security.
Password on Boot secures your computer against
unauthorized use. Combine the use of this password with

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Acer PREDATOR TRITON 700 and is the answer not in the manual?

Acer PREDATOR TRITON 700 Specifications

General IconGeneral
BrandAcer
ModelPREDATOR TRITON 700
CategoryLaptop
LanguageEnglish

Related product manuals