EasyManuals Logo
Home>HP>Laptop>ENVY 13

HP ENVY 13 User Manual

HP ENVY 13
95 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #26 background image
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA)-
Personal and Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the
network, other WLAN devices can pick up unprotected signals and either connect to your network
(uninvited) or capture information being sent across it. However, you can take precautions to protect
your WLAN:
Use a wireless transmitter with built-in security
Many wireless base stations, gateways, or routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
Work behind a firewall
A firewall is a barrier that checks both data and requests for data that are sent to your network,
and discards any suspicious items. Firewalls are available in many varieties, both software and
hardware. Some networks use a combination of both types.
Use wireless encryption
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all
network data before it is transmitted using a WEP key. Usually, you can allow the network to
assign the WEP key. Alternatively, you can set up your own key, generate a different key, or
choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses “temporal key integrity protocol” (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Connecting to a WLAN
To connect to the WLAN, follow these steps:
1. Be sure that the WLAN device is on (wireless light is off). If the wireless light is amber, press the
wireless key.
2. Click the network icon in the notification area, at the far right of the taskbar.
3. Select your WLAN from the list.
4. Click Connect.
If the network is a security-enabled WLAN, you are prompted to enter a network security key, which
is a security code. Type the code, and then click OK to complete the connection.
NOTE: If no WLANs are listed, you are out of range of a wireless router or access point.
NOTE: If you do not see the network you want to connect to, click Open Network and Sharing
Center, and then click Set up a new connection or network. A list of options is displayed. You
can choose to manually search for and connect to a network or to create a new network connection.
16 Chapter 3 Wireless and local area network

Table of Contents

Other manuals for HP ENVY 13

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP ENVY 13 and is the answer not in the manual?

HP ENVY 13 Specifications

General IconGeneral
Form factorClamshell
Product typeLaptop
Product colorSilver
Country of originChina
Internal memory8 GB
Memory clock speed1600 MHz
Memory form factorOn-board
Internal memory typeLPDDR3-SDRAM
Memory layout (slots x size)1 x 8 GB
LED backlightYes
Display diagonal13.3 \
Display resolution3200 x 1800 pixels
Native aspect ratio16:9
SSD capacityThe Solid State Drive's storage capacity in Gigabytes.
Storage mediaSSD
Total storage capacity512 GB
Compatible memory cardsSD
Number of SSDs installed1
Speakers manufacturerBang & Olufsen
Number of built-in speakers2
Wi-Fi standards802.11b, 802.11g, Wi-Fi 4 (802.11n), 802.11a, Wi-Fi 5 (802.11ac)
Bluetooth version4.0
Charging port typeDC-in jack
USB 2.0 ports quantityUSB 2.0 ports have a data transmission speed of 480 Mbps, and are backwards compatible with USB 1.1 ports. You can connect all kinds of peripheral devices to them.
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity3
USB 3.2 Gen 1 (3.1 Gen 1) Type-C ports quantity0
Battery capacity45 Wh
On-board graphics card ID1916
Discrete graphics card modelNot available
On-board graphics card modelIntel® HD Graphics 520
On-board graphics card familyIntel® HD Graphics
Maximum on-board graphics card memory1.74 GB
On-board graphics card OpenGL version4.4
On-board graphics card base frequency300 MHz
On-board graphics card DirectX version12.0
On-board graphics card dynamic frequency (max)1050 MHz
Sustainability certificatesEPEAT Silver, ENERGY STAR
Pointing deviceTouchpad
Cable lock slot typeKensington
AC adapter power45 W
Operating system architecture64-bit
Bus typeOPI
SteppingD1
Tjunction100 °C
Processor cache4 MB
System bus rate4 GT/s
Processor familyIntel® Core™ i7
Processor seriesIntel Core i7-6500 Mobile series
Processor socketLGA 1356 (Socket B2)
Processor threads4
Processor codenameSkylake
Configurable TDP-up25 W
Processor frequency2.5 GHz
Processor cache typeSmart Cache
Configurable TDP-down7.5 W
Processor lithography14 nm
Processor manufacturerIntel
Processor front side bus- MHz
PCI Express slots version3.0
Processor boost frequency3.1 GHz
PCI Express configurations1x4, 4x1
Thermal Design Power (TDP)15 W
Configurable TDP-up frequency2.6 GHz
Configurable TDP-down frequency0.8 GHz
Maximum number of PCI Express lanes12
Processor codeSR2EZ
Processor ARK ID88194
Processor package size42 X 24 mm
Supported instruction setsSSE4.1, SSE4.2, AVX 2.0
Intel Secure Key Technology version1.00
Intel Stable Image Platform Program (SIPP) version0.00
Weight and Dimensions IconWeight and Dimensions
Depth226 mm
Width326.5 mm
Height12.9 mm
Weight1390 g

Related product manuals