EasyManuals Logo

HP PROBOOK 6440B User Manual

HP PROBOOK 6440B
183 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #36 background imageLoading...
Page #36 background image
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA) and
Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN
devices can pick up unprotected signals and either connect to your network (uninvited) or capture
information being sent across it. However, you can take precautions to protect your WLAN:
Use a wireless transmitter with built-in security.
Many wireless base stations, gateways, and routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
Work behind a firewall.
A firewall is a barrier that checks both data and requests for data that are sent to your network and
then discards any suspicious items. Firewalls are available in many varieties, both software and
hardware. Some networks use a combination of both types.
Use wireless encryption.
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP) is a wireless security protocol that uses a WEP key to
encode or encrypt all network data before it is transmitted. Usually, you can allow the network
to assign the WEP key. Alternatively, you can set up your own key, generate a different key,
or choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses temporal key integrity protocol (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Close your network.
If possible, prevent your network name (SSID) from being broadcast by the wireless transmitter.
Most networks initially broadcast the name, telling any computer nearby that your network is
available. By closing the network, other computers are less likely to know that your network exists.
NOTE: If your network is closed and the SSID is not broadcast, you will need to know or remember
the SSID to connect new devices to the network. Write down the SSID and store it in a secure
place before closing the network.
26 Chapter 2 Wireless, modem, and local area network

Table of Contents

Other manuals for HP PROBOOK 6440B

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP PROBOOK 6440B and is the answer not in the manual?

HP PROBOOK 6440B Specifications

General IconGeneral
Bus typeDMI
SteppingC2
Tjunction105 °C
Processor cache3 MB
Processor cores2
System bus rate2.5 GT/s
Processor familyIntel® Core™ i5
Processor seriesIntel Core i5-400 Series
Processor socketBGA 1288
Processor threads4
Processor codenameArrandale
Processing Die size81 mm²
Processor frequency2.26 GHz
Processor cache typeSmart Cache
Processor lithography32 nm
Processor manufacturerIntel
Processor front side bus- MHz
PCI Express slots version2.0
Processor boost frequency2.53 GHz
Processor operating modes64-bit
ECC supported by processorNo
PCI Express configurations1x16
Thermal Design Power (TDP)35 W
CPU multiplier (bus/core ratio)17
Maximum number of PCI Express lanes16
Number of Processing Die Transistors382 M
Motherboard chipsetIntel® HM57 Express
HDD speed7200 RPM
HDD interfaceSATA II
Optical drive typeDVD Super Multi
Total storage capacity250 GB
LED backlightYes
Display diagonal- \
Display resolution1366 x 768 pixels
Native aspect ratio16:9
Memory slots2x SO-DIMM
Internal memory2 GB
Memory clock speed1333 MHz
Internal memory typeDDR3-SDRAM
Maximum internal memory- GB
Discrete graphics card model-
On-board graphics card modelIntel® HD Graphics
On-board graphics card base frequency500 MHz
On-board graphics card dynamic frequency (max)766 MHz
TypePC
Dimensions (WxDxH)30 x 340 x 240 mm
Wireless technologyWi-Fi
Intel segment taggingEnterprise
Compliance industry standardsIEEE 802.11 b/g/n
Networking typeGigabitEthernet, WLAN
Operating system installedWindows XP Professional
Charging port typeDC-in jack
Serial ports quantity0
USB 2.0 ports quantityUSB 2.0 ports have a data transmission speed of 480 Mbps, and are backwards compatible with USB 1.1 ports. You can connect all kinds of peripheral devices to them.
Product colorBlack
Country of originChina
Processor codeSLBPM
Processor ARK ID43537
Processor package sizerPGA 37.5x 37.5, BGA 34x28 mm
Graphics & IMC lithography45 nm
Supported instruction setsSSE4.1, SSE4.2
Intel® Turbo Boost Technology1.0
Weight and Dimensions IconWeight and Dimensions
Depth340 mm
Width30 mm
Height240 mm
Weight2260 g

Related product manuals