Chapter 5. Protecting Your Computer
This chapter provides information about how to protect your
computer and its internal devices.
Using Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Power-On Password . . . . . . . . . . . . . . . . . . . . . . . 102
Setting a Power-On Password ................ 102
Entering a Power-On Password ............... 103
Changing a Power-On Password .............. 104
Removing a Power-On Password .............. 104
Hard Disk Password ....................... 105
Setting a Hard Disk Password ................ 106
Entering a Hard Disk Password ............... 107
Changing a Hard Disk Password .............. 108
Removing a Hard Disk Password .............. 109
Supervisor Password . . . . . . . . . . . . . . . . . . . . . . . 110
Setting a Supervisor Password ................ 110
Entering a Supervisor Password ............... 111
Changing a Supervisor Password .............. 111
Removing a Supervisor Password .............. 113
Using Several Hard Disk Drives with the Supervisor
Password . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Using the Personalization Editor .................. 116
Using Locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Using the Security Lock ..................... 117
Using the PC Card Lock ..................... 118
Removing the PC Card Lock ................. 120
Copyright IBM Corp. 1996 101