HP tc4400 Guide de démarrage rapide Page 18

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 60
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 17
367187-002.book Page 4 Friday, March 17, 2006 10:38 AM
Next steps
Protect your privacy
When you use the computer for e-mail, network, or Internet
access, it is possible for unauthorized persons to obtain
information about you, your computer, and your data.
To optimize the privacy protection features included with the
computer
Keep the operating system and software updated. Many
software applications contain security enhancements.
Use a firewall. A firewall is software that monitors incoming
traffic on the computer. Some firewalls also monitor outgoing
traffic.
Protect the computer from power surges
To protect the computer from the power surges that might be
caused by an uncertain power supply or an electrical storm:
Plug the computer power cord into an optional, high-quality
surge protector. Surge protectors are available from most
computer or electronics retailers.
During an electrical storm, either run the computer on battery
power or shut down the computer and unplug the power cord.
If applicable to your location, provide surge protection on the
modem cable that connects the modem to a telephone line.
Telephone line surge protectors are available from computer
or electronic retailers in some regions.
2–4 Getting Started
Vue de la page 17
1 2 ... 13 14 15 16 17 18 19 20 21 22 23 ... 59 60

Commentaires sur ces manuels

Pas de commentaire