Securing your wireless network, Using an optional security cable lock – HP Pavilion g4-2149se Notebook PC User Manual

Page 64

Advertising
background image

There are two types of firewalls to consider:

Host-based firewalls—Software that protects only the computer it is installed on.

Network-based firewalls—Installed between your DSL or cable modem and your home network
to protect all the computers on the network.

When a firewall is installed on a system, all data sent to and from the system is monitored and
compared with a set of user-defined security criteria. Any data that does not meet those criteria is
blocked.

Your computer or networking equipment may already have a firewall installed. If not, firewall software
solutions are available.

NOTE:

Under some circumstances a firewall can block access to Internet games, interfere with

printer or file sharing on a network, or block authorized e-mail attachments. To temporarily resolve the
problem, disable the firewall, perform the task that you want to perform, and then reenable the
firewall. To permanently resolve the problem, reconfigure the firewall.

1.

To view or modify the firewall settings, select Computer > YaST.

NOTE:

When accessing YaST, you are prompted for the root password.

2.

In the left pane, click Security and Users, and then click Firewall in the right pane.

NOTE:

When modifying firewall settings, you are prompted for the root password.

Securing your wireless network

When you set up your wireless network, always enable security features. For more information, see

Protecting your WLAN on page 15

.

Backing up your software applications and information

Regularly back up your software applications and information to protect them from being permanently
lost or damaged through a virus attack or a software or hardware failure. For more information, see

Backing up and restoring on page 58

.

Using an optional security cable lock

A security cable lock, which is purchased separately, is designed to act as a deterrent, but it may not
prevent the computer from being mishandled or stolen. Security cable locks are only one of several
methods that should be employed as part of a complete security solution to help maximize theft
protection.

The security cable slot on your computer may look slightly different from the illustration in this section.
For the location of the security cable slot on your computer, see

Getting to know your computer

on page 3

.

1.

Loop the security cable lock around a secured object.

2.

Insert the key (1) into the security cable lock (2).

54

Chapter 9 Securing your computer and information

Advertising