Protecting Your Computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using Passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . .
76
Setting a Password
. . . . . . . . . . . . . . . . . . . . . . . .
77
Entering a Password
. . . . . . . . . . . . . . . . . . . . . . .
79
Removing and Changing a Password
. . . . . . . . . . . . .
80
Using Locks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
82
Copyright IBM Corporation 1999
75