Protecting your computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . .
74
Setting a password
. . . . . . . . . . . . . . . . . . . . . . . .
75
Entering a password
. . . . . . . . . . . . . . . . . . . . . . .
77
Removing and changing a password
. . . . . . . . . . . . . .
78
Using locks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
80
Copyright IBM Corporation 1999
73