Securing your wireless network, Using an optional security cable lock – HP Pavilion g4-2149se Notebook PC User Manual
Page 64

There are two types of firewalls to consider:
●
Host-based firewalls—Software that protects only the computer it is installed on.
●
Network-based firewalls—Installed between your DSL or cable modem and your home network
to protect all the computers on the network.
When a firewall is installed on a system, all data sent to and from the system is monitored and
compared with a set of user-defined security criteria. Any data that does not meet those criteria is
blocked.
Your computer or networking equipment may already have a firewall installed. If not, firewall software
solutions are available.
NOTE:
Under some circumstances a firewall can block access to Internet games, interfere with
printer or file sharing on a network, or block authorized e-mail attachments. To temporarily resolve the
problem, disable the firewall, perform the task that you want to perform, and then reenable the
firewall. To permanently resolve the problem, reconfigure the firewall.
1.
To view or modify the firewall settings, select Computer > YaST.
NOTE:
When accessing YaST, you are prompted for the root password.
2.
In the left pane, click Security and Users, and then click Firewall in the right pane.
NOTE:
When modifying firewall settings, you are prompted for the root password.
Securing your wireless network
When you set up your wireless network, always enable security features. For more information, see
Protecting your WLAN on page 15
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently
lost or damaged through a virus attack or a software or hardware failure. For more information, see
Backing up and restoring on page 58
.
Using an optional security cable lock
A security cable lock, which is purchased separately, is designed to act as a deterrent, but it may not
prevent the computer from being mishandled or stolen. Security cable locks are only one of several
methods that should be employed as part of a complete security solution to help maximize theft
protection.
The security cable slot on your computer may look slightly different from the illustration in this section.
For the location of the security cable slot on your computer, see
.
1.
Loop the security cable lock around a secured object.
2.
Insert the key (1) into the security cable lock (2).
54
Chapter 9 Securing your computer and information