beautypg.com

Security, Bluetooth wireless technology, Worldwide operation – Toshiba Satellite A100 (PSAAR) User Manual

Page 73: Radio links

background image

User’s Manual

4-21

Operating Basics

Supported features. It supports the following features:

Automatic Transmit Rate Select mechanism in the transmit range of 54,

48, 36, 24, 18, 12, 9 and 6 Mbit/s (Revision A and G, Revision A/B, B/G,

A/B/G combo type).

Automatic Transmit Rate Select mechanism in the transmit range of 11,

5.5, 2 and 1 Mbit/s (Revision B).

Frequency Channel Selection (Revision A/Turbo Mode: 5 GHz,

Revision B/G: 2.4GHz)

Roaming over multiple channels

Card Power Management

Wired Equivalent Privacy (WEP) data encryption, based on the 152 bit

encryption algorithm (Atheros module type).

Advanced Encryption Standard (AES) data encryption, based on 256 bit

encryption algorithm (Atheros module type).

Security

Be sure to enable WEP (encryption) function. Otherwise your computer

will allow the illegal access by outsider through wireless LAN to cause

illegal instruction, eavesdropping, and loss or destruction of stored data.

TOSHIBA strongly recommends the customer to enable the WEP

function.

TOSHIBA is not liable for the eavesdropping of data due to the use of

Wireless LAN and the damage thereof.

Bluetooth wireless technology

Bluetooth™ wireless technology eliminates the need for cables between

electronic devices such as desktop computers, printers and mobile phones.

You cannot use the built-in Bluetooth functions and an optional Bluetooth

PC card simultaneously.
Bluetooth wireless technology has the following features:

Worldwide operation

The Bluetooth radio transmitter and receiver operates in the 2.45 GHz

band, which is license-free and compatible with radio systems in most

countries in the world.

Radio links

You can easily establish links between two or more devices. The link is

maintained even if the devices are not within line of sight.

Security

Two advanced security mechanisms ensure a high level of security:

Authentication prevents access to critical data and makes it impossible

to falsify the origin of a message.

Encryption prevents eavesdropping and maintains link privacy.