hit counter script

Chapter 2. Using The Setup Utility Program; Starting The Setup Utility Program; Viewing And Changing Settings; Using Passwords - Lenovo 828747F User Manual

User manual
Hide thumbs Also See for 828747F:
Table of Contents

Advertisement

Chapter 2. Using the Setup Utility program

The Setup Utility program is used to view and change the configuration settings of
your computer, regardless of which operating system you are using. However, the
operating-system settings might override any similar settings in the Setup Utility
program.

Starting the Setup Utility program

To start the Setup Utility program, do the following:
1. If your computer is already on when you start this procedure, shut down the
2. Repeatedly press and release the F1 key while turning on your computer.
The Setup Utility might start automatically when POST detects that hardware has
been removed or new hardware has been installed in your computer.

Viewing and changing settings

The Setup Utility program menu lists items that identify system configuration
topics.
When working with the Setup Utility program menu, you must use the keyboard.
The keys used to perform various tasks are displayed at the bottom of each screen.

Using passwords

By using the Setup Utility program, you can set passwords to prevent
unauthorized persons from gaining access to your computer and data. The
following types of passwords are available:
v User Password
v Administrator Password
You do not have to set any passwords to use your computer. However, if you
decide to set any passwords, read the following sections.

Password considerations

If you are setting any of the various types of passwords on your computer, you
should read and understand the following information:
v For security reasons, it is a good idea to use a strong password that cannot be
© Lenovo 2005, 2006. Portions © IBM Corp. 2005, 2006.
operating system and turn off the computer.
Note: If a password has been set, the Setup Utility program menu is not
displayed until you type your password. See "Using passwords" for
more information.
easily compromised. Strong passwords typically adhere to the following rules:
– Be at least eight characters in length
– Contain at least one alphabetic character, one numeric character, and one
symbol
– Have at least one symbol in the second through sixth positions
– Not be your name or your user name
31

Advertisement

Table of Contents
loading

Table of Contents