IBM Dock I Benutzerhandbuch
Chapter 3. Using the Security Features
This chapter contains information on how you can protect your
Dock I against theft or unauthorized use. There are two ways to
secure the Dock I; use the security lock or attach the it to a work
surface.
Dock I against theft or unauthorized use. There are two ways to
secure the Dock I; use the security lock or attach the it to a work
surface.
This chapter contains:
Using the Security Lock
Using the Security Lock
. . . . . . . . . . . . . . . . . . . . . . .
3-2
Security Lock Description
. . . . . . . . . . . . . . . . . . . . .
3-2
Key Positions and Their Functions
. . . . . . . . . . . . . . .
3-2
Securing the Dock I with the Security Hook
. . . . . . . . . . .
3-4
Ordering Additional Security Lock Keys
. . . . . . . . . . . .
3-5
Copyright IBM Corp. 1993
3-1
Title: C74AMST CreationDate: 06/23/93 17:09:07