IBM 390 Mode D'Emploi
Chapter 3. Protecting Your Computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using Passwords
puter from theft or unauthorized use.
Using Passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . .
76
Entering a Password
. . . . . . . . . . . . . . . . . . . . . . .
77
Setting a Password
. . . . . . . . . . . . . . . . . . . . . . . .
78
Changing or Removing a Password
. . . . . . . . . . . . . .
79
Using Locks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
81
Using the Security Screw
. . . . . . . . . . . . . . . . . . . . . .
82
Copyright IBM Corporation 1998
75