IBM 240 ユーザーズマニュアル
![IBM](https://files.manualsbrain.com/attachments/f70d337d03c66895b7a6fbe0e6de3554f47d7dd3/common/fit/150/50/fb4e568062ca4d0154259807170f4c71f2c7aafa861a4d9a0eb3af958af4/brand_logo.png)
Chapter 3. Protecting your computer
This chapter provides information about how to protect your com-
puter from theft or unauthorized use.
Using passwords
puter from theft or unauthorized use.
Using passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . .
72
Entering a password
. . . . . . . . . . . . . . . . . . . . . . .
73
Setting a password
. . . . . . . . . . . . . . . . . . . . . . . .
74
Changing or removing a password
. . . . . . . . . . . . . . .
75
Using locks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
76
Copyright IBM Corporation 1999
71