Safety Instructions
iv
Personalization Appearance and Sound ....................................................33
Connecting an External Monitor ...............................................................34
Duplicating the Desktop......................................................................35
Extending the Desktop.........................................................................35
Data Entry .....................................................................................................36
The Keyboard............................................................................................36
Notebook-Specific Key Combinations ..................................................36
Touch Pad.................................................................................................37
The Hard drive...............................................................................................38
Important Directories ................................................................................39
The Optical Drive ..........................................................................................40
Loading a Disc...........................................................................................40
Emergency Ejection of a Blocked Disc ..................................................42
Playing Back and Retrieving Data from Discs .............................................42
Regional Playback Information for DVD.....................................................43
Subjects Concerning the CD/DVD-Rewriter...............................................43
Recordable/Rewriteable Discs ..............................................................43
The Sound Card ............................................................................................44
External Audio Ports ..................................................................................45
The Network .................................................................................................47
What is a network?....................................................................................47
Ethernet-Network ................................................................................47
Wireless LAN........................................................................................48
Troubleshooting within the Network ...................................................49
The Multimedia Card Reader .........................................................................50
Inserting Memory Cards............................................................................50
Removing Memory Cards..........................................................................50
Express Card .................................................................................................51
Installing Express Card ..............................................................................51
Removing Express Card.............................................................................51
Webcam (optional) .......................................................................................52
Actual example using Windows Messenger...............................................52
Bluetooth (optional)......................................................................................53
Universal Serial Bus (USB) Port.......................................................................54
eSATA / USB port.......................................................................................55
Remove eSATA devices ........................................................................55
Securing the Notebook .................................................................................56
Fingerprint Sensor (optional) ....................................................................56
Benefits of this technology...................................................................56
Configuration of the software: .............................................................56
Fast user switching ..............................................................................57
File Encryption.....................................................................................58
File Decryption ....................................................................................58
Startup Password ......................................................................................59
Using a safety lock.....................................................................................59