Schützen des Computers ................................................................................................................... 60
Verwenden von Kennwörtern ............................................................................................................. 61
Setup-Kennwort ................................................................................................................. 62
Verwenden von Firewalls ................................................................................................................... 72
Starten von Computer Setup .............................................................................................................. 75
Menüs in Computer Setup .................................................................................................................. 76
Menü „File" (Datei) ............................................................................................................. 76
Reinigungsmittel ................................................................................................................................. 81
viii