HP Stream 8 Tablet - 5901 User Manual Page 32

  • Download
  • Add to my manuals
  • Print
  • Page
    / 40
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 31
Using firewall software
Firewalls are designed to prevent unauthorized access to a system or network. A firewall can be
software you install on your tablet and/or network, or it can be a combination of both hardware and
software.
There are two types of firewalls to consider:
Host-based firewalls—Software that protects only the tablet it is installed on.
Network-based firewalls—Installed between your DSL or cable modem and your home network
to protect all the computers on the network.
When a firewall is installed on a system, all data sent to and from the system is monitored and
compared with a set of user-defined security criteria. Any data that does not meet those criteria is
blocked.
Installing software updates
HP, Windows, and third-party software installed on your tablet should be regularly updated to correct
security problems and improve software performance. For more information, see Updating programs
and drivers on page 17.
Installing critical security updates
CAUTION: Microsoft sends out alerts regarding critical updates. To protect the tablet from security
breaches and computer viruses, install all critical updates from Microsoft as soon as you receive an
alert.
You can install these updates manually or automatically.
To view or change the settings:
1.
From the Start screen, tap , type control panel.
2. Select System and Security, select Windows Update, select Change settings, and then follow
the on-screen instructions.
Securing your wireless network
When you set up a WLAN or access an existing WLAN, always enable security features to protect
your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and
airports may not provide any security.
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently
lost or damaged through a virus attack or a software or hardware failure. For more information, see
Backup and recovery on page 25.
22 Chapter 7 Securing your tablet and information
Page view 31
1 2 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40

Comments to this Manuals

No comments