Инструкция для HP iPAQ rx5900 Travel Companion

(скачивание инструкции бесплатно)
Формат файла: PDF
Доступность: Бесплатно как и все руководства на сайте. Без регистрации и SMS.
Дополнительно: Чтение инструкции онлайн
background image

5

 

Recovering from a locked device 

If the device locks and you enter a correct answer to the pre-selected question, this regains access 
to the device and its data. If you forget the PIN/password and the answer to the preselected 
question, there is no way to recover from a locked device without losing data. The device will 
prompt for a hard or clean reset, and all memory will be set back to the default factory condition 
which includes deleting data in the iPAQ File Store. If this option is chosen, the iPAQ File Store 
takes more than 10 minutes to initialize. During this initialization process, it is recommended that 
you connect your HP iPAQ to AC power to avoid timeouts. 

However, if you forget your PIN, but successfully enter your hint question/answer, you are prompted 
to enter a new PIN. If you do not answer the hint question/answer successfully, there is a time delay 
between the hint question/answer attempts until you enter the correct answer. 

Passphrases 

When HP ProtectTools is initiated, you are prompted for a passphrase that is different than the PIN 
or password used to access the device. The passphrase is created for one reason: if data is stored 
on a memory card and encrypted by HP ProtectTools, a passphrase is used to facilitate sharing the 
data with other HP iPAQ devices. In other words, HP iPAQ devices that use the same passphrase 
can also share the data that is encrypted on memory cards. 

One special example occurs when HP ProtectTools is disabled but data is still encrypted on a 
memory card. This data can be retrieved from the card if HP ProtectTools is reinitiated on the HP 
iPAQ using the same passphrase used previously when the data was encrypted on the card. Thus, 
like PINs and passwords, it is important to store the passphrase in a secure location. Passphrases 
must be at least eight characters long and must include at least one punctuation mark. For best 
results, a mix of at least 30 numbers, letters, and special characters should be used. 

Performance considerations related to data encryption 

With HP ProtectTools, the HP iPAQ automatically encrypts data stored on the device using one of 
four encryption algorithms. These encryption algorithms are listed below in order of the strongest to 
the weakest: 

•  Lite 
•  AES (advanced encryption standard) 
•  Blowfish 
•  3DES 

When you lock and unlock the device, the HP iPAQ encrypts and decrypts the data using whichever 
algorithm is chosen. Since the computer must run all data through this algorithm, the 
encryption/decryption operation will take time and affect the performance of the device. 

If you have a large amount of data on your device and choose to encrypt it all, regardless of 
processor performance, it will take time to decrypt the data To improve performance, you may 
consider encrypting only the most critical data. Performance can also be improved somewhat by 
moving to weaker encryption algorithm. For instance, someone using AES for encryption can see a 
small performance improvement by changing to the Blowfish method, which is still strong but not 
quite as strong as AES. It is possible to change the encryption settings later, but this also involves a 
wait while the data is being converted from one format to the other. 

Encrypting your personal data is the best way to protect your personal information. The encryption 
process runs in the background, so you are able to perform other tasks on your HP iPAQ during this 
time. There are two methods to monitor the decryption process. To find out more about encrypting 
and decrypting data, refer to the documentation on the 

Companion CD or Getting Started CD that 

came with your HP iPAQ. 

1
2
3
4
5
6
7
8
9
10
Оглавление инструкции
  • Страница 1 из 11
    HP iPAQ Handheld Security Solutions Overview..........................................................................................................................................................2
  • Страница 2 из 11
    Overview Protecting the private information on your HP iPAQ is serious business. There are many ways that you can protect your HP iPAQ. Taking advantage of the built-in security features is a great way to start protecting your HP iPAQ. These security features are powerful defenses against data
  • Страница 3 из 11
    HP ProtectTools The special security technology found in many HP iPAQ devices is provided by HP ProtectTools, a suite of built-in, not bolted on security solutions. These security solutions are based on the same technologies used by market leader CREDANT Technologies Inc. CREDANT Mobile Guardian®
  • Страница 4 из 11
    To use Odyssey Client on your HP iPAQ, your device must have an 802.1x-compliant (network interface card) NIC driver. The HP iPAQ can be compatible with your preferred WLAN security protocol for network authentication. A readme.txt file is included with the Odyssey Client software that lists
  • Страница 5 из 11
    Recovering from a locked device If the device locks and you enter a correct answer to the pre-selected question, this regains access to the device and its data. If you forget the PIN/password and the answer to the preselected question, there is no way to recover from a locked device without losing
  • Страница 6 из 11
    Network Connections You will need to configure the networks you want to connect to. Using your HP iPAQ, you must be within the range of the access point to initiate network authentication. You will need your logon credentials to access various networks: SSID, user name, password, and domain name.
  • Страница 7 из 11
    A wireless network is a group of computers and associated devices that share a common wireless communication link over radio waves. A wireless network is enabled by a collection of wireless access points residing within a small geographic area, such as in an office building or wireless fidelity
  • Страница 8 из 11
    Note: The 54-Mbit/s maximum speed of 802.11g is obtained only when the network contains other 802.11g-based devices. Users who mix 802.11b devices in that network will see a maximum throughput value of only 22 Mbit/s. • The 802.1x standard defines the method of encapsulating EAPs over wired or
  • Страница 9 из 11
    Terminology A glossary of security-related terms: Acronym Term Definition 802.11b The standard specification for wireless local area networks (WLAN), often called Wi-Fi. 802.1x 802.1x uses the protocol EAP (Extensible Authentication Protocol) to perform authentication when using a wireless network.
  • Страница 10 из 11
    For more information iPAQ Mobile http://www.hp.com/go/iPAQ http://hp.com/sbso/wireless/index.html MSN Mobile http://www.mobile.msn.com/pocketpc Call to action www.hp.com http://welcome.hp.com/country/us/en/support.html www.hp.com/sbso/wireless/secure_wlan_mobile.pdf www.bluefiresecurity.com
  • Страница 11 из 11