摘要:
A local area network (LAN) server allows an authenticated user of a computer remote from the LAN to cause a diskless computer in the LAN to redirect screen shots to the computer remote from the LAN, with the screen shots being generated based on a users computer image persistently stored in an enterprise storage of the LAN.
摘要:
To unlock a HDD when a computer is in the suspend state, at both BIOS and the HDD a secret is combined with a password to render a new one-time password. BIOS sends its new one-time password to the HDD which unlocks itself only if a match is found. The new one-time password is then saved as an “old” password for subsequent combination with the secret when coming out of subsequent suspend states. In this way, if a computer is stolen the thief cannot sniff the bus between BIOS and the HDD to obtain a password that is of any use once the computer ever re-enters the suspend state.
摘要:
An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.
摘要:
An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.
摘要:
A system, method, and program product is provided that manages a rental computer system by verifying installation of a secure time-day module in a computer system. The computer system is rendered inoperable if the secure time-day module is not installed. A current time-day value is retrieved from the secure time-day module and an end time-day value is retrieved from a secure storage area. The current time-day value is compared to the end time-day value in order to determine whether a rental period has expired. If the rental period has expired, then the user is prevented from using the rental computer system.
摘要:
Fingertip-sized discrete areas are provided on a slate computer and have different tactile characteristics than the remainder of the surface on which they are disposed. The discrete areas are arranged to mimic home keys of a keyboard and each discrete area corresponds to a respective home key. In this way, a user is given tactile feedback of when fingers are properly placed in the home position, with home key finger placement triggering the presentation of a full keyboard on screen. Other embodiments do not use tactilely distinct keys, with simultaneous placement of two or more fingers on the computer triggering display of the virtual keyboard.
摘要:
A hard disk drive unit includes a microprocessor programmed to erase data stored within the drive unit if it is determined that a process potentially leading to a misuse of the data stored within the drive unit, and if secure disposal configuration data stored in nonvolatile storage within the drive indicates that the data is to be erased. Such a process includes initializing the drive unit for operation without providing a password matching a password stored in the drive unit, initializing the drive unit in a system not having CMOS configuration data matching the drive unit, and determining that a failure rate within the drive unit exceeds a threshold level.
摘要:
A first device captures session data for each application session that is executing on a first device, and provides the session data to a second device in order for the second device to reconstruct the application sessions. A first device identifies one or more application sessions currently executing on the first device. Each of the application sessions include a media object and session data, which includes a media object identifier that corresponds to the media object and a first device media session position. The first device captures the session data transmits the captured session data to one or more second devices. The second devices are adapted to reconstruct at least one of the application sessions using the received session data and positions the application sessions at a second device media session position that corresponds to the received first device media session position.
摘要:
A system, method, and program product is provided that recovers from a sector error affecting a critical file. A damaged sector prevents a critical file from being read prevents the computer system from booting. A controller records a sector number corresponding to the damaged sector. The system is rebooted using an alternative boot media. The system accesses the primary nonvolatile storage media after the rebooting. The damaged sector number is read from the error log and a file map is used to determine the critical file that is stored in the damaged sector. A backup copy of the critical file is retrieved from a backup media. The backup copy is written to the primary media using undamaged sectors and the critical file is mapped to the undamaged sectors. The system is subsequently booted successfully from the primary nonvolatile storage media.
摘要:
An arrangement facilitating the connection of a client to a network through an access point, particularly in an area with overlapping 0.11n channels. Preferably, a client may communicate with two access points and “ask” one of them to stop transmitting long enough so as to facilitate communication with the other access point. Current specifications otherwise provide no workable arrangement for handling overlapping channels.