Computer, computer security setting method, and program
A technology of computer security, computer device, applied in the field of portable computer device, can solve problems such as network connection failure, security breach
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The invention is described in detail below with respect to the embodiments shown in the drawings.
[0034] FIG. 1 is a diagram for explaining the device configuration of a notebook PC (computer device) 10 according to this embodiment.
[0035] As shown in FIG. 1, a PC 10 includes a CPU 11 for executing a process according to a given control program, a memory 12 for storing data to be processed, such as RAM (random access memory), and a display unit (LCD) for controlling 13 graphics on the graphics chip 14, these are connected to the chipset 15.
[0036] The chipset 15 is connected to a bridge circuit 16 . HDD 18 is connected to bridge circuit 16 through IDE channel 17 . Also connected to the bridge circuit 16 are a controller 20 that inputs and outputs events according to signals from pointing devices such as a keyboard 19 and a mouse (not shown), and an EEPROM (Electrically Erasable Programmable ROM) 21. The BIOS controls the components of the PC 10 according to in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 