Page 1 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please.

Slides:



Advertisements
Similar presentations
Step-by-Step: Set an Access Password for a Document OPEN the peerreview document from the lesson folder. 1.Click the File tab and then click the Save As.
Advertisements

DNR-322L & DNR-326.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Microsoft Windows Vista Chapter 5 Personalize Your Work Environment.
Miscellaneous Windows 2000 Desktop Features Windows 2000 Intermediate.
®® Microsoft Windows 7 for Power Users Tutorial 2 Customizing Microsoft Windows 7.
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Week:#14 Windows Recovery
WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs Using the Taskbar, opening & switching.
EPOCH 1000 File Management Data Logging and Reporting
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
Copyright 2007, EMC Paradigm Publishing Inc. WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs.
Windows Tutorial 9 Maintaining Hardware and Software
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
© 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Y650 Product and Feature Review.
Windows XP 101: Using Windows XP Professional in the Classroom.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Chapter 7 Working with Files.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Configuring the MagicInfo Pro Display
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
1 Lesson 6 Exploring Microsoft Office 2007 Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Hands-On Virtual Computing
| © 2006 LenovoLenovo Confidential Lenovo China Service Technical Center Ideapad Y510 - Preload Software -
Week #7 Objectives: Secure Windows 7 Desktop
Teach Yourself Windows 98 Module 2: Working with Files, Folders, and the Desktop.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
University of Management & Technology 1 Operating Systems & Utility Programs.
Microsoft Windows 7 Essential Introduction to Windows 7.
Constant Hall A Mediated Classroom Guide. In Constant Hall classrooms, media and computer equipment is stored in a Media Desk. You will also find this.
Lenovo Confidential | © 2008 Lenovo - One Key Rescue System 6.0 Introduction -
Windows 7 for Information Workers NetCom SME: Neil Masih.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Smart PSS Associate Certified Class Dahua Security Certification
Wimba Presenters Guide North Dakota University System 2009.
Page 1 of 7 Presentation Title Goes Here | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
1 Computer Disk management Using Disk Management To open Disk Management: Click Start, right-click My Computer, and then click Manage. Under the Storage.
© 2009 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Rapid Drive 2.0 TSC, lenovo.
Module 15 Managing Windows Server® 2008 Backup and Restore.
© 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential VeriFace 3.6 disclosure a software makes.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Securing a Database 1.Understanding database security 2.Protecting the Database File 3.Protecting Code 4.Using User level Security 5.Working with workgroups.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
Understanding Backup and Recovery Methods Lesson 8.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Microsoft Windows 7 Chapter 3 File and Folder Management.
Windows 2000 Unit A A1 – A24 and Ap1 – Ap3 (Formatting a Disk)
AL A. LAURIO Teacher Microsoft Windows Vista. DESKTOP is the main screen area that you see after you turn on your computer and log on to Windows. it serves.
MICROSOFT ONENOTE ADVANCED MODULE 1 EXPLORE ONENOTE 2010  Navigate in the OneNote program window  Work in the OneNote program window  Explore.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Lenovo Confidential| © 2008 Lenovo IdeaPad™ Y550 -BIOS & Preload Software-
Page 1 of 7 Presentation Title Goes Here | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential.
Photo Recovery How to Get Back your Lost Photos Easily?
Advance startup options Shift Restart. Restart options.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Windows Tutorial 9 Maintaining Hardware and Software
The bios.
Presentation transcript:

Page 1 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!!

© 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential ideapad U350 BIOS & Software TSC, lenovo

Page 3 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Enter BIOS Setup Press ‘F2’ during POST to enter BIOS setup

Page 4 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Main Menu

Page 5 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Advanced Menu

Page 6 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Security Menu

Page 7 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Boot Menu

Page 8 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Exit Menu

Page 9 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential BIOS -- Other Videos of BIOS setup are provided:

Page 10 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential G550 Software Applications VeriFace ™ 3.5 WinDVD Ready Comm 5.0 Adobe Reader 9.0 Easy Capture Energy Management Software 4.0 OneKey Rescue System 6.0 NIS 2009

Page 11 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Face recognition software gives customers a cool and fun way to logon to the PC easily and friendly. Your face is your password Supports multiple users File encryption/decryption Encrypt and decrypt sensitive files, using your face as the password! Login log review Check who has tried to log into your computer Leave a video message Unauthorized users can leave a video message for the computer owner to view when they return. Live detection Stops unauthorized users from using a photo of the owner to log in. Checks head movement and other characteristics to determine if a real person or a photo NEW! Users can enable/ disable the live detection or set the sensitivity level according to their preference. Software -- VeriFace™ 3.5 Face Recognition

Page 12 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- VeriFace™ 3.5 Face Recognition Enrolling Face Image 1. Create password first

Page 13 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- VeriFace™ 3.5 Face Recognition Enrolling Face Image 2. Enroll face image as your password. Attention: Due to the camera's limitation in light sensitivity, we strongly recommend that you locate in an environment where the light distribution is even and stable. The following situations can all have possible negative effects on the result: Bright dome light Slanting desk lamp Near a bright window Dim light

Page 14 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- VeriFace™ 3.5 Face Recognition Log Manager View all log and message records About Settings Help

Page 15 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- VeriFace™ 3.5 Face Recognition Setting Live detection is disabled (Default) The help file of this software is provided

Page 16 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- VeriFace™ 3.5 Face Recognition VeriFace Logon Your face is your password

Page 17 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- VeriFace™ 3.5 Face Recognition Leave a video message Cancel Logon You can leave a 30s video message

Page 18 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Integrated communications management software provides a single intuitive interface to create, manage and share internet connections. Single user interface for all networking requirements Easy to set up direct peer-to-peer connections to quickly transfer files between 2 computers*   Software -- ReadyComm 5.0 ReadComm Help Float Icon

Page 19 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- ReadyComm 5.0 Networks

Page 20 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- ReadyComm 5.0 Sharing Add my shared files and folders Download selected shared files/folders Refresh Add Clear Send Send the invitation to share screens Share the screen with other users Disable all current screen shares Add my shared devices Refresh Download selected shared device Add games to the IGRS game

Page 21 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- ReadyComm 5.0 Options Up Down Import Clear

Page 22 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Easy photo capture software with advanced effects, makes use of built- in webcam. Take photos Record video Store and navigate picture & video files Apply special effects Apply backgrounds & borders Motion Control – activate camera based on user movement       EasyCapture 3.5

Page 23 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Easy Capture User Interface Capture Photo Mode settings Photos & videos captured

Page 24 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Easy Capture Media View Browse photos and videos

Page 25 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Easy Capture Settings

Page 26 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Lenovo Energy Management Power Schemes Energy Management provides a total of five power usage schemes. Right-click or double-click the program icon on the taskbar and select any power scheme

Page 27 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Lenovo Energy Management UI State Energy Star High Performance Balanced Power Saver Super Energy Saver Info Help Settings

Page 28 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Lenovo Energy Management Settings

Page 29 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Software -- Lenovo Energy Management Battery Information

Page 30 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Onekey 6.0 Main functions Windows module System backup Backup system to local hard disk/DVD/other Removable Device Incremental backup to local hard disk Recovery disc creation Burn the backup image to recovery disc OneKey Rescue System module System recovery Restore system partition to factory default Restore system partition to user’s backup Data backup Backup user data even system is damaged Password management Protect the unauthorized users to restore system

Page 31 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Key features (Top 5 highlighted in blue) Safe Keep factory default in hidden partition from being damaged; Strong stability itself; Speedy Full backup system at 400M/min-500M/min in average; Quick incremental backup based on the changed data; Restore system at 850M/min-1000M/min in average ; Easy The simple wizard for user; The full helpful information in user interface; Complete Support to backup and restore system partition; Support to copy user data to other device if necessary; Support to create recovery disc;

Page 32 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential The main UI Windows module –System backup –Recovery disc creation OneKey Rescue System module –System recovery –Data backup –Password managemet

Page 33 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential CYBERLINK CONFIDENTIAL Select full back up. Back up to default path and input description Check summary 3 3 Begin back up. 4 4 System backup-full backup

Page 34 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential CYBERLINK CONFIDENTIAL Select incremental back up.Input description. 2 2 Check summary.Begin back up Incremental backup point number no limited. 2.Incremental backup point number depends on your space size of hard disk. 3.If your D:\ drive space not enough, you will see the messenger on the screen: The available space is not enough. 1.Incremental backup point number no limited. 2.Incremental backup point number depends on your space size of hard disk. 3.If your D:\ drive space not enough, you will see the messenger on the screen: The available space is not enough. System backup-Incremental backup

Page 35 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential System recovery-restore to factory default 1 1 Select restore mode summary Restore to factory default would destroy all the data on the system partition. User can’t undo the operation 1.Restore to factory default would destroy all the data on the system partition. User can’t undo the operation Restore to factory default would destroy all the data on the system partition. User can’t undo the operation 1.Restore to factory default would destroy all the data on the system partition. User can’t undo the operation

Page 36 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential System recovery-restore to user backup 1 1 Select recover point or backup file. Select restore mode 3 3 Select source Summary

Page 37 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Backup user data 1 1 Select source to backup 3 3 Select destination Begin to backup Summary. 2 2

Page 38 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Setting password 1 1 Default no password 3 3 Setting password confirmation Complete message. 2 2

Page 39 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential