Acer Power 5400 Handbuch Seite 29

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 60
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 28
Momentus 5400 FDE.4 SATA Product Manual, Rev. C 23
3.5.1 Drive installation
Upon receipt by the consumer, the drive’s user interface is identical to a Momentus 5400.5 drive. The normal
ATA security commands are functioning and available for initialization of the password as follows:
Per normal ATA Security Commands specifications, the drive is unlocked and all ATA security commands and
all normal ATA commands may be issued.
1. Consumer accesses the computer manufacturer’s BIOS set-up screen.
2. Consumer selects option to set User Password.
After setting the User password, the drive is now under access control (locked) and will require a password
for future accesses.
3. Optional: Consumer selects the option to set the Master password from the BIOS choices.
4. Consumer exits the BIOS settings menu and continues with the boot process.
5. The BIOS enters the Security Freeze Command (F5) prior to exiting the boot sequence.
3.5.2 Consumer usage
After initialization, the consumer will just need to enter their User password each time the computer is booted
according to the following description:
1. The computer system is turned on or the hardware is reset.
2. The drive reports to the BIOS that it is in the locked state per standard ATA Security Command reporting.
3. The BIOS queries the user for the password.
4. The BIOS supplies the password to the drive using the Security Unlock Command (F2).
5. The drive is unlocked and the BIOS may continue the booting process.
6. The BIOS enters the Security Freeze Lock Command (F5) prior to exiting the boot sequence.
Note. To ensure that the system reauthenticates the user, turn the laptop power off (shut down) rather
than putting it in sleep mode. The system will authenticate the user at powerup.
3.6 Security Erase--ATA security commands
The Momentus 5400 FDE.4 SATA provides powerful features for cryptographically erasing the drive for dis-
posal or repurposing. The drive uses the ATA Security Erase Prepare (F3) and ATA Security Erase (F4) com-
mands to perform the cryptographic erase.
3.6.1 Secure Erase procedure
Using the Security Erase commands, the drive's cryptographic key can be replaced according to the following
procedure:
1. Consumer boots up the computer normally according to the Consumer Usage section above.
2. Consumer invokes software or BIOS option for Erase.
3. The software or BIOS queries the user for either the User or Master password.
4. The software or BIOS issues the Security Erase Prepare (F3) command.
5. The software or BIOS issues the Security Erase Unit (F4) command.
Select the Enhanced erase for cryptographic key erasure that completes in less than one second.
Seitenansicht 28
1 2 ... 24 25 26 27 28 29 30 31 32 33 34 ... 59 60

Kommentare zu diesen Handbüchern

Keine Kommentare