HP ProtectTools...............................................................................................................................................3
Using HP ProtectTools.................................................................................................................................3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)...........................................................................4
Special issues related to security.....................................................................................................................4
Recovering from a locked device.................................................................................................................5
For more information......................................................................................................................................10
Call to action..................................................................................................................................................10
5
Recovering from a locked device
If the device locks and you enter a correct answer to the pre-selected question, this regains access
to the device and its data. If you forget the PIN/password and the answer to the preselected
question, there is no way to recover from a locked device without losing data. The device will
prompt for a hard or clean reset, and all memory will be set back to the default factory condition
which includes deleting data in the iPAQ File Store. If this option is chosen, the iPAQ File Store
takes more than 10 minutes to initialize. During this initialization process, it is recommended that
you connect your HP iPAQ to AC power to avoid timeouts.
However, if you forget your PIN, but successfully enter your hint question/answer, you are prompted
to enter a new PIN. If you do not answer the hint question/answer successfully, there is a time delay
between the hint question/answer attempts until you enter the correct answer.
Passphrases
When HP ProtectTools is initiated, you are prompted for a passphrase that is different than the PIN
or password used to access the device. The passphrase is created for one reason: if data is stored
on a memory card and encrypted by HP ProtectTools, a passphrase is used to facilitate sharing the
data with other HP iPAQ devices. In other words, HP iPAQ devices that use the same passphrase
can also share the data that is encrypted on memory cards.
One special example occurs when HP ProtectTools is disabled but data is still encrypted on a
memory card. This data can be retrieved from the card if HP ProtectTools is reinitiated on the HP
iPAQ using the same passphrase used previously when the data was encrypted on the card. Thus,
like PINs and passwords, it is important to store the passphrase in a secure location. Passphrases
must be at least eight characters long and must include at least one punctuation mark. For best
results, a mix of at least 30 numbers, letters, and special characters should be used.
Performance considerations related to data encryption
With HP ProtectTools, the HP iPAQ automatically encrypts data stored on the device using one of
four encryption algorithms. These encryption algorithms are listed below in order of the strongest to
the weakest:
•Lite
•AES (advanced encryption standard)
•Blowfish
•3DES
When you lock and unlock the device, the HP iPAQ encrypts and decrypts the data using whichever
algorithm is chosen. Since the computer must run all data through this algorithm, the
encryption/decryption operation will take time and affect the performance of the device.
If you have a large amount of data on your device and choose to encrypt it all, regardless of
processor performance, it will take time to decrypt the data To improve performance, you may
consider encrypting only the most critical data. Performance can also be improved somewhat by
moving to weaker encryption algorithm. For instance, someone using AES for encryption can see a
small performance improvement by changing to the Blowfish method, which is still strong but not
quite as strong as AES. It is possible to change the encryption settings later, but this also involves a
wait while the data is being converted from one format to the other.
Encrypting your personal data is the best way to protect your personal information. The encryption
process runs in the background, so you are able to perform other tasks on your HP iPAQ during this
time. There are two methods to monitor the decryption process. To find out more about encrypting
and decrypting data, refer to the documentation on the
Companio
n CD or
Getting Started
CD that
came with your HP iPAQ.
6
Network Connections
You will need to configure the networks you want to connect to. Using your HP iPAQ, you must be
within the range of the access point to initiate network authentication. You will need your logon
credentials to access various networks: SSID, user name, password, and domain name. You will
then be able to select an available network from an on-screen list.
To get specific information about configuring and logging on to networks, refer to the documentation
that came with your HP iPAQ.
Virtual Private Network and Wired Equivalency Privacy
A virtual private network (VPN) allows two or more private networks to be connected over a publicly
accessed network. Primarily, a VPN connection helps you to securely connect to servers (such as a
corporate network) via the Internet. In a sense, VPNs are similar to WANs or a securely encrypted
tunnel. The key feature of VPNs is that they can use public networks like the Internet rather than
rely on expensive, privately leased lines.
Additionally, VPNs have the same security and encryption features as private networks. To learn
more about setting up and connecting to a VPN, refer to the documentation on the
Companion
CD
or Getting Started
CD that came with your HP iPAQ.
Wired Equivalency Privacy (WEP) encrypts data immediately before wireless transmissions are
sent, and decrypts data it receives. WEP is a security protocol designed to provide a wireless local
area network (WLAN) with the same level of security usually expected on a local area network
(LAN). Basically, WLAN is a wireless network in which a mobile user can connect to a local area
network through a wireless connection.
WEP security is considered the first significant line of defense against casual eavesdroppers. If
WEP uses a secret key, which is considered similar to a password, then the key must be available
on all of the network’s wireless devices. WEP is intended to provide wireless users with the same
level of privacy as users in a wired network environment.
Public wireless connections such as hotspots can be somewhat insecure. (Hotspots are public or
private areas where a wireless access point is available. For example, this wireless connection can
be located at a library or coffee house.)
Temporal Key Integrity Protocol (TKIP) technology improves WEP by using a per-packet key
mechanism, in which the base key is modified for each packet sent over the network. The overall
key length is extended to 256 bits for encryption.
To obtain device-specific instructions on how to create, change, and start a VPN connection using
your HP iPAQ, refer to the documentation that came with your device.
To get specific information about turning on or off WLAN and Wi-Fi, refer to the documentation on
the
Companion
CD or
Getting Started
CD that came with your device.
Wi-Fi Protected Access (WPA) and TKIP/AES
Wi-Fi Protected Access (WPA) works with 802.11, and it secures a wireless network environment.
WPA is intended to replace the current, less secure WEP system which is part of the Electrical and
Electronic Engineers (IEEE) 802.11i standard.
WPA technology enables a practical, economical solution to wireless LAN security. WPA is also a
strong encryption solution for wireless network security—especially while users roam from access
point to access point.
7
A wireless network is a group of computers and associated devices that share a common wireless
communication link over radio waves. A wireless network is enabled by a collection of wireless
access points residing within a small geographic area, such as in an office building or wireless
fidelity (Wi-Fi) public hotspot.
WLANs enable a variety of mobile transactions such as Internet and e-mail access, and
sophisticated tasks such as allowing sales people to access customer records from customer
locations.
TKIP/AES enhance the encryption methods of the 802.11 standards of WPA. These enhancements
include:
•Improved data encryption for WPA (It provides more secured data encryption then WEP.)
•WPA allows simpler passphrases, based on preconfigured WEP keys (If you configure a
passphrase for your access points, you cannot use 802.1x-based authentication. You must also
use the same passphrase in Odyssey Client.)
Wireless fidelity (Wi-Fi)
Wi-Fi, also known as 802.11, is a communication standard created by the Institute of Electrical and
Electronic Engineers (IEEE). The 802.11 standard defines the electrical and radio frequency
components of a wireless Ethernet.
This standard also defines an encryption algorithm (Wired Equivalent Privacy, or WEP) to secure
the network. The Wi-Fi Alliance is the body that ensures compatibility and is responsible for issuing
standard compliance tests and logos.
Wi-Fi hotspots
Wi-Fi hotspots are WLANs that use the IEEE 802.11 protocol to establish wireless connections for
general public use. Offered to customers by a growing number of hotels, restaurants, airport
lounges, coffee shops and other businesses, Wi-Fi hotspots enable users to access Internet
resources, send and receive e-mail, use instant messaging, and perform similar tasks they would
otherwise perform on their business or home PCs. Before trying to connect to a wireless network at
a public Wi-Fi hotspot, it is a good idea to find out what setting information you will need to connect
to their network. Many Wi-Fi hotspots charge their customers a fee for this service.
Convenience and increased productivity make Wi-Fi hotspots attractive to users on the go, but
hotspots can also increase the possibility of security risks. The security risks are manageable;
however, if safety precautions are taken.
You can find out more information about Wi-Fi features and connections in the documentation on
the
Companion
CD or
Getting Started
CD that came with your HP iPAQ.
WLAN standards
IEEE wireless standards such as 802.11 have undergone many improvements and addendums
since they were first defined. The following list offers a high-level description of each of the better
known standards:
•802.11, which operates in the 2.4-GHz frequency band and offers only 2 megabits per
second (Mbit/s) of overall throughput, was the original implemented standard.
•802.11b is the most widely used form of Wi-Fi today. The radio operates within the 2.4-Ghz
frequency band but allows a maximum data throughput of 11 Mbit/s.
•802.11a is a short-range, but extremely high-speed, Wi-Fi network. This standard is not
compatible with existing 802.11b networks. This high-speed Wi-Fi network operates in the 5-Ghz
frequency band and can transfer data at a maximum speed of 54 Mbit/s.
•802.11g is compatible with existing 802.11b networks, but also enables higher speeds. Its
maximum speed is 54 Mbit/s, but 802.11g operates in the 2.4-Ghz frequency band.
8
Note: The 54-Mbit/s maximum speed of 802.11g is obtained only when the network contains other 802.11g-based devices.
Users who mix 802.11b devices in that network will see a maximum throughput value of only 22 Mbit/s.
•The 802.1x standard defines the method of encapsulating EAPs over wired or wireless Ethernet
networks. This standard does not define any specific security protocol, but is based on EAP types
documented and ratified by the Internet Engineering Task Force (IETF).
Additional Security Solutions
Personal firewalls are the best way to protect your computer-related devices and wireless network.
A firewall keeps computer hackers out and your sensitive data in; it acts as a barrier through which
all information passes between the computer and the network. Personal firewalls monitor all
incoming and outgoing traffic on your computer, including external systems.
Firewalls look at this data and make an access decision based on predetermined access rules. A
firewall can give you the needed tools to protect your sensitive information while you’re
communicating across public networks. You have an option of selecting what information you want
to protect, such as credit card numbers or passwords.
Personal firewalls can also prevent Web servers from getting access to sensitive data, and they can
block Java applets and ActiveX controls. These Internet tools can endanger computer security.
Firewalls can provide you with various helpful security needs for your computer hardware and
software.
Personal firewalls are also available for mobile devices, such as Zone Alarm Personal Edition from
Zone Labs, Inc. To download a free copy of this software on to your personal computer or notebook,
go to
www.zonelabs.com for more information.
Bluefire Security Technologies
TM
develops software that protects devices, data, and networks. The
security solutions help prevent intrusion, provide integrity management, encryption, and
authentication enterprise security. These security features add extra protection across VPNs, such
as protecting lost and stolen devices; and preventing computer-hacker attacks and unauthorized
access. Bluefire Mobile Firewall provides protection of information with encryption of data files,
external storage cards, and personal information such as your mailbox, contact, calendar, and task
databases. By visiting www.bluefiresecurity.com
, Windows Mobile 2003 and Windows Mobile 5.0
users can download a free 30-day trial version of the software.
Pointsec
® for Pocket PC provides convenient, real-time encryption of information on mobile devices
as well as external storage cards. User-information is automatically encrypted and stored on your
device. Pointsec for Pocket PCs is a pictured-based application. It is combined with PicturePIN
®
(access control) and QuickPIN
® to provide fast re-entry to the device and its content. This security
solution protects sensitive information in any format including Word Mobile, Excel Mobile, Outlook e-
mail, attachments and notes. Your information is secure and instantly accessible. Pointsec
® for
Pocket PC is an integrated mobile security solution that provides users with strong encryption and
fast, reliable speed or performance. You can learn more about security solutions that protect lost or
stolen mobile devices by visiting www.pointsec.com
.
These technologies can protect against unauthorized accesses, enforce security policies as well as
Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.
Product:
Spelregels forum
Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:
lees eerst de handleiding door;
controleer of uw vraag al eerder door iemand anders is gesteld;
probeer uw vraag zo duidelijk mogelijk te stellen;
heeft u een probleem en al geprobeerd om dit op te lossen, vermeld dit erbij aub;
heeft u een oplossing gekregen van een bezoeker dan horen wij dat graag in dit forum;
wilt u een reactie geven op een vraag of antwoord, gebruik dan niet dit formulier maar klik op de knop 'reageer op deze vraag';
uw vraag wordt direct op de website gezet; vermijd daarom persoonlijke gegevens in te vullen;
Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.
Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.
Abonneren
Abonneer u voor het ontvangen van emails voor uw Compaq Ipaq 3630 security bij:
nieuwe vragen en antwoorden
nieuwe handleidingen
U ontvangt een email met instructies om u voor één of beide opties in te schrijven.
Ontvang uw handleiding per email
Vul uw emailadres in en ontvang de handleiding van Compaq Ipaq 3630 security in de taal/talen: Engels als bijlage per email.
De handleiding is 0,14 mb groot.
U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.
Stel vragen via chat aan uw handleiding
Stel uw vraag over deze PDF
Uw handleiding is per email verstuurd. Controleer uw email
Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.
Er is een email naar u verstuurd om uw inschrijving definitief te maken.
Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken
U heeft geen emailadres opgegeven
Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.
Uw vraag is op deze pagina toegevoegd
Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.