User’s Manual 6-13
Power and Power-Up Modes
User Token field
■ Create (button)
You can use an SD card token, instead of entering the password. After
you have registered a password, insert an SD card in SD card slot and
click Create. You can use an SD card of any capacity, but it must be
formatted correctly.
If an unformatted card or one with an incompatible format is inserted,
you will be prompted to format it with a tool named TOSHIBA SD
Memory Card Format. To start the format tool, point to or click the
following items:
start -> All Programs -> TOSHIBA -> Utilities ->SD Memory
Card Format
■ Disable (button)
Click this button to invalidate the token. You cannot re-validate old
tokens, but you can use the same SD cards to create new tokens.
■ If you forget your HDD User Password, TOSHIBA will NOT be able to
assist you, and your HDD will be rendered COMPLETELY and
PERMANENTLY INOPERABLE. TOSHIBA will NOT be held
responsible for any loss of any data, any loss of use or access to your
HDD, or for any other losses to you or any other person or organization
that result from the loss of access to your HDD. If you cannot accept
this risk, don’t register the HDD User Password.
■ When setting the HDD Master Password, save the HDD User
Password settings in the BIOS SETUP Program.
■ When saving the HDD User Password shut down or restart the
computer. If the computer is not shut down or restarted, the saved data
may not be correctly reflected. For more information on shutting down
or restarting the computer, refer to Turning on the power in Chapter 3.
Refer to Starting and Ending the BIOS Setup Program section in Chapter 7
for more information.
When you format an SD Memory card, all data will be deleted. Be sure to
save data on the card to other media before you format the card.
After using the token created for authentication, do not leave it inserted in
the SD card slot, ensure that the token is removed from the slot and stored
in a safe location. If the token is left in the slot, there is a danger of theft or
a third party using it for authentication and operating the user's computer
(resulting in extraction, modification or deletion of data) when the user is
not at their desk.