Hybrid RPL, which installs hybrid images (or files) on the hard disk. If yourcomputer is a Hybrid RPL client, each time the computer starts from the network,LANClient Control Manager downloads a small bootstrap program to yourcomputer hard disk drive and avoids the network traffic associated with astandard RPL.DHCP is a protocol that lets network administrators centrally manage andautomate the assignment of Internet Protocol (IP) addresses on a network.Remote AdministrationA network administrator can use the Remote Administration feature to remotelyupdate the POST and BIOS code in your computer.Network-management software, such as LANClient Control Manager (LCCM), isrequired to take advantage of this feature.LANClient Control ManagerLANClient Control Manager is a graphical, server-based program that aids insystem deployment by allowing mass unattended installations of operatingsystems, complete software images, device drivers, and BIOS code updates toremote systems. Used with Wake on LAN, LCCM can remotely turn on yourcomputer, which means that installation can be done while the computer is notbeing used.For more information or to download this software, visithttp://www.ibm.com/pc/us/desktop/lccm on the World Wide Web.System Migration AssistantSystem Migration Assistant (SMA) helps administrators remotely transferconfigurations, profile settings, printer drivers, and files from an IBM or non-IBMPC to supported IBM systems.For more information or to download this software, visithttp://www.pc.ibm.com/us/software/sysmgmt/products/sma on the World WideWeb.Desktop Management InterfaceDMI is a method for gathering information about the hardware and software inyour computer. In a network environment, network administrators can use DMI toremotely monitor and control your computer.Using security featuresTo deter unauthorized use of your computer, you can use anti-intrusion featuresand other security features that are provided with your computer.Anti-intrusion featuresIBM anti-intrusion features help protect against the theft of computer components,such as the microprocessor, system memory modules, or hard disk drives.A cover lock is built into your computer to prevent the cover from being removed.Two identical keys for the cover lock are also supplied. A tag attached to the keyshas the key serial number and the address of the key manufacturer.Chapter 3. Operating your computer 23