Feeds
70%
HP Pavilion dv6

HP Pavilion dv6-3085ea 15.6in notebook

Family favourite?

  • alert
  • submit to reddit

Business security measures using SSL

Life is suite

The 92-key keyboard is pleasant to use with shallow action on the keys, and you can switch on a glowing keyboard backlight when playing around in the dark. A set of dedicated keys down the left give you one-tap access to your e-mail program, your web browser, HP MediaSmart, the current program's Print dialogue window, and a calculator.

HP Pavilion dv6

HP MediaSmart Suite pops up big friendly icons for accessing media files and devices

If the latter seems incongruous next to the others, you'll find the way it self-launches in 100 separate windows even more bizarre. Leave the calculator key well alone, I say.

The large trackpad in front of the keyboard supports a small variety of multi-touch gestures but don't expect more than a flip and a scroll. You can tap anywhere on the trackpad to make a selection or double-tap to launch. To do anything more complex, such as click and drag, you will need to press down on the denoted left- and right-click areas and drag another finger across the main area of the trackpad.

HP Pavilion dv6

The notebook, as tested, is currently supplied in a metal finish only.

To the right of the trackpad is a built-in, swipe-action fingerprint reader, a device not found on the other Pavilion dv6 models. You can record any or all of your fingerprints on either hand and use them for additional PC security. For example, you could protect your Windows account with an impossibly complex passphrase that you'll never have to type in because you can log in with a simple swish of your finger.

HP Pavilion dv6

Log in to your Windows user account with a swipe of a finger instead of a password

I'm no security expert but the fingerprint reader appeared to work a treat. I tried lots of silly ways of trying to circumvent the system but couldn't fool it. Nor did it ever misread my fingers, even when they got er... a little greasy in the gentle warmth of the summer.

New hybrid storage solutions

Next page: Pointing the finger

More from The Register

next story
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Get your Indian Landfill Android One handsets - they're only SIXTY QUID
Cheap and deafening mobes for the subcontinental masses
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
A SCORCHIO fatboy SSD: Samsung SSD850 PRO 3D V-NAND
4Gb/s speeds on a consumer drive, anyone?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.