Securing the Power Tool (see figures B1B2)