HOW TO PROTECT YOUR LAPTOP
FROM THEFT...
Your laptop is probably the
most expensive portable device you own. What makes it even more valuable is the
data personal and official that you store on it. But, if you carry your
notebook PC on work trips and holidays, there's a chance that you might
misplace it or worse, it could get stolen.Thankfully, there's useful
anti-theft technology that could not only prevent someone from stealing it, but
could even help you track your laptop if it's stolen and also keep your
sensitive data safe from prying eyes. KENSINGTON LOCK I f you look at the side
of your laptop, you might find a little slot that's called the Kensington Lock
(usually marked with a padlock sign). This slot is a metalreinforced hole using
which you can tether your laptop to a table or other immovable furniture.
To do
this, you will require the Kensington Lock, which can be bought from online
stores for as less as `200. The lock comprises a metal anchor attached to a
metal cable with a loop at the end.
To secure
your laptop, all you have to do is loop the cable around a heavy or immovable
object like a table leg, and push the metal anchor into the laptop's slot. This
anchor can then be locked into place with a key or a combination lock.
The
Kensington Lock is useful when it comes to protecting your device from thefts
at locations like airports, public libraries, hotel lobbies and coffee shops.It
is the first step in protecting your gear when you leave it unattended.
TRACK YOUR
LAPTOP
In the event that your laptop is stolen or misplaced, it would help if you had a `tracking' software installed on your computer. And the cheapest way to do this is to install Prey a free tool from the Prey Project.
First, go
to preyproject.com, download and install the software on
your laptop. This utility is available for Windows, Mac OS X, and even
UbuntuDebian machines.
After
installation, the software will require you to create a free account by
registering with an e-mail address and password.
Once
you've logged in, Prey will immediately be up and running on your computer.
Now, in
case you've lost or misplaced this machine, simply go to preyproject.com from another PC, and log in with your
account details. You will be taken to a web page that displays your lost
laptop's location on a map (see screenshot).
From this
page, you can indicate that your laptop is missing and Prey automatically
generates reports on its whereabouts. The dashboard even lets you trigger a
30-second alarm on your device (provided its volume control is on); send a
message to the person using your laptop asking them to return it to you (if it
has been misplaced), and even remotely lock the laptop with a password.
A free
account lets you register and track up to three devices, but if you opt for a
paid Pro account, Prey lets you track anything between 10 to 500 devices (ideal
for corporates). It also promises you accelerated tracking, priority support,
as well as the option to delete files remotely.
It should
be noted, that in order for your laptop to be tracked, it will need to be
switched on and connected to the internet.
Alternatively
, you could visit http:www.lockittight.com and try the free tool that's available
for laptops running Windows XP , Vista, Win 7 and 8. Its installation procedure
is similar to Prey and while its user interface is not as intuitive, it packs
in extra features such as letting you remotely use your laptop's camera to
shoot a picture of the person using the device, capture a screenshot of what it
is displaying, access browser history , and more from its Settings option.
ENCRYPTING
DATA
Tracking
your stolen laptop is one thing, protecting the data stored on it is quite
another. File encryption to the rescue. To safeguard your sensitive data, you
should make it a practice to encrypt all your important files on the
laptop.This will make it tougher for an intruder to gain access to the data on
the hard drive.
The
simplest way to encrypt files and folders is with the Encrypting File System
(EFS) in Windows. You will be able use this feature if your laptop runs on
Windows XP7 Professional, Vista Business, or Windows 88.110 Pro. This
encryption technology is linked to your computer login, so anyone with access
to your computer's password will have access to the encrypted files. It is
therefore advised that you create a guest account for other users who might be
using your machine if you don't want them to access your confidential
information.
To
encrypt...
Right-click the file or folder you want to protect and click Properties.
In the
dialog box that appears. Select the General tab, and click on the Advanced
button.
This will
open the Advanced Attributes dialog box.
Here,
select the Encrypt contents to secure data check box.
Click OK
twice to return to the file folder you have just encrypted.
You will
now be presented with the Confirm Attribute Changes dialog box. Choose between
Apply changes to this folder only or Apply changes to this folder, subfolders
and files. The latter is selected by default.
Click OK.
Windows
will start encrypting the file or the folder con tents. This will take some time
as it depends on the amount of data it has to encrypt. The file or folder name
will now be displayed in green, so you know the contents are protected. Adding
new files into an encrypted folder is a simple drag-and-drop affair. The
contents will only be accessible when you login to Windows with your user name
and password. Alternatively, you can use the free VeraCrypt tool available
for Windows, Mac OS X and Linux platforms from veracrypt.codeplex.com.
For a
step-by-step guide on how to use the tool, go to
veracrypt.codeplex.comdocumentation and click on Beginner's Tutorial.Note:
Before your encrypt something important, do a trial run of this tool with dummy
files. This will help you understand the process better. If you're going to use
this tool with official files, please seek the help of your office system
administrator. That said, the documentation for VeraCrypt complete with
screenshots is extensive, and very simple to follow.
Also, after
adding files to an encrypted VeraCrypt volume, the original unencrypted files
should be moved to an external hard drive or deleted altogether. When you use
Windows EFS to protect your files, an “encryption certificate“ and a key will
be created in the system. You should save a copy of these credentials in case
you have to reinstall Windows.To know how, visit:
windows.microsoft.comen-inwindowsback-up-efs-certificate
Source |
Time of India | 21 November 2015