Hardware information

Central processing unit guarantee -where?d my notebook go? - hardware


Laptops are lovely. They are convenient, mobile, able and prestigious.

They are also thief magnets. Over 400,000 laptops die out each year, goodbye their owners wondering where they went, what is incident with their data and what to do next.

Some of the laptops are just lost - left in cabs, at hotels, restaurants and at conferences and events. Many of these laptops (but not all) find their way back to their lucky owners.

Some are stolen by citizens - many of them co-workers, assistance staff or ancestors compelling improvement of a "moment of opportunity" - who just want to have a laptop.

Some are stolen by authority "Laptop Lifters" who may work in teams to steal the laptops for resale.

And others are stolen, not for the notebook itself, which may be a bonus, but for the data on the laptop's hard drive - monetary or individuality data or big business plans or data.

For example:

  • QualComm's CEO had his mainframe stolen while he was conducting a Press Conference. Reportedly, some of QualComm's most costly secrets were on that laptop, unencrypted and only cosseted by an by far bypassed password.
  • A Area of State cpu containing high level in a row on nuclear proliferation was stolen right from State's headquarters. Two administrators were fired and other personnel were reprimanded.
Think about it - What other piece of apparatus or own possession do we routinely carry about that is worth over a thousand dollars, by itself, and may be worth thousands more in data? Why wouldn't that be charismatic to thieves?

A large part of the catch is less on the hardware or software end of things, it's in the HUMAN side of things. By raising our awareness many of the vulnerabilities can be awfully lessened.

There are 3 areas of vulnerability: 1) Securing the concrete laptop, 2) Securing the Data, 3) Receiving the mainframe back.

1) Securing the concrete laptop

There are many ways to check the brute defense of a laptop.

There are cable locks that can be fond of to an firm aim to make it more challenging to just pick up the notebook and walk away. While these cables can be cut with a bolt cutter, some of them are joint with an alarm that will sound if the cable is cut.

Alarms or gesticulate detectors are also accessible exclusive of the cable locks. They can be set to activate at any time the central processing unit is moved or when the notebook is moved a a selection of coldness away from a compact receiver that the owner has, which also alerts the owner. www. anchorpad. com, www. kensington. com, www. computersecurity. com, www. pcguardian. com, www. trackitcorp. com, www. minatronics. com

Use a mainframe moving bag that does not look like a notebook case. Having a central processing unit case that says IBM or Sony is promotion that you are moving a approvingly constructive commodity. Bear in mind using a pack with your notebook in it in a padded sleeve. One of the prime sitting room for mainframe theft is the men's bathroom in airports and contract centers. A new prime place that laptops are stolen is at pay phones in a busy area.

Just as there are mugger teams, one of whom distracts you by "accidentally" bumping into you while the other steals your wallet, there are "Laptop Lifters" one of whom will by mistake spill amazing on you while the other walks off with your laptop. A good rule to abide by is: any time there is a amusement near you, put your hand on your laptop.

People commonly feel comfortable at conferences and conventions. After all, you are customarily surrounded by your peers, and there are often contract staff about to give security. Often the theft will take place on the back up or third day, when IDs for entry are not being check as stringently, and many of the attendees are NOT bearing their badges. Many times ancestors will leave laptops careless on or under alliance tables at some point in breaks.

Even if it is not your cpu that is stolen, your PCMIA cards - modem or wireless connectors - can be stolen in an instant. Not only is this a loss of value, it's also a real inconvenience.

It's a good idea to incise your ballet company in sequence importantly on the exterior of the central processing unit and on its hauling case. It makes it less alluring to the thief, since it makes it easy to categorize and makes it harder to sell. Having a large or clearly decorated luggage tag steadily affixed makes it less appealing since thieves like to be "invisible. "

You also ought to be sure to send in that a small amount registration card that came with your laptop. At times a stolen central processing unit will be sent back to the manufacturer for darning by the anyone who had harmlessly bought it from the thief. You may get your cpu back this way.

Don't leave your cpu in your car. If it is visible, you may lose your central processing unit AND have to pay for the break to your car. Fee cars are often the elite aim at of thieves, in particular at accepted restaurants or shopping malls. Plus, the extremes of fever (both hot AND cold), can each fry your central processing unit or freeze the LCD screen.

2) Data Security

Losing your mainframe may mean you'll have to shell out $1,000 - $3,000 for a new one. Behind your data can be MUCH more serious. Many colonize ONLY have a laptop, so ALL of their data is on it. Plus, most colonize don't back up their data as often as they should.

Replacing the data can be a pain. But down your Individual data, plus conceivably your Communal Guarantee number, PIN numbers, acknowledgment card info, etc can be a form of not public hell.

Here are the steps you be supposed to take:

Set a BIOS password. BIOS is the first curriculum to load when you turn on your computer. Your central processing unit will not boot at all until that password is entered. Even though there are ways to bypass this, (there's all kinds of info on the 'Net), it's the first in more than a few layers of collateral you can institute. (See http://www. lockdown. co. uk/?pg=biospsw&s=articles to see how to set a BIOS password).

Use the NTFS file arrangement (assuming you are using XP). NTFS has bright encryption capabilities not accessible in FAT or FAT32. Here are a fasten of articles that might help you decide: http://windows. about. com/od/filesfoldersdisks/l/aa001231b. htm http://www. microsoft. com/technet/prodtechnol/winxppro/maintain/convertfat. mspx

Prevent data loss all the way through your Infrared port. Do you in point of fact use your infrared port? Do you even know if you have one? If you do have one, your laptop can be hacked into all the way crosswise the room! A austere way to disable it is to put a piece of black electrical tape diagonally it. (It's a barely dark window, by and large on the back of your laptop). On the other hand you can disable the infrared port completely. For the reason that each cpu manufacturer has another steps, hunt on Google or Yahoo for "Disable Infrared Port" and add your mainframe manufacturer's name to the hunt terms.

Back up your data beforehand you leave your office. That way, if your notebook is lost or stolen, you have not lost your files.

Consider custody easily hurt files off your cpu hard drive. A DVD can hold many gigabytes of data and can be approved in your pocket. A USB storeroom contraption is also quite handy.

If you are in a row XP Pro, your can encrypt your data using EFS (Encrypting File System), so it will be absolutely unreadable devoid of the decryption key. If you don't have the Pro version, you can acquisition third party encryption software. |

3) Getting your cpu back.

So the worst has happened and your cpu has disappeared. Hopefully, you have your name and phone digit on it somewhere, so it can be returned to you if it was just left in a cab.

If you've taken the right steps ahead of it disappeared, there's a fair attempt you will get it back.

Here's what you can do to amplify the accidental of in receipt of it back:

There are software solutions that allow you to trace your notebook if it ever connects to the Internet. For instance, www. computrace. com/ will give you the IP deal with everywhere your mainframe logs on. The cost is under $50. Being paid the keep watch over to go and claim your mainframe is a further story, however.

According to some reports, when the law enforcement cooperate, recovery is up to 90%!
All in all, the most actual blocking is user awareness. Reportedly, Arthur Andersen CPA firm not only has course and posters on mainframe (and other) security, but they also have itinerant defense personnel who take unattended laptops, cell phones, purses and PDAs off of desks and other unsecure locations, exit a note at the back forceful the unfortunate "victim" where to get their chattels back. Quite an education, and in all probability cute efficient in raising awareness!

© Steve Freedman, Archer Strategic Alliances 2005 All Civil liberties Reserved

Steve Freedman Archer Strategic Alliances http://helpprotectmycomputer. com


A Hard Look At Hardware  WPLG Local 10

Developed by:
home | site map
goldenarticles.net © 2021