Sunday, November 22, 2015

HOW TO PROTECT YOUR LAPTOP FROM THEFT...



HOW TO PROTECT YOUR LAPTOP FROM THEFT...

Your laptop is probably the most expensive portable device you own. What makes it even more valuable is the data ­ personal and official ­ that you store on it. But, if you carry your notebook PC on work trips and holidays, there's a chance that you might misplace it ­ or worse, it could get stolen.Thankfully, there's useful anti-theft technology that could not only prevent someone from stealing it, but could even help you track your laptop if it's stolen and also keep your sensitive data safe from prying eyes. KENSINGTON LOCK I f you look at the side of your laptop, you might find a little slot that's called the Kensington Lock (usually marked with a padlock sign). This slot is a metalreinforced hole using which you can tether your laptop to a table or other immovable furniture.

To do this, you will require the Kensington Lock, which can be bought from online stores for as less as `200. The lock comprises a metal anchor attached to a metal cable with a loop at the end.
To secure your laptop, all you have to do is loop the cable around a heavy or immovable object like a table leg, and push the metal anchor into the laptop's slot. This anchor can then be locked into place with a key or a combination lock.

The Kensington Lock is useful when it comes to protecting your device from thefts at locations like airports, public libraries, hotel lobbies and coffee shops.It is the first step in protecting your gear when you leave it unattended. 

TRACK YOUR LAPTOP 

In the event that your laptop is stolen or misplaced, it would help if you had a `tracking' software installed on your computer. And the cheapest way to do this is to install Prey ­ a free tool from the Prey Project.

First, go to preyproject.com, download and install the software on your laptop. This utility is available for Windows, Mac OS X, and even UbuntuDebian machines.

After installation, the software will require you to create a free account by registering with an e-mail address and password.

Once you've logged in, Prey will immediately be up and running on your computer.

Now, in case you've lost or misplaced this machine, simply go to preyproject.com from another PC, and log in with your account details. You will be taken to a web page that displays your lost laptop's location on a map (see screenshot).

From this page, you can indicate that your laptop is missing and Prey automatically generates reports on its whereabouts. The dashboard even lets you trigger a 30-second alarm on your device (provided its volume control is on); send a message to the person using your laptop asking them to return it to you (if it has been misplaced), and even remotely lock the laptop with a password.

A free account lets you register and track up to three devices, but if you opt for a paid Pro account, Prey lets you track anything between 10 to 500 devices (ideal for corporates). It also promises you accelerated tracking, priority support, as well as the option to delete files remotely.

It should be noted, that in order for your laptop to be tracked, it will need to be switched on and connected to the internet.

Alternatively , you could visit http:www.lockittight.com and try the free tool that's available for laptops running Windows XP , Vista, Win 7 and 8. Its installation procedure is similar to Prey ­ and while its user interface is not as intuitive, it packs in extra features such as letting you remotely use your laptop's camera to shoot a picture of the person using the device, capture a screenshot of what it is displaying, access browser history , and more from its Settings option. 

ENCRYPTING DATA 

Tracking your stolen laptop is one thing, protecting the data stored on it is quite another. File encryption to the rescue. To safeguard your sensitive data, you should make it a practice to encrypt all your important files on the laptop.This will make it tougher for an intruder to gain access to the data on the hard drive.

The simplest way to encrypt files and folders is with the Encrypting File System (EFS) in Windows. You will be able use this feature if your laptop runs on Windows XP7 Professional, Vista Business, or Windows 88.110 Pro. This encryption technology is linked to your computer login, so anyone with access to your computer's password will have access to the encrypted files. It is therefore advised that you create a guest account for other users who might be using your machine if you don't want them to access your confidential information.

To encrypt...

Right-click the file or folder you want to protect and click Properties.

In the dialog box that appears. Select the General tab, and click on the Advanced button.

This will open the Advanced Attributes dialog box.

Here, select the Encrypt contents to secure data check box.

Click OK twice to return to the file folder you have just encrypted.

You will now be presented with the Confirm Attribute Changes dialog box. Choose between Apply changes to this folder only or Apply changes to this folder, subfolders and files. The latter is selected by default.

Click OK.

Windows will start encrypting the file or the folder con tents. This will take some time as it depends on the amount of data it has to encrypt. The file or folder name will now be displayed in green, so you know the contents are protected. Adding new files into an encrypted folder is a simple drag-and-drop affair. The contents will only be accessible when you login to Windows with your user name and password. Alternatively, you can use the free VeraCrypt tool ­ available for Windows, Mac OS X and Linux platforms ­ from veracrypt.codeplex.com.

For a step-by-step guide on how to use the tool, go to veracrypt.codeplex.comdocumentation and click on Beginner's Tutorial.Note: Before your encrypt something important, do a trial run of this tool with dummy files. This will help you understand the process better. If you're going to use this tool with official files, please seek the help of your office system administrator. That said, the documentation for VeraCrypt ­ complete with screenshots ­ is extensive, and very simple to follow.

Also, after adding files to an encrypted VeraCrypt volume, the original unencrypted files should be moved to an external hard drive or deleted altogether. When you use Windows EFS to protect your files, an “encryption certificate“ and a key will be created in the system. You should save a copy of these credentials in case you have to reinstall Windows.To know how, visit: windows.microsoft.comen-inwindowsback-up-efs-certificate 

Source | Time of India | 21 November 2015

Regards

Pralhad Jadhav
Khaitan & Co

No comments:

Post a Comment