HOW TO PROTECT YOUR
LAPTOP FROM THEFT...
Your laptop is probably the most
expensive portable device you own. What makes it even more valuable is the data
personal and official that you store on it. But, if you carry your notebook
PC on work trips and holidays, there's a chance that you might misplace it or
worse, it could get stolen.Thankfully, there's useful anti-theft technology
that could not only prevent someone from stealing it, but could even help you
track your laptop if it's stolen and also keep your sensitive data safe from
prying eyes. KENSINGTON LOCK I f you look at the side of your laptop, you might
find a little slot that's called the Kensington Lock (usually marked with a
padlock sign). This slot is a metalreinforced hole using which you can tether
your laptop to a table or other immovable furniture.
To
do this, you will require the Kensington Lock, which can be bought from online
stores for as less as `200. The lock comprises a metal anchor attached to a
metal cable with a loop at the end.
To
secure your laptop, all you have to do is loop the cable around a heavy or
immovable object like a table leg, and push the metal anchor into the laptop's
slot. This anchor can then be locked into place with a key or a combination
lock.
The
Kensington Lock is useful when it comes to protecting your device from thefts
at locations like airports, public libraries, hotel lobbies and coffee shops.It
is the first step in protecting your gear when you leave it unattended.
TRACK YOUR LAPTOP
In
the event that your laptop is stolen or misplaced, it would help if you had a
`tracking' software installed on your computer. And the cheapest way to do this
is to install Prey a free tool from the Prey Project.
First,
go to preyproject.com, download and install the software on your laptop. This
utility is available for Windows, Mac OS X, and even UbuntuDebian machines.
After
installation, the software will require you to create a free account by
registering with an e-mail address and password.
Once
you've logged in, Prey will immediately be up and running on your computer.
Now,
in case you've lost or misplaced this machine, simply go to preyproject.com
from another PC, and log in with your account details. You will be taken to a
web page that displays your lost laptop's location on a map (see screenshot).
From
this page, you can indicate that your laptop is missing and Prey automatically
generates reports on its whereabouts. The dashboard even lets you trigger a
30-second alarm on your device (provided its volume control is on); send a
message to the person using your laptop asking them to return it to you (if it
has been misplaced), and even remotely lock the laptop with a password.
A
free account lets you register and track up to three devices, but if you opt
for a paid Pro account, Prey lets you track anything between 10 to 500 devices
(ideal for corporates). It also promises you accelerated tracking, priority
support, as well as the option to delete files remotely.
It
should be noted, that in order for your laptop to be tracked, it will need to
be switched on and connected to the internet.
Alternatively
, you could visit http:www.lockittight.com and try the free tool that's
available for laptops running Windows XP , Vista, Win 7 and 8. Its installation
procedure is similar to Prey and while its user interface is not as
intuitive, it packs in extra features such as letting you remotely use your
laptop's camera to shoot a picture of the person using the device, capture a
screenshot of what it is displaying, access browser history , and more from its
Settings option.
ENCRYPTING DATA
Tracking
your stolen laptop is one thing, protecting the data stored on it is quite
another. File encryption to the rescue. To safeguard your sensitive data, you
should make it a practice to encrypt all your important files on the
laptop.This will make it tougher for an intruder to gain access to the data on
the hard drive.
The
simplest way to encrypt files and folders is with the Encrypting File System
(EFS) in Windows. You will be able use this feature if your laptop runs on
Windows XP7 Professional, Vista Business, or Windows 88.110 Pro. This
encryption technology is linked to your computer login, so anyone with access
to your computer's password will have access to the encrypted files. It is
therefore advised that you create a guest account for other users who might be
using your machine if you don't want them to access your confidential
information.
To encrypt...
Right-click the file or folder you want to protect and click Properties.
In
the dialog box that appears. Select the General tab, and click on the Advanced
button.
This
will open the Advanced Attributes dialog box.
Here,
select the Encrypt contents to secure data check box.
Click
OK twice to return to the file folder you have just encrypted.
You
will now be presented with the Confirm Attribute Changes dialog box. Choose
between Apply changes to this folder only or Apply changes to this folder,
subfolders and files. The latter is selected by default.
Click OK.
Windows
will start encrypting the file or the folder con tents. This will take some
time as it depends on the amount of data it has to encrypt. The file or folder
name will now be displayed in green, so you know the contents are protected.
Adding new files into an encrypted folder is a simple drag-and-drop affair. The
contents will only be accessible when you login to Windows with your user name
and password. Alternatively, you can use the free VeraCrypt tool available
for Windows, Mac OS X and Linux platforms from veracrypt.codeplex.com.
For
a step-by-step guide on how to use the tool, go to
veracrypt.codeplex.comdocumentation and click on Beginner's Tutorial.Note:
Before your encrypt something important, do a trial run of this tool with dummy
files. This will help you understand the process better. If you're going to use
this tool with official files, please seek the help of your office system
administrator. That said, the documentation for VeraCrypt complete with
screenshots is extensive, and very simple to follow.
Also,
after adding files to an encrypted VeraCrypt volume, the original unencrypted
files should be moved to an external hard drive or deleted altogether. When you
use Windows EFS to protect your files, an “encryption certificate“ and a key
will be created in the system. You should save a copy of these credentials in
case you have to reinstall Windows.To know how, visit:
windows.microsoft.comen-inwindowsback-up-efs-certificate
Source | Time of India | 21
November 2015
Regards
Pralhad
Jadhav
Khaitan
& Co
No comments:
Post a Comment