• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Laptop Security: Do not leave home without it!

By Abhishek Ghosh December 30, 2010 9:39 pm Updated on December 30, 2010

Laptop Security: Do not leave home without it!

Advertisement

laptop_securityHundreds of thousands of laptops are lost or stolen each year. What if it unfortunately happens to you? Think of all the relevant information stored in your laptop and the chaos that would come into your life if it becomes lost or stolen.

All the pictures you downloaded from your camera and never had time to mount and print. More importantly, your personal information, your credit card and bank statements you shudder to think. Security of laptops should be of high priority to the owners. Not only protection against physical loss, but by internal infestation of spyware, viruses, hackers and spammers. Your safety must be maintained and updated. Better to control. Treat your laptop as you would do for your wallet, your purse, your fine jewelry. Protect your child. Here are some important steps to protect your laptop.

Make sure your OS (Operating System) is secure. Windows 7, Windows Vista, Windows 2000 Pro and XP Pro are secure operating systems. Windows 95/98/ME are not; anyone could access your data.

Advertisement

---

Password protect your data:

Send your registration manufacturers. If your laptop is stolen is never sent in the maintenance or repair, it can be traced through registration.

Turn on your popup blocker. On the Internet, go to Tools / Internet Options /. Click the Privacy tab and check the box that says Block pop-ups.

Install anti-spyware and antivirus software, and maintain it.

Check for Windows updates and take the time to install. A few minutes is all it takes. Its so easy to click “remind me later”, but even if you must restart your computer, its time well spent.

Measures of security to protect your laptop computer:

Carry your laptop in a discreet bag. If a fancy designer seems to have “steal me” written on it.

Never leave it unattended, even for a minute.

Store in a locked drawer when not in use.

Label it. Use ID tags in plain view that it would be difficult for a thief to remove. Engrave your name on the cover.

The security inside – Protect your data:

Set BIOS password. This is the first thing that pops up when the machine is on. Most computers will not start if the attempted password fails on three occasions.

Set Login Password. Most systems require a password to connect. If the password is entered incorrectly, the system will reject the user. Password protection is not 100% safe, but it certainly presents a difficult challenge for a robber.

Sensors: There are very sophisticated sensors that can be purchased for additional protection, such as a fingerprint sensor or a motion sensor. Your password could be a model of sequential movements of your head side to side, up or down. There are also sensors that alarm sounds if anyone touches your laptop when you are out of reach. In addition, there are fingerprint sensors, retina sensor, or even the characteristics of your strikes can be recorded for authentication. The sensors are fairly new and not yet a standard feature on regular laptops.

Tracking Devices: You can now buy software that allows your laptop to “check in” to a monitoring center using a signal. Central tracking service works with the police and Internet service providers to locate and recover stolen laptops.

Personal Firewall: Install this extra layer of protection not only to prevent intruders from hacking into your system, but also prevent your information from escaping.

NTFS: If you have Windows 7 / Windows Vista / Windows NT / 2000 / XP, use the NTFS filing system. NTFS stands for NT-filing system.

Disable the Guest account, or at least give it a very complex and difficult to guess the password.

Rename the Administrator account. Do not use the word admin in the name. A different name will make it more difficult for hackers to open the door. You can also create a “shadow account director.” Assign a password complex, too difficult to guess, and limit all privileges. Then enable “logs” so that you can tell if access has been attempted.

Disable the “Last Logged-username”. This will prevent hackers from password guessing. You can find instructions for doing so on the installation CD for your laptop.

Encrypt your files. Use EFS (Encrypting filing system). When a file is encrypted, any file stored in this file is also encrypted. Encryption is a lot to do and it can also slow the performance speed of your laptop, you can choose to encrypt only the most Sensitive  files on your laptop.

Disable the infrared port. The port is for data transmission and is not always the method chosen by most users. But did you know that someone sitting in the room you could actually browse your files via infrared without even knowing it? You can disable the port in the BIOS, or simply cover it with a piece of black electrical tape.

Back up your data before you travel. If any unfortunate circumstance happens, your data can be recovered by you. You can store all your data on a disk (encrypted and password protected, of course) and travel with an “empty” laptop. Remember to keep records on you and not in your bag for laptop! And give attention to metal detectors in airports. Otherwise, you can send your records and retrieve them when you arrive at your destination.

External Security for Notebook:

Cable lock. You never know when it becomes necessary to leave your laptop unattended, if even for a minute or two. Get a cable lock and use it. Make sure it attaches to something very solid and unwavering.Laptop Security: Do not leave home without it!

Docking station to your office, many people do not know can pass through. You never know who might want your laptop abroad. A docking station can be permanently attached to your desktop and the laptop it locks up. If you can not have a docking station, make a habit of blocking it in a drawer when not in use or when you must leave the workstation. You would not leave your wallet on your desk when you leave,do you?

Airports are a prime location for thieves to snatch your property in seconds. Obviously, never leave them unattended. Carry-on, never check your laptop. There is risk it getting lost in the baggage system at the airport. How can you secure your data while traveling? A particular company, Absolute Software, a company based in Canada, has developed software that can trace a lost or stolen laptop, and even delete the data with a remote device. Another company in Colorado, Otter Products, makes the case that sustainable transportation is dimensionally stable, water resistant, drop-resistant and locked for travel.

In summary, one could almost turn your laptop into a mini Fort Knox, if you enjoyed all the options of security available. But we hope this article has instilled paranoia you enough to entice you to take precautions to ensure the safety of your laptop and your privacy! Careful measures of security simple on a regular basis will become as common as putting your seat belt as a safety measure when you ride in the car. If the measures of security are in place, you can relax and make your day without worry.

As any as responsible company, Microsoft has a small guide on Laptop’s Security. You can read it here.

Tagged With do ever leave your home without your laptop

This Article Has Been Shared 965 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Laptop Security: Do not leave home without it!

  • What are keyloggers, trojans and Backdoors?

    Here is a small article explaining the terms Keyloggers, Trojans and Backdoors to an average Microsoft Windows user.

  • Windows 7 and Mac OS X: which one is better?

    Microsoft and Apple compete with the new versions of their operating systems those launched two months apart. Thecustomizewindows presents an honest comparison after using both the operating system for more than one year.

  • Registry Bloat-What they are?

    The term registry bloat means the Windows registry is filled up with obsolete or unnecessary data entries those are useless for Your Windows 7 PC.

  • Why there are pirated versions of Windows 7 and how they look?

    Today, for real innocent Windows 7 users, we will discuss outline of what are the methods used to crack Windows 7, why people use them and how the sold packages looks in the real world.

  • What are ASCII art and emoticons

    You have probably seen pictures “written” inside text files within a downloaded zipped file or obviously used a colon, followed by a close part of first bracket. These are ASCII art and emoticons.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. AvatarArmando Brummett says

    October 20, 2011 at 6:20 pm

    What a terrific blog, certainly glad I found it. I’ll let all my buddies know about this blog; I I’m sure I will return again.

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is an Automatic Ethanol Fireplace February 8, 2023
  • Disadvantages of Cloud-Native Computing February 7, 2023
  • Projector Screen Basics February 6, 2023
  • What is Configuration Management February 5, 2023
  • What is ChatGPT? February 3, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Laptop Security: Do not leave home without it!," in The Customize Windows, December 30, 2010, February 8, 2023, https://thecustomizewindows.com/2010/12/laptop-security-do-not-leave-home-without-it/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT