Laptop Protection Page Content
Laptop Protection Overview
Due to our highly technological and mobile lifestyle, laptops have become one of modern society's most valuable tools for business and communication. Imagine your laptop disappearing or a glass of wine spilling on it and losing countless hours of work and irreplaceable content. This is why it's so important to practice good laptop protection.
This article covers general laptop protection information, how to password protect not only access to a laptop, but how to password protect FILES, laptop theft prevention, how to report a stolen or lost laptop online and information about the Lost Laptop Database and Stolen Laptop Database on Stolen Lost Found Online.
Firewall Laptop Protection
A firewall is a software program or piece of hardware that blocks hackers from entering and using a laptop. Hackers search the Internet the way some telemarketers automatically dial random phone numbers. A laptop hacker will send out pings (calls) to thousands of laptops and wait for responses. Firewalls prevent your laptop from responding to these random calls and blocks a laptop to and from sources not permitted. This is especially important if you have a high-speed Internet connection, such as DSL or cable.
Some operating systems have built-in firewalls that may be shipped in the “off” mode. Be sure to turn your firewall on. To be effective, your firewall must be set up properly and updated regularly. Check your online “Help” feature for specific instructions.
Anit-virus Laptop Protection
Anti-virus software protects your laptop from viruses that can destroy your data, slow down or crash your laptop, or allow spammers to send e-mail through your account. Anti-virus protection scans your laptop and your incoming e-mail for viruses, and then deletes them. You must keep your anti-virus software updated to cope with the latest “bugs” circulating the Internet. Most anti-virus software includes a feature to download updates automatically when you are online. In addition, make sure that the software is continually running and checking your system for viruses, especially if you are downloading files from the Web or checking your e-mail. Set your anti-virus software to check for viruses when you first turn on your laptop. You should also give your system a thorough scan at least twice a month.
Anti-Spyware Laptop Protection
Spyware is software installed without your knowledge or consent that can monitor your online activities and collect personal information while you surf the Web. Some kinds of spyware, called keyloggers, record everything you key in – including your passwords and financial information. Signs that your laptop may be infected with spyware include a sudden flurry of pop-up ads, being taken to Web sites you don’t want to go to, and generally slowed performance. Spyware protection is included in some anti-virus software programs. Check your anti- virus software documentation for instructions on how to activate the spyware protection features. You can buy separate anti-spyware software programs. Keep your anti- spyware software updated and run it regularly. To avoid spyware in the first place, download software only from sites you know and trust. Piggybacking spyware can be an unseen cost of many “free” programs. Don’t click on links in pop-up windows or in spam e-mail.
Laptop Protection With Browser And System Management
Hackers are constantly trying to find flaws or holes in operating systems and browsers. To protect your laptop and the information on it, put the security settings in your system and browser at medium or higher. Check the Tools or Options menus for how to do this. Update your system and browser regularly, taking advantage of automatic updating when it’s available. Windows Update is a service offered by Microsoft. It will download and install software updates to the Microsoft Windows Operating System, Internet Explorer, Outlook Express, and will also deliver security updates to you. Patching can also be run automatically for other systems, such as Macintosh Operating System.
Securing A Wireless Network For Laptop Protection
If you use a wireless network in your home, be sure to take precautions to secure it against hackers. Encrypting wireless communications is the first step. Choose a wireless router with an encryption feature and turn it on. WPA encryption is considered stronger than WEP. Your laptop, router, and other equipment must use the same encryption. If your router enables identifier broadcasting, disable it. Note the SSID name so you can connect your laptop to the network manually. Hackers know the pre-set passwords of this kind of equipment. Be sure to change the default identifier on your router and the pre-set administrative password. Turn off your wireless network when you’re not using it.
Remember that public “hot spots” may not be secure. It’s safest to avoid accessing or sending sensitive personal information over a public wireless network.
Laptop Protection By Encrypting All Files
One of the most common mis-conceptions about personal laptop computers is that the files are safe if there is a password required to access laptop. The reality is, unfortunately, it that the files on any hard drive can be accessed without any difficulty within minutes. The password required is to function the operating system, but if the hard drive is accessed from another laptop or computer, the files can easily be dragged off the disc and opened.
The most secure way to store files is within a secure disc image which requires a password to access it's contents. A disc image can be thought of as a file firewall around all sensitive material. All encryption and security measures are man-made, and can therefore be decoded. However, even the lowest level of security; a 128-bit AES encryption disc image is extremely hard to decode and would take decoders of FBI level up to several weeks to crack into. A common laptop their does not have this level of expertise, also, by the time the information is accessed account numbers and other such information will have been changed and will be of not worth all the work. Even hidden files and hidden folders appear, these and password protected folders can be accessed easily when looking through a disc from another laptop. Many laptop thieves can access a hard drives contents within a minute to gain personal information such as date of birth, financial records or social security numbers. Once it is realized disc content is inaccessible, a disc will be wiped, have a fresh operating system written on it and reinstalled if it was removed from the laptop, ready for sale on the black market or an unsuspecting buyer.
How To Encrypt FIles Laptop Protection
How to create a secure disk image on a Mac OS X:
- Open a new Finder window by either pressing the keys "command" then "N" or in the upper left corner of the screen, click "File" then click "New Finder Window" in the drop down menu. (All shortcuts in every mac app is listed to the right of the drop-down menu words)
- Select the "Applications" folder, then the "Utilities" folder, then double click "Disk Utility"
- In the menu along the top of the Disk Utility application, select "New Image"
- Name the new disc image and specify the size and security measures, 128-bit is ample, however if extra security is desired, 256-bit can be used.
- Click "Create"
- Type in a password, the use of numbers and punctuation greatly increases security. Do not select "Remember password in my keychain," this will prevent people from accessing it without a password on your computer.
- Write the password on paper and store it in a secure location, without the password the files will be accessed
There is free software for Windows available. However, as Mac users, Stolen Lost Found Online has not used any and can therefore no be able to review any. This information could be Googled here
Additional Laptop Protection Information
California Office of Privacy Protection (www.privacy.ca.gov)
The California Office of Privacy Protection provides information for consumers on protecting your computer, identity theft, and other privacy topics. The tips above are taken from “CIS 12: Protect Your Computer from Viruses, Hackers, and Spies.”
OnGuardOnline provides practical tips from the federal government and the technology industry to help you defend yourself against Internet fraud, secure your computer, and protect your personal information.
Consumer Reports (www.consumerreports.org)
The independent nonprofit Consumers Union provides product reviews and strategies in a September 2006 article in ConsumerReports.org, “Stay Safe Online: Best Software Tools and Strategies,” available for free online. Product ratings are available to subscribers.
PC Magazine (www.pcmag.com)
The magazine provides product reviews in December 2006 articles, ”Suitest Security Software,” available for free online at http://www.pcmag.com/article2/0,1759,2076246,00.asp.
How To File A Stolen Laptop Police Report
The first step in any occurrence of theft is to report the incident to the police immediately. This helps you recover the stolen item if it gets confiscated and helps with an insurance claim process on the account an official police report is required to file a claim.
Here are the general steps to file a police report:
- Call the non-emergency phone number for the local police station or law enforcement agency where the item was stolen.
- Obtain the physical address and go to the police station or law enforcement agency.
- Once there, go to the stolen property department if applicable.
- While creating a stolen property police report it's important to provide the theft detective or clerk with as many details as possible, especially the item's serial number, any identifying marks or stickers. Also include when, where and how the item was stolen.
- Once you have completed the report, be sure to obtain a copy and retain it for follow-up and recovery.
It's important to file a police report for theft, no matter how big, small or valuable the stolen item is, because it helps the police know a thief's (or thieves) M.O. and to control theft by using crime data to increase patrol in areas with a high or rising crime rate. Sometimes an area's theft rate can skyrocket because people don't report theft incidents because the stolen item isn't of high monetary value. This is called petty theft and is how a petty thief can continue stealing because the police are not made aware of their activity.
How To Report A Stolen Laptop Online
Get the world on your case! Here are the steps to create an online Stolen Laptop report for free:
- If not yet registered, click the "Register" link at the top right-hand side of the page or click the "Report" button at page top.
- Enter your information and click the "Register" button.
- Open the email account used for registration, open the verification email and click the link in the email body or copy and paste it in your browser address bar and press the "Enter" or "Return" key.
- Log in to the Stolen Lost Found Online website
- Click the "Report" link in the main navigation bar or the "Report" button at page top.
- Select the appropriate category.
- Select the appropriate sub-category.
- Select to post as Stolen.
- Enter as much information about the Stolen Laptop as possible - the make, model and serial number are especially important. Also helpful are any identifying marks and photos if available.
- Click the "Submit" button.
That's it. Once the Stolen Laptop report is submitted it will post on Stolen Lost Found Online immediately and will appear on the search engines within a day. By reporting online you literally make a world of difference for recovering your Stolen Laptop, long into the future.
Latest Stolen Laptop Reports
- Stolen Laptop Gateway serial number NXY34AA00134104ADB3400
- Stolen toshiba laptop ID 5620
- Stolen Asus K5 Laptop serial number 00-23-15-41-1E-D0
- Stolen Asus laptop serial number A9N0AS94937840A
- Stolen Laptop Unknown serial number 8k019H5575J
Latest Lost Laptop Reports
- Lost Asus X54C serial number C2N0AS09667605
- Lost Lenovo Yoga 13 serial number EB34477267
- Lost Apple Macbook Pro Retina serial number C02NR3QRG3QD
- Lost Apple Ipad Mini WIFI 16GB serial number F9FNMMMDF196
- Lost Lenovo T440 serial number PF01J0D9
- Lost Lenovo T440 serial number PF01D1GN
- Lost Hewlett Packard HP 2560P serial number CNU323B1VS
- Lost apple macbook serial number w88218rr0p0
- Lost HP G60t serial number 2CE9519VXW
- Lost Apple MacBook Air 13 inch serial number C02GX0PGDJWR
Latest Found Laptop Reports
- Found China Z400 ID 11490
- Found Dell Latitude E6410 ID 10208
- Found Lenovo Lenovo O'Hare airport June 8th 1 pm ID 5215
- Found APPLE A1297 ID 4515
Laptop Protection Conclusion
Stolen Lost Found Online is dedicated to providing the most current and concise Laptop Protection information. If you have any stolen Laptop information, theft prevention or consumer protection tips you would like to share, please let us know. Thanks.