Skip to main content

Prevent Notebook Theft, Track Stolen Laptop Computers

Prevent Laptop Theft Without Security Locks


A laptop is stolen every 53 seconds and 97% of stolen laptop computers are never recovered. Here are solutions prevent Notebook Theft and also remain secure against Computer Identity Theft.


Computrace LoJack for Laptops is a recovery service that enables law enforcement to track and recover stolen laptops. When your laptop is protected with this service, software installed on your laptop works behind the scenes to silently and securely contact Computrace Monitoring Center, and if stolen, report its location using any Internet connection.


Absolute Software has licensed LoJack, the car-theft prevention technology for tracking stolen laptop. It embeds a special agent in a computer’s BIOS and when that computer connects to any IP networks, the embedded Computrace agent sends a silent signal to Absolute Monitoring Center providing its IP address or phone number to identify its physical location. Absolute works with local law enforcement to recover the computer.


How Police Catch Laptop Thieves


Storage tricks: When traveling, you can keep your notebook's data safe by removing the hard drive and stashing it in another location. If the data it contains is critical, keep it on a flash thumb drive and then load it on your notebook when you need it. A second option is biometrically protected storage, which uses your fingerprint as a password equivalent. ThinkCP's 1GB biometric flash drive costs $289.

Popular posts from this blog

How to Download Contacts from Facebook To Outlook Address Book

Facebook users are not too pleased with the "walled garden" approach of Facebook. The reason is simple - while you can easily import your Outlook address book and GMail contacts into Facebook, the reverse path is closed. There's no "official" way to export your Facebook friends email addresses or contact phone numbers out as a CSV file so that you can sync the contacts data with Outlook, GMail or your BlackBerry. Some third-party Facebook hacks like "Facebook Sync" (for Mac) and "Facebook Downloader" (for Windows) did allow you to download your Facebook friends' names, emails, mobile phone number and profile photo to the desktop but they were quickly removed for violation of Facebook Terms of Use. How to Download Contacts from Facebook There are still some options to take Friends data outside the walls of Facebook wall. Facebook offers the Takeout option allowing you to download all Facebook data locally to the disk (include

PhishTank Detects Phishing Websites by Digg Style Voting

OpenDNS, a free service that helps anyone surf the Internet faster with a simple DNS tweak , will announce PhishTank today. PhishTank is a free public database of phishing URLs where anyone can submit their phishes via email or through the website. The submissions are verified by the other community members who then vote for the suspected site. This is such a neat idea as sites can be categorized just based on user feedback without even having to manually verify each and every submission. PhishTank employs the "feedback loop" mechanism where users will be kept updated with the status' of the phish they submit either via email alerts or a personal RSS feed . Naturally, once the PhishTank databases grows, other sites can harness the data using open APIs which will remain free. OpenDNS would also use this data to improve their existing phishing detection algorithms which are already very impressive and efficient. PhishTank | PhishTank Blog [Thanks Allison] Related: Google

Digital Inspiration

Digital Inspiration is a popular tech blog by  Amit Agarwal . Our popular Google Scripts include  Gmail Mail Merge  (send personalized emails with Gmail ),  Document Studio (generate PDFs from Google Forms ) and   File Upload Forms ( receive files  in Google Drive). Also see  Reverse Image Mobile Search , Online Speech Recognition and Website Screenshots , the most useful websites on the Internet.