Absolute Beginners Guide to Tablet PCs
Because your Tablet PC is so portable, it might just choose to get up and leave with a little help from someone else. There are numerous ways to protect your Tablet PC from thieves and intruders. Listed below are a few options. Theft-Prevention Devices
There are several ways to protect your Tablet PC from theft. One of the most common is to use a cable lock that ties into your Tablet PC's security slot. It then connects to a heavy object, like a piece of furniture, to protect from theft. There are also alarms and security lockers available. One alarm I'd recommend is the Targus DEFCON 1.
Data Access Protection
Protecting from physical theft is one thing, but what about protecting your Tablet PC from someone who just wants your data? There are several ways to protect yourself from data theft, including security cards, password generators, and biometric (fingerprint and retinal scan) devices. Fortunately, the Windows XP operating system is built for data protection, unlike the Windows 9x and Me operating systems. This means that with the appropriate security access, your Tablet PC can be hardened against prying eyes. Caution
Access Control Devices
There are numerous hardware solutions for login and data-access security, including USB keys (about the size of USB flash drives), Smart Cards, and others. Each solution requires a hardware/software combination to protect your machine. Usually, a client application is loaded onto your machine; this application looks for the hardware piece when login occurs. What to Look For
Look for devices that work the way you want to, without providing too much of a barrier to the way you use your machine. Some Tablet PCs (such as the Acer) include a Smart Card reader, so it makes sense to use what your platform supports. If your Tablet PC does not have built-in support for security cards, you can always get a USB or PC card compatible device. Tip
Biometric Devices
There are numerous biometric devices available for mobile computers, mostly based on fingerprint scanning. The intricacies involved in getting the software and hardware to work together preclude this from inclusion here, but if you want fingerprint-based security, you may want to look to manufacturers such as Precise Biometrics (www.precisebiometrics.com), or research this online. I just wanted point out that it is available if you have a need for this type of security measure. |