
Closure according to various criteria
The Intel solution can be configured in that way, that the blocking after several failed login attempts or if a time shift program registered that the connection to a central server is not specified in the timetable. This function must, however, even before the user is configured, to be filed. When the owner noticed the theft only if it is already too late, he can send an SMS.
After successful registration, the program is active and can, for example, complete closure of the computer trigger. If the notebook is later found, display the data using a password or a secret message once again accessible. The actual blocking of a notebook is made by blocking the boot process. The rescue attempt is also with security solutions from third-party combine. Additional decryption code can be erased on the computer, when this example, to protect the hard drive separately.
Tidak ada komentar:
Posting Komentar