The Swedish company Ericsson has announced that in cooperation with the chip manufacturer Intel HSPA all notebooks should contain the new anti-theft protection, called PC Theft Protection Technology. The aim of the collaboration is a network-service, on which a notification via SMS or GPS to HSPA module can be send in your notebook - and it locks it!
Closure according to various criteria
The Intel solution can be configured in that way, that the blocking after several failed login attempts or if a time shift program registered that the connection to a central server is not specified in the timetable. This function must, however, even before the user is configured, to be filed. When the owner noticed the theft only if it is already too late, he can send an SMS.
After successful registration, the program is active and can, for example, complete closure of the computer trigger. If the notebook is later found, display the data using a password or a secret message once again accessible. The actual blocking of a notebook is made by blocking the boot process. The rescue attempt is also with security solutions from third-party combine. Additional decryption code can be erased on the computer, when this example, to protect the hard drive separately.
Closure according to various criteria
The Intel solution can be configured in that way, that the blocking after several failed login attempts or if a time shift program registered that the connection to a central server is not specified in the timetable. This function must, however, even before the user is configured, to be filed. When the owner noticed the theft only if it is already too late, he can send an SMS.
After successful registration, the program is active and can, for example, complete closure of the computer trigger. If the notebook is later found, display the data using a password or a secret message once again accessible. The actual blocking of a notebook is made by blocking the boot process. The rescue attempt is also with security solutions from third-party combine. Additional decryption code can be erased on the computer, when this example, to protect the hard drive separately.
Tidak ada komentar:
Posting Komentar