Language Selection

English French German Italian Portuguese Spanish

Keeping Your Computer and Its Contents Safe

Filed under
Security

IT'S hard not to experience anxiety when you're traveling with a laptop. A computer can certainly make life easier for travelers keeping an online travel journal, serial e-mailers and those who want to keep up with their jobs. But there are, as every laptop-toting traveler knows, numerous risks: accidental drops during security screenings, theft from a hotel room, loss in a taxi or restaurant or hardware failure from too many jolts.

"Laptops are great because you can take your entire office with you wherever you go, but you need to recognize that your entire office might be lost, stolen or damaged beyond use," said Ann Westerheim, president of Ekaru, a technology services company.

Perhaps the most important safety measure, Ms. Westerheim said, is protecting the information on your computer, so that if it is damaged, lost or stolen, the data remain safe. Travelers now have many backup devices to choose from.

Beside storing your files and data on a removable CD or DVD disk, there is a variety of other portable storage devices. Particularly convenient are flash drives: small key-chain-size plastic devices that weigh only an ounce or so and plug into a computer's U.S.B. port (the port typically used for connecting printers and other peripherals). You can copy your e-mail files, documents, pictures or data files to the U.S.B. flash drive and can then keep the files with you or keep them in the hotel safe.

Lexar makes a U.S.B. memory device, JumpDrive Secure, with one gigabyte of storage, large enough for lots of documents, photos and e-mail ($75.99 at Amazon.com), that includes software that allows only users with a password to download data.

For additional security, there are flash drives with biometric capabilities, like a fingerprint reader that allows access only with a matching fingerprint. For example, ACP makes a U.S.B. memory drive (Security Key Fingerprint Mini Flash Drive, $200.99 at www.compusa.com) with one gigabyte of storage. Other U.S.B. flash drives, like the Relay 512MB ($49.98 from Staples) simply provide portable storage without any additional security capabilities.

Alternatively, you might even want to consider storing or backing up your data files on the memory cards that slip into comparably equipped digital cameras or cellular phones. For example, my Nokia 6230 phone from Cingular accepts standard MultiMedia Cards (SanDisk 256MB MMC Card, $39.99 at www.sandisk.com) that I can remove from the phone and slide into a computer to copy and store files, while my digital camera accepts Memory Stick styles of memory cards. This solution is good for travelers who simply want backup.

Of course, you want to protect the laptop itself, too. A variety of traditional security-oriented devices like cables (just like bicycle locks) for attaching your laptop to something immovable (for example, the Kensington MicroSaver, $44.99 at www.kensington.com), or small motion-detecting alarms that are placed in the bag with the laptop (Targus PA400U Defcon 1, $49.99 at www.targus.com), help guard against theft.

But there is a range of other, more basic approaches for reducing the risk and stress of taking your computer with you.

There is your hotel, for instance. Before booking a room, security-conscious laptop owners should ask what size of room safe the hotel offers or if the front desk is willing to store a laptop in the office safe.

"We all know hotel safes aren't perfect, but they do protect from most thieves," said Brian Beeler, president of NoteBookReview.com, a Web site that reviews notebook PC's. "While the average safe isn't very large, most are large enough to secure 12-inch notebooks and under. Larger machines, especially with wide screens, simply won't fit, reducing your physical security options."

A few hotels have started offering larger safes. For example, the Beverly Hilton in Beverly Hills, Calif., recently installed a specially designed laptop safe in every room that not only fits newer, widescreen laptops but also includes power outlets so guests can charge their computers (and other devices) while keeping them secure. Gaylord Palms Resort in Kissimmee, Fla., also offers extra-large in-room safes with electric outlets.

"You can also insure your notebook by adding it on to your homeowner's or renter's policy," Mr. Beeler said. "It's often more affordable than the accidental damage policies that computer stores sell."

In some cases, your existing homeowner's insurance policy will cover theft of laptops, with your standard deductible, if it's not being used for business purposes. Safeware (www.safeware.com) offers insurance for notebook computers and includes coverage for accidental damage, theft, vandalism and other problems. The premium for a three-month-old computer that cost $1,500 with no deductible was $90, based on a recent Web-generated quote.

If you don't want to travel with a computer but need access to data, files or e-mail while on the road and have the use of a hotel business center or other Internet source, you can arrange to have your computer at home run a remote access program that's included in Windows XP or through a service like GoToMyPC (www.gotomypc.com), which enables users to gain access remotely to their PC's from any Internet-connected computer. To use a service like GoToMyPC, you register the computer you want to make available on the site, download the remote access host software and install it. To access that computer remotely, you then use a Web-enabled PC to log in to your home PC. You are now able to work as if you were at home. Personal plans for GoToMyPC start at $19.95 a month or $179.40 a year.

And lowest tech of all, travelers can take a simple and inexpensive precaution recommended by Robert L. Siciliano, a personal security and identify theft expert and president of SafeTravelSecurity.com. "I have all my contact information and a picture of me taped to the back of my computer," Mr. Siciliano said. "That way if I leave it somewhere, people can easily identify me and call or page me to retrieve it."

By DAVID A. KELLY
The New York Times

Wow

Has the New York Times slipped into mediocrity or what? Can't wait for that article writer's next report on using a raincoat to stay dry in the rain and how you can prevent being stuck with a flat tire by carrying a spare. His laptop article was complete dribble - can you say "Gosh Mr. Obvious, tell us more"?

re: Wow

lololol... you crack me up!

Hey, and that was the best article on there today. Big Grin

Oh man, news gets so slow on the weekend...

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.