Remote Laptop Security

Remote Laptop Security

Remote Laptop Security (RLS) is a security measure that allows a user to control access to files on a computer even if it has been lost or stolen. The user in charge chooses which files he or she wants to safeguard using RLS software. Desired files are converted and encrypted in order to prevent unwanted access. In the case of a loss or theft of a laptop, access to secured files on the stolen machine is denied. Until recently RLS solutions required stolen laptops to be connected to the Internet, however a new breed of RLS tools such as BackStopp use mobile phone technology and are not reliant on Internet or WiFi connections.

RLS software periodically authenticates the identity of the user. When access to files on a certain computer is deactivated, that computer will no longer pass the authentication process. Depending on the software, some programs authenticate the user’s identity whether he or she is connected to the Internet or not.

Remote Laptop Security is useful for individuals, as well as businesses dealing with medical records, insurance accounts, legal cases, customer data and other confidential client files.

Alternatives to Remote Laptop Security

* Full Disk Encryption
* Pre-boot authentication
* Single Sign-On

External links

* [http://www.essentialsecurity.com/Documents/article18.htm 3 Ways To Protect Your Laptop] - tips for laptop security and information about RLS
* [http://www.privacyrights.org Privacy Rights Clearinghouse] - nonprofit consumer information and advocacy organization
* [http://www.http://www.consumer.gov/idtheft Federal Trade Commission] - ID theft information and resources
* [http://labmice.techtarget.com/articles/laptopsecurity.htm LabMice.net Laptop Security Guidelines for IT Professionals] - additional tips to safeguard your laptop
* [http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf 2005 CSI/FBI Computer Crime and Security Survey] - statistics and information about computer crime


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Laptop theft — is a significant threat to users of laptop computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose… …   Wikipedia

  • Laptop — A desktop replacement laptop with its 18.4 inch screen showing its technical specifications. A laptop, also called a notebook,[1][2] is a personal computer for …   Wikipedia

  • Remote administration — refers to any method of controlling a computer from a remote location.Software that allows remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system in order to use… …   Wikipedia

  • Remote Forensic Software — Plastische Darstellung des „Bundestrojaners“ , vom Chaos Computer Club Als Online Durchsuchung wird der verdeckte staatliche Zugriff auf fremde informationstechnische Systeme über Kommunikationsnetze bezeichnet. Der Begriff umfasst dabei sowohl… …   Deutsch Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • One Laptop per Child — OLPC redirects here. For other uses, see OLPC (disambiguation). One Laptop per Child Formation January 2005 Type Non profit Headquarters Cambridge, Massachuset …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Wireless LAN security — One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this… …   Wikipedia

  • Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… …   Wikipedia

  • RLS — may stand for:*Robert Louis Stevenson (1850 1894), Scottish author *Remote Laptop Security, an encryption solution to protect data on stolen laptops *Restless legs syndrome, a medical disorder *Reversing language shift, a model for revitalizing… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”