Laptop-Computers Headline Animator

Showing posts with label code. Show all posts
Showing posts with label code. Show all posts

Laptop Security: Quick Facts, Tips

Quick Facts

Thinking of taking your laptop on the road? It’s a great way to work and stay in touch when you’re out and about, but you need to take some steps to keep your laptop safe–and in your possession. Here are some things you can do to keep track of your laptop:

  • Treat it like cash.
  • Get it out of the car...don’t ever leave it behind.
  • Keep it locked...use a security cable.
  • Keep it off the floor...or at least between your feet.
  • Keep passwords separate...not near the laptop or case.
  • Don’t leave it “for just a sec”...no matter where you are.
  • Pay attention in airports...especially at security.
  • Use bells and whistles...if you’ve got an alarm, turn it on.

Keeping Laptops From Getting Lost or Stolen

A laptop computer defines convenience and mobility. It enables you to work from home, a hotel room, a conference hall, or a coffee shop.

Maybe you’ve taken steps to secure the data on your laptop: You’ve installed a firewall. You update your antivirus software. You protect your information with a strong password. You encrypt your data, and you’re too smart to fall for those emails that ask for your personal information. But what about the laptop itself? A minor distraction is all it takes for your laptop to vanish. If it does, you may lose more than an expensive piece of hardware. The fact is, if your data protections aren’t up to par, that sensitive and valuable information in your laptop may be a magnet for an identity thief.
Chances are you’ve heard stories about stolen laptops on the news or from friends and colleagues. No one thinks their laptop will be stolen– at least not until they find the trunk of their car broken into, notice that their laptop isn’t waiting at the other side of airport security, or get a refill at the local java joint only to turn around and find their laptop gone.

OnGuardOnline, a website managed by the federal government that is devoted to computer security, protecting personal information, and guarding against Internet fraud, suggests keeping these tips in mind when you take your laptop out and about:

  • Treat your laptop like cash. If you had a wad of money sitting out in a public place, would you turn your back on it – even for just a minute? Would you put it in checked luggage? Leave it on the backseat of your car? Of course not. Keep a careful eye on your laptop just as you would a pile of cash.
  • Keep it locked. Whether you’re using your laptop in the office, a hotel, or some other public place, a security device can make it more difficult for someone to steal it. Use a laptop security cable: attach it to something immovable or to a heavy piece of furniture that’s difficult to move – say, a table or a desk.
  • Keep it off the floor. No matter where you are in public – at a conference, a coffee shop, or a registration desk – avoid putting your laptop on the floor. If you must put it down, place it between your feet or at least up against your leg, so that you’re aware of it.
  • Keep your passwords elsewhere. Remembering strong passwords or access numbers can be difficult. However, leaving either in a laptop carrying case or on your laptop is like leaving the keys in your car. There’s no reason to make it easy for a thief to get to your personal or corporate information.
  • Mind the bag. When you take your laptop on the road, carrying it in a computer case may advertise what’s inside. Consider using a suitcase, a padded briefcase or a backpack instead.
  • Get it out of the car. Don’t leave your laptop in the car – not on the seat, not in the trunk. Parked cars are a favorite target of laptop thieves; don’t help them by leaving your laptop unattended. That said, if you must leave your laptop behind, keep it out of sight.
  • Don’t leave it “for just a minute.” Your conference colleagues seem trustworthy, so you’re comfortable leaving your laptop while you network during a break. The people at the coffee shop seem nice, so you ask them to keep an eye while you use the restroom. Don’t leave your laptop unguarded – even for a minute. Take it with you if you can, or at least use a cable to secure it to something heavy.
  • Pay attention in airports. Keep your eye on your laptop as you go through security. Hold onto it until the person in front of you has gone through the metal detector – and keep an eye out when it emerges on the other side of the screener. The confusion and shuffle of security checkpoints can be fertile ground for theft.
  • Be vigilant in hotels. If you stay in hotels, a security cable may not be enough. Try not to leave your laptop out in your room. Rather, use the safe in your room if there is one. If you’re using a security cable to lock down your laptop, consider hanging the “do not disturb” sign on your door.
  • Use bells and whistles. Depending on your security needs, an alarm can be a useful tool. Some laptop alarms sound when there’s unexpected motion, or when the computer moves outside a specified range around you. Or consider a kind of “lo-jack” for your laptop: a program that reports the location of your stolen laptop once it’s connected to the Internet.
  • Where to turn for help. If your laptop is stolen, report it immediately to the local authorities. If it’s your business laptop that’s missing, also immediately notify your employer. You may also wish to review the FTC’s information for businesses about data breaches. If it’s your personal laptop and you fear that your information may be misused by an identity thief, visit the FTC’s Identity Theft page for more instructions.

Source: Internet

Ramayana by Bill Gates!!

When Bill Gates was in India, he had a chance 2 listen Ramayana from Atal Behari Vajpayee. After, returning 2 US he wrote it in his personal Diary.A Tabloid in US got a copy of his writings. These are excerpts from his diary.
Ramayana by Bill Gates...

LAN, LAN ago, in the SYSTEM of I/O-dhya, there ruled a PROCESSOR named DOS-rat. Once he EXECUTED a great sacrifice PROGRAM after which his queens gave an OUTPUT of four SUNs--RAM, LSIman, BUG-rat and SED-rughana. RAM the eldest was a MICROCHIP with excellent MEMORY. His brothers, however, were only PERIPHERAL ICs. Once when RAM was only 16MB, he married princess 'C'ta. 12years passed and DOS-rat decided to INSTALL RAM as his successor.However, Queen CIE/CAE(KaiKayee), who was once offered a boon by DOS-rat for a lifesaving HELP COMMAND, took this opportunity at theinstigation of her BIOSed maid (a real plotter), and insisted that her son Bug-rat be INSTALLED and that RAM be CUT-N-PASTED to the forest for 14years. At this cruel and unexpected demand, a SURGE passed through DOS-rat and he collapsed, power-less. RAM agreed to LOG INTO forest and 'C'ta insisted to LOGIN with him. LSI-man also resolved on LOGGING IN with his brother.The forest was the dwelling of SPARCnakha, the TRAN-SISTOR of RAW-van, PROCESSOR of LAN-ka.Attracted by RAM's stature, she proposed that he marry her. RAM,politely declined. Perceiving 'C'ta to be the SOURCE CODE of her distress, she hastened to kill her. Weeping, SPARC-nakha fled to LAN-ka, where RAW-van, moved by TRAN-SISTOR's plight, approached his uncle MAR-icha. MAR-icha REPROGRAMED himself into the form of a golden stag and drew RAM deep into the forest. Finally, tired of chase, RAM shot the deer, which, with his last breath, cried out desperately for LSI-man in RAM's voice. Fooled by this VIRTUAL RAM SOUND, 'C'ta urged LSI-man to his brother's aid. Catching the opportunity, RAW-van DELINKED 'C'ta from her LIBRARY and changed her ROOT DIRECTORY to LAN-ka.

----------------INTERVAL--------------------

RAM and LSI-man started SEARCHING for the missing 'C'ta all over the forest. They made friendship with the forest SYSTEM ADMINISTRATOR SU-greev and his powerful co-processor Ha-NEUMAN. SU-greev agreed to help RAM.SU-greev ordered his PROGRAMMERS to use powerful 'SEARCH' techniques to FIND the missing 'C'ta. His ROGRAMMERS SEARCHED all around the INTER-NETworked forests. Many tried to 'EXCITE' the birds and animals not to forget the 'WEBCRAWLERS' (Insects) and tried to 'INFO SEEK' something about 'C'ta. Some of them even shouted 'YA-HOO' but they all ended up with 'NOT FOUND MESSAGES'. Several other SEARCH techniques proved useless.Ha-NEUMAN devised a RISKy TECHNOLOGY and used it to cross the seas at anastonishing CLOCK SPEED. Soon Ha-NEUMAN DOWNLOADED himself intoLAN-ka.After doing some local SEARCH, Ha-NEUMAN found 'C'ta weeping under a TREE STRUCTURE. Ha-NEUMAN used a LOGIN ID (ring) to identify himself to 'C'ta.After DECRYPTING THE KEY, 'C'ta believed in him and asked him to send a 'STATUS_OK' MESSAGE to RAM. Meanwhile all the raakshasa BUGS around 'C'ta carptured Ha-NEUMAN and tried to DELETE him using pyro-techniques. But Ha-NEUMAN managed to spread chaos by spreading the VIRUS 'Fire'.Ha-NEUMAN happily pressed ESCAPE from LAN-ka and conveyed all the STATUS MESSAGES toRAM and SU-greev. RAW-wan decided to take the all powerful RAM head-on and prepared for the battle.One of the RAW-wan'sSUN(son) almost DELETED RAM & LSI-man with a powerful brahma-astra. But Ha-NEUMAN resorted to some ACTIVE-X gradients and REFORMATTED RAM and LSI-man. RAM used the SOURCE CODE secrets of RAW-wan and once for all wiped out RAW-wan's presense on earth. After the battle, RAM got INSTALLED in I/O-dhya and spreaded his MICROSOFT WORKS and other USER FRIENDLY PROGRAMS to all USERS and every one lived happily ever after.

Source: Fellow Blogger