
Use the related Threats and Countermeasures Guide in the Windows XP Security Guide to evaluate any threats to security, and use the Security Guide to learn about the tools and mechanisms for implementing the protection mechanisms. The irony is that people tend to turn EFS on for files they care the most about, and then lose them.

In that case their files become completely inaccessible. Occasionally someone will turn EFS on without backing up and then they find they need to reinstall the OS. EFS or other similar technologies are designed to thwart the data thief when the disk is in hand, but make sure to understand all the implications of EFS. NTFS security was designed to protect files from within the OS and via the network, not to protect files when someone has the hard drive and is intent on retrieving the data. It takes all of a minute or so to gain access to NTFS files if the actual drive or laptop has been stolen. BIOS passwords do have a role, but they are not going to stop the knowledgeable hacker.įile encryption also has its advantages and disadvantages. On many systems, resetting the BIOS can break or trigger tamper-resistant measures, which may be useful as an incident indicator. The BIOS password can, however, buy you time to change passwords, cancel credit cards, disable accounts, assess damage, and so forth, and might prevent a hacker from gaining access to personal information. You should definitely weigh the pros and cons of using these passwords. Lists of these passwords are in wide circulation and are easy to bypass by documented procedures (remove the battery and short the contacts, and so on). If you use BIOS passwords, remember that systems often include override passwords on a vendor-by-vendor basis.

DATATHIEF SQL SOFTWARE
For example, third-party software tracing packages such as the one at trace the location of stolen laptops. Information on the physical protection of laptops is also available. Physical protection-for example, watch your computer while going through security checkpoints, and minimize time spent in public areas.File system encryption with the Encrypting File System (EFS) in Windows XP or third-party software.You should also consider physical security and think about using some of the following: I'm running Windows® XP.Ī Check out the Microsoft Windows XP Security Guide Overview and the Threats and Countermeasures Guide.
DATATHIEF SQL HOW TO
Q I need to know how to make my laptop as secure as possible because I travel to clients frequently. Hard Drive Security, Comparing Two Versions of a DB, and More SQL
