Powered by Blogger.

RSS FEED

Blog Archive

Wednesday, 4 January 2012

Tutorial: How to protect your laptop from data theft

Tutorial: How to protect your laptop from data theft

How to protect your laptop from data theft

Ten years ago, a laptop was an expensive and specialist purchase, but today it's become an everyday item widely used as people's primary work device.

That casualness breeds complacency and that leads to leaving a laptop on the train, unattended in a café or library and having it stolen (we do still have libraries don't we?).

That's besides it being an easy target when someone manages to break into your home. So what are the options for protecting your vulnerable laptop or netbook?

We've looked at solid ways of bolstering the log-in password and ways to protect the sensitive services accessed through your web browser. But once a device is in the hands of a stranger, the defensive position has to change.

One tactic that we'll get to is encryption from single files to full-drive encryption: it's a way you can lock-down sensitive information in a way that even the FBI can't crack.

The alternative approach is to go on the offensive. There are now a number of well known stories about people managing to get laptops recovered by the police using third-party remote access software.

One of the more recent was Greg Martin, a UK-based security expert who used to work for both NASA and the FBI. He had his Mac Book Pro stolen during the London riots. He was running a rather excellent open source protection system called Prey, which can be downloaded from preyproject.com.

Using this, he logged his laptop as missing within the Prey system; as soon as it came back online he was emailed a notification. From that point onwards, Greg's criminal friend was doomed. Able to watch him surf the web, taking webcam shots of him as he did, eventually he logged onto Facebook and that was his fate sealed.

With a full breakdown of his name, age, secondary school, IP address, ISP, address and photos both from Facebook and the laptop's webcam, Greg simply supplied the details to the police and let them reclaim his property.

The biggest potential stumbling block with this type of software is whether the perpetrator can figure out how to log onto the system intact or not. It's a good argument for leaving a Guest account active, so you can be assured the tracking software will always be accessed. Prey is a fabulous system that also has software that can cover your desktop and mobile phones.

The other common solution is Logmein.com for PC and Macs, which provides a basic free service. This is focused more on enabling remote log-ins to your system, rather than reclaiming stolen or lost devices. However there is a stealth mode available in Logmein.com, so if someone is using the system you're able to log in covertly, take a few screen grabs and webcam shots, and watch them browse the internet.

For your eyes only

Prey

We've already touched on the issue that a solid password isn't much help, if an attacker can get their hands physically on the hard drive. Again, on a desktop system this may seem less of an issue, but with a laptop or netbook the likelihood of having a device stolen is far higher.

Encryption is the answer and of course more passwords, probably. Both the Business and Ultimate editions of Windows 7 and Vista both come with file, folder and full-drive encryption options built in.

Right-click on folder or file, select Properties > Advanced and click Encrypt contents to do just that. There are no passwords involved and it's locked to the system and user log-in details. This system generates a cypher key that needs to be backed up. Windows will prompt you to do so, as without it, if Windows needs to be reinstalled you won't be able to access any encrypted data.

The Ultimate and Business editions of Windows 7 and Vista both come with a full-drive encryption solution called BitLocker. This works slightly differently for the Windows boot partition and all other partitions. The big difference is that for all other partitions you're able to just use a password. For the primary boot partition, your hardware has to use a compatible Trusted Platform Module (TPM), more common on business-targeted desktops and laptops than home consumer systems.

The quickest way to check is to fire it up by opening the Start Menu, typing BitLocker and pressing return. If you click the Turn On BitLocker link for the Windows drive, marked with a Windows flag, you'll be given the good or bad news. Often the TPM will need to be switched on within the BIOS and then initialised using the TPM link from the BitLocker Control Panel that generates the secret key.

Once initiated it'll begin encrypting the entire drive, which can take quite a while, so set aside a few hours of downtime if you plan this.

BitLocker To Go extends the protection to removable devices. If you're not running a version of Windows that supports encryption worry not.

The TrueCrypt open source system is a long standing, well regarded and highly secure partition, full drive and virtual drive encryption solution. It'll happily encrypt a Windows boot partition, even on the fly as you continue to use it, along with handling the pre-boot environment.

Other cool extras include its ability to create a file that's then mounted as an encrypted virtual partition, while 'hidden modes' enable you to enter an emergency encryption code that keeps the true partition hidden but reveals a working fake one.

If these all seem a little full-on then we'd also suggest AXCrypt. This sweet little freeware program is right up to date, supporting 32-bit and 64-bit versions of Windows 7 and back to Windows 9x. Once installed it enables you to encrypt single files and folders with just a right click and the entry of a password. Job done, and that will be all of your stuff protected end-to-end - from on the internet to your home devices.

How to track a stolen laptop with Prey

1. Laptop protection

step 1

Prey works on a centralised service basis. It's installed on multiple devices and managed via its web control panel. There's an alternative mode but we'll choose this option. Download the laptop client from preyproject.com, install it, choose Prey + Control Panel and create a new user name with password.

2. Control Panel

step 2

Log into the preyproject.com website and you'll have access to the Control Panel. The opening page shows you all the devices you have registered. The free service has a limit of three, with 10 reports, but that's enough to provide security. Click the icon to confi gure this further.

3. You are the Quarry

step 3

The main page is where you can set all the juicy bits. Geo and Networking enables you to pin down a rough locality for the device; the Session section will take screenshots of activity and monitor files; while the webcam will grab images of the perp.

4. It's gone

step 4

If a device is lost, setting the Missing switch to On will send an email to you the instant the Prey system detects the device is online and is in a state it has been able to run the client-side Prey app. The default setting sends updates every 20 minutes.

5. We've got one!

step 5

So how did it do? We initially had problems getting the webcam to work but it finally activated, was taking screengrabs and logging IP traces. It'd be better if it took targeted grabs and browser log-ins but it's certainly a very good step in the right direction.

6. Mobile protection

step 6

Prey works on more than just PCs, Macs or Linux: it also supports Android devices, including phones and tablets. A version for iOS devices, such as the iPhone, is apparently in the works. Phone devices are activated and controlled via SMS and it can play a loud sound if you've misplaced them.



0 comments:

Post a Comment

TOP PRODUCTS

Total Pageviews

PRODUCTS

Design by araba-cı | MoneyGenerator Blogger Template by GosuBlogger