?
Solved

wich one is the best ?

Posted on 2004-04-18
2
Medium Priority
?
238 Views
Last Modified: 2010-04-11
0
Comment
Question by:be_affraid
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10854770
From a security perspective, the best laptop is one that is locked in a cabinet, in a secure room.
0
 

Accepted Solution

by:
malir earned 80 total points
ID: 10856166
Accoring to Security perspective: buy a laptop according to your needs, check your labtop's consfiguration before buying and make sure you have right operating systrem, such as windows 2000 professional or any NT/2k versions, coz these are the Os that have such blocking cabalities whiich you will require from security perspective( error loging, latest capaiiest of downloading softwares and enabling/disabling appz, etc... ). Don't use windows 98/me/ OS.

as soon as you buy labtop/New OS, Download two things

1) Virus Scanner  - Mcfee or symentic or any good ones
2) Firewall --    
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question