Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Netbook Poison Pill

Posted on 2010-08-25
7
Medium Priority
?
606 Views
Last Modified: 2013-12-04
Just got my first mini laptop. I store my client list on it. I am looking for something akin to what my ipod has which after a certain number of password attempts it will reformat the hard drive. The netbook is not my main concern, it is the security of the list. Everything is sync'd with work pc so the losing the data on the netbook is not a concern. I also understand that anyone can remove the drive and look up data. But I would think a thief would turn it on first and try to access Windows.

Any help would be appreciated.
0
Comment
Question by:ss6766
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 27

Assisted Solution

by:Tolomir
Tolomir earned 400 total points
ID: 33522125
hmm how about this, use a secure hardware token to store your files:

https://www.ironkey.com/personal

  IronKey protects against brute force password guessing attacks by using non-volatile access-failure counters stored on the
Cryptochip.  If a thief tries to break into an IronKey and enters 10 incorrect passwords, the Cryptochip will securely erase
all of the encrypted data with patent-pending Flash
Trash technology. This ensures no trace of your data can be recovered from the device.


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 33522156
you get a 1 GB USB stick for $79.

See this demo for details and to compare the technology in contrast to standard USB sticks:

https://www.ironkey.com/demo-personal
0
 
LVL 2

Assisted Solution

by:texasjpm
texasjpm earned 400 total points
ID: 33523450
We use alertsec. It does full disk encription and has a limited number of failed logon attempts with automatic locking.

http://www.alertsec.com/
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 4

Accepted Solution

by:
curua2008 earned 1200 total points
ID: 33524692
i suggest using Absolute Poison Pill

http://www.absolute.com/en/partners/alliances/intel.aspx

Or other simple way you can use TrueCrypt to encrypt your data on the netbook. The thief without knowing your password will not be able to read the data.

www.truecrypt.org

0
 
LVL 27

Expert Comment

by:Tolomir
ID: 33525566
truecrypt doesn't come with a "self destruct" feature.
0
 
LVL 4

Expert Comment

by:curua2008
ID: 33525582
i agree that TrueCrypt doesn't have the self-destruct feature but if the thief can not read the encrypted data i think it's also good enough.
0
 

Author Closing Comment

by:ss6766
ID: 33526024
Thanks for the help. I opted for the Truecrypt. I agree that if they don't know the password the info is useless and the price is...well...free. Thanks to all.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question