40923250 cp2020

  • Home
    • Site Map
    • reveal
    • blog
  • First
  • Hw1
    • PCH18
      • Laptop and Notebook Component Replacement
      • Troubleshooting Hard Drives
    • PCH19
      • Overview
      • AC Power
      • Proper Disposal Procedures
      • Security
  • HW2
    • 2-1 取得一甲分組數列
    • 2-2 是否有人加退選
    • 2-3 產生W3網頁html
  • Hw3
    • 14.移除重複項
    • 15.倒序
    • 16.密碼生成器
  • 學習日記
    • git clone
    • 刪除submodule
    • ORError
    • ssh keygen
  • python
    • Variables 變數
Proper Disposal Procedures << Previous Next >> HW2

Security

Security cables are used to ensure that laptops are not physically removed from a particular area. Security cables are constructed much like a bicycle security lock, with a thick, carbon strengthened steel or metal cable that has a loop on one end and a lock on the other. The lock end has a T-shaped head that is inserted into the Kensington security slot on the computer (named after the first company to produce these locks). The locks are set using either a key or a combination-style lock. The other end, with the loop, can then be secured to a stationary device, like a pole or the desk itself. Often, these are installed by looping the lock end through the loop end, as it goes around a portion of the desk, securing the security lock to a location on the desk. Some security cables also have an audible alarm feature that alerts when someone tries to force the lock. Remember that these physical security measures only work when used properly. Tether a laptop to a strong, unbreakable, non-movable object.

安全電纜用於確保未從特定區域物理移除便攜式計算機。安全纜線的結構很像自行車安全鎖,由一根粗的,碳增強的鋼或金屬纜線組成,該纜線的一端有一個環,另一端有一個鎖。鎖端有一個T形頭,該頭插入計算機上的Kensington安全插槽(以生產這些鎖的第一家公司的名字命名)。可以使用鑰匙或組合鎖來設置鎖。然後可以將帶有環的另一端固定到固定裝置,例如桿子或桌子本身。通常,通過將鎖端繞在桌子的一部分周圍,將鎖端穿過環形端進行安裝,從而將安全鎖固定到桌子上的某個位置,從而進行安裝。一些安全電纜還具有聲音警報功能,當有人試圖強行鎖定時會發出警報。請記住,這些物理安全措施只有在正確使用後才能起作用。將筆記本電腦系在堅固,堅固,不可移動的物體上。

Kensington lock connected. Image used under CC-BY-SA from Wikimedia Commons.

Security cable. Photo used under CC-BY-SA license from Satoly.

Laptop lock. Photo used under CC-BY-SA license from Seth Werkheiser.


Proper Disposal Procedures << Previous Next >> HW2

Copyright © All rights reserved | This template is made with by Colorlib