Tip

Use BIOS protection features

If you are concerned about protecting the data on your hard drive, you probably have a password set on your Operating System, such as the Windows login password, and you may be using NTFS which allows you to set permissions on your files and folders. You may even be using some third-party encryption software that enables you to encrypt the entire contents of your hard drive, or perhaps you're using the encryption features that come standard with recent versions of Microsoft Windows. If you've gone to the trouble of deploying these security features, you should also consider features provided by the BIOS provided by most manufacturers.

BIOS, the Basic Input/Output System is the "firmware" that's built into your computer's motherboard that

Requires Free Membership to View

boots up the PC and loads the operating system. The first screen you see when you turn the computer on is typically a splash screen for the BIOS. It often has a message instructing you to press a particular key to enter the setup for the computer, which is really just configuring BIOS options. This is where you configure power-saving settings, and a bunch of other details most users could care less about.

However, there will likely be a few security settings as well. Most common is a simple password that prevents anyone from booting the PC w/o entering the password. That's great, but it's pretty simple for a thief to get your data by popping the case open and moving your hard drive to another PC. This bypasses the "power on" password because it's stored in the BIOS, not in your hard drive.

To solve this problem, most BIOS makers also have a "hard drive password" actually stored on the hard drive. If a thief puts this hard drive in another PC, he will still get a password prompt before he can access the data.

One last thing to check is a case-alarm feature. This is typically a wire that connects to your desktop's case. If someone opens your computer's case it breaks the circuit, and you'll get a message the next time you log in, which lets you know someone was tampering with your computer.


Thomas Alexander Lancaster IV is a consultant and author with over ten years experience in the networking industry, focused on Internet infrastructure.


 

This was first published in October 2002

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.