mirror of
https://github.com/privacyguides/i18n.git
synced 2026-05-07 03:01:17 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Choosing Your Hardware
|
title: "Choosing Your Hardware"
|
||||||
icon: material/chip
|
icon: 'material/chip'
|
||||||
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Choosing Your Hardware
|
title: "Choosing Your Hardware"
|
||||||
icon: material/chip
|
icon: 'material/chip'
|
||||||
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Choosing Your Hardware
|
title: "Choosing Your Hardware"
|
||||||
icon: material/chip
|
icon: 'material/chip'
|
||||||
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ La mejor manera de prevenir un ataque dirigido contra ti antes de que un disposi
|
|||||||
|
|
||||||
Asegúrate de que tu dispositivo es compatible con el arranque seguro/verificado y de que lo tienes activado. Intenta evitar dejar tu dispositivo desatendido siempre que sea posible.
|
Asegúrate de que tu dispositivo es compatible con el arranque seguro/verificado y de que lo tienes activado. Intenta evitar dejar tu dispositivo desatendido siempre que sea posible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Asegura tu Red
|
## Asegura tu Red
|
||||||
|
|
||||||
### Compartimentación
|
### Compartimentación
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ Le meilleur moyen d'éviter une attaque ciblée contre vous avant que l'appareil
|
|||||||
|
|
||||||
Assurez-vous que votre appareil prend en charge le démarrage sécurisé/le démarrage vérifié et qu'il est activé. Dans la mesure du possible, évitez de laisser votre appareil sans surveillance.
|
Assurez-vous que votre appareil prend en charge le démarrage sécurisé/le démarrage vérifié et qu'il est activé. Dans la mesure du possible, évitez de laisser votre appareil sans surveillance.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Sécurisez votre réseau
|
## Sécurisez votre réseau
|
||||||
|
|
||||||
### Compartimentation
|
### Compartimentation
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ OSの権限管理をそもそも信用しない場合、物理的にカメラに
|
|||||||
|
|
||||||
デバイスがセキュアブート・ベリファイドブートに対応しているか確認し、有効にしてください。 可能な限り、デバイスを放置しないようにしてください。
|
デバイスがセキュアブート・ベリファイドブートに対応しているか確認し、有効にしてください。 可能な限り、デバイスを放置しないようにしてください。
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## ネットワークの保護
|
## ネットワークの保護
|
||||||
|
|
||||||
### 区画化
|
### 区画化
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Защитите свою сеть
|
## Защитите свою сеть
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Säkra ditt nätverk
|
## Säkra ditt nätverk
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ You can also get cables, like [BusKill](https://buskill.in), that will lock or w
|
|||||||
|
|
||||||
確保您的裝置支援安全開機/驗證開機,並且已啟用。 盡可能避免讓您的裝置無人看管。
|
確保您的裝置支援安全開機/驗證開機,並且已啟用。 盡可能避免讓您的裝置無人看管。
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## 保護您的網路安全
|
## 保護您的網路安全
|
||||||
|
|
||||||
### 隔離
|
### 隔離
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ Android 為生物辨識定義了三種 [安全等級](https://source.android.com
|
|||||||
|
|
||||||
確保您的裝置支援安全開機/驗證開機,並且已啟用。 盡可能避免讓您的裝置無人看管。
|
確保您的裝置支援安全開機/驗證開機,並且已啟用。 盡可能避免讓您的裝置無人看管。
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## 保護您的網路安全
|
## 保護您的網路安全
|
||||||
|
|
||||||
### 隔離
|
### 隔離
|
||||||
|
|||||||
@@ -110,6 +110,12 @@ The best way to prevent a targeted attack against you before a device is in your
|
|||||||
|
|
||||||
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
Make sure your device supports secure boot/verified boot, and you have it enabled. Try to avoid leaving your device unattended whenever possible.
|
||||||
|
|
||||||
|
### Kensington Locks
|
||||||
|
|
||||||
|
Many laptops come equipped with a [Kensington slot](https://www.kensington.com/solutions/product-category/security/?srsltid=AfmBOorQOlRnqRJOAqM-Mvl7wumed0wBdiOgktlvdidpMHNIvGfwj9VI) that can be used to secure your device with a **metal cable** that locks into the slot on your machine. These locks can be combination locks or keyed.
|
||||||
|
|
||||||
|
As with all locks, Kensington locks are vulnerable to [physical attacks](https://youtu.be/vgvCxL7dMJk) so you should mainly use them to deter petty theft. You can secure your laptop at home or even when you're out in public using a table leg or something that won't move easily.
|
||||||
|
|
||||||
## Secure your Network
|
## Secure your Network
|
||||||
|
|
||||||
### Compartmentalization
|
### Compartmentalization
|
||||||
|
|||||||
Reference in New Issue
Block a user