

It is also possible to set a Smartcard so that data can only be used if the proper card is present. If access to a notebook is dependent on a Smartcard, the computer checks the data on the Smartcard against data on the computer and only gives the user access to the notebook if the data agrees. Important: The data should be locked on the Smartcard so that it cannot simply be read and used.

DOES ABSOLUTE LOJACK USE BITLOCKER CODE
The card then releases its information only after this code is entered correctly. Identification is often confirmed by the use of a security code in conjunction with a smart card. EC cards and access cards for doors are examples of this technology. It contains stored information or can even have its own processor. A Smartcard is, as the name suggests, a "smart" card that acts like a key. One approach to better data protection is the use of Smartcards.

There is demand, then, for security that functions even if the user fails. If the creator uses standard phrases or chooses the name of their wife, children or pet, often a little experimentation is enough for the thief to break through to the data. This is especially true if the creator of the password was inexperienced and naive in choosing the password. Even if the thief doesn't know the password, there is still a high chance of him or her getting their hands on sensitive data. Simple password protection upon the start-up of a computer doesn't constitute much of a hurdle for many offenders. In light of that, when selecting a notebook for business use, security is a top concern. Unauthorized access to the hard drive of a notebook or the server of a business can have terrible repercussions, and in some cases it can even put the life of the company in jeopardy. It can be information as secret as the intelligence of the secret service: Company data. For the original German review, see here.
