{"id":371,"date":"2008-08-26T09:19:12","date_gmt":"2008-08-26T08:19:12","guid":{"rendered":"http:\/\/blog.intego.com\/?p=371"},"modified":"2008-08-26T09:19:12","modified_gmt":"2008-08-26T08:19:12","slug":"kensington-laptop-lock-picked-with-a-toilet-paper-roll","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/","title":{"rendered":"Kensington Laptop Lock Picked with a Toilet Paper Roll"},"content":{"rendered":"<p>When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no one can get physical access to it. If someone steals your Mac, they&#8217;ll get to its data one way or another &#8211; they can always just remove the hard disk and put it in another Mac, or simply use a Mac OS X installation disc to get at its contents.<\/p>\n<p>In terms of physical security, Kensington laptop locks are often said to be reliable. But a creative hacker shows, in <a href=\"http:\/\/video.google.com\/videoplay?docid=6560787668346205814&#038;hl=en\">a two-minute video<\/a>, how to make a small cylinder out of a toilet paper roll and crack the lock in seconds. Next time you think that such locks are secure, remember this video. You may want to think of better security for Macs that you use in public settings, such as labs, libraries or caf\u00e9s. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no one can get physical access to it. If someone steals your Mac, they&#8217;ll get to its data one way or another &#8211; they can always just remove the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kensington Laptop Lock Picked with a Toilet Paper Roll - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-08-26T08:19:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/\",\"name\":\"Kensington Laptop Lock Picked with a Toilet Paper Roll - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-08-26T08:19:12+00:00\",\"dateModified\":\"2008-08-26T08:19:12+00:00\",\"description\":\"When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kensington Laptop Lock Picked with a Toilet Paper Roll\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Kensington Laptop Lock Picked with a Toilet Paper Roll\",\"datePublished\":\"2008-08-26T08:19:12+00:00\",\"dateModified\":\"2008-08-26T08:19:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#webpage\"},\"wordCount\":162,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/","og_locale":"en_US","og_type":"article","og_title":"Kensington Laptop Lock Picked with a Toilet Paper Roll - The Mac Security Blog","og_description":"When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no","og_url":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-08-26T08:19:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/","name":"Kensington Laptop Lock Picked with a Toilet Paper Roll - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-08-26T08:19:12+00:00","dateModified":"2008-08-26T08:19:12+00:00","description":"When we think about security, we usually think about viruses, hackers and Trojan horses, but the first step in securing your Mac is making sure that no","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Kensington Laptop Lock Picked with a Toilet Paper Roll"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Kensington Laptop Lock Picked with a Toilet Paper Roll","datePublished":"2008-08-26T08:19:12+00:00","dateModified":"2008-08-26T08:19:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/kensington-laptop-lock-picked-with-a-toilet-paper-roll\/#webpage"},"wordCount":162,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-5Z","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/371"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/371\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}