A Kensington Security Slot (also called a K-Slot or Kensington lock) is part of an anti-theft system designed and patented by Kryptonite in 1999-2000, assigned to Schlage in 2002, and since 2005 owned and marketed by Kensington Computer Products Group, a division of ACCO Brands.
Description
In depth tutorial to show installation and the use of the Kensington ClickSafe Keyed Laptop Lock. - The Kensington ClickSafeĆ¢¢ Keyed Laptop Lock is designed for effortless protection of computers and your business's most important data. Locks attach to hardware in a single step. Just one...
The system consists of a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as laptops, computer monitors, desktop computers, gaming consoles, and video projectors, combined with a metal anchor attached to a rubberized metal cable secured with a key or combination lock. The end of the cable has a small loop that allows the cable to be looped around a permanent object, such as a heavy table or other similar equipment.
The hole is found in most laptops, although a lock for it is typically not included. Occasionally, the slot is located so that installing a lock will also prevent the removal of a valuable subcomponent, such as a rechargeable battery or a memory module. The Kensington slot may be marked with a small icon that looks like a padlock with a capital "K", or the slot may be unlabelled.
Security
Kensington locks are not designed to be an impervious protection measure. Because most computer equipment cases are generally made of plastic or thin metal, the lock can be torn out, though not without doing significant visible damage to the case. The cable itself can be cut if an individual has a wire cutter or bolt cutter sufficiently strong to cut through the cable material, which will vary between different brands of cable. The Kensington type locks are useful to discourage quick grab-and-run thefts of equipment from casually supervised locations such as coffee shops, but cannot prevent the removal of equipment secured in an unattended location.
The key is often a cylindrical type, but there are versions which use a traditional flat key. There are also versions of the lock that use a numeric combination instead of a key.
Alternatives
Several manufacturers offer similar locking mechanisms that do not require a special lock hole. They attach to a popular port, such as the VGA or printer port, and have special screws to secure locks in place.
References
External links
- Official website