+1

If given a choice, I would rather the thief not have access to my data than
to get my hardware back.

Of course, you don't necessarily need to encrypt the whole disk; you could
simply keep all private data in a TrueCrypt container. Thus, a thief could
launch the OS, log-in without a password, and (unknowingly) trigger the
tracking software all without gaining access to your private data.

http://www.truecrypt.org
On Nov 28, 2012 11:42 AM, "Mwirima Byaruhanga" <[email protected]> wrote:

> sekabira yasin wrote thus on 11/28/12 10:48 AM:
>
> > Dangers if u have a password.., the thief might be intelligent and
> > first things first, Clean Format Yo Device 2 Nu OS.. Now Prey Becomes
> > History.....
>
>
> If you value the info on the device, just encrypt it. There's one
> thing trying to recover it and another thing finding your sensitive
> info all over the place while you are at it.
>
>
> _______________________________________________
> The Uganda Linux User Group: http://linux.or.ug
>
> Send messages to this mailing list by addressing e-mails to:
> [email protected]
> Mailing list archives: http://www.mail-archive.com/[email protected]/
> Mailing list settings: http://kym.net/mailman/listinfo/lug
> To unsubscribe: http://kym.net/mailman/options/lug
>
> The Uganda LUG mailing list is generously hosted by INFOCOM:
> http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The mailing list host is not responsible for them in
> any way.
>
_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to