Home
Help

Globe 100

Latest News
Latest business news
Latest high-tech news

Market Watch Dow:
10955.41 (+69.30)
NASDAQ:
2534.41 (+49.29)
S&P 500:
1347.31 (+15.31)
More stock quotes

Columnists
Steve Bailey
Marla Brill
Simson L. Garfinkel
Kenneth Hooker
Charles A. Jaffe
David Warsh

Columns
Boston Capital
Plugged In
The Globe 100

Links
Technology
Check out Boston. com's Tech Center

Personal Finance
Financial calculators, financial advice, stock quotes and more

Boston.com business section, including Emerging Business

Yellow Pages
Alphabetical listings, courtesy Boston.com's Yellow Pages Directory
Banks
Brokers
Credit and Debt Counseling
Credit Unions
Exchanges
Financial Planners
Insurance
Investment Bankers
Investment Securities
Loans
Mutual Funds
Retirement Planners
Savings and Loans

Sections Boston Globe Online: Page One Nation | World Metro | Region Business Sports Living | Arts Editorials

Weekly
Health | Science (Mon.)
Food (Wed.)
Calendar (Thu.)
At Home (Thu.)

Sunday
Focus
Learning
Travel
Real Estate
Automotive
Sunday Magazine
City Weekly
South Weekly
West Weekly
North Weekly
NorthWest Weekly
NH Weekly

Features
Archives
Book Reviews
Columns
Comics
Crossword
Horoscopes
Death Notices
Lottery
Movie Reviews
Music Reviews
Obituaries
Today's stories A-Z
TV & Radio
Weather

Classifieds
Autos
Classifieds
Help Wanted
Real Estate

Help
Contact the Globe
Send us feedback

Alternative views
Low-graphics version
Acrobat version (.pdf)

Search the Globe:

Today
Yesterday

Search the Web
Using Lycos:


Mom gets flowers. You get $5.
The Boston Globe OnlineBoston.com Boston Globe Online / Business
[ Send this story to a friend | Easy-print version | Add to Daily User ]

PLUGGED IN
Take a byte out of crime

Whether it's a laptop or desktop, take precautions

By Simson L. Garfinkel, Globe Staff, 05/06/99

A DAY FOR MOMS
A home for moms

Create a Mother's Day website

Where progressive moms come to rant

omputer theft is the crime that keeps on going.

First there is the financial loss: When somebody steals your computer, the cost of replacing the machine can easily run into the thousands. It can take even longer to replace your data and reinstall all of your applications - provided that you have backups. Then there is the opportunity cost: If you use your computer every day, you can't work until the machine is replaced. Finally, there is the possibility for data crime: What will a thief do with the data he finds on your hard drive?

Laptops are certainly the easiest kinds of computers to steal: They are small, portable, easily concealed, and easily resold. But desktop machines are also common targets. I once wrote an article about a company in San Francisco that had its entire network of workstations and file servers stolen over a weekend. The thieves had come over an inside wall that separated the office from a hallway; apparently, the partition had only gone up as far as the false ceiling. Data-wise, the company was wiped out: Besides stealing the computers, the thieves also took the company's only tape drive.

I'm continually surprised by the large number of homes I see leaving themselves open to this kind of data loss. There are many houses that have laptops or desktop computers easily visible through first-floor windows. A simple ounce of prevention would be to arrange your home office so valuables are not visible from the street.

To further protect your computers, you might consider tagging them, bolting them down, or equipping them with a tracking program. Computer tags are my favorite physical security deterrent. The best are made by Security Tracking of Office Property (www.stoptheft.com). These tags are 2-inch square metal plates that you can stick to a plastic or metal-cased computer. Each plate has a serial number and requires more than 800 pounds of force to remove. If somebody does pry off the plate, an indelible tattoo is left underneath that proclaims the computer is ''stolen property.''

Since it is illegal to knowingly purchase stolen property, these tags dramatically cut the resale value of a stolen computer - and thus provide a disincentive to theft. Single plates cost $25 and include three years of the company's tracing service. It's a great deal.

Computer recovery isn't enough for most institutions: Schools, libraries, and other organizations that do business with the public have long used security plates to keep their computers locked down. These plates consist of two metal pieces that lock together. The bottom piece bolts to a table. The top piece attaches to the bottom of the computer using a high-strength adhesive.

Prices range from $50 to $250. If you put a computer in a public place, be sure to also lock the machine's case. A common trick on college campuses is to steal the memory chips out of desktop computers. The chips are worth more than their weight in gold and are easily resold because they have no serial numbers.

CompuTrace is a tracking system that's used by some businesses and schools to locate stolen computers. The system is based on a ''stealth program'' that hides on your computer's hard disk and periodically calls the company's tracing phone number when your computer is otherwise idle. Normally, the program simply calls up, says hello, and hangs up. But if you report a CompuTrace-protected computer as stolen, CompuTrace will record the phone number from which the next call is made. CompuTrace will then work with law enforcement authorities to obtain a search warrant for the location and return the stolen property to you.

I have no experience with CompuTrace, but Vanstar, the Canadian Mounties, and the First Tennessee Bank have used the system successfully, according to information on the company's Web site. The program costs $70, which includes one year of monitoring. You can find more information at www.computrace.com/.

No matter how you choose to protect your computer, you should be sure that you back up its contents regularly. You should make and keep several backups, and you should keep them in several places.

There are two kinds of backups: full, which back up your computer in its entirety, and partial or incremental, which just back up the data that has changed on your system. You can back up a computer to a tape drive, a write-once CD-ROM, or to another hard disk. I frequently back up laptops to the hard drive on my server.

Microsoft Windows comes with its own built-in backup software. While Microsoft Backup is good enough for saving copies of your data, I don't like to use it for making full system backups. The reason is disaster recovery. Using Microsoft Backup, it is very difficult to restore a crashed computer to its precrash condition.

A better product is Seagate Backup Exec, which costs $60 for Windows 98 and $95 for Windows NT. Besides making a backup of your hard drive, Backup Exec makes a ''disaster recovery disk.'' To restore your backup, just boot the disk and put your backup tape or CD-ROM into the drive. Although this disaster recovery feature is present in most other backup programs, I found Seagate's to be among the easiest to use. (Indeed, it's a slimmed -down version of Backup Exec that Microsoft ships with Windows as Microsoft Backup.) Seagate's software also works with a wide range of tape drives and other devices.

On the Macintosh, the clear choice for backup software is Dantz's Retrospect. This program comes bundled with most tape drives sold for the Macintosh. You can also buy additional packages of Retrospect to let you back up Mac clients or even PCs on your network. Indeed, if I had a network of PCs to back up, I would probably buy a Mac to be my backup server and use it to run Retrospect.

Technology writer Simson L. Garfinkel can be reached at plugged-in@simson.net

This story ran on page C04 of the Boston Globe on 05/06/99.
© Copyright 1999 Globe Newspaper Company.

[ Send this story to a friend | Easy-print version | Add to Daily User ]


Click here for advertiser information
Mom gets flowers. You get $5.

© Copyright 1998 Globe Newspaper Company
Boston Globe Extranet
Extending our newspaper services to the web
Return to the home page
of The Globe Online