Top 10 Tactics for Protecting Your Stuff


By Kevin Purdy
We’ve offered up a wealth of tips on locking down your data, but old-school, straight-up stealing is another matter entirely. Try these 10 tips on securing, disguising, tracking down, and hiding your goods so they don’t get nicked.

Photo by tom.arthur.

10. Sign your gear, add return incentives

Your wallet or purse already has your license in it for identification and mailing, but what about your other, possibly more expensive gear? You should definitely get a label on it. Adam kinda-sorta thinks the ImHonest label service makes sense, if you want to protect your mailing address and give gadget finders an offer of a reward to return your gear (even if that reward is, not surprisingly, just some ImHonest labels, unless you go further yourself). Homemade labels with an email address might be good enough for most, but for gadgets with memory cards inside, digitally signing with a .txt file makes sense as well. (Original post)

9. Make your lunch look less appetizing

This falls under the same category of ugly-as-deterrent mentioned elsewhere on this list, but office lunch thieves are a different kind of bandit. They (somewhat) know you, they (hopefully) don’t want to sell your goods, and they’re more of an opportunistic nuisance than a hit-and-run thief. Since we originally posted about designer Sherwood Forlee’s faux-moldy anti-theft lunch bags, Forlee’s put his bags up for sale at $10 for 25 bags. Not a bad price for semi-reusable bags, but you can likely replicate the effect on your own with non-toxic paint or food dye. Better still, if you’re willing to sacrifice two slices of bread for the cause, we’ve heard a surreptitious coffee grounds sandwich often teaches a vital lesson about personal property to refrigerator prowlers. (Original post)

8. Get a carry bag that doesn’t scream “Steal me!”

Targus bags and other carriers meant to look like a laptop, or have a generally high-tech appearance, do a great job of letting everyone know that something inside is expensive enough to buy a single-purpose bag for. Getting clever with your gear holders is a good way to ensure you always know which bag is yours, and that laptop-hunting thieves are less likely to nick yours. The newspaper sleeve is a good reference point, although it might get your laptop mistaken for a left-behind periodical. You can also cobble together a clever carrier made from old plastic bags, cardboard, a FedEx envelope, or even an old wetsuit.

7. Put a cute baby in your wallet

When researchers left 240 wallets scattered around the streets of Edinburgh, Scotland, they inserted an equal number of cute baby, puppy, family, and elderly pictures in them, along with a relevant mailing address. They received 42 percent of the wallets back overall, but 88 percent of the wallets with cute babies in them came back. The researchers suggest it has to do with an evolutionary instinct to preserve the young, so if it’s not terribly embarrassing, keep a cute baby in plain sight in your wallet or purse. If you lack for your own adorable tyke, it’s a great reason to call that aunt you never speak to anymore. (Original post)

6. Destroy a credit card the right way

If you’re looking to ditch one of your expired or unused credit cards, don’t just give it one or two token scissor cuts and toss it where identity thieves would love to have a go at it. Try the method recommended by the Wallet Pop blog (and demonstrated in the video above), which involves using a strong magnet and 15 cuts across your little debt recorder. Worried you’ll hurt your credit score by canceling your plastic? Don’t be—if you’ve got no balance, canceling a card can make sense. (Original post)

5. Erase your hard drives the permanent way

Weekend editor Jason doesn’t like to leave his hard drives loaded with personal data, like 40 percent of the used hard drives that can be bought on eBay. So he keeps a variety of total-erasure software on hand, knows how long he needs to run them, and firmly believes in the security power of fire, magnets, and other physical disruption tools. You might not need to mount your hard drives and fire at them with real ammunition, but a quick read through our feature on properly erasing your physical media will make you want to truly cleanse your drives before donating, selling, or handing them off. Photo by scragz.

4. Uglify gear you don’t want grabbed

If the guts of your possessions are what matter to you most, and you don’t mind a little creative shoddiness, “uglifying” might be the way to go for your prized possessions. One blogger took his “ugly camera” for a spin in some fairly harsh areas, and even had it left in his pockets by muggers who went for a $20 cellphone instead. So if a digital camera, a nice bike, or anything else you’re concerned about looks like it might be a nice target, consider creatively junking it up a bit. (Original post)

3. Make little changes to prevent identity theft

The more people, companies, and places you ensure your identifying information to, the larger a target you are for whoever wants to masquerade as you until the packages arrive from eBay. You can, however, lock down your data life without moving into a mountain cave. Actively guarding your Social Security number takes patience and persuasion powers, but you usually don’t have to give it out. The Get Rich Slowly blog suggests keeping in mind the Three ‘D’s of identity theft protection—deter, detect, and defend, bolstered by the FTC’s identity theft tips. When you find a cheaper price at an off-brand store, use a virtual credit card to shield your real account from misplaced digits. Finally, be not afraid to bust out the shredder and feed it with the financial records you don’t need.

2. Know where to hide your money

It might seem counter-intuitive, but a former burglar suggests that leaving a little bit of money in a few barely-hidden spots might save your living space, and your actual stash of cash, from being torn apart and tracked down by those who would take what you have. If you’re looking for a place to store emergency money that you’ll (almost) always have on you, the Cash “Can” keyring is a good bet against being burglarized. (Original post)

1. Set up a laptop security system

Laptops hold a lot of data you probably don’t want in the open, and they’re not cheap to replace. If you’d rather your thin computer not find its way into the wrong hands, we have a few suggestions on securing your laptop on multiple fronts. From inexpensive, physical laptop locks to webcam mugshot takers and missing computer trackers, a lot of tools are available for Windows and Mac machines that make it hard for a thief to walk away with your system, or make him wish he hadn’t if he makes it out the door with it.


How do you secure your gear, money, documents, and other items against low-tech thievery—beyond, of course, locking your door and closing your windows? Tell us about your more creative theft deterrents in the comments.
source
Related articles by Zemanta

Reblog this post [with Zemanta]

TECH – Google Latitude keeps tabs on friends’ locations

Google Latitude

Posted by Stephen Shankland

Google Latitude shows your friends on a map–as long as they’ve agreed to share their location.

(Credit: Google)

Just because the Internet has broken down geographic barriers, don’t assume that Google doesn’t care about geography.

The company plans to launch software called Latitude on Wednesday that lets mobile phone users share their location with close contacts. Google hopes it will help people find each other while out and about and to keep track of loved ones.

“What Google Latitude does is allow you to share that location with friends and family members, and likewise be able to see friends and family members’ locations,” said Steve Lee, product manager for Google Latitude. For example, a girlfriend could use it to see if her boyfriend has arrived at a restaurant and, if not, how far away he is.

To protect privacy, Google specifically requires people to sign up for the service. People can share their precise location, the city they’re in, or nothing at all.

“What we found in testing is that the most common scenario is a symmetrical arrangement, where both people are sharing with each other,” Lee said.

The software spotlights Google’s fixation with mapping and location technology. Location is an important part of navigating the real world, and Google clearly sees its geographic services as a way to establish a more personal connection with customers who today use Google chiefly for the virtual realm of the Internet. And of course money is involved, too: Google hopes its mapping technology will lead to location-based advertising revenue.

Google’s power is firmly lodged in search and search advertising, but the company is trying to expand to broader online services, too. That includes online documents and various aspects of social networking, which are much more personal services and ones that put Google into more direct competition with rivals such as Microsoft, Facebook, and Yahoo. Like using Google profiles to contact information with select contacts, using Google Latitude tells Google who’s who in your social graph.

Latitude lets you contact somebody who's close by.

Latitude lets you contact somebody who’s close by.

(Credit: Google)

How it works
Latitude is part of Google Maps for Mobile, the company’s mapping software for mobile phones, but also can be used through a gadget loaded onto its iGoogle customized home page. It’ll work in 27 countries at launch, Google said.

Initially, it will work on most color-screen BlackBerry phones, most phones with Windows Mobile 5.0 or later, and most Symbian-based devices such as Nokia smartphones. An update to the Google Android operating system now being distributed to the T-Mobile G1 phone also enables it, and iPhone and iPod Touch users will get the option “very soon,” Lee said.

Latitude uses Google’s technology to judge a user’s location not just by GPS satellite, but also by proximity to mobile phone towers and wireless networks.

That’s a much more automated approach than the manual “check-in” process used by Dodgeball, a service that Google decided in January to shut down.

Other competitors exist, though. BrightKite and Loopt offer mechanisms for people to find each other by mobile phone, for example. Then there’s MobiFriends, Tripit, and Dopplr.

And Google’s clearest competitor, Yahoo, offers some competition with Fire Eagle. That service doesn’t provide location information, but it does provide a mechanism to centralize people’s geographic privacy choices, in effect taking care of some of the social graph management when it comes to location information.

To use the service, you need a Google account to record who has permission to see your location. For choosing who gets to see your location, you can use contacts stored with Gmail or Picasa, Google said.

The white lie
With the service, you can hide from specific people or disappear altogether. And you can manually set a specific location if, for example, your phone can’t show it with sufficient precision or if you wish to tell someone a white lie about whether you really aren’t going to go to the candy store.

People must agree to share their location before Latitude will work.

People must agree to share their location before Latitude will work.

(Credit: Google)

Google envisions two broad classes of people with whom you might want to share location information. First is a small, close-knit circle of friends and family with whom you’re willing to share your exact spot. Second is a larger group with whom you’re happy to share city-level detail, convenient for finding out when somebody’s in town but not much more.

When somebody is close, the software lets you contact the person various ways–by calling or sending an e-mail or text message, for example. It also lets you hide from that specific person.

Privacy is of course a significant concern when it comes to sharing this sort of information. If you want to use Latitude, you must specifically enable the service.

Meeting your pals at a bar is an obvious example of the software’s possibilities, but there are softer cases I see as useful, too.

Lee pointed to a case where a friend’s girlfriend, though far away in Seattle, will “virtually place herself next to him.” That sounds a little sappy for my tastes, but I can still relate. My wife is on the other side of the country right now, and it would be heart-warming to see just where. There are a lot of occasions where technology is better for maintaining relationships than it is for establishing them, and this looks like one to me.

Stephen Shankland covers Google, Yahoo, search, online advertising, portals, digital photography, and related subjects. He joined CNET News in 1998 and since then also has covered servers, supercomputing, open-source software, and science. E-mail Stephen.

Source – http://news.cnet.com/8301-1035_3-10155946-94.html?tag=mncol;title

  • Calendar

    • May 2024
      M T W T F S S
       12345
      6789101112
      13141516171819
      20212223242526
      2728293031  
  • Search