Knowledge (XXG)

Kensington Security Slot

Source 📝

130: 182: 531: 234: 1089: 25: 1124: 122: 1112: 1100: 224:
The hole is found in many laptops, although a lock for it is typically not included. Occasionally, the slot is located so that installing a lock will also prevent the removal of a valuable subcomponent, such as a rechargeable battery or a memory module. The Kensington slot may be marked with a small
244:
Kensington locks can discourage opportunistic grab-and-run thefts of equipment from public locations such as coffee shops or libraries, but they are not designed to be impervious protection measures, nor are they intended to secure equipment in unattended locations, because they can be torn out of
253:. In addition to this, successfully securing the non-locking, loop end of the cable is dependent upon the availability of a suitable anchoring point on a virtually immovable base object, or a thief may just shift that object, and then take the protected device with cable attached. 245:
equipment (although not without causing visible damage), given that the cases are typically made of plastic or thin metal, and the cable can be cut with
221:. The end of the cable has a small loop that allows the cable to be looped around a permanent object, such as a heavy table or other similar equipment. 42: 445: 268:
Several manufacturers offer similar locking mechanisms that do not require a special lock hole. They attach to a popular port, such as the
89: 189:
The system consists of a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as
1115: 386: 61: 108: 1149: 68: 1034: 46: 968: 75: 947: 694: 129: 1049: 1039: 361: 57: 438: 35: 907: 166: 704: 257: 1008: 962: 892: 689: 1069: 1064: 580: 343: 158: 423: 1092: 1003: 836: 530: 431: 181: 82: 1154: 973: 927: 864: 826: 725: 597: 550: 1123: 922: 831: 766: 674: 602: 134: 709: 669: 300: 1044: 771: 664: 515: 154: 1103: 957: 816: 684: 659: 218: 198: 194: 233: 1054: 1018: 983: 952: 735: 730: 495: 390: 210: 206: 1127: 294: 1013: 988: 879: 821: 485: 480: 466: 202: 1143: 932: 912: 545: 505: 500: 269: 978: 887: 854: 846: 806: 756: 740: 633: 585: 565: 462: 458: 454: 273: 238: 213:, combined with a metal anchor attached to a rubberized metal cable secured with a 225:
icon that looks like a padlock with a capital "K", or the slot may be unlabelled.
121: 1074: 1059: 993: 902: 811: 761: 654: 490: 260:
or, less frequently, a flat key lock or a numeric combination lock with no key.
250: 246: 170: 24: 937: 786: 618: 338: 332: 327: 214: 917: 897: 859: 781: 776: 699: 638: 555: 365: 133:
The Kensington Security Slot is the rightmost opening on the side of this
998: 869: 796: 628: 590: 560: 520: 510: 679: 623: 575: 570: 162: 942: 190: 801: 232: 180: 128: 120: 427: 18: 416: 237:
Kensington lock attached to a Kensington Security Slot on a
323:
Security anchor/tether assemblage for portable articles
276:, and have special screws to secure locks in place. 1027: 878: 845: 749: 718: 647: 611: 538: 473: 387:"PA496U: Targus DEFCON® VPKL - Video Port Key Lock" 318: 316: 296:
The Computer Chronicles - Notebook Computers (1992)
49:. Unsourced material may be challenged and removed. 165:in 2002, and since 2005 owned and marketed by 439: 8: 446: 432: 424: 157:designed in the mid 1980s and patented by 125:Kensington Security lock: unlocked, locked 109:Learn how and when to remove this message 16:Anti-theft system for computer equipment 285: 356: 354: 352: 7: 1111: 1099: 47:adding citations to reliable sources 342:(Cornelius McDaid, John Ristuccia, 362:"Kensington SAFE Security Ratings" 256:The lock mechanism is typically a 14: 1122: 1110: 1098: 1088: 1087: 529: 23: 303:from the original on 2021-12-22 34:needs additional citations for 1035:Glossary of locksmithing terms 1: 969:Perimeter intrusion detection 948:Miniature snap-action switch 695:Time-delay combination locks 346:- priority date: 1999-06-21) 1050:John M. Mossman Lock Museum 1040:Electromagnetic door holder 1171: 161:in 1999–2000, assigned to 58:"Kensington Security Slot" 1083: 908:Closed-circuit television 527: 293:The Computer Chronicles, 167:Kensington Products Group 792:Kensington Security Slot 705:Tubular pin tumbler lock 258:tubular pin tumbler lock 143:Kensington Security Slot 1150:Locks (security device) 1009:Vandal-resistant switch 963:Passive infrared sensor 893:Alarm monitoring center 690:Rotary combination lock 539:Components and hardware 1065:Lock Museum of America 581:Bored cylindrical lock 344:Kryptonite Corporation 241: 186: 185:Kensington Laptop Lock 138: 126: 1093:Category:Locksmithing 1004:Ultrasonic transducer 328:U.S. Patent 6,081,974 236: 184: 132: 124: 974:Photoelectric sensor 928:Glass break detector 827:Real-estate lock box 726:Electromagnetic lock 598:Single-point locking 551:Interchangeable core 474:Fundamental concepts 43:improve this article 1070:Musée de la Serrure 923:Fingerprint scanner 832:Steering-wheel lock 767:Chubb detector lock 675:Magnetic keyed lock 603:Three-point locking 710:Wafer tumbler lock 670:Lever tumbler lock 242: 187: 139: 127: 1137: 1136: 1045:Exit control lock 772:Child safety lock 665:Disc tumbler lock 516:Physical security 199:desktop computers 195:computer monitors 155:anti-theft system 119: 118: 111: 93: 1162: 1126: 1114: 1113: 1102: 1101: 1091: 1090: 958:Occupancy sensor 817:Power door locks 750:Other lock types 719:Electronic locks 685:Combination lock 660:Pin tumbler lock 648:Mechanical locks 533: 448: 441: 434: 425: 420: 419: 417:Official website 402: 401: 399: 398: 389:. Archived from 383: 377: 376: 374: 373: 364:. Archived from 358: 347: 341: 335: 330: 320: 311: 310: 309: 308: 290: 219:combination lock 211:video projectors 207:audio interfaces 169:, a division of 153:) is part of an 114: 107: 103: 100: 94: 92: 51: 27: 19: 1170: 1169: 1165: 1164: 1163: 1161: 1160: 1159: 1140: 1139: 1138: 1133: 1079: 1055:Key to the City 1023: 1019:Window security 984:Pressure switch 953:Motion detector 880:Security alarms 874: 841: 745: 736:Electric strike 731:Electronic lock 714: 643: 607: 534: 525: 496:Key duplication 469: 467:security alarms 452: 415: 414: 411: 406: 405: 396: 394: 385: 384: 380: 371: 369: 360: 359: 350: 337: 331: 326: 321: 314: 306: 304: 292: 291: 287: 282: 266: 231: 203:gaming consoles 179: 151:Kensington lock 145:(also called a 137:laptop computer 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1168: 1166: 1158: 1157: 1152: 1142: 1141: 1135: 1134: 1132: 1131: 1119: 1107: 1095: 1084: 1081: 1080: 1078: 1077: 1072: 1067: 1062: 1057: 1052: 1047: 1042: 1037: 1031: 1029: 1025: 1024: 1022: 1021: 1016: 1014:Water detector 1011: 1006: 1001: 996: 991: 989:Proximity card 986: 981: 976: 971: 966: 960: 955: 950: 945: 940: 935: 930: 925: 920: 915: 910: 905: 900: 895: 890: 884: 882: 876: 875: 873: 872: 867: 862: 857: 851: 849: 843: 842: 840: 839: 834: 829: 824: 822:Protector lock 819: 814: 809: 804: 799: 794: 789: 784: 779: 774: 769: 764: 759: 753: 751: 747: 746: 744: 743: 738: 733: 728: 722: 720: 716: 715: 713: 712: 707: 702: 697: 692: 687: 682: 677: 672: 667: 662: 657: 651: 649: 645: 644: 642: 641: 636: 631: 626: 621: 615: 613: 609: 608: 606: 605: 600: 595: 594: 593: 588: 583: 573: 568: 563: 558: 553: 548: 542: 540: 536: 535: 528: 526: 524: 523: 518: 513: 508: 503: 498: 493: 488: 486:Authentication 483: 481:Access control 477: 475: 471: 470: 453: 451: 450: 443: 436: 428: 422: 421: 410: 409:External links 407: 404: 403: 378: 348: 312: 284: 283: 281: 278: 265: 262: 230: 227: 178: 175: 117: 116: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1167: 1156: 1153: 1151: 1148: 1147: 1145: 1130: 1129: 1125: 1120: 1118: 1117: 1108: 1106: 1105: 1096: 1094: 1086: 1085: 1082: 1076: 1073: 1071: 1068: 1066: 1063: 1061: 1058: 1056: 1053: 1051: 1048: 1046: 1043: 1041: 1038: 1036: 1033: 1032: 1030: 1028:Miscellaneous 1026: 1020: 1017: 1015: 1012: 1010: 1007: 1005: 1002: 1000: 997: 995: 992: 990: 987: 985: 982: 980: 977: 975: 972: 970: 967: 964: 961: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 933:Heat detector 931: 929: 926: 924: 921: 919: 916: 914: 913:Door security 911: 909: 906: 904: 901: 899: 896: 894: 891: 889: 886: 885: 883: 881: 877: 871: 868: 866: 863: 861: 858: 856: 853: 852: 850: 848: 844: 838: 835: 833: 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 785: 783: 780: 778: 775: 773: 770: 768: 765: 763: 760: 758: 755: 754: 752: 748: 742: 739: 737: 734: 732: 729: 727: 724: 723: 721: 717: 711: 708: 706: 703: 701: 698: 696: 693: 691: 688: 686: 683: 681: 678: 676: 673: 671: 668: 666: 663: 661: 658: 656: 653: 652: 650: 646: 640: 637: 635: 632: 630: 627: 625: 622: 620: 617: 616: 614: 610: 604: 601: 599: 596: 592: 589: 587: 584: 582: 579: 578: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 543: 541: 537: 532: 522: 519: 517: 514: 512: 509: 507: 506:Master keying 504: 502: 501:Key relevance 499: 497: 494: 492: 489: 487: 484: 482: 479: 478: 476: 472: 468: 464: 460: 456: 449: 444: 442: 437: 435: 430: 429: 426: 418: 413: 412: 408: 393:on 2009-05-27 392: 388: 382: 379: 368:on 2011-09-03 367: 363: 357: 355: 353: 349: 345: 340: 334: 329: 324: 319: 317: 313: 302: 298: 297: 289: 286: 279: 277: 275: 271: 263: 261: 259: 254: 252: 248: 240: 235: 228: 226: 222: 220: 216: 212: 208: 204: 200: 196: 192: 183: 176: 174: 172: 168: 164: 160: 156: 152: 148: 144: 136: 131: 123: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 1121: 1109: 1097: 979:Piezo switch 888:Alarm device 855:Lock bumping 847:Lock picking 807:Luggage lock 791: 757:Bicycle lock 741:Keycard lock 634:Skeleton key 586:Mortise lock 566:Key retainer 463:lock picking 459:locksmithing 395:. Retrieved 391:the original 381: 370:. Retrieved 366:the original 322: 305:, retrieved 295: 288: 274:printer port 267: 264:Alternatives 255: 251:bolt cutters 243: 239:PowerBook G4 223: 188: 150: 146: 142: 140: 135:Acer Swift 3 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 1155:ACCO Brands 1075:Puzzle lock 1060:Lock Museum 994:Reed switch 903:Card reader 812:Night latch 762:Bramah lock 655:Warded lock 491:Key control 171:ACCO Brands 1144:Categories 938:Key switch 787:Door chain 619:Berlin key 397:2014-04-12 372:2014-04-12 307:2018-12-13 280:References 229:Efficiency 159:Kryptonite 99:March 2024 69:newspapers 918:Dual loop 898:Car alarm 860:Locksport 782:Dead bolt 777:Crash bar 700:Time lock 639:Smart key 556:Key blank 339:6,360,405 333:6,317,936 999:Tripwire 870:Snap gun 865:Slim Jim 837:The Club 797:Knox Box 629:Keychain 591:Rim lock 561:Key code 521:Rekeying 511:Password 301:archived 680:Padlock 624:Car key 576:Lockset 571:Lockrod 546:Bitting 191:laptops 163:Schlage 83:scholar 943:Keypad 465:, and 209:, and 177:Design 147:K-Slot 85:  78:  71:  64:  56:  1116:Locks 965:(PIR) 802:Latch 455:Locks 90:JSTOR 76:books 1128:Book 1104:Keys 612:Keys 336:and 247:wire 141:The 62:news 272:or 270:VGA 249:or 217:or 215:key 149:or 45:by 1146:: 461:, 457:, 351:^ 325:: 315:^ 299:, 205:, 201:, 197:, 193:, 173:. 447:e 440:t 433:v 400:. 375:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Kensington Security Slot"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message


Acer Swift 3
anti-theft system
Kryptonite
Schlage
Kensington Products Group
ACCO Brands

laptops
computer monitors
desktop computers
gaming consoles
audio interfaces
video projectors
key
combination lock

PowerBook G4

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.