130:
182:
531:
234:
1089:
25:
1124:
122:
1112:
1100:
224:
The hole is found in many laptops, although a lock for it is typically not included. Occasionally, the slot is located so that installing a lock will also prevent the removal of a valuable subcomponent, such as a rechargeable battery or a memory module. The
Kensington slot may be marked with a small
244:
Kensington locks can discourage opportunistic grab-and-run thefts of equipment from public locations such as coffee shops or libraries, but they are not designed to be impervious protection measures, nor are they intended to secure equipment in unattended locations, because they can be torn out of
253:. In addition to this, successfully securing the non-locking, loop end of the cable is dependent upon the availability of a suitable anchoring point on a virtually immovable base object, or a thief may just shift that object, and then take the protected device with cable attached.
245:
equipment (although not without causing visible damage), given that the cases are typically made of plastic or thin metal, and the cable can be cut with
221:. The end of the cable has a small loop that allows the cable to be looped around a permanent object, such as a heavy table or other similar equipment.
42:
445:
268:
Several manufacturers offer similar locking mechanisms that do not require a special lock hole. They attach to a popular port, such as the
89:
189:
The system consists of a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as
1115:
386:
61:
108:
1149:
68:
1034:
46:
968:
75:
947:
694:
129:
1049:
1039:
361:
57:
438:
35:
907:
166:
704:
257:
1008:
962:
892:
689:
1069:
1064:
580:
343:
158:
423:
1092:
1003:
836:
530:
431:
181:
82:
1154:
973:
927:
864:
826:
725:
597:
550:
1123:
922:
831:
766:
674:
602:
134:
709:
669:
300:
1044:
771:
664:
515:
154:
1103:
957:
816:
684:
659:
218:
198:
194:
233:
1054:
1018:
983:
952:
735:
730:
495:
390:
210:
206:
1127:
294:
1013:
988:
879:
821:
485:
480:
466:
202:
1143:
932:
912:
545:
505:
500:
269:
978:
887:
854:
846:
806:
756:
740:
633:
585:
565:
462:
458:
454:
273:
238:
213:, combined with a metal anchor attached to a rubberized metal cable secured with a
225:
icon that looks like a padlock with a capital "K", or the slot may be unlabelled.
121:
1074:
1059:
993:
902:
811:
761:
654:
490:
260:
or, less frequently, a flat key lock or a numeric combination lock with no key.
250:
246:
170:
24:
937:
786:
618:
338:
332:
327:
214:
917:
897:
859:
781:
776:
699:
638:
555:
365:
133:
The
Kensington Security Slot is the rightmost opening on the side of this
998:
869:
796:
628:
590:
560:
520:
510:
679:
623:
575:
570:
162:
942:
190:
801:
232:
180:
128:
120:
427:
18:
416:
237:
Kensington lock attached to a
Kensington Security Slot on a
323:
Security anchor/tether assemblage for portable articles
276:, and have special screws to secure locks in place.
1027:
878:
845:
749:
718:
647:
611:
538:
473:
387:"PA496U: Targus DEFCON® VPKL - Video Port Key Lock"
318:
316:
296:
The
Computer Chronicles - Notebook Computers (1992)
49:. Unsourced material may be challenged and removed.
165:in 2002, and since 2005 owned and marketed by
439:
8:
446:
432:
424:
157:designed in the mid 1980s and patented by
125:Kensington Security lock: unlocked, locked
109:Learn how and when to remove this message
16:Anti-theft system for computer equipment
285:
356:
354:
352:
7:
1111:
1099:
47:adding citations to reliable sources
342:(Cornelius McDaid, John Ristuccia,
362:"Kensington SAFE Security Ratings"
256:The lock mechanism is typically a
14:
1122:
1110:
1098:
1088:
1087:
529:
23:
303:from the original on 2021-12-22
34:needs additional citations for
1035:Glossary of locksmithing terms
1:
969:Perimeter intrusion detection
948:Miniature snap-action switch
695:Time-delay combination locks
346:- priority date: 1999-06-21)
1050:John M. Mossman Lock Museum
1040:Electromagnetic door holder
1171:
161:in 1999–2000, assigned to
58:"Kensington Security Slot"
1083:
908:Closed-circuit television
527:
293:The Computer Chronicles,
167:Kensington Products Group
792:Kensington Security Slot
705:Tubular pin tumbler lock
258:tubular pin tumbler lock
143:Kensington Security Slot
1150:Locks (security device)
1009:Vandal-resistant switch
963:Passive infrared sensor
893:Alarm monitoring center
690:Rotary combination lock
539:Components and hardware
1065:Lock Museum of America
581:Bored cylindrical lock
344:Kryptonite Corporation
241:
186:
185:Kensington Laptop Lock
138:
126:
1093:Category:Locksmithing
1004:Ultrasonic transducer
328:U.S. Patent 6,081,974
236:
184:
132:
124:
974:Photoelectric sensor
928:Glass break detector
827:Real-estate lock box
726:Electromagnetic lock
598:Single-point locking
551:Interchangeable core
474:Fundamental concepts
43:improve this article
1070:Musée de la Serrure
923:Fingerprint scanner
832:Steering-wheel lock
767:Chubb detector lock
675:Magnetic keyed lock
603:Three-point locking
710:Wafer tumbler lock
670:Lever tumbler lock
242:
187:
139:
127:
1137:
1136:
1045:Exit control lock
772:Child safety lock
665:Disc tumbler lock
516:Physical security
199:desktop computers
195:computer monitors
155:anti-theft system
119:
118:
111:
93:
1162:
1126:
1114:
1113:
1102:
1101:
1091:
1090:
958:Occupancy sensor
817:Power door locks
750:Other lock types
719:Electronic locks
685:Combination lock
660:Pin tumbler lock
648:Mechanical locks
533:
448:
441:
434:
425:
420:
419:
417:Official website
402:
401:
399:
398:
389:. Archived from
383:
377:
376:
374:
373:
364:. Archived from
358:
347:
341:
335:
330:
320:
311:
310:
309:
308:
290:
219:combination lock
211:video projectors
207:audio interfaces
169:, a division of
153:) is part of an
114:
107:
103:
100:
94:
92:
51:
27:
19:
1170:
1169:
1165:
1164:
1163:
1161:
1160:
1159:
1140:
1139:
1138:
1133:
1079:
1055:Key to the City
1023:
1019:Window security
984:Pressure switch
953:Motion detector
880:Security alarms
874:
841:
745:
736:Electric strike
731:Electronic lock
714:
643:
607:
534:
525:
496:Key duplication
469:
467:security alarms
452:
415:
414:
411:
406:
405:
396:
394:
385:
384:
380:
371:
369:
360:
359:
350:
337:
331:
326:
321:
314:
306:
304:
292:
291:
287:
282:
266:
231:
203:gaming consoles
179:
151:Kensington lock
145:(also called a
137:laptop computer
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
1168:
1166:
1158:
1157:
1152:
1142:
1141:
1135:
1134:
1132:
1131:
1119:
1107:
1095:
1084:
1081:
1080:
1078:
1077:
1072:
1067:
1062:
1057:
1052:
1047:
1042:
1037:
1031:
1029:
1025:
1024:
1022:
1021:
1016:
1014:Water detector
1011:
1006:
1001:
996:
991:
989:Proximity card
986:
981:
976:
971:
966:
960:
955:
950:
945:
940:
935:
930:
925:
920:
915:
910:
905:
900:
895:
890:
884:
882:
876:
875:
873:
872:
867:
862:
857:
851:
849:
843:
842:
840:
839:
834:
829:
824:
822:Protector lock
819:
814:
809:
804:
799:
794:
789:
784:
779:
774:
769:
764:
759:
753:
751:
747:
746:
744:
743:
738:
733:
728:
722:
720:
716:
715:
713:
712:
707:
702:
697:
692:
687:
682:
677:
672:
667:
662:
657:
651:
649:
645:
644:
642:
641:
636:
631:
626:
621:
615:
613:
609:
608:
606:
605:
600:
595:
594:
593:
588:
583:
573:
568:
563:
558:
553:
548:
542:
540:
536:
535:
528:
526:
524:
523:
518:
513:
508:
503:
498:
493:
488:
486:Authentication
483:
481:Access control
477:
475:
471:
470:
453:
451:
450:
443:
436:
428:
422:
421:
410:
409:External links
407:
404:
403:
378:
348:
312:
284:
283:
281:
278:
265:
262:
230:
227:
178:
175:
117:
116:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1167:
1156:
1153:
1151:
1148:
1147:
1145:
1130:
1129:
1125:
1120:
1118:
1117:
1108:
1106:
1105:
1096:
1094:
1086:
1085:
1082:
1076:
1073:
1071:
1068:
1066:
1063:
1061:
1058:
1056:
1053:
1051:
1048:
1046:
1043:
1041:
1038:
1036:
1033:
1032:
1030:
1028:Miscellaneous
1026:
1020:
1017:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
997:
995:
992:
990:
987:
985:
982:
980:
977:
975:
972:
970:
967:
964:
961:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
934:
933:Heat detector
931:
929:
926:
924:
921:
919:
916:
914:
913:Door security
911:
909:
906:
904:
901:
899:
896:
894:
891:
889:
886:
885:
883:
881:
877:
871:
868:
866:
863:
861:
858:
856:
853:
852:
850:
848:
844:
838:
835:
833:
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
788:
785:
783:
780:
778:
775:
773:
770:
768:
765:
763:
760:
758:
755:
754:
752:
748:
742:
739:
737:
734:
732:
729:
727:
724:
723:
721:
717:
711:
708:
706:
703:
701:
698:
696:
693:
691:
688:
686:
683:
681:
678:
676:
673:
671:
668:
666:
663:
661:
658:
656:
653:
652:
650:
646:
640:
637:
635:
632:
630:
627:
625:
622:
620:
617:
616:
614:
610:
604:
601:
599:
596:
592:
589:
587:
584:
582:
579:
578:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
543:
541:
537:
532:
522:
519:
517:
514:
512:
509:
507:
506:Master keying
504:
502:
501:Key relevance
499:
497:
494:
492:
489:
487:
484:
482:
479:
478:
476:
472:
468:
464:
460:
456:
449:
444:
442:
437:
435:
430:
429:
426:
418:
413:
412:
408:
393:on 2009-05-27
392:
388:
382:
379:
368:on 2011-09-03
367:
363:
357:
355:
353:
349:
345:
340:
334:
329:
324:
319:
317:
313:
302:
298:
297:
289:
286:
279:
277:
275:
271:
263:
261:
259:
254:
252:
248:
240:
235:
228:
226:
222:
220:
216:
212:
208:
204:
200:
196:
192:
183:
176:
174:
172:
168:
164:
160:
156:
152:
148:
144:
136:
131:
123:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
1121:
1109:
1097:
979:Piezo switch
888:Alarm device
855:Lock bumping
847:Lock picking
807:Luggage lock
791:
757:Bicycle lock
741:Keycard lock
634:Skeleton key
586:Mortise lock
566:Key retainer
463:lock picking
459:locksmithing
395:. Retrieved
391:the original
381:
370:. Retrieved
366:the original
322:
305:, retrieved
295:
288:
274:printer port
267:
264:Alternatives
255:
251:bolt cutters
243:
239:PowerBook G4
223:
188:
150:
146:
142:
140:
135:Acer Swift 3
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
1155:ACCO Brands
1075:Puzzle lock
1060:Lock Museum
994:Reed switch
903:Card reader
812:Night latch
762:Bramah lock
655:Warded lock
491:Key control
171:ACCO Brands
1144:Categories
938:Key switch
787:Door chain
619:Berlin key
397:2014-04-12
372:2014-04-12
307:2018-12-13
280:References
229:Efficiency
159:Kryptonite
99:March 2024
69:newspapers
918:Dual loop
898:Car alarm
860:Locksport
782:Dead bolt
777:Crash bar
700:Time lock
639:Smart key
556:Key blank
339:6,360,405
333:6,317,936
999:Tripwire
870:Snap gun
865:Slim Jim
837:The Club
797:Knox Box
629:Keychain
591:Rim lock
561:Key code
521:Rekeying
511:Password
301:archived
680:Padlock
624:Car key
576:Lockset
571:Lockrod
546:Bitting
191:laptops
163:Schlage
83:scholar
943:Keypad
465:, and
209:, and
177:Design
147:K-Slot
85:
78:
71:
64:
56:
1116:Locks
965:(PIR)
802:Latch
455:Locks
90:JSTOR
76:books
1128:Book
1104:Keys
612:Keys
336:and
247:wire
141:The
62:news
272:or
270:VGA
249:or
217:or
215:key
149:or
45:by
1146::
461:,
457:,
351:^
325::
315:^
299:,
205:,
201:,
197:,
193:,
173:.
447:e
440:t
433:v
400:.
375:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.