Knowledge (XXG)

Kensington Security Slot

Source 📝

141: 193: 542: 245: 1100: 36: 1135: 133: 1123: 1111: 235:
The hole is found in many laptops, although a lock for it is typically not included. Occasionally, the slot is located so that installing a lock will also prevent the removal of a valuable subcomponent, such as a rechargeable battery or a memory module. The Kensington slot may be marked with a small
255:
Kensington locks can discourage opportunistic grab-and-run thefts of equipment from public locations such as coffee shops or libraries, but they are not designed to be impervious protection measures, nor are they intended to secure equipment in unattended locations, because they can be torn out of
264:. In addition to this, successfully securing the non-locking, loop end of the cable is dependent upon the availability of a suitable anchoring point on a virtually immovable base object, or a thief may just shift that object, and then take the protected device with cable attached. 256:
equipment (although not without causing visible damage), given that the cases are typically made of plastic or thin metal, and the cable can be cut with
232:. The end of the cable has a small loop that allows the cable to be looped around a permanent object, such as a heavy table or other similar equipment. 53: 456: 279:
Several manufacturers offer similar locking mechanisms that do not require a special lock hole. They attach to a popular port, such as the
100: 200:
The system consists of a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as
1126: 397: 72: 119: 1160: 79: 1045: 57: 979: 86: 958: 705: 140: 1060: 1050: 372: 68: 449: 46: 918: 177: 715: 268: 1019: 973: 903: 700: 1080: 1075: 591: 354: 169: 434: 1103: 1014: 847: 541: 442: 192: 93: 1165: 984: 938: 875: 837: 736: 608: 561: 1134: 933: 842: 777: 685: 613: 145: 720: 680: 311: 1055: 782: 675: 526: 165: 1114: 968: 827: 695: 670: 229: 209: 205: 244: 1065: 1029: 994: 963: 746: 741: 506: 401: 221: 217: 1138: 305: 1024: 999: 890: 832: 496: 491: 477: 213: 1154: 943: 923: 556: 516: 511: 280: 17: 989: 898: 865: 857: 817: 767: 751: 644: 596: 576: 473: 469: 465: 284: 249: 224:, combined with a metal anchor attached to a rubberized metal cable secured with a 236:
icon that looks like a padlock with a capital "K", or the slot may be unlabelled.
132: 1085: 1070: 1004: 913: 822: 772: 665: 501: 271:
or, less frequently, a flat key lock or a numeric combination lock with no key.
261: 257: 181: 35: 948: 797: 629: 349: 343: 338: 225: 928: 908: 870: 792: 787: 710: 649: 566: 376: 144:
The Kensington Security Slot is the rightmost opening on the side of this
1009: 880: 807: 639: 601: 571: 531: 521: 690: 634: 586: 581: 173: 953: 201: 812: 243: 191: 139: 131: 438: 29: 427: 248:
Kensington lock attached to a Kensington Security Slot on a
334:
Security anchor/tether assemblage for portable articles
287:, and have special screws to secure locks in place. 1038: 889: 856: 760: 729: 658: 622: 549: 484: 398:"PA496U: Targus DEFCON® VPKL - Video Port Key Lock" 329: 327: 307:
The Computer Chronicles - Notebook Computers (1992)
60:. Unsourced material may be challenged and removed. 176:in 2002, and since 2005 owned and marketed by 450: 8: 457: 443: 435: 168:designed in the mid 1980s and patented by 136:Kensington Security lock: unlocked, locked 120:Learn how and when to remove this message 27:Anti-theft system for computer equipment 296: 367: 365: 363: 7: 1122: 1110: 58:adding citations to reliable sources 353:(Cornelius McDaid, John Ristuccia, 373:"Kensington SAFE Security Ratings" 267:The lock mechanism is typically a 25: 1133: 1121: 1109: 1099: 1098: 540: 34: 314:from the original on 2021-12-22 45:needs additional citations for 1046:Glossary of locksmithing terms 1: 980:Perimeter intrusion detection 959:Miniature snap-action switch 706:Time-delay combination locks 357:- priority date: 1999-06-21) 1061:John M. Mossman Lock Museum 1051:Electromagnetic door holder 1182: 172:in 1999–2000, assigned to 69:"Kensington Security Slot" 1094: 919:Closed-circuit television 538: 304:The Computer Chronicles, 178:Kensington Products Group 803:Kensington Security Slot 716:Tubular pin tumbler lock 269:tubular pin tumbler lock 154:Kensington Security Slot 1161:Locks (security device) 1020:Vandal-resistant switch 974:Passive infrared sensor 904:Alarm monitoring center 701:Rotary combination lock 550:Components and hardware 1076:Lock Museum of America 592:Bored cylindrical lock 355:Kryptonite Corporation 252: 197: 196:Kensington Laptop Lock 149: 137: 1104:Category:Locksmithing 1015:Ultrasonic transducer 339:U.S. Patent 6,081,974 247: 195: 143: 135: 985:Photoelectric sensor 939:Glass break detector 838:Real-estate lock box 737:Electromagnetic lock 609:Single-point locking 562:Interchangeable core 485:Fundamental concepts 54:improve this article 18:Kensington lock slot 1081:Musée de la Serrure 934:Fingerprint scanner 843:Steering-wheel lock 778:Chubb detector lock 686:Magnetic keyed lock 614:Three-point locking 721:Wafer tumbler lock 681:Lever tumbler lock 253: 198: 150: 138: 1148: 1147: 1056:Exit control lock 783:Child safety lock 676:Disc tumbler lock 527:Physical security 210:desktop computers 206:computer monitors 166:anti-theft system 130: 129: 122: 104: 16:(Redirected from 1173: 1137: 1125: 1124: 1113: 1112: 1102: 1101: 969:Occupancy sensor 828:Power door locks 761:Other lock types 730:Electronic locks 696:Combination lock 671:Pin tumbler lock 659:Mechanical locks 544: 459: 452: 445: 436: 431: 430: 428:Official website 413: 412: 410: 409: 400:. Archived from 394: 388: 387: 385: 384: 375:. Archived from 369: 358: 352: 346: 341: 331: 322: 321: 320: 319: 301: 230:combination lock 222:video projectors 218:audio interfaces 180:, a division of 164:) is part of an 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 1181: 1180: 1176: 1175: 1174: 1172: 1171: 1170: 1151: 1150: 1149: 1144: 1090: 1066:Key to the City 1034: 1030:Window security 995:Pressure switch 964:Motion detector 891:Security alarms 885: 852: 756: 747:Electric strike 742:Electronic lock 725: 654: 618: 545: 536: 507:Key duplication 480: 478:security alarms 463: 426: 425: 422: 417: 416: 407: 405: 396: 395: 391: 382: 380: 371: 370: 361: 348: 342: 337: 332: 325: 317: 315: 303: 302: 298: 293: 277: 242: 214:gaming consoles 190: 162:Kensington lock 156:(also called a 148:laptop computer 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 1179: 1177: 1169: 1168: 1163: 1153: 1152: 1146: 1145: 1143: 1142: 1130: 1118: 1106: 1095: 1092: 1091: 1089: 1088: 1083: 1078: 1073: 1068: 1063: 1058: 1053: 1048: 1042: 1040: 1036: 1035: 1033: 1032: 1027: 1025:Water detector 1022: 1017: 1012: 1007: 1002: 1000:Proximity card 997: 992: 987: 982: 977: 971: 966: 961: 956: 951: 946: 941: 936: 931: 926: 921: 916: 911: 906: 901: 895: 893: 887: 886: 884: 883: 878: 873: 868: 862: 860: 854: 853: 851: 850: 845: 840: 835: 833:Protector lock 830: 825: 820: 815: 810: 805: 800: 795: 790: 785: 780: 775: 770: 764: 762: 758: 757: 755: 754: 749: 744: 739: 733: 731: 727: 726: 724: 723: 718: 713: 708: 703: 698: 693: 688: 683: 678: 673: 668: 662: 660: 656: 655: 653: 652: 647: 642: 637: 632: 626: 624: 620: 619: 617: 616: 611: 606: 605: 604: 599: 594: 584: 579: 574: 569: 564: 559: 553: 551: 547: 546: 539: 537: 535: 534: 529: 524: 519: 514: 509: 504: 499: 497:Authentication 494: 492:Access control 488: 486: 482: 481: 464: 462: 461: 454: 447: 439: 433: 432: 421: 420:External links 418: 415: 414: 389: 359: 323: 295: 294: 292: 289: 276: 273: 241: 238: 189: 186: 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1178: 1167: 1164: 1162: 1159: 1158: 1156: 1141: 1140: 1136: 1131: 1129: 1128: 1119: 1117: 1116: 1107: 1105: 1097: 1096: 1093: 1087: 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1043: 1041: 1039:Miscellaneous 1037: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1008: 1006: 1003: 1001: 998: 996: 993: 991: 988: 986: 983: 981: 978: 975: 972: 970: 967: 965: 962: 960: 957: 955: 952: 950: 947: 945: 944:Heat detector 942: 940: 937: 935: 932: 930: 927: 925: 924:Door security 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 897: 896: 894: 892: 888: 882: 879: 877: 874: 872: 869: 867: 864: 863: 861: 859: 855: 849: 846: 844: 841: 839: 836: 834: 831: 829: 826: 824: 821: 819: 816: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 765: 763: 759: 753: 750: 748: 745: 743: 740: 738: 735: 734: 732: 728: 722: 719: 717: 714: 712: 709: 707: 704: 702: 699: 697: 694: 692: 689: 687: 684: 682: 679: 677: 674: 672: 669: 667: 664: 663: 661: 657: 651: 648: 646: 643: 641: 638: 636: 633: 631: 628: 627: 625: 621: 615: 612: 610: 607: 603: 600: 598: 595: 593: 590: 589: 588: 585: 583: 580: 578: 575: 573: 570: 568: 565: 563: 560: 558: 555: 554: 552: 548: 543: 533: 530: 528: 525: 523: 520: 518: 517:Master keying 515: 513: 512:Key relevance 510: 508: 505: 503: 500: 498: 495: 493: 490: 489: 487: 483: 479: 475: 471: 467: 460: 455: 453: 448: 446: 441: 440: 437: 429: 424: 423: 419: 404:on 2009-05-27 403: 399: 393: 390: 379:on 2011-09-03 378: 374: 368: 366: 364: 360: 356: 351: 345: 340: 335: 330: 328: 324: 313: 309: 308: 300: 297: 290: 288: 286: 282: 274: 272: 270: 265: 263: 259: 251: 246: 239: 237: 233: 231: 227: 223: 219: 215: 211: 207: 203: 194: 187: 185: 183: 179: 175: 171: 167: 163: 159: 155: 147: 142: 134: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 1132: 1120: 1108: 990:Piezo switch 899:Alarm device 866:Lock bumping 858:Lock picking 818:Luggage lock 802: 768:Bicycle lock 752:Keycard lock 645:Skeleton key 597:Mortise lock 577:Key retainer 474:lock picking 470:locksmithing 406:. Retrieved 402:the original 392: 381:. Retrieved 377:the original 333: 316:, retrieved 306: 299: 285:printer port 278: 275:Alternatives 266: 262:bolt cutters 254: 250:PowerBook G4 234: 199: 161: 157: 153: 151: 146:Acer Swift 3 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 1166:ACCO Brands 1086:Puzzle lock 1071:Lock Museum 1005:Reed switch 914:Card reader 823:Night latch 773:Bramah lock 666:Warded lock 502:Key control 182:ACCO Brands 1155:Categories 949:Key switch 798:Door chain 630:Berlin key 408:2014-04-12 383:2014-04-12 318:2018-12-13 291:References 240:Efficiency 170:Kryptonite 110:March 2024 80:newspapers 929:Dual loop 909:Car alarm 871:Locksport 793:Dead bolt 788:Crash bar 711:Time lock 650:Smart key 567:Key blank 350:6,360,405 344:6,317,936 1010:Tripwire 881:Snap gun 876:Slim Jim 848:The Club 808:Knox Box 640:Keychain 602:Rim lock 572:Key code 532:Rekeying 522:Password 312:archived 691:Padlock 635:Car key 587:Lockset 582:Lockrod 557:Bitting 202:laptops 174:Schlage 94:scholar 954:Keypad 476:, and 220:, and 188:Design 158:K-Slot 96:  89:  82:  75:  67:  1127:Locks 976:(PIR) 813:Latch 466:Locks 101:JSTOR 87:books 1139:Book 1115:Keys 623:Keys 347:and 258:wire 152:The 73:news 283:or 281:VGA 260:or 228:or 226:key 160:or 56:by 1157:: 472:, 468:, 362:^ 336:: 326:^ 310:, 216:, 212:, 208:, 204:, 184:. 458:e 451:t 444:v 411:. 386:. 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Kensington lock slot

verification
improve this article
adding citations to reliable sources
"Kensington Security Slot"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message


Acer Swift 3
anti-theft system
Kryptonite
Schlage
Kensington Products Group
ACCO Brands

laptops
computer monitors
desktop computers
gaming consoles
audio interfaces
video projectors
key
combination lock

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.