141:
193:
542:
245:
1100:
36:
1135:
133:
1123:
1111:
235:
The hole is found in many laptops, although a lock for it is typically not included. Occasionally, the slot is located so that installing a lock will also prevent the removal of a valuable subcomponent, such as a rechargeable battery or a memory module. The
Kensington slot may be marked with a small
255:
Kensington locks can discourage opportunistic grab-and-run thefts of equipment from public locations such as coffee shops or libraries, but they are not designed to be impervious protection measures, nor are they intended to secure equipment in unattended locations, because they can be torn out of
264:. In addition to this, successfully securing the non-locking, loop end of the cable is dependent upon the availability of a suitable anchoring point on a virtually immovable base object, or a thief may just shift that object, and then take the protected device with cable attached.
256:
equipment (although not without causing visible damage), given that the cases are typically made of plastic or thin metal, and the cable can be cut with
232:. The end of the cable has a small loop that allows the cable to be looped around a permanent object, such as a heavy table or other similar equipment.
53:
456:
279:
Several manufacturers offer similar locking mechanisms that do not require a special lock hole. They attach to a popular port, such as the
100:
200:
The system consists of a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as
1126:
397:
72:
119:
1160:
79:
1045:
57:
979:
86:
958:
705:
140:
1060:
1050:
372:
68:
449:
46:
918:
177:
715:
268:
1019:
973:
903:
700:
1080:
1075:
591:
354:
169:
434:
1103:
1014:
847:
541:
442:
192:
93:
1165:
984:
938:
875:
837:
736:
608:
561:
1134:
933:
842:
777:
685:
613:
145:
720:
680:
311:
1055:
782:
675:
526:
165:
1114:
968:
827:
695:
670:
229:
209:
205:
244:
1065:
1029:
994:
963:
746:
741:
506:
401:
221:
217:
1138:
305:
1024:
999:
890:
832:
496:
491:
477:
213:
1154:
943:
923:
556:
516:
511:
280:
17:
989:
898:
865:
857:
817:
767:
751:
644:
596:
576:
473:
469:
465:
284:
249:
224:, combined with a metal anchor attached to a rubberized metal cable secured with a
236:
icon that looks like a padlock with a capital "K", or the slot may be unlabelled.
132:
1085:
1070:
1004:
913:
822:
772:
665:
501:
271:
or, less frequently, a flat key lock or a numeric combination lock with no key.
261:
257:
181:
35:
948:
797:
629:
349:
343:
338:
225:
928:
908:
870:
792:
787:
710:
649:
566:
376:
144:
The
Kensington Security Slot is the rightmost opening on the side of this
1009:
880:
807:
639:
601:
571:
531:
521:
690:
634:
586:
581:
173:
953:
201:
812:
243:
191:
139:
131:
438:
29:
427:
248:
Kensington lock attached to a
Kensington Security Slot on a
334:
Security anchor/tether assemblage for portable articles
287:, and have special screws to secure locks in place.
1038:
889:
856:
760:
729:
658:
622:
549:
484:
398:"PA496U: Targus DEFCON® VPKL - Video Port Key Lock"
329:
327:
307:
The
Computer Chronicles - Notebook Computers (1992)
60:. Unsourced material may be challenged and removed.
176:in 2002, and since 2005 owned and marketed by
450:
8:
457:
443:
435:
168:designed in the mid 1980s and patented by
136:Kensington Security lock: unlocked, locked
120:Learn how and when to remove this message
27:Anti-theft system for computer equipment
296:
367:
365:
363:
7:
1122:
1110:
58:adding citations to reliable sources
353:(Cornelius McDaid, John Ristuccia,
373:"Kensington SAFE Security Ratings"
267:The lock mechanism is typically a
25:
1133:
1121:
1109:
1099:
1098:
540:
34:
314:from the original on 2021-12-22
45:needs additional citations for
1046:Glossary of locksmithing terms
1:
980:Perimeter intrusion detection
959:Miniature snap-action switch
706:Time-delay combination locks
357:- priority date: 1999-06-21)
1061:John M. Mossman Lock Museum
1051:Electromagnetic door holder
1182:
172:in 1999–2000, assigned to
69:"Kensington Security Slot"
1094:
919:Closed-circuit television
538:
304:The Computer Chronicles,
178:Kensington Products Group
803:Kensington Security Slot
716:Tubular pin tumbler lock
269:tubular pin tumbler lock
154:Kensington Security Slot
1161:Locks (security device)
1020:Vandal-resistant switch
974:Passive infrared sensor
904:Alarm monitoring center
701:Rotary combination lock
550:Components and hardware
1076:Lock Museum of America
592:Bored cylindrical lock
355:Kryptonite Corporation
252:
197:
196:Kensington Laptop Lock
149:
137:
1104:Category:Locksmithing
1015:Ultrasonic transducer
339:U.S. Patent 6,081,974
247:
195:
143:
135:
985:Photoelectric sensor
939:Glass break detector
838:Real-estate lock box
737:Electromagnetic lock
609:Single-point locking
562:Interchangeable core
485:Fundamental concepts
54:improve this article
18:Kensington lock slot
1081:Musée de la Serrure
934:Fingerprint scanner
843:Steering-wheel lock
778:Chubb detector lock
686:Magnetic keyed lock
614:Three-point locking
721:Wafer tumbler lock
681:Lever tumbler lock
253:
198:
150:
138:
1148:
1147:
1056:Exit control lock
783:Child safety lock
676:Disc tumbler lock
527:Physical security
210:desktop computers
206:computer monitors
166:anti-theft system
130:
129:
122:
104:
16:(Redirected from
1173:
1137:
1125:
1124:
1113:
1112:
1102:
1101:
969:Occupancy sensor
828:Power door locks
761:Other lock types
730:Electronic locks
696:Combination lock
671:Pin tumbler lock
659:Mechanical locks
544:
459:
452:
445:
436:
431:
430:
428:Official website
413:
412:
410:
409:
400:. Archived from
394:
388:
387:
385:
384:
375:. Archived from
369:
358:
352:
346:
341:
331:
322:
321:
320:
319:
301:
230:combination lock
222:video projectors
218:audio interfaces
180:, a division of
164:) is part of an
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
1181:
1180:
1176:
1175:
1174:
1172:
1171:
1170:
1151:
1150:
1149:
1144:
1090:
1066:Key to the City
1034:
1030:Window security
995:Pressure switch
964:Motion detector
891:Security alarms
885:
852:
756:
747:Electric strike
742:Electronic lock
725:
654:
618:
545:
536:
507:Key duplication
480:
478:security alarms
463:
426:
425:
422:
417:
416:
407:
405:
396:
395:
391:
382:
380:
371:
370:
361:
348:
342:
337:
332:
325:
317:
315:
303:
302:
298:
293:
277:
242:
214:gaming consoles
190:
162:Kensington lock
156:(also called a
148:laptop computer
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
1179:
1177:
1169:
1168:
1163:
1153:
1152:
1146:
1145:
1143:
1142:
1130:
1118:
1106:
1095:
1092:
1091:
1089:
1088:
1083:
1078:
1073:
1068:
1063:
1058:
1053:
1048:
1042:
1040:
1036:
1035:
1033:
1032:
1027:
1025:Water detector
1022:
1017:
1012:
1007:
1002:
1000:Proximity card
997:
992:
987:
982:
977:
971:
966:
961:
956:
951:
946:
941:
936:
931:
926:
921:
916:
911:
906:
901:
895:
893:
887:
886:
884:
883:
878:
873:
868:
862:
860:
854:
853:
851:
850:
845:
840:
835:
833:Protector lock
830:
825:
820:
815:
810:
805:
800:
795:
790:
785:
780:
775:
770:
764:
762:
758:
757:
755:
754:
749:
744:
739:
733:
731:
727:
726:
724:
723:
718:
713:
708:
703:
698:
693:
688:
683:
678:
673:
668:
662:
660:
656:
655:
653:
652:
647:
642:
637:
632:
626:
624:
620:
619:
617:
616:
611:
606:
605:
604:
599:
594:
584:
579:
574:
569:
564:
559:
553:
551:
547:
546:
539:
537:
535:
534:
529:
524:
519:
514:
509:
504:
499:
497:Authentication
494:
492:Access control
488:
486:
482:
481:
464:
462:
461:
454:
447:
439:
433:
432:
421:
420:External links
418:
415:
414:
389:
359:
323:
295:
294:
292:
289:
276:
273:
241:
238:
189:
186:
128:
127:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1178:
1167:
1164:
1162:
1159:
1158:
1156:
1141:
1140:
1136:
1131:
1129:
1128:
1119:
1117:
1116:
1107:
1105:
1097:
1096:
1093:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1043:
1041:
1039:Miscellaneous
1037:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1006:
1003:
1001:
998:
996:
993:
991:
988:
986:
983:
981:
978:
975:
972:
970:
967:
965:
962:
960:
957:
955:
952:
950:
947:
945:
944:Heat detector
942:
940:
937:
935:
932:
930:
927:
925:
924:Door security
922:
920:
917:
915:
912:
910:
907:
905:
902:
900:
897:
896:
894:
892:
888:
882:
879:
877:
874:
872:
869:
867:
864:
863:
861:
859:
855:
849:
846:
844:
841:
839:
836:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
774:
771:
769:
766:
765:
763:
759:
753:
750:
748:
745:
743:
740:
738:
735:
734:
732:
728:
722:
719:
717:
714:
712:
709:
707:
704:
702:
699:
697:
694:
692:
689:
687:
684:
682:
679:
677:
674:
672:
669:
667:
664:
663:
661:
657:
651:
648:
646:
643:
641:
638:
636:
633:
631:
628:
627:
625:
621:
615:
612:
610:
607:
603:
600:
598:
595:
593:
590:
589:
588:
585:
583:
580:
578:
575:
573:
570:
568:
565:
563:
560:
558:
555:
554:
552:
548:
543:
533:
530:
528:
525:
523:
520:
518:
517:Master keying
515:
513:
512:Key relevance
510:
508:
505:
503:
500:
498:
495:
493:
490:
489:
487:
483:
479:
475:
471:
467:
460:
455:
453:
448:
446:
441:
440:
437:
429:
424:
423:
419:
404:on 2009-05-27
403:
399:
393:
390:
379:on 2011-09-03
378:
374:
368:
366:
364:
360:
356:
351:
345:
340:
335:
330:
328:
324:
313:
309:
308:
300:
297:
290:
288:
286:
282:
274:
272:
270:
265:
263:
259:
251:
246:
239:
237:
233:
231:
227:
223:
219:
215:
211:
207:
203:
194:
187:
185:
183:
179:
175:
171:
167:
163:
159:
155:
147:
142:
134:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
1132:
1120:
1108:
990:Piezo switch
899:Alarm device
866:Lock bumping
858:Lock picking
818:Luggage lock
802:
768:Bicycle lock
752:Keycard lock
645:Skeleton key
597:Mortise lock
577:Key retainer
474:lock picking
470:locksmithing
406:. Retrieved
402:the original
392:
381:. Retrieved
377:the original
333:
316:, retrieved
306:
299:
285:printer port
278:
275:Alternatives
266:
262:bolt cutters
254:
250:PowerBook G4
234:
199:
161:
157:
153:
151:
146:Acer Swift 3
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
1166:ACCO Brands
1086:Puzzle lock
1071:Lock Museum
1005:Reed switch
914:Card reader
823:Night latch
773:Bramah lock
666:Warded lock
502:Key control
182:ACCO Brands
1155:Categories
949:Key switch
798:Door chain
630:Berlin key
408:2014-04-12
383:2014-04-12
318:2018-12-13
291:References
240:Efficiency
170:Kryptonite
110:March 2024
80:newspapers
929:Dual loop
909:Car alarm
871:Locksport
793:Dead bolt
788:Crash bar
711:Time lock
650:Smart key
567:Key blank
350:6,360,405
344:6,317,936
1010:Tripwire
881:Snap gun
876:Slim Jim
848:The Club
808:Knox Box
640:Keychain
602:Rim lock
572:Key code
532:Rekeying
522:Password
312:archived
691:Padlock
635:Car key
587:Lockset
582:Lockrod
557:Bitting
202:laptops
174:Schlage
94:scholar
954:Keypad
476:, and
220:, and
188:Design
158:K-Slot
96:
89:
82:
75:
67:
1127:Locks
976:(PIR)
813:Latch
466:Locks
101:JSTOR
87:books
1139:Book
1115:Keys
623:Keys
347:and
258:wire
152:The
73:news
283:or
281:VGA
260:or
228:or
226:key
160:or
56:by
1157::
472:,
468:,
362:^
336::
326:^
310:,
216:,
212:,
208:,
204:,
184:.
458:e
451:t
444:v
411:.
386:.
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.