Statements (24)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security
|
| gptkbp:alsoKnownAs |
gptkb:K-slot
gptkb:Kensington_lock |
| gptkbp:category |
computer security
hardware security |
| gptkbp:compatibleWith |
devices with K-slot
|
| gptkbp:developedBy |
gptkb:Kensington_Computer_Products_Group
|
| gptkbp:hasComponent |
gptkb:Cyclops
locking mechanism lock slot |
| gptkbp:introducedIn |
1992
|
| gptkbp:marketedAs |
gptkb:Kensington
|
| gptkbp:prevention |
gptkb:crime
|
| gptkbp:requires |
physical key
combination code |
| gptkbp:standardizedBy |
gptkb:Kensington
|
| gptkbp:usedFor |
securing desktop computers
securing laptops securing monitors securing other portable devices securing projectors |
| gptkbp:bfsParent |
gptkb:Sir_John_Ponsonby_Conroy
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Kensington System
|