Statements (24)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
|
gptkbp:alsoKnownAs |
gptkb:K-slot
gptkb:Kensington_lock |
gptkbp:category |
computer security
hardware security |
gptkbp:compatibleWith |
devices with K-slot
|
gptkbp:developedBy |
gptkb:Kensington_Computer_Products_Group
|
gptkbp:hasComponent |
gptkb:Cyclops
locking mechanism lock slot |
https://www.w3.org/2000/01/rdf-schema#label |
Kensington System
|
gptkbp:introducedIn |
1992
|
gptkbp:marketedAs |
gptkb:Kensington
|
gptkbp:prevention |
gptkb:crime
|
gptkbp:requires |
physical key
combination code |
gptkbp:standardizedBy |
gptkb:Kensington
|
gptkbp:usedFor |
securing desktop computers
securing laptops securing monitors securing other portable devices securing projectors |
gptkbp:bfsParent |
gptkb:Sir_John_Ponsonby_Conroy
|
gptkbp:bfsLayer |
7
|