Questions about computer theft........!

Associate
Joined
22 Aug 2010
Posts
2,212
Location
In My Command Center
So i was thinking just a moment ago that if some A hole broke in and stole my PC and used Google Chrome, they would be able to log into to nearly every website i use, financial and otherwise!
I like many out there save their passwords for ease of logging in. I have a different password for nearly every website and cannot remember them all so its easier just to let Chrome save them.
I also use Google Drive on my PC and i have many sensitive documents on there.
I have set up two step verifications on everything I can to help with security.

So my questions are -

1) Is there a way i can remotely delete my pc?

2) If I log into Google on another PC and de authorise my PC will it remove everything from Chrome?

3) If I de authorise my Drive will it permanently delete everything off my PC?

Many thanks
 
Do you have a password on your Windows account?
Is the machine set to auto login?

You should consider using Bitlocker full disk encryption.
 
I dont have a password on my PC or windows acc.
Auto login for what?

Is bitlocker a native thing in window 7?

Many thanks

**edit**

ok found bitlocker :) many thanks but previous questions still stand :)

**edit no 2**

ok just realised i can selectively choose which files to sync to my pc so i can leave some hidden in Google Drive online :)
 
Last edited:
Windows password is pointless apparently as anyone who wants to get into your windows account will easy, there's even stuff to download on the net that will get passed a windows password. No idea if they actually work, or even window passwords are that easy to get passed, but ppl say they are?
 
For Windows based OS you can brute force weak passwords easily or remove passwords altogether with neither option requiring any more knowledge than being able to do a google search.
 
All my important data is all on a encrypted drive and so is my backup drive, so if anyone stole my pc and/or my backup, my important data drives will appear empty. I decided todo this a few yrs ago.
 
Bitlocker full disk encryption and a reasonably complex windows login password should be enough for the most part. Any tools to brute force or clear a windows password may require you to boot from a live CD or similar meaning they shouldn't be able to access the encrypted hdd with unlocking it first with either a TPM or a password/USB stick depending on how it was setup. Running Windows 8/8.1 with a UEFI bios and SecureBoot should make it even more secure to stop code being injected after the drive is unlocked but before windows is loaded

It's also my understanding that most other "hacks" to gain access to Windows require either poorly configured security or some interaction from the user to install or enable something to take advantage of an exploit, i.e. opening an email with an attachment called photo_001.zip
 
Last edited:
Do you have a password on your Windows account?

ZATudi0.jpg



A windows password offers no security what so ever.
 
It does when coupled with disk encryption.

Also consider getting rid of saved passwords in Google and put them into something like Lastpass. With Lastpass you have a login to the website / tool and then you can further secure it with Google Authenticator. It's also free.

http://www.lastpass.com



M.
 
It does when coupled with disk encryption.

Also consider getting rid of saved passwords in Google and put them into something like Lastpass. With Lastpass you have a login to the website / tool and then you can further secure it with Google Authenticator. It's also free.

http://www.lastpass.com



M.

TY, thats good info :)

Bitlocker full disk encryption and a reasonably complex windows login password should be enough for the most part. Any tools to brute force or clear a windows password may require you to boot from a live CD or similar meaning they shouldn't be able to access the encrypted hdd with unlocking it first with either a TPM or a password/USB stick depending on how it was setup. Running Windows 8/8.1 with a UEFI bios and SecureBoot should make it even more secure to stop code being injected after the drive is unlocked but before windows is loaded

It's also my understanding that most other "hacks" to gain access to Windows require either poorly configured security or some interaction from the user to install or enable something to take advantage of an exploit, i.e. opening an email with an attachment called photo_001.zip


All my important data is all on a encrypted drive and so is my backup drive, so if anyone stole my pc and/or my backup, my important data drives will appear empty. I decided todo this a few yrs ago.

I think this is what i will look into, many thanks
 
You guys told me a long time ago "if you encrypt your whole boot drive, this slows down loading times"?

I never noticed any real slow down apart from on boot with my system disk fully encrypted using TrueCrypt but then again that was before I had an SSD so I imagine it'll have a tiny hit on performance these days.
 
I never noticed any real slow down apart from on boot with my system disk fully encrypted using TrueCrypt but then again that was before I had an SSD so I imagine it'll have a tiny hit on performance these days.

Mid-range Sandy Bridge CPUs upwards have AES-NI instructions added to virtually eradicate any overhead.
 
Windows password is pointless apparently as anyone who wants to get into your windows account will easy, there's even stuff to download on the net that will get passed a windows password. No idea if they actually work, or even window passwords are that easy to get passed, but ppl say they are?

actually if you reset the windows password using erd or soemthing all the passwords contained within are lost, so they would have your website history butsaved passwords should have gone...

I'd not fully tested this to be totally sure which passwords may not vanish..
 
I never noticed any real slow down apart from on boot with my system disk fully encrypted using TrueCrypt but then again that was before I had an SSD so I imagine it'll have a tiny hit on performance these days.

So if you use truecrypt to encrypted your boot drive I guess it asks for a password before it boots windows and is it worth doing?
 
So if you use truecrypt to encrypted your boot drive I guess it asks for a password before it boots windows and is it worth doing?

Yep, although it only works with Win 7 or earlier without having to mess about too much.
It's about as secure as you'll get.
 
Using Windows 8.1 with a TPM on the motherboard, when I go away on holiday or overnight I remove the TPM and take it with me.

Bitlocker on all drives, strong MS account password. Bitlocker keys are saved elsewhere encrypted separately as a backup.

Browser - I use Lastpass which I have to log into every time to get access to.

Simple steps make it far more secure.
 
It does when coupled with disk encryption.

No, it doesn't.

Once you have the pc booted and windows is loaded ready for logon it's game on for anyone who wants to access the data on that pc.

Disk encryption offers security, regardless of whether Windows has a password or not.

So yeah,

A windows password offers no security what so ever.

The only password that is secure would be the encryption password which is entered before booting.
 
Back
Top Bottom