Privacy Watch: This Stolen Laptop Will Self-Destruct in 5 Seconds

Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

Illustration: Mark Matcho
For many fans of the classic Mission: Impossible television series of the late sixties and early seventies, the best part came in the first 5 minutes, when the tape giving the assignment dissolved into a cloud of gray smoke. It's an attractive concept for anyone who deals with sensitive information: If your data is in danger of being stolen, have it self-destruct.

A growing number of products make the idea a reality for lost or stolen laptops, PDAs, and cell phones. Some software will wipe clean a hard drive or memory card that falls into the wrong hands. Some hard drives have a so-called poison pill to physically destroy the drive if it has been tampered with.

These technologies can certainly help big businesses that lose devices containing important corporate data. But you don't need to work at a large company to see the benefit: Just imagine a thief prowling through the account information and passwords you store on a portable device.


Until recently only large corporations could get such products. Now, however, versions for individuals and small businesses are starting to appear. Absolute Software, which makes Lojack for Laptops, will add a remote-kill feature to the next version of the program, so if a portable is stolen, the firm will be able to send a command to wipe out specific files--or even the entire contents of the hard drive.

Two companies make software for PDA smart phones that wipe the device's memory upon receipt of a special SMS text message. Bluefish Wireless sells a $15 program called Central that does this for Palm Treo devices. Windows Smartphone users should check out the $10 PDAKill software from [Editor's note: After the June PC World went to press, the vendor updated this product and changed its name; go to the link for more information.]

Destroying your own data is certainly a drastic solution, but for some people the kill-pill option is well worth considering. If hardware carrying precious data is stolen, your privacy, or your company's bottom line, could depend on it.

Andrew Brandt is a senior associate editor for PC World. E-mail him at Find links to previously published Privacy Watch columns below.
Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details.
Shop Tech Products at Amazon