Obtaining an encrypted notebook/computer and prevent against infiltration

Hej ��

I'm writing to explore the options on comparisons of commercial notebooks over encrypted notebooks which are offered online in the prevent and general protection against infiltration and 'hacks' and other 'obvious' methods into the system outside of security management techniques which deal with proper file and user management.

  • what are encrypted notebooks;
  • how are encrypted notebooks different then commercial counterparts; and
  • how is the running operating system managed and protected

Always ��

Welcome fractal_bar,

This is not my specialist area at all, but this link was useful.

Robin