thumb|Kensington Security lock: unlocked, lockedthumb|The Kensington Security Slot is the rightmost opening on the side of this Acer Swift 3 laptop computer
The Kensington Security Slot (also called a K-Slot or Kensington lock) is part of an anti-theft system designed in the mid 1980s and patented by Kryptonite in 1999–2000,[1] assigned to Schlage in 2002, and since 2005 owned and marketed by Kensington Products Group, a division of ACCO Brands.
thumb|Kensington Laptop Lock
The system consists of a small, metal-reinforced hole found commonly on small or portable computers and electronics equipment such as laptops, computer monitors, desktop computers, gaming consoles, audio interfaces, and video projectors, combined with a metal anchor attached to a rubberized metal cable secured with a key or combination lock. The end of the cable has a small loop that allows the cable to be looped around a permanent object, such as a heavy table or other similar equipment.[1]
The hole is found in many laptops, although a lock for it is typically not included. Occasionally, the slot is located so that installing a lock will also prevent the removal of a valuable subcomponent, such as a rechargeable battery or a memory module. The Kensington slot may be marked with a small icon that looks like a padlock with a capital "K", or the slot may be unlabelled.
thumb|Kensington lock attached to a Kensington Security Slot on a PowerBook G4
Kensington locks can discourage opportunistic grab-and-run thefts of equipment from public locations such as coffee shops or libraries, but they are not designed to be impervious protection measures, nor are they intended to secure equipment in unattended locations,[2] because they can be torn out of equipment (although not without causing visible damage), given that the cases are typically made of plastic or thin metal, and the cable can be cut with wire or bolt cutters. In addition to this, successfully securing the non-locking, loop end of the cable is dependent upon the availability of a suitable anchoring point on a virtually immovable base object, or a thief may just shift that object, and then take the protected device with cable attached.
The lock mechanism is typically a tubular pin tumbler lock or, less frequently, a flat key lock or a numeric combination lock with no key.
Several manufacturers offer similar locking mechanisms that do not require a special lock hole.[3] They attach to a popular port, such as the VGA or printer port, and have special screws to secure locks in place.