
DEFCON
Notebook Computer Key Lock
™
KL

Targus DEFCON™ KL
Thank you for purchasing the Targus DEFCON KL
Notebook Computer Key Lock. The cut and tamperresistant DEFCON KL helps protect your valuable notebook
computer from theft.
In addition to this user’s guide, this package contains:
• DEFCON KL Notebook Computer Key Lock
• Two keys
If you are missing any parts, contact Technical
Support immediately. For more information, refer to
“Technical Support” on page 7.
Registering the DEFCON KL
Registering the DEFCON KL enables you to order
extra or replacement keys more efficiently by
recording all of the information necessary to order
keys, including the DEFCON KL key code.
To register, go to:
http://www.targususa.com/accessories/DefconKL.htm
You will need to provide your name, email address,
phone number, DEFCON KL key code, and a
password.
Once you register, you can order keys at any time by
contacting Technical Support. For more information,
refer to “Ordering Replacement Keys” on page 7.
2
Locating the Key Code
The DEFCON KL key code is located on the key,
under the cover. For your convenience, record the key
code in the space provided at the end of this guide.

Using the DEFCON KL
Securing the DEFCON KL
Select an object in the room to which you will secure
your notebook computer with the DEFCON KL.
NOTE: Choose a large, heavy piece of furniture such as a
table or desk, or an immovable fixture such as a closet
hanging bar.
1 Take the looped end of the cable and wrap it
around the selected object.
NOTE: Wrap the cable around a part of the object that will
deter an intruder from slipping the cable off (for example, a
table or desk leg with a cross bar or a drawer handle).
2 Feed the locking device through the looped end
of the cable as shown.
3
Securing the DEFCON KL to an object