'' [B]
oth programs generally accomplish the same thing: they lock the device down, preventing unauthorized access to the sensitive data, and if the owner sends an appropriate command, then the software wipes the hard drive, making the laptop / cell phone worthless.»