Solved

Is there a USB "lock" available to disable a computer?

Posted on 2011-10-01
5
391 Views
Last Modified: 2012-05-12
Does anyone know of a USB "Key" or dongle that would render a desktop computer 95% useless unless the key were inserted? This would not be for extreme security purposes. It would be intended for the "honest hackers".such as nosey family members and the like. Also a requirement would be the option to purchase a duplicate "key" for bank vault storage in case the original were lost. Any ideas? Manufacturers? Retailers?
0
Comment
Question by:Need-a-Clue
  • 2
  • 2
5 Comments
 
LVL 93

Assisted Solution

by:John Hurst
John Hurst earned 150 total points
ID: 36898224
I have not heard of such a thing. Even if it existed, it would not stop someone booting the hard drive with a bootable device and getting the data from it (which is what nosey people are looking for). ... Thinkpads_User
0
 

Author Comment

by:Need-a-Clue
ID: 36898441
I had heard of a system by which BIOS caused an internal card/device to activate. The device would then look for the specific dongle and, if correct would continue booting. Maybe I'm missing something here. Highly likely.
0
 
LVL 9

Accepted Solution

by:
Vampireofdarkness earned 350 total points
ID: 36899038
The only one I've heard of / seen is the Fujitsu MemoryBird / SystemLock (http://uk.ts.fujitsu.com/rl/servicesupport/techsupport/software/SystemLock/SystemLock.htm), but that is specific to Fujitsu machines...I also don't think it comes with the duplicate option.

You would likely need to go for a Smart Card setup.
0
 

Author Closing Comment

by:Need-a-Clue
ID: 36899499
Thanks all. Ill keep searching.
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 36899727
Thank you. I was pleased to assist. I shall look around as well. ... Thinkpads_User
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question