Solved

Is there a USB "lock" available to disable a computer?

Posted on 2011-10-01
5
387 Views
Last Modified: 2012-05-12
Does anyone know of a USB "Key" or dongle that would render a desktop computer 95% useless unless the key were inserted? This would not be for extreme security purposes. It would be intended for the "honest hackers".such as nosey family members and the like. Also a requirement would be the option to purchase a duplicate "key" for bank vault storage in case the original were lost. Any ideas? Manufacturers? Retailers?
0
Comment
Question by:Need-a-Clue
  • 2
  • 2
5 Comments
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 150 total points
Comment Utility
I have not heard of such a thing. Even if it existed, it would not stop someone booting the hard drive with a bootable device and getting the data from it (which is what nosey people are looking for). ... Thinkpads_User
0
 

Author Comment

by:Need-a-Clue
Comment Utility
I had heard of a system by which BIOS caused an internal card/device to activate. The device would then look for the specific dongle and, if correct would continue booting. Maybe I'm missing something here. Highly likely.
0
 
LVL 9

Accepted Solution

by:
Vampireofdarkness earned 350 total points
Comment Utility
The only one I've heard of / seen is the Fujitsu MemoryBird / SystemLock (http://uk.ts.fujitsu.com/rl/servicesupport/techsupport/software/SystemLock/SystemLock.htm), but that is specific to Fujitsu machines...I also don't think it comes with the duplicate option.

You would likely need to go for a Smart Card setup.
0
 

Author Closing Comment

by:Need-a-Clue
Comment Utility
Thanks all. Ill keep searching.
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
Thank you. I was pleased to assist. I shall look around as well. ... Thinkpads_User
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now