Solved

Is there a USB "lock" available to disable a computer?

Posted on 2011-10-01
5
394 Views
Last Modified: 2012-05-12
Does anyone know of a USB "Key" or dongle that would render a desktop computer 95% useless unless the key were inserted? This would not be for extreme security purposes. It would be intended for the "honest hackers".such as nosey family members and the like. Also a requirement would be the option to purchase a duplicate "key" for bank vault storage in case the original were lost. Any ideas? Manufacturers? Retailers?
0
Comment
Question by:Need-a-Clue
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 95

Assisted Solution

by:John Hurst
John Hurst earned 150 total points
ID: 36898224
I have not heard of such a thing. Even if it existed, it would not stop someone booting the hard drive with a bootable device and getting the data from it (which is what nosey people are looking for). ... Thinkpads_User
0
 

Author Comment

by:Need-a-Clue
ID: 36898441
I had heard of a system by which BIOS caused an internal card/device to activate. The device would then look for the specific dongle and, if correct would continue booting. Maybe I'm missing something here. Highly likely.
0
 
LVL 9

Accepted Solution

by:
Vampireofdarkness earned 350 total points
ID: 36899038
The only one I've heard of / seen is the Fujitsu MemoryBird / SystemLock (http://uk.ts.fujitsu.com/rl/servicesupport/techsupport/software/SystemLock/SystemLock.htm), but that is specific to Fujitsu machines...I also don't think it comes with the duplicate option.

You would likely need to go for a Smart Card setup.
0
 

Author Closing Comment

by:Need-a-Clue
ID: 36899499
Thanks all. Ill keep searching.
0
 
LVL 95

Expert Comment

by:John Hurst
ID: 36899727
Thank you. I was pleased to assist. I shall look around as well. ... Thinkpads_User
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question