Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Secure Dongle X

Posted on 2013-05-16
5
Medium Priority
?
1,050 Views
Last Modified: 2013-05-22
Hi there

We recently found a "Secure Dongle X" in the back of a clients PC. Now they do not have any software that would require a dongle and we have never seen it before.

Could it be used for anything untoward? Hacking etc?

They do have concerns regarding one member of staff, this member of staff and her family also clean the building at weekends when no one else is about, so have plenty of opportunity to "mess around" without being seen.
0
Comment
Question by:diles
  • 3
  • 2
5 Comments
 
LVL 8

Expert Comment

by:teomcam
ID: 39172271
Some security equipment requires secure dongle. Also please check following link
http://www.securemetric.com/securedongle-x.php
0
 

Author Comment

by:diles
ID: 39172707
I'm aware of that but they don't have any secure software that would require one. They did use to use a voicemail system but that is long gone and i do not recall that dongle being there the last time i was working on that pc.
0
 
LVL 8

Expert Comment

by:teomcam
ID: 39172850
That's weird. Those dongles not used for hacking purpose but could you check more closely if the dongle have been tampered or not? Possibly it might be some other tool covered with Secure Dongle X cover!
If that is very critical machine that might be a kind of transmission dongle whihc delivering the data somewhere else.
0
 

Accepted Solution

by:
diles earned 0 total points
ID: 39174488
Thanks for all your help. Dongle removed and keeped in safe place. All seems to be working ok.
0
 

Author Closing Comment

by:diles
ID: 39186858
No good answer as this is unusual so we will have to see what happens.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Experts Exchange expands question security options for members.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question