Sie sind auf Seite 1von 15

INTERNET DONGLE

Content
• Definition
• Advantages
• History
• References


Definition
• A device that attaches to a computer
to control access to a particular
application. Dongles provide the
most effective means of copy
protection.

b a ck
-
Advantages
Low power consumption.
- Supports Plug and Play.
- The compact USB Infrared Dongle
allows wireless data transmission
using the IrDA protocol at speeds of
up to 4Mbit/sec.
- Wirelessly connect to your Mobile
Phone, PDA and other mobile
devices!
-

• b a ck

History
The word dongle has been used as a placeholder name since the 1970s. Its origin
is unknown. The American Heritage Dictionary, 4th edition, says it is "probably
[an] arbitrary coinage." Claims that it was derived from the name "Don Gall"
are an urban myth popularized by a 1992 advertisement for Rainbow
Technologies, now SafeNet, a dongle vendor.
• Dongle as the name of a device was used well before 1980 within the telecom
industry to refer to BNC cable joiners of either gender (such as the RG58 cable
used on 10 meg Ethernet).
• WORDCRAFT was the first program to use a software protection dongle, in 1980.
Its dongle was a simple passive device that supplied data to the pins of a
Commodore PET's external cassette port in a pre-determined manner. This
arrangement was made possible because the PET cassette port supplied both
power and data connections through a proprietary edge connector. It did,
however, make the cassette port unusable for its intended purpose.
• That first dongle was allegedly invented and named by Graham Heggie in the UK
although the true inventor and namer of the Dongle was a Mr John Paulson
from Chinley in Derbyshire (UK)[citationneeded ]
• The two cubic inch (33 cm³) resin-potted first generation devices were called
"dongles" by the inventor as there was no other suitable term to hand on the
day. The device increased WORDCRAFT sales significantly. The distributor, b a ck
Dataview Ltd., then based in Colchester, UK, then went on to produce a
Reference
• http://www.douglasadams.com
• http://www.tdi-matrix.com
• http://www.safenet-
inc.com/products/sentinel/hardware
_keys
• http://www.aladdin.com/hasp/default
• http://wibu.com/codemeter
• http://www.sg-lock.com
• b a ck
Create by :
SAYYID HAZIQ BIN HASSMORO
MUHAMMAD IZZUL FITRI BIN SULAIMAN
AHMAD NADHIR BIN KHIRUDIN
The
end
• A security or copy-protection device for commercial
computer programs. Programs can use a dongle
query at the start of a program to determine if the
registration is valid and to terminate if the correct
code is not present.
• Technically speaking, a dongle is a mechanism for
ensuring that only authorized users can copy or use
specific software applications, especially very
expensive programs. Common mechanisms include:
hardware keys that plug into a parallel or serial port,
so a software application can access them for
verification; special key diskettes, accessed in a
similar manner; and registration numbers, loaded
into some form of ROM (read-only memory) at the
factory or during system set up. If more than one
application requires a dongle, multiple dongles can
be daisy-chained together from the same port.
Dongles are not in frequent use, partly because
enterprises don't like to have a serial or parallel port
• A dongle is an external hardware-
based security solution that
provides the highest level of
security currently available.
Hardware tokens are commonly
used to protect high value
applications and therefore end
users are accustomed to their
presence. Dongles do not create a
substantial inconvenience and
therefore do not inhibit a software
• Wirelessly connect to your
Mobile Phone, PDA and other
mobile devices!

• A dongle is a small hardware device that connects to a computer
to authenticate an item of software.
• Dongle may also refer to something that plugs into a computer
and converts a small (often proprietary) port or plug into a
larger standard plug. Dongles tend to consist of two connectors
that are attached to one another by a length of cable that that
hangs (dangle) from a laptop computer. For example:
• A jack wired to a small edge connector on a Type I or II PCMCIA
card, typically an 8P8C modular connector for an Ethernet cable
or RJ11 jack for a telephone cable. This type of dongle has no
copy prevention purpose. PCMCIA card dongles are notoriously
fragile and unreliable. They are falling out of favour as more
laptops include built-in Ethernet and modem sockets.
• USB adapters, such as for memory cards.
• Other USB devices, primarily flash memory drives, used only for
data storage (as opposed to USB Hardware Token Devices).
• The word has also been applied to Bluetooth and Wi-Fi antennas.
• It is also been used to refer to ATI CrossFire Interconnects


• A dongle is a small hardware device that connects to a computer to
authenticate a piece of software. When the dongle is not present, the
software runs in a restricted mode or refuses to run. Dongles are used by
some proprietary vendors as a form of copy prevention or
digital rights management because it is much harder to copy the dongle
than to copy the software it authenticates. Vendors of software protection
dongles (and dongle-controlled software) often use terms such as hardware
key, hardware token, or security device in their written literature. In
day-to-day use however, the jargon word "dongle" is much more commonly
used.
• The term has been somewhat generalized to describe specialized connectors
that convert one type of port to another, for example an RJ45 jack that plugs
into the edge connector on some kinds of PCMCIA Ethernet cards, as well as
small devices such as USB flash drives or wireless networking adapters. In
addition, author Douglas Adams, in a 1990s column for the US edition of
MacWorld magazine, used the term "little dongly things" to describe plug
converters necessary for adapting US power cables to international plugs.
These usages are not universally accepted.
• Software protection dongles are typically used with very expensive packages
(starting with about USD 500 and up) and vertical market software, such as
CAD/CAM software, MICROS Systems hospitality and special retail software,
Digital Audio Workstation applications and some translation memory
packages. Efforts to introduce dongle copy prevention in the mainstream
software market were generally met with stiff resistance from users. Despite
being hardware, dongles are not a complete solution to the trusted client
problem.
• Well-known software protection dongle manufacturers include Matrix (Matrix

Das könnte Ihnen auch gefallen