Feeds
40%

Atek Logio password storage gadget

Remembers the login details you can't

  • alert
  • submit to reddit

High performance access to file storage

Review Whether you’re logging on to a computer, withdrawing cash from a hole in a wall or reviving a comatose mobile phone, passwords are a daily nuisance necessity. With so many mundane tasks requesting usernames and passwords, a possible solution to this ongoing memory game is the Atek Logio Secure Password Organiser, which acts as the keeper of the keys and nothing more.

About 3mm thick and only slightly wider than a credit card, the Logio features a "US government recommended AES encryption algorithm". There are no computer interface options and no backdoor access. Forget the master password, then forget about ever unlocking the Logio again – it’s junk.

Atek Logio

Atek's Logio: keeper of the keys

Supplied with a leatherette wallet, lanyard and a 50-page user manual, it’s easy to overlook the single coin-cell battery taped inside the packaging that now lingers in the bin. This commonplace CR2016 cell slides in a fairly unobtrusive slot on the bottom left corner of the Logio. Fortunately, all records remain in memory when the battery needs replacing.

Available in black or white, the Logio has a landscape mode aspect with alphanumeric keys laid out horizontally, plus a range of data-entry shortcut keys. Adjacent to the three-row LCD screen - capable of showing up to 11 characters per row before scrolling - are the navigation keys, power button and enter key. The Logio relies on a membrane keyboard, which can be set to beep to confirm key presses.

The initial set-up requires the master password to be entered before anything else can be configured. This has to be numeric only and between eight and 15 digits long. The manual offers some mnemonic suggestions which, considering this is an aid for the forgetful, is a thoughtful addition. Entering the master password is the only time that the keypad becomes numeric-only. At all other times, it works like a mobile phone, requiring repeated key presses to access the different characters assigned to each key.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.