by dbIII (701233) writes: I refer you again to the line about keeping current keys in authorized keysObviously that is not going to help in any way at all until it is already been revealed that the key is stolen - most likely by somebody using it to get in and create some sort of incident.If I am not fit to use a calculator by spotting these things that you are not then where does that leave you?