Results 1 to 3 of 3

Thread: Secure your Computer's access with Predator

  1. #1
    Join Date
    May 2009
    Posts
    1,611

    Secure your Computer's access with Predator

    When you're away from your computer, then anyone can use and access your data even put the mess in your system settings. To secure access to your computer, you can lock your session, your password will be requested in order to reactivate your session and access your open tasks and software running.

    You can also turn a USB key in lock with the free Predator. When the key is plugged in, you can use your computer normally. When you leave your computer and remove the key, the computer becomes unusable. The screen goes black, keyboard and mouse are locked and in fact, no one can access your data.

    Installing Predator:

    • Download and save Predator on your desktop or anywhere else in your Hard drive.

    • Open the folder where the unzipped files. Double click the file InstallPredator.exe.

    • Click the Run button.

    • The installation wizard opens Predator. Click the Next button.

    • Select I agree and click Next.

    • Then click Next 3 times.

    • Once finished copying files, click the Close button.


    Transforming a USB drive into lock:

    Predator will use your USB drive as a lock to protect physical access to your computer. Note that the data on the USB drive will not change and you can always use it to store your files.

    • Start Predator double clicking its shortcut on the desktop.

    • A dialog box appears. Plug your USB key and click the OK button.

    • You'll now be able to adjust the parameters of protection. The Interval field indicates reading (in seconds), the frequency of verification of the USB by Predator. By default, the software checks every 30 seconds if the USB key is present. If it is not there, your computer is locked.

    • The Interval field indicates the frequency of writing (in seconds) where the key lock is changed. This prevents someone who copied your USB key to access your computer. You can leave these two fields with default values.

    • In the Password box, type a complex password that will allow you to still log you if you lost or forgot your USB drive.

    • Your USB is selected (change the letter if it is not the case) and click the Create button key.

    • When the key is created, hit OK.

  2. #2
    Join Date
    May 2009
    Posts
    1,611

    Re: Secure your Computer's access with Predator

    Lock and Unlock your computer:

    Now that your USB drive protection is created, you can use to block access to your computer in case of absence. Here is how to do that:

    • The Predator icon in the notification area next to the clock tells you the activity of protection. When the icon is red, it means that Predator writes data on your USB drive. You do not need to disconnect. When the icon is green, it means that you can unplug the key to go away and secure your computer.

    • Remove your USB drive so when you leave your computer. Wait a few seconds the screen goes black and the keys on your keyboard become inactive.

    • When you return, plug the USB key, you get to your office, your documents and open source software, in short, just as it was before to go away.

    • In case of intrusion attempts (more than 3 keys pressed during the lockout), a warning appears.

    • To access the history of Predator and see if intrusion attempts occurred, click the right mouse button on the icon of Predator in the notification area and click View logs.


    Run Predator at Windows startup:

    By default, the automatic start of Predator is reserved for the Pro version of the software. However, you can automatically launch at startup using the Startup folder in the Start menu.

    • Right-click the icon on the desktop of Predator and choose Copy.
    • Click the Start button, click All Programs, click the right mouse button on the Startup folder and click Open.

    • In the window that opens, click the Edit menu then Paste (press the Alt key if the menu bar is not displayed).

    • The shortcut is now present in the Startup menu. It will run every time you start Windows.

    • If your USB key is not inserted when Windows starts, it automatically switch to a black screen and the keyboard will be ineffective.

    • Plug your USB stick to access your desktop.

  3. #3
    Join Date
    May 2009
    Posts
    1,611

    Re: Secure your Computer's access with Predator

    Important Features of Predator:

    • PREDATOR can send alert messages by Email or by SMS.
    • PREDATOR records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away.
    • PREDATOR can replicate this log on your Twitter account, allowing you to remotely monitor all access-control activity on your PC.
    • PREDATOR frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
    • PREDATOR disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.
    • PREDATOR lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.
    • PREDATOR can sound an audible alarm if somebody enters an invalid password.
    • And finally, PREDATOR can protect several PCs with the same USB flash drive, e.g. your home and office computers.

Similar Threads

  1. Unable to access secure websites after upgrading to Windows 7
    By TheNexus in forum Technology & Internet
    Replies: 4
    Last Post: 06-02-2011, 07:44 PM
  2. Getting Secure External Vendor Access
    By Wiren in forum Networking & Security
    Replies: 3
    Last Post: 13-12-2010, 06:04 AM
  3. How to secure VPN with SMS access code authentication?
    By Alexus in forum Networking & Security
    Replies: 4
    Last Post: 12-10-2010, 04:04 PM
  4. How do I grant access to web servers secure database?
    By Liliana in forum Technology & Internet
    Replies: 5
    Last Post: 13-02-2010, 05:14 AM
  5. How do I know my computer is secure
    By Bindusar in forum Networking & Security
    Replies: 6
    Last Post: 17-12-2009, 09:33 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,711,722,650.42558 seconds with 16 queries