Lock Your PC or Laptop With USB


Who doesn’t want to lock their lappy and who doesn’t want to secure their laptop. So you can prevent access to your computer, but with just a password, you are missing out on an alternate (and more secure) way to lock down your computer. Predator, a free Windows program, turns your USB drive into a key that locks your computer when it's removed.
To unlock your computer, you'll have to plug the USB drive back in (Talk about having secret-agent-style security). This can be downloaded for free. Anyone who attempts to access your computer without the USB flash drive will be hit with an epic "Access Denied" message


THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY 
ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY



Follow My Steps To Know How To Lock Your Computer With USB

Step 1: Download and install Predator.

                   Click Here To Download Preadtor 64-Bit

                        Click Here To Download predator 32-Bit

Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumb drive. When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.

Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the "New password" field. If you lose your USB drive, you'll use it to unlock your computer. If you'd like, you can check the Always Required box and you'll be asked to enter the password each time you use your thumb drive to unlock your PC. Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you're done, click "Create key" and then OK.


Step 4: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running. Every 30 seconds, Predator will check to see that your USB drive is plugged in. If it isn't, your computer will dim and lock down.



Advanced Security Features:


  • PREDATOR can protect several PCs with the same USB flash drive, e.g. your home and office computers.
  • PREDATOR can protect several user accounts on a PC, each one having its own settings and its own USB stick.
  • PREDATOR can lock user accounts according to a hourly, daily or weekly schedule, each one with its own timetable.
  • PREDATOR can send alert messages by Email.
  • PREDATOR can take a picture of the person who tries to use your computer and attach it to an email or upload it to a remote server.
  • PREDATOR records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away.
  • PREDATOR frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
  • PREDATOR protects its own in-memory process. Nobody can stop it with Ctrl-Alt-Del.
  • PREDATOR disables the CD Autorun feature in Windows, to prevent intruders from running malware on specially crafted CDs.
  • PREDATOR lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.
  • PREDATOR can sound an audible alarm if somebody enters an invalid password.


==========    Hacking Don't Need Agreements     ==========
Just Remember One Thing You Don't Need To Seek Anyone's Permission To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
            Thank You for Reading My Post, I Hope It Will Be Useful For You


I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At BhanuHacks@gmail.com

Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Web Developer, Student and Mechanical Engineer. He Enjoys writing articles, Blogging, Solving Errors and Social Networking. Feel Free to let me know any of your concerns about hacking or let me know if you need any more methods on hacking anything. Enjoy Learning

No comments:

Post a Comment