It’s in all the movies and TV-series where a Government Employee log on a Secure Computer. He or She insert or remove a KeyCard to log on and off. Without the KeyCard the computer is rendered useless. If you like the idea, well …
Predator, let you do exactly that !
Security is always an issue wetter you are working on your Home Computer or you are at work. This is why password protection was invented – to prevent unauthorized access to computers and systems. This is why most Company Networks have the message “This Computer is Locked!” when you are away from your workstation.
If the network requires many users with passwords and security it is a daunting and tiresome task to maintain the ever-changing usernames and passwords. Now, this can be done easier and simpler, using Predator.
PREDATOR locks your PC when you are away, even if your Windows session is still opened.
Simple User Control
Predator allows you to lock or unlock a computer by inserting or removing a USB Flash Drive. Once installed you can control who has access to the computer by administering Flash Drives.
It uses a regular USB Flash Drive as an access control device, and works as follows:
- you insert the USB drive and run PREDATOR (autostart with Windows is possible)
- you do your work…
When you’re away from your PC, you simply remove the Flash Drive. Once removed, the Keyboard, Mouse and Windows Task Manager are disabled. If you want, you can set the screen to dim down, making it obvious that the computer is locked, or you may also make it appear turned off all together.
When you return to your Computer, insert the Flash Drive and your Computer goes back to normal.
One on Several or Several on One…
One Flash Drive can be set to access several computers and Several Flash Drives can be set to access one computer. The system checks the inserted Flash Drive on a custom interval and even changes the access key on a regular basis, thus preventing unauthorized people to gain access by copying the Flash Drives .
Warnings and Logs
A new feature (for those who have used this a while) is the ability to send warning of unauthorized access attempts by SMS or Email. This function require that you have a Twitter Account.
If someone attempts to breach your security you can also make your Computer go haywire with your optional sounds or alarms, which is useful for computers in a public area.
I like it!
Within one minute of installing Predator, I was protected. The software feels light, it takes no CPU what so ever and the only visible proof of its existence, is a small green pulsating dot in the Taskbar. Which in Windows 7 disappears in the “hidden Icon” section after a few minutes.
I plugged out my Flash Drive and after about 30 seconds My computer was locked down. The time it takes to completely lock depends on two things. How often you set Predator to monitor your Flash Drive, and how long ago it checked it.
As with everything else, there are a few things I would like to change or add. The Graphics Designer in me, would love to see the product in a more user-friendly color scheme. The software GUI is dark and not very inviting and it could use a few touches here and there. I do keep in mind that it’s a settings panel and not an environment of which you are going to stay much.
As function goes, if Predator would take a step up, and also include User Account Control. You could let people access their own User Account when plugging in their own Flash Drive. Then you would get the total Network Security Solution. And then it would truly be what we see in Hollywood…
Predator comes in two versions; a Free Version and a Professional version. It also supports 32-bit and 64-bit architecture. You can read more about Predator by Clicking Here!
Computer geek from the age of 7, which amounts to 30 years of computer experience. From the early days (when every computer company had their own OS) of DOS, Windows 1.0 through Seven...