Choose Your Language: International US DE ES FR
Hello Guest Login Here or

PREDATOR 3.2.1.312

PREDATOR Description

PREDATOR - This application protects your PC with a USB flash drive.

PREDATOR is a free program that protects your computer from unauthorized access using a USB flash drive.

PREDATOR turns any USB flash drive into an access control device which you can use to lock/unlock your PC. All you have to do is use PREDATOR to create a key on an inserted USB thumb drive, set the program to autostart with Windows for continuous protection and the USB removable drive is now a key for your computer.

While you’re in front of the PC, keep the USB flash drive inserted. Remove it when you’re away and the keyboard & mouse will be disabled and the screen will darken so no one else can access your computer. When you return, simply insert the USB flash drive to regain computer access.

Features:

- A log is automatically created and all security-related events are recorded and displayed in it.
- The security codes recorded on your USB drive are frequently changed so if anyone copies the key from your USB flash drive it will not work.
- After removing the USB key, PREDATOR disables the Task Manager to prevent intruders from manually terminating the program.
- A user-defined password lets you regain access to your computer if you’ve lost your USB key.
- The free version of PREDATOR lets you protect 2 computers using the same key.

PREDATOR 3.2.1.312 is licensed as Trial for the Windows operating system / platform. PREDATOR is provided as a free to try download for all software users (Trial).

User Reviews (0)

No reviews yet, be the first to add a review and we'll give you some extra points.
Related Software
Java Runtime Environment 6 Update 7
Allows you to run applications "applets"
33 / 10,472
ModernHash For Windows 8 Stable
Generates MD5 and SHA hashes for any file
0 / 1,578
46 / 30,987
Hauberk PC Doctor 3.0.0.1
A tool that cleans register, sets up PC and accelerates games.
1 / 648
Cyberarms Intrusion Detection 2.1.4
Provides a pro-active Intrusion Detection and Defense System (IDDS).
2 / 825
DEKSI USB Security 2.8.1
Block unauthorized USB devices from any p.c.
1 / 395