PREDATOR

Updated 2 hours ago

locks your PC when you are away, even if your Windows session is still opened. It uses a regular USB flash drive as an access control device, and works as follows:

• you insert the USB drive • you run PREDATOR (autostart with Windows is possible) • you do your work… • when you’re away from your PC, you simply remove the USB drive:  Ã‚· once it is removed, the keyboard and mouse are disabled and the screen darkens • when you return back to your PC, you put the USB flash drive in place:  Ã‚· keyboard and mouse are immediately released, and the display is restored.

It’s easier and faster than closing your Windows session, since you do not have to retype your password when you return.

PREDATOR records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away. P REDATOR can replicate this log on your Twitter account, allowing you to remotely monitor all access-control activity on your PC.

PREDATOR frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.

PREDATOR disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.

PREDATOR lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.

PREDATOR can sound an audible alarm if somebody enters an invalid password.

And finally, PREDATOR can protect several PCs with the same USB flash drive, e.g. your home and office computers.

With PREDATOR, security is as simple as inserting or removing a USB stick !

PREDATOR Free Edition is for private, non-commercial use only.

Download: PREDATOR 2.3.0.599

Conclusion

This software provides valuable functionality for users. Whether for personal or professional use, it delivers on its core promises. Regular updates and active development ensure continued relevance. User satisfaction and community support demonstrate its value.

Final Thoughts

Based on its features and performance, this software is worth considering. Evaluate your specific needs and whether this solution addresses them. Try it yourself to determine if it’s the right fit for your requirements.

Key Features

Fast Performance

Optimized for speed and efficiency

Secure & Safe

Built with security in mind

Cross-Platform

Available on multiple platforms

Customizable

Personalize to fit your needs

System Requirements

Windows

Compatible with Windows operating system

Download Options

Important: Always download software from official sources. Scan downloaded files with antivirus software before installation.
Published Sep 21, 2010
Last Updated Nov 18, 2025
Platforms 1 OS