Lock your PC with a USB Flash
Drive
Ever wanted to be like James
Bond and be secretive? So you
can prevent access to your
computer, but with just a
password, you are missing out
on an alternate (and more
secure) way to lock down your
computer.
Predator, a free Windows
program, turns your USB drive
into a key that locks your
computer when it's removed. To
unlock your computer, you'll have
to plug the USB drive back in.
(Talk about having secret-agent-
style security.)
Anyone who attempts to access
your computer without the USB
flash drive will be hit with an epic
"Access Denied" message. To get
started, follow this guide:
Step 1: Download and
install Predator.
Step 2: Once Predator launches,
plug in your USB flash drive.
None of the contents of the drive
will be deleted or altered in any
way, so feel free to use your
primary thumbdrive.
When you insert the drive, a
dialog box will appear asking
you to create a password. Click
OK to continue.
Step 3: In the Preferences
window, take note of a few key
settings. First, enter a secure,
unique password in the "New
password" field. If you lose your
USB drive, you'll use it to unlock
your computer.
If you'd like, you can check the
Always Required box and you'll
be asked to enter the password
each time you use your
thumbdrive to unlock your PC.
Finally, in the section under Flash
Drives, ensure that the correct
USB flash drive is selected. When
you're done, click "Create key"
and then OK.
(Credit: Predator)
Step 4: Predator will exit. When it
does, click the Predator icon in
the taskbar to restart the
program. A few seconds later,
the icon will turn green, alerting
you that Predator is running.
Every 30 seconds, Predator will
check to see that your USB drive
is plugged in. If it isn't, your
computer will dim and lock
down
Enjoy!!!!!
HOW TO HACK REMOTE COMPUTER USING IP ADDRESS? Note: we are not responsible what you are going to do with this trick FIRSTLY WE WILL TELL YOU WHAT IS INTERNET PROTOCOL (IP) The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house...
Comments
Post a Comment
We are thankful for your precious comment.
- Trick 2 Crack team