PREDATOR 3.1.0.201
Please use one of the links below to download PREDATOR
Antivirus Information
We did not scan PREDATOR for viruses, adware, spyware or other type of malware. For your own protection it's recommended to have an updated antivirus installed on your computer when downloading and installing programs from Windows10Compatible. We strongly recommend you to use Antivirus and check PREDATOR for viruses before you install.
Windows10Compatible lists downloads from various software publishers, so if you have a question regarding a particular software contact the publisher directly. The download links for PREDATOR are provided to you by Windows10Compatible without any warranties, representations or gurantees of any kind, so download at your own risk.
Publisher Description
With PREDATOR, you can lock and unlock your PC by simply removing or inserting a USB flash drive. You can use any USB stick, the program will generate a security code and place it on the device to identify it as the key. It will then check every few seconds if the drive is still inserted and if it is not, the program will lock your computer. If anyone attempts to access your PC while the USB stick is removed, he will be prompted for a password and, if the correct password is not entered within 20 seconds, an alarm will sound and access is denied. Optionally, PREDATOR will take a picture with your webcam and email it to you. PREDATOR has a built-in scheduler where you define the times of day when each user may use the computer. You can make specific rules for each user and each day of the week. Out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer. PREDATOR logs the access attempt and notifies you the next time you unlock your PC. Unlocking your computer is as simple as inserting the USB key drive, if you happen to lose your USB stick, you can unlock your computer with a password that you specify during setup. Furthermore, Predator frequently changes the security codes recorded on your USB drive, so even if an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
RELATED PROGRAMS
USB Flash Security
Add encryption to USB Flash Drive on the market. It locks by the password by only removing! Data in a USB Flash Drive is protected by a password.Useful Security Tool. Features: [Install on USB Flash Drive] Install the tool which...
- Freeware
- 27 Oct 2015
- 8.79 MB
Inactive Shut Down Control for MS Access
Inactive Shut Down Control is a hidden Microsoft Access form that can be opened in your application to keep track of periods of user inactivity. When the period of inactivity exceeds a specified limit, a warning message appears, and the...
- Freeware
- 20 Jul 2015
- 346 KB
EaseFilter File Access Control SDK
The EaseFilter File Access Control Filter Driver SDK allows you to monitor or control the file I/O activities in file system level in real time, prevent your sensitive files from being accessed by unauthorized users or processes. You can control...
- Shareware
- 06 Mar 2023
- 3.5 MB
Chili Security Internet Security
Chili Internet Security is an award-winning security software. It is based on an award-winning technology as rewarded by AV-TEST (The Independent IT-Security Institute), whom for three consecutive years have named Chili Internet Security as having the 'Best Protection' and 'Best...
- Demo
- 20 Jul 2015
- 2.56 MB
Max PC Privacy
Max PC Privacy is a comprehensive solution to boost your system performance and clear all your, online and offline activities. It is exclusively designed to clear all the Internet history, system history & cache, registry data. Max PC Privacy provide...
- Shareware
- 27 Feb 2016
- 525 KB