How to Lock and Unlock a Computer with USB PenDrive !



It is a very simple process. I’ll guide step by step but make sure a working USB Pendrive without any virus or malware. It’s okay if you already have some important files on your Pendrive, this software does not require empty Pendrives.



Step 1: Download and install a software: Predator.


      This software locks your PC when you are away, even if your Windows session is still active.
It uses a regular USB flash drive as an access control device.

Step 2: Once Predator launches plug in the Pendrive.
When you’re away from your PC, you simply remove the USB drive:
– once it is removed, the keyboard and mouse are disabled and the screen darkens
when you return back to your PC, you put the USB flash drive in place:
– keyboard and mouse are immediately released, and the display is restored.
Step 3 :  When you insert the USB Pendrive, Predator will ask you whether you want to create a password. Click OK to continue.
Step 4: In the Preferences window, enter a secure password in the “New password” field. That is if you lose your USB pen drive, you can use this password to unlock your computer.
This software also allows you to use a password in addition to USB lock/unlock. If you want this facility, check the Always Required box and you’ll be asked to enter the password each time you use your thumb drive to unlock your PC.
Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you’re done, click “Create key” and then OK.
Step 5: Predator will exit. Click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running. Once done, Predator will check every 30 seconds to see that your USB Pendrive is plugged in. If it isn’t, your computer will dim and lock down.
You can pause Predator at any time select “Pause monitoring” from the taskbar menu. You can also check if someone accessed your PC/laptop while the Predator was switched on using USB drive from the Predator activity log.
The only issue with using Predator on your computer is that it locks down one USB port exclusively for the lock/unlock purpose.

Comments

Popular posts from this blog

Using Kali Linux: Perform Website Cloning via SET toolkit

What is Log4j Vulnerability ?

How To Stop Becoming a Bait (A Cyber Security Methodology)