{"id":1408,"date":"2011-04-17T14:30:30","date_gmt":"2011-04-17T18:30:30","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=1408"},"modified":"2011-04-17T14:30:30","modified_gmt":"2011-04-17T18:30:30","slug":"use-a-usb-flash-drive-to-lock-your-computer-cloudeight-freeware-pick","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/use-a-usb-flash-drive-to-lock-your-computer-cloudeight-freeware-pick\/","title":{"rendered":"Use a USB flash drive to lock your computer &#8211; Cloudeight freeware pick"},"content":{"rendered":"<p><a href=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2011\/04\/key.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-1409\" title=\"key\" src=\"http:\/\/thundercloud.net\/infoave\/new\/wp-content\/uploads\/2011\/04\/key-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2011\/04\/key-150x150.jpg 150w, https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2011\/04\/key-100x100.jpg 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>Did you know you can use a USB flash drive to lock  \t\t\t\tyour computer? You can. And unless someone has access to that flash drive, they can&#8217;t start or logon to your computer. \u00a0It will turn any USB flash drive into a key to your computer.\u00a0So if you want to secure your computer so no one can access it when you&#8217;re not around (this comes in really handy for laptops) keep on reading.<\/p>\n<p>There\u2019s  a small program called  \t\t\t\tPredator that you can install on a USB  drive that allows you to\u00a0  \t\t\t\tuse that USB drive to lock your computer.  It does this by disabling your keyboard, monitor and mouse  \t\t\t\t whenever you remove the special USB drive from your computer. Simply  remove the flash drive and your computer is  \t\t\t\tlocked, until you  return and insert the flash drive back into a USB  \t\t\t\tport on your  computer. So what Predator does is turn a USB flash drive into a key  \t\t \t\tthat locks and unlocks your computer. It\u2019s really great if you travel  and  \t\t\t\ttake a notebook with you or if you don\u2019t want people snooping   \t\t\t\taround your PC when you\u2019re not home. EB? Is that you?<\/p>\n<p>Here\u2019s some details on Predator  \t\t\t\tfrom the program\u2019s developer:<\/p>\n<p><em>\u201cPREDATOR  locks your PC when you  \t\t\t\tare away, even if your Windows session is  still opened. It uses  \t\t\t\ta regular USB flash drive as an access  control device, and works  \t\t\t\tas follows:<\/em><\/p>\n<p><em> <\/em><\/p>\n<p><em>* you insert the USB drive<br \/>\n* you run PREDATOR (autostart with Windows is possible)<br \/>\n* you do your work\u2026<br \/>\n* when you\u2019re away from your PC, you simply remove the USB  \t\t\t\tdrive:<br \/>\nonce it is removed, the keyboard and mouse are disabled and the  \t\t\t\tscreen darkens<br \/>\n* when you return back to your PC, you put the USB flash drive  \t\t\t\tin place:<br \/>\nkeyboard and mouse are immediately released, and the display is  \t\t\t\trestored.<\/em><\/p>\n<p><em> <\/em><\/p>\n<p><em>It\u2019s easier and faster than closing your Windows session, since  \t\t\t\tyou do not have to retype your password when you return.<\/em><\/p>\n<p><em>Advanced Security Features:<\/p>\n<p>* PREDATOR records all security-related events in a log file:  \t\t\t\t start, alarms, stop. By reading this log, you will know if  \t\t\t\t intruders have tried to use your computer while you have been  \t\t\t\taway.<br \/>\n* PREDATOR can replicate this log on your Twitter account,  \t\t\t\tallowing  you to remotely monitor all access-control activity on  \t\t\t\tyour PC.<br \/>\n* PREDATOR frequently changes the security codes recorded on  \t\t\t\tyour  USB drive. If an intruder manages to copy your stick, this  \t\t\t\tcopy  will not work because the codes on your own stick will have  \t\t\t\tchanged  in the meantime.<br \/>\n* PREDATOR disables the Windows task manager when you unplug the  \t\t\t\tUSB drive. Nobody can stop it with Ctrl-Alt-Del.<br \/>\n* PREDATOR lets you regain control of your computer if you lose  \t\t\t\t your stick: when you start the software for the first time, you  \t\t\t\tset  a password that will unlock your session if your USB drive  \t\t\t\tis not  available.<br \/>\n* PREDATOR can sound an audible alarm if somebody enters an  \t\t\t\tinvalid password.<br \/>\n* And finally, PREDATOR can protect several PCs with the same  \t\t\t\tUSB flash drive, e.g. your home and office computers.<\/p>\n<p><\/em><\/p>\n<p><em>With PREDATOR, security is as simple as inserting or removing a  \t\t\t\tUSB stick !\u201d<\/em><\/p>\n<p>Great idea. Isn\u2019t it? Predator is  \t\t\t\tfree for home\/personal use. \t\t\t\t<a rel=\"nofollow\" href=\"http:\/\/www.montpellier-informatique.com\/predator\/en\/index.php\" target=\"_blank\"> If you have a flash drive and you want to turn it into a key to  \t\t\t\t lock your computer, then visit this page to learn more about  \t\t\t\t Predator.<\/a><\/p>\n<p>And did you know?<\/p>\n<p>Our USB Bracelets are a great way to make sure you always have your flash drive with you and ready to use. \u00a0<a href=\"http:\/\/thundercloud.net\/sale\/2011\/donation\/bracelet2011.htm\" target=\"_blank\">Read more here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you know you can use a USB flash drive to lock your computer? You can. And unless someone has access to that flash drive, they can&#8217;t start or logon to your computer. \u00a0It will turn any USB flash drive into a key to your computer.\u00a0So if you want to secure your computer so no one can access\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/use-a-usb-flash-drive-to-lock-your-computer-cloudeight-freeware-pick\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":1409,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[37,75,938,937,936],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1408"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=1408"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1408\/revisions"}],"predecessor-version":[{"id":1410,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1408\/revisions\/1410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/1409"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=1408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=1408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=1408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}