How to make your computer secure from hackers-DIY steps



Preventing access to your computer with just a password is fast becoming obsolete; there are better ways of securing your system. It is very paramount you take advantage these alternate ways of locking down your computer.
The only physical component needed to lock or unlock your PC  is the USB drive. This may just be the most secure option right now, if you have a spare USB thumb drive lying around or get a new one from a nearby shop. Once that is done, setting up the key will just be the minutes.


What are the benefits and drawbacks?

The benefits are:-
1. the physical key is harder to compromise.
2. keys are harder to steal than ordinary passwords.
3. It relief you of the burden to keep remembering password

The drawbacks are:-
1. you can lose the USB key
2. You can damage the USB key
3. The USB is used only for that purpose because it permanently occupies USB port space

The key varies from windows to windows, such the various form of it are:
1. Predator for windows
2. Rohos logon key for Windows and Mac
3. USB lock for Mac

The predator method for windows will be the only option on focus.


Predator, a free Windows program, turns your USB drive into a key that locks your computer when it’s removed. To unlock your computer, you’ll have to plug the USB drive back in. (Talk about having secret-agent-style security).
Anyone who attempts to access your computer without the USB flash drive will be hit with an epic “Access Denied” message. If you happen to loose your USB stick,you can open your system with a password that u specify during setup.
You can pause Predator at any time by selecting “Pause monitoring” from the taskbar menu.If someone tried to access your PC while it was locked down, you’ll see the activity log when you log back in. You can see the log at any time by clicking “View log” from the taskbar menu.

To get started, follow this guide:

Step 1: Download and install Predator pro here , make sure u select the right one for your computer

Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive.
When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.

Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the “New password” field. If you lose your USB drive, you’ll use it to unlock your computer.
If you’d like, you can check the Always Required box and you’ll be asked to enter the password each time you use your thumbdrive to unlock your PC.
Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you’re done, click “Create key” and then OK.

Step 4: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running.

Start using predator now and enjoy maximum security on your computer systems. In case u are still wondering how to use some features,predator’s Web site has several cool how-tos, including one that shows you how to program your computer to take a snapshot each time someone tries and fails to log in to your computer. Check it out here.

0 comments:

Post a Comment

 
Top