img - Nigeria's Premier Online Forum - How To Make Your Computer Secure From Hackers
Welcome, Guest.
Did you miss your activation email?

Date: October 21, 2018, 09:55:06 AM


How To Make Your Computer Secure From Hackers: Computers/Specs : - Nigeria's Premier Online Forum


How To Make Your Computer Secure From Hackers

By: Adenosine (M) |Time : August 07, 2016, 09:38:22 PM

Preventing access to your computer with just a password is fast becoming obsolete; there better ways of securing your system.  Is very paramount you take advantage these alternate ways of locking down your computer. The only physical component needed to lock or unlock your PC  is the USB drive. This may just be the most secure option right now, if you have a spare USB thumb drive lying around or get a new one from a nearby shop. Once that is done, setting up the key will just be the minutes.

What are the benefits and drawbacks?
The benefits are:-
1. Physical key is harder to compromise
2. keys are harder to steal than ordinary passwords.
3. It relief you of the burden to keep remembering password

The drawbacks are:-
1. lose the USB key
2. Damage the USB key
3. The USB is used only for that purpose because it permanently occupies USB port space

The key varies from windows to windows, such the various form of it are-
1. Predator for windows
2. Rohos Logon Key for windows and Mac
3. USB Lock for Mac
The predator method for windows will be the only option on focus.
Predator, a free Windows program, turns your USB drive into a key that locks your computer when it’s removed. To unlock your computer, you’ll have to plug the USB drive back in. (Talk about having secret-agent-style security.)
Anyone who attempts to access your computer without the USB flash drive will be hit with an epic “Access Denied” message. To get started, follow this guide:
Step 1 : Download and install Predator.
Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive.
When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.
Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the “New password” field. If you lose your USB drive, you’ll use it to unlock your computer.
If you’d like, you can check the Always Required box and you’ll be asked to enter the password each time you use your thumbdrive to unlock your PC.
Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you’re done, click “Create key” and then OK.
Step 4: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running.
Every 30 seconds, Predator will check to see that your USB drive is plugged in. If it isn’t, your computer will dim and lock down.
Alternatively, All in all according to makeuseof, Predator is your best bet if you want a quick and simple solution that just works as long as you’re running Windows and have USB ports to spare. It’s the most powerful and flexible program on this list with its built-scheduler and per-user customization. You won’t find those features in its competitors.
To set up your first USB key with Predator:
Install Predator .
Run Predator.
Insert your USB drive when prompted.
Enter a password for this user.
Select the drive that represents the USB device.
Click the Register Key button.
Here are some extra tips :
To pause Predator at any time select “Pause monitoring” from the taskbar menu.
If someone tried to access your PC while it was locked down, you’ll see the activity log when you log back in. You can see the log at any time by clicking “View log” from the taskbar menu.
Predator’s Web site has several cool how-tos, including one that shows you how to program your computer to take a snapshot each time someone tries and fails to log in to your computer. Check it out .

Re: How To Make Your Computer Secure From Hackers

By: y0ifcf (M) |Time : August 07, 2016, 11:52:09 PM
Very useful information. Thanks!

0 Members and 1 Guest are viewing this topic. Reply

web site traffic statistics