With PREDATOR, you can lock and unlock your PC by simply removing or inserting a USB flash drive. You can use any USB stick, the program will generate a security code and place it on the device to identify it as the key.
Internet Broadcasting Server - Free Ed. 2.0.3 Broadcast live audio, MP3 music and photos over the Internet ! This software is capable of streaming live audio, music and images from a simple PC running Windows, using an external web server as a relay.
Description: With PREDATOR, you can lock and unlock your PC by simply removing or inserting a USB flash drive. You can use any USB stick, the program will generate a security code and place it on the device to identify it as the key. It will then check every few seconds if the drive is still inserted and if it is not, the program will lock your computer. If anyone attempts to access your PC while the USB stick is removed, he will be prompted for a password and, if the correct password is not entered within 20 seconds, an alarm will sound and access is denied. Optionally, PREDATOR will take a picture with your webcam and email it to you.
PREDATOR has a built-in scheduler where you define the times of day when each user may use the computer. You can make specific rules for each user and each day of the week. Out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer.
PREDATOR logs the access attempt and notifies you the next time you unlock your PC. Unlocking your computer is as simple as inserting the USB key drive, if you happen to lose your USB stick, you can unlock your computer with a password that you specify during setup. Furthermore, Predator frequently changes the security codes recorded on your USB drive, so even if an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
Security risks of iPods and USB flash drives High-tech consumer devices, such as Apple's iPod, present a serious security risk in the workplace, according to a new report from Gartner, being used not only to download confidential data, but also to introduce a virus into the company network.