Part 1: Activating the Predator…

1. Get Predator

predator 1

Download Predator from the website. The two editions are available for 32-bit and 64-bit versions of Windows XP, Windows Vista, Windows 7, Server 2003 and Server 2008.

2. Plug in USB

predator 2

Install the software on the PC you want to protect. Once it's installed, Predator prompts you to insert a USB key before you launch it for the first time. You are then asked to enter a password.

3. Create key

predator 3

Once you've entered a suitable password, you'll see the Preferences window. Make sure that Predator points to your USB drive correctly in the 'Flash drives' section, then click 'Create key'.

Part 2: Maintaining the Predator

4. Remove to lock

predator 4

After the Predator key has been created, Predator will periodically monitor whether it's plugged in or not. To lock the computer remove the key when the green icon is flashing.

5. Check log

predator 5

By default, Predator is configured to launch the log viewer if it notices an unsuccessful login attempt has been made while the USB key was removed and the session was locked.

6. Tweak settings

predator 6

Predator's default settings will suit most users, but it has a comprehensive set of options to give you better control over its monitoring and reporting abilities, depending on how paranoid you are about security.

-------------------------------------------------------------------------------------------------------

First published in PC Format Issue 258

Liked this? Then check out How to surf the web with military-grade security

Sign up for TechRadar's free Week in Tech newsletter
Get the best tech stories of the week, plus the most popular news and reviews delivered straight to your inbox. Sign up at http://www.techradar.com/register

Follow us on Twitter * Find us on Facebook * Add us on Google+