Part 1: Activating the Predator…
1. Get Predator
2. Plug in USB
Install the software on the PC you want to protect. Once it's installed, Predator prompts you to insert a USB key before you launch it for the first time. You are then asked to enter a password.
3. Create key
Once you've entered a suitable password, you'll see the Preferences window. Make sure that Predator points to your USB drive correctly in the 'Flash drives' section, then click 'Create key'.
Part 2: Maintaining the Predator
4. Remove to lock
After the Predator key has been created, Predator will periodically monitor whether it's plugged in or not. To lock the computer remove the key when the green icon is flashing.
5. Check log
By default, Predator is configured to launch the log viewer if it notices an unsuccessful login attempt has been made while the USB key was removed and the session was locked.
6. Tweak settings
Predator's default settings will suit most users, but it has a comprehensive set of options to give you better control over its monitoring and reporting abilities, depending on how paranoid you are about security.