Predator 2.4

Predator 2.4

Your computer accessible only with the correct USB key.

Protect your PC in your absence using a simple USB key device as authorized access control, it seems very simple and convenient. This is exactly what you will achieve Predator.

Predator once installed on your computer and running the second background, your computer will be functional if it recognizes the USB device is connected to your machine. Otherwise, your PC is not accessible. Without the proper USB key, the screen is black and you can not perform any action on the computer, even if it is turned on and a session is open. Nothing is possible, either by the keyboard or no disk drive, or USB. Nothing but your key will not remove it from its lethargy.

Your USB key and Predator work together and everything goes normally. You remove your key, Predator instantly blocks access to the PC. You return to the office, you plug your key and you find your Windows session the easiest way in the world.

Predator can help you protect several PCs with the same key but also to protect a PC with several different keys, all keys must be connected in order to have access to the PC.

If your USB key was to be found, you still have the option of typing a password to recover your PC and reconfigure Predator with a new key.

Predator can send alerts via SMS or email if someone tries to use your computer. All attempts are recorded in a report that you can view on your return. This report can also be automatically posted to your Twitter account, account where you can then take control of the remote lock or unlock your PC.

  • Downloader
  • LicenseFreeware
  • Version2.4
  • Downloads

    Downloads: 710


This site chose Norton to promote consumer confidence online. Download

If your download does not start, choose a mirror below: (Free Download)

Web Developer
  • cannot be held liable for issues that arise from the download or use of these software products.
  • We encourage you to determine whether this software or your intended use is legal.
  • Even if we try to check the program files for viruses, we cannot guarantee 100% that they are clean.
  • For your own protection always check downloaded files for viruses, spyware and malware.


Predator 2.4
  • Predator
  • download Predator
  • Predator free
  • download Predator free
  • USB Key

Predator is a product developed by Richard Goutorbe. This site is not directly affiliated with Richard Goutorbe. All trademarks, registered trademarks, product names and company names or logos mentioned herein are the property of their respective owners. Our download manager distributes the original unmodified software, obtained directly from Richard Goutorbe's website, and does not modify it in any way.