PREDATOR frequently changes the security codes recorded on your USB drive.
PREDATOR can replicate this log on your Twitter account, allowing you to remotely monitor all access-control activity on your PC.
By reading this log, you will know if intruders have tried to use your computer while you have been away.
PREDATOR records all security-related events in a log file: start, alarms, stop.
PREDATOR can send alert messages by Email or by SMS.
It's easier and faster than closing your Windows session, since you do not have to retype your password when you return.
when you return back to your PC, you put the USB flash drive in place: keyboard and mouse are immediately released, and the display is restored.
when you're away from your PC, you simply remove the USB drive: once it is removed, the keyboard and mouse are disabled and the screen darkens.
you run PREDATOR (autostart with Windows is possible).
It uses a regular USB flash drive as an access control device, and works as follows: PREDATOR locks your PC when you are away, even if your Windows session is still opened.