background preloader

Predator Locks and Unlocks Your PC with a USB Thumb Drive

Predator Locks and Unlocks Your PC with a USB Thumb Drive
PREDATOR locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive: - once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place: - keyboard and mouse are immediately released, and the display is restored. PREDATOR helps to limit the time your kids spend on their computers: you define the times of day when each user may access the computer with the built-in scheduler you can make specific rules for each user and each day of the week out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer ; or you can remove the flash drive to disable the computer for good. Watch a short demo video of PREDATOR:

Related:  security & privacyUtilitairesHerramientas

catchme catchme 0.3 catchme is the rootkit/stealth malware scanner that scans for: catchme can also delete, destroy and collect malicious files. LastActivityView - View the latest computer activity in Windows operating system See Also TurnedOnTimesView - View the time/date ranges that your computer was turned on NK2Edit - Edit, merge and repair the AutoComplete files (.NK2) of Microsoft Outlook. Description LastActivityView is a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. The activity displayed by LastActivityView includes: Running .exe file, Opening open/save dialog-box, Opening file/folder from Explorer or other software, software installation, system shutdown/start, application or system crash, network connection/disconnection and more... You can easily export this information into csv/tab-delimited/xml/html file or copy it to the clipboard and then paste into Excel or other software.

13 SEO And Web Terms Writers Need To Know - Web Design Relief As the world progresses into a Web age filled with truncated speech to meet our quickening lifestyles, acronyms and other terms have become more and more prevalent in everyday usage. There’s no better example of this evolutionary stage in language than the world of Web design. Web jargon can become dizzying at times, but a strong foundation in its meanings and implementation can help protect even the most naive of authors seeking professional help for his or her author website. Quickly adjust your social media privacy settings. Adjust Your Privacy Settings Start by quickly adjusting the privacy settings on all of your major accounts by using the icons below: Check Your Privacy

Launcher: Free application launcher and icon manager - Spyware FREE. If you are a Windows user and have a lot of icons placed on the desktop, it may be really difficult to find a certain icon and manage all of them. There is a better way of organizing all your icons on the desktop, using a powerful launcher. Eusing Launcher practically organizes all the desktop icons in the shape of a circle, allowing you to easily and quickly find any desired icon. Eusing Launcher includes some predefined icons added to its interface, but the user can add virtually any program shortcut to it. You can access any program or Windows feature in the shortest time possible and with great ease.

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc. When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

FARR (Find And Run Robot) - Mouser - Software "The Ultimate Program for Keyboard Maniacs" Find and Run Robot (FARR) is a program for keyboard maniacs -- it uses an adaptive "live search" function to rapidly find programs and documents on your computer as you type. Press your chosen hotkey to display the FARR window, then just start typing the first letters of the application you want to launch and the results appear instantly. Hit enter to launch the top result, or refine your search with special modifiers and commands. FARR also lets you quickly run web searches, send email, manipulate files, control on-screen windows, and much more. Build and share custom commands or install plugins to add tons of new features, like live search features for your clipboard history and your internet bookmarks; a popup a calculator with history tape and persistant variables; and many more..

Lightbeam for Firefox Tracking & privacy Not all tracking is bad. Many services rely on user data to provide relevant content and enhance your online experience. But tracking can happen without the user’s knowledge. WebCopy - Copy websites locally for offline browsing What can WebCopy do? WebCopy will examine the HTML mark-up of a website and attempt to discover all linked resources such as other pages, images, videos, file downloads - anything and everything. It will download all of theses resources, and continue to search for more. In this manner, WebCopy can "crawl" an entire website and download everything it sees in an effort to create a reasonable facsimile of the source website. What can WebCopy not do?