Skip to main content

How to lock and unlock your pc with USB drive like a hacker

Anyone who attempts to access your computer without the USB flash drive will be hit with an epic “Access Denied” message. To get started, follow this guide:

Step 1: Download and install Predator here

Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive.

When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.

Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the “New password” field. If you lose your USB drive, you’ll use it to unlock your computer.

If you’d like, you can check the Always Required box and you’ll be asked to enter the password each time you use your thumbdrive to unlock your PC.

Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you’re done, click Create key and then OK.

Step 4: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running.

Every 30 seconds, Predator will check to see that your USB drive is plugged in. If it isn’t, your computer will dim and lock down.☠
@vickthegeek

Comments

Popular posts from this blog

πŸŒ€ HOW TO GET ACCESS TO BLOCKED WEBSITES πŸŒ€

Let us discuss all the methods i.e., from easier methods to harder ones. 1. Recast the URL This trick works for the sites which are hosted on VPN and on Dedicated server Environment and have an unverified SSL installed for that domain name. To get access to such websites you have to implement 2 simple steps. They are: 1. Go to the address bar of the browser (Any browser) 2. Instead of typing www.websiteURL.com or http://www.WebsiteURL.com , try typing https://www.WebsiteURL.com So, as the domain is unverified with SSL installation, it will show up a security notice with the options as Proceed anyway or Back to Safety. Here, you have to select the option Proceed Anyway, then you will get an entry ticket to the site. 2. DNS Server Replacement In this method you have to change or replace the DNS server to get access over the blocked websites. Say, DNS server is the container which contains all the information regarding all the sites from the entire world. So, ...

​​πŸ”₯ Run Kali Linux Natively On Your Windows 10 πŸ”₯

😁Great News For Hackers😁 Now you can download and install Kali Linux directly from the Microsoft App Store on Windows 10 just like any other application. I know it sounds crazy, but it’s true! Kali Linux, a very popular, free, and open-source Linux-based operating system widely used for hacking and penetration testing, is now natively available on Windows 10, without requiring dual boot or virtualization. Kali Linux is the latest Linux distribution to be made available on the Windows App Store for one-click installation, joining the list of other popular distribution such as Ubuntu, OpenSUSE and SUSE Enterprise Linux.In Windows 10, Microsoft has provided a feature called “Windows Subsystem for Linux” (WSL) that allows users to run Linux applications directly on Windows. “For the past few weeks, we’ve been working with the Microsoft WSL team to get Kali Linux introduced into the Microsoft App Store as an official WSL distribution, and t...

*Hack some other computer remotely using their IP address*

_Steps to Follow:_ *Step 1:* Now Go to Star and click Run and then type as ```“CMD”``` and hit ```enter```. command prompt will open. *Step 2:* Type in cmd as “```nbtstat -a IPaddressOfVictim```”  and hit enter. (use ping command to know victim ipaddress) For eg: ```nbstat -a 223.222.222.222``` If you see this your in NetBIOS Remote Machine Name Table Name Type Status ————————————————————— user<00> UNIQUE Registered workgroup <00> GROUP Registered user <03> UNIQUE Registered user <20> UNIQUE Registered MAC Address = xx-xx-xx-xx-xx-xx ————————————————————— If you don’t get the number <20>. The victim disabled the File And Printer Sharing, find  another v...