PREDATOR will efficiently protect your privacy if you take the following security measures:
. Use a Standard user account to do your daily work. This will protect many critical areas of your filesystem, and if administrative privileges are occasionally required to perform a specific task, Windows will prompt for the Administrator's password.
. If you still run Windows XP, be the unique user of your computer. If you run a newer version of Windows, you may create additional user accounts but don't make them Administrators.
. Define a strong and unique Windows password. This password protects you from someone taking full control of your computer by restarting Windows in Safe Mode. If your password is at least 12 characters long and returns 0 result when searched on Google, it is strong. It should also be unique: do not use the same password to protect your mailbox or to access any internet account. Google "create user password Windows"
to learn how to protect your Windows user account with a password.
. Encrypt your files. Use BitLocker or EFS (Encrypting File System) if available in your edition of Windows. File encryption protects you from someone accessing your data by rebooting your computer with a Linux CD.
. Disable the Autorun functionality in Windows. When a removable media (CD, DVD and some USB flash drives) that contains an Autorun program is inserted, the system automatically executes the program without requiring user intervention, even if your computer has been locked by Predator. This means that someone could mount a CD-Rom with an autorun program which would install malware in your PC.
Google "How to disable the Autorun functionality in Windows"
to find how to disable it permanently, or check the "Disable Autorun" option in PREDATOR's settings
to disable it when your session is locked.
. Enable Windows Updates to keep your computer patched against known vulnerabilities.
. Enable Windows Firewall to prevent unauthorized programs from accessing the network.
. Allow your antivirus software to download daily updates.
. Do not use software from untrusted sources. Trusted sources are the websites of the software creators and their original CDs or DVDs. Software repositories, P2P downloads, CD or DVD copies should be considered unsafe.
10. Finally, install PREDATOR. Define a strong PREDATOR password. Configure PREDATOR to autostart with Windows. Check the Protect Preferences option. Uncheck the Enable Pause and Enable Exit options.