Loading...

Track your Stolen Laptops/Tablets/Handheld Devices with Prey

Saturday, December 3, 2011 // by Saurabh Sharma // Labels: //





Softwares Today on Tech. in Total. that can help resolving the Location of the thief in case your Laptop/Tablets/Handheld Device is Stolen.
Yes We're talking about Prey
Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.
  • Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.
  • You can quickly find out where your computer is located, who's using it, and what he's doing on it thanks to Prey's powerful reports system. By marking your device as missing, Prey will gather all the evidence you request and send it either to your Control Panel account or directly to your mailbox, depending on the reporting method you choose.
  • Besides gathering information, you can also trigger actions remotely such as sounding a loud alarm or showing a message which will appear onscreen – just in case you want the guy to know he's being chased at.
  • You can also wipe your stored passwords for security, or even lock down your PC to prevent access. In other words, you're in control.
There's two ways in which you can send Prey the activation signal and get the reports.


1. Prey + Control Panel:


Recommended for most users. You monitor your devices on Prey's web Control Panel, where you can watch new reports arrive and manage specific settings, such as changing the frequency for reports and actions. You can add up to three devices for free, and can optionally upgrade to a Pro Account in case you wish to bypass this limit.


2. Prey Standalone:


For advanced users who wish more control. In this case, reports fly directly to your inbox but you need to set up your SMTP settings, and more importantly, you must generate a valid web URL which will trigger Prey to wake up when deleted -- otherwise Prey will keep sending reports on each interval! (For more information please check our FAQ).



Prey is available for different platforms which covers:


Key features
  • 100% geolocation aware: Prey uses either the device's GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. It's shockingly accurate.
  • Wifi autoconnectIf enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.
  • Light as a featherPrey has very few dependencies and doesn't even leave a memory footprint until activated. We care as much as you do.
  • Know your enemyTake a picture of the thief with your laptop's webcam so you know what he looks like and where he's hiding. Powerful evidence.
  • Watch their movementsGrab a screenshot of the active session -- if you're lucky you may catch the guy logged into his email or Facebook account!
  • Keep your data safeHide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.
  • No unauthorized accessFully lock down your PC, making it unusable unless a specific password is entered. The guy won't be able to do a thing!
  • Scan your hardwareGet a complete list of your PC's CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.
  • Full auto updaterPrey can check its current version and automagically fetch and update itself, so you don't need to manually reinstall each time.
Tell us how you like this post & if you have more tools to mention Drop it in your Comments



Like It? Share It


About Saurabh Sharma
I am a 22yr Techno Freak, A Computer Science Student, An App. Developer, A Web Developer, and A Painting Artist

Popular Posts

Advertisement