Jump to content

Recommended Posts

Posted

<div class="KonaBody"><p><img src="http://osxdaily.com/wp-content/uploads/2011/05/laptop-theft-recovery-software-prey.jpg" alt="Prey is Free Laptop Theft Recovery Software" title="laptop-theft-recovery-software-prey" width="620" height="346" class="aligncenter size-full wp-image-16125" /></p>

<p>If you travel with a laptop often, do yourself a favor and install Prey, it’s <strong>free theft tracking and recovery software that really works</strong>. Prey is basically a tiny daemon that runs in the background on your <a href="http://osxdaily.com/category/mac/">Mac</a> (or Windows or Linux PC) that does nothing until it receives a signal indicating the hardware is missing or stolen via the Prey website or an SMS… then the magic happens.</p>

<p>Once Prey is activated, it starts gathering the following information and enables these features:</p>

<ul>

<li><strong>Current hardware location</strong> via GPS or WiFi triangulation, shown on Google Maps</li>

<li>Force connections to nearby WiFi to transmit data</li>

<li><strong>Pictures of the thief</strong> via the laptops built-in camera</li>

<li>Network information and <strong>IP addresses</strong></li>

<li><strong>Screen shots of the desktop</strong> and application usage, to find out what the thief is doing on your computer</li>

<li>Hardware status</li>

<li><strong>Remotely lock down the hardware,</strong> requiring a password and displaying a “STOLEN” message</li>

<li>Remotely <strong>clear your saved passwords</strong></li>

<li>Remotely <strong>sound an alarm</strong> (think car alarm for your laptop)</li>

</ul>

<p>All of this data is silently gathered unbeknownst to the perpetrator, allowing you to collect information to help law enforcement (or yourself) track down your stolen goods and return them to the rightful owner.</p>

<p><a href="http://preyproject.com/">You can download Prey for free at PreyProject.com</a> (Mac, Windows, Linux, Android compatible)</p>

<p>Installation is simple and there is practically no overhead, it just runs quietly in the background waiting to be activated. In addition to being free, the app is also open source so if you can check out the source code yourself if you’re into that sort of thing.</p>

<p><img src="http://osxdaily.com/wp-content/uploads/2011/05/theft-recovery-prey-data-capture.jpg" alt="Prey is Theft Tracking and Recovery Software for Mac, Windows, and Linux" title="theft-recovery-prey-data-capture" width="517" height="262" class="aligncenter size-full wp-image-16130" /></p>

<p>Here’s the most important part, <em>Prey actually works to recover stolen hardware</em>. You may have <a href="http://www.crunchgear.com/2011/05/13/the-wild-tale-of-a-stolen-laptop-in-brooklyn/">read about this</a> recently when a popular tech authors MacBook Pro was stolen and he successfully tracked the machine down in and recovered it using Prey. </p>

<p>Check out this video of Prey in action, and then go install it yourself. It’s free, it works, there’s no reason not to install this if you have a laptop you care about:</p>

<p><span id="more-16124"></span>

<iframe src="http://player.vimeo.com/video/18728980?title=0&byline=0&portrait=0" width="600" height="338" frameborder="0"></iframe></p>

<p>Prey is almost fully cross platform compatible and installs in Mac OS X, Windows, Linux, and Android, there’s just one noticeable exception for now, no <a href="http://osxdaily.com/category/iphone/">iPhone</a> and <a href="http://osxdaily.com/category/ipad/">iPad</a> version. I’m guessing the lack of iOS support is because iOS won’t allow the installation of background daemons without a jailbreak, but nonetheless Prey Project says they’re working on it, so cross your fingers and we’ll keep you updated if an iPhone version comes available.</p>

<p>Finally, if you’re an enterprise customer or you want to protect multiple machines with Prey, that’s when a fee starts kicking in, but for most users with just one computer to track, it’s free, which can’t be beat.</p>

</div>

<p><a href="http://feedads.g.doubleclick.net/~a/qRgoJ0xWJvSQdoXyQE5cutU0EPg/0/da"><img src="http://feedads.g.doubleclick.net/~a/qRgoJ0xWJvSQdoXyQE5cutU0EPg/0/di" border="0" ismap="true"></img></a><br/>

<a href="http://feedads.g.doubleclick.net/~a/qRgoJ0xWJvSQdoXyQE5cutU0EPg/1/da"><img src="http://feedads.g.doubleclick.net/~a/qRgoJ0xWJvSQdoXyQE5cutU0EPg/1/di" border="0" ismap="true"></img></a></p><div class="feedflare">

<a href="http://feeds.feedburner.com/~ff/osxdaily?a=ttBw4yCDAbc:Cs1plilri8s:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/osxdaily?d=yIl2AUoC8zA" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=ttBw4yCDAbc:Cs1plilri8s:V_sGLiPBpWU"><img src="http://feeds.feedburner.com/~ff/osxdaily?i=ttBw4yCDAbc:Cs1plilri8s:V_sGLiPBpWU" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=ttBw4yCDAbc:Cs1plilri8s:D7DqB2pKExk"><img src="http://feeds.feedburner.com/~ff/osxdaily?i=ttBw4yCDAbc:Cs1plilri8s:D7DqB2pKExk" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=ttBw4yCDAbc:Cs1plilri8s:7Q72WNTAKBA"><img src="http://feeds.feedburner.com/~ff/osxdaily?d=7Q72WNTAKBA" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=ttBw4yCDAbc:Cs1plilri8s:qj6IDK7rITs"><img src="http://feeds.feedburner.com/~ff/osxdaily?d=qj6IDK7rITs" border="0"></img></a>

</div><img src="http://feeds.feedburner.com/~r/osxdaily/~4/ttBw4yCDAbc" height="1" width="1"/>

 

View the full article

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic


×
×
  • Create New...