WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Thursday, June 23, 2011

laptop security software

If you travel often with your laptop, it’s important that you have an anti-theft or tracking software in place in case your laptop goes missing. We covered a number of such tools, including both software and devices like Bluetooth alarm, in our popular laptop security software post. One of the tools mentioned was Prey, a software that can trace and locate a stolen laptop (or even a desktop for that matter).

Today, we will talk in detail about Prey and how it works. It comes in both free and pro versions, and luckily, the free version is decent enough (read “has essential features”) for everyone of us to install and use.

If you own a laptop, I’d take a step further and say that this is a tool you must use.

Lets see how it works.

Installing and Setting Up Prey’s Anti-theft Solution

Step 1. Download the Prey software and install it. It works on all the leading operating systems including mobile operating systems like Android.

trace and locate stolen laptop with prey 1

Step 2. After the installation is done, you need to configure its settings.

trace and locate stolen laptop with prey 2

Step 3. It’ll detect if you are running it for the first time and ask you to set up the reporting method. Click on OK.

trace and locate stolen laptop with prey 3

Step 4. The Prey Configurator window opens up to help you set up the reporting method and other things.

trace and locate stolen laptop with prey 4

Step 5. It gives you the choice between Prey+Control Panel or Prey standalone. Their web based control panel is neat, so I recommend that you go with that.

trace and locate stolen laptop with prey 5

Step 6. You’ll need to sign up with them and enter your login credentials.

trace and locate stolen laptop with prey 6

Finally, it’ll mention that the device is set up and being tracked.

trace and locate stolen laptop with prey 7

Now, lets see how its online control panel looks like and what are the options it has to offer.

Getting Familiar With Prey Control Panel

You can visit control.preyproject.com and login with your details.

trace and locate stolen laptop with prey 8

You should find your device listed there. Click on the device image or on its name to check the options.

trace and locate stolen laptop with prey 9

There are a number of settings, all well explained when you hover the mouse cursor over the question mark beside each of them, that help Prey to trace and locate your stolen computer.

As you see below, it starts with Missing?, which is what you gotta do and click on Save changes when your laptop does go missing (I hope you never have to use this option). There’s also the frequency of reports thing that indicates the time intervals between consecutive reports.

trace and locate stolen laptop with prey 10

If you scroll down on that page, you’ll find two columns: Information to gather and Actions to perform. Under actions to perform, you can set up alarm, alert, lock the computer or even delete data remotely. The tool can gather information like location, nearby Wi-Fi hotspots etc.

trace and locate stolen laptop with prey 11

It can also get screenshots of the session, and automatically take a picture of the thief using the laptop’s attached webcam.

trace and locate stolen laptop with prey 12

There are more settings to be found if you click on Settings at the top navbar of that page. These are basically notification settings that you can customize.

trace and locate stolen laptop with prey 13

Finally, if you want to set up Wi-Fi autoconnect through Prey, then you’ll have to visit the Prey Configurator again (that’s installed on your computer), and there click on Manage Prey Settings and check WiFi autoconnect.

trace and locate stolen laptop with prey 14

There are obviously some caveats, like what if the computer never connects to the internet after getting stolen? Well, there’s nothing much you can do in that case because most of the anti-theft software are dependent on the assumption that the computer will connect to the internet or be in the vicinity of a wireless hotspot so that it can be tracked.

No comments:

Post a Comment

LinkWithin

Related Posts Plugin for WordPress, Blogger...