How to Track your Stolen Laptop?
|
Last month i buy a new Dell Inspiron 15R Laptop worth Rs 45,000 from Dell showroom with Intel i5 processor and NVidia 1 Gb dedicated graphics. It was all possible with my own pocket money generated via this blog and thanking God/Parents for that. But sometimes i thought if my laptop gets stolen or lost, what should i do then? All my personal information and data gets erased for forever. This lead me to scroll at Google search engine again and successfully founded an result. Hence the result comes with an software named as Prey which is known to be a free stolen laptop tracking tool. So lets explore it in more details and learn how to use it for various safety measures in our future.
What is Prey?
Prey lets you keep track of your laptop, phone and tablet whenever stolen or missing -- easily and all in one place. It's lightweight, open source software that gives you full and remote control, 24/7. It helps you to find your stolen laptop by sending timed reports to your email with a lot of information includes general status of the computer, a list of running programs, active connections, Wi-Fi information, a screenshot of the running desktop and if your laptop has an integrated webcam it will include a picture of the thief also.
Salient Features of Prey:
1. 100% Geo-location aware
Prey uses either the device's GPS or the nearest Wi-Fi hotspots to triangulate and grab a fix on its location. It's shockingly accurate.
2. Know your enemy
Take a picture of the thief with your laptop's webcam so you know what he looks like and where he's hiding. Powerful evidence.
3. No unauthorized access
Fully lock down your PC, making it unusable unless a specific password is entered. The guy won't be able to do a thing!
4. Wi-Fi auto connect
If enabled, Prey will attempt to hook onto to the nearest open Wi-Fi hotspot when no Internet connection is found.
5. Watch their movements
Grab a screenshot of the active session -- if you're lucky you may catch the guy logged into his email or Facebook account!
6. Scan your hardware
Get a complete list of your PC's CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.
7. Light as a feather
Prey has very few dependencies and doesn't even leave a memory footprint until activated. We care as much as you do.
8. Keep your data safe
Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.
9. Full auto updater
Prey can check its current version and automagically fetch and update itself, so you don't need to manually reinstall each time.
10. And many more…
How to Use it?
1. First of all download and install this software from here. It is also available for Mac users.
2. Then open it and run. Now configure this soft with your name, device, email id and create a new account at Prey along with password.
3. All Done! Check your mail and confirm account respectively. After that, Login to your web panel and manage your settings as per your choice at prey.
How it Works?
Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.
What to do if laptop lost?
Just go to web panel and change the laptop status to missing. Select report timing, operating system and add webcam in modules. Then Save your all settings and check mail after 5 min.
Now Prey will try to hook onto the nearest open Wi-Fi hotspot when no internet connection is found, prey automatically communicate with web panel and check your status in panel. If panel showing missing status software automatically start working in your laptop. It will take details of your laptop like opened software details, network details, screen shot and take a picture of the thief with your laptops webcam so you know what he looks like and where he’s hiding and send to your email id already configured in this software. Pray also hide your Outlook or Thunderbird data from thief. Hence you will get the stolen details in your mail ID by which your laptop thief can be detected very easily. Enjoy freedom!
I Hope this article will be very helpful to the Hostel boys in their college. Please share and award proper credits to this blog.
Join me on Google+
|
Respected Readers :-
|
E njoyed this post very much – So why not you Subscribe to our regular Email Updates ! and stay connected with us forever .
but what if person FORMATS the laptop?
ReplyDeleteNice question buddy! But i am sorry for this case. If your laptop gets formatted by another user Prey cant detect it anymore.
Delete