Content of the material
- ↓ 01 PreyProject
- Notify your financial institutions
- Theft Prevention
- Using the Prey Control Panel
- Join or sign in
- File a police report and report the loss to the manufacturer
- 5. LockItTight
- Step One: Set It and Forget It
- 3. GadgetTrak
- 2. Get your data back
- ↓ 10 Laptop Alarm [ Outdated ]
- Recommended for you:
↓ 01 PreyProject
Prey is an anti-theft tracking software for your laptop, phone and tablet that lets you remotely locate, lock, wipe and recover it if ever stolen, or simply missing. You do this by logging into a web platform where you can also trigger actions like sounding an alarm or showing an onscreen message to let the thief know you’re after him. Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. Features:
- Wifi auto connect – Prey will attempt to connect to a Wifi to send the necessary information.
- Powerful report system – Will take a screenshot of the desktop or a picture of the thief via the built- in webcam.
- Messaging/alert system – Send a message which will appear on the screen together with a loud alarm to the thief.
- Webcam image capturing – Capture images of the theft silently using the secondary camera.
- Screenshot grabbing – Capture screen shot, this enables you to find out which website he or she is visiting, such as his facebook page.
- Data securing, hardware scanning, screen locking, remote messaging, and sonic-alarm triggering.
Notify your financial institutions
Just as you would if you lost your physical wallet, contact your bank and credit-card companies about any financial accounts that autofill when you make a purchase or that you have saved on e-commerce sites. You can freeze your debit and credit cards and let your financial institutions know about the possibility of suspicious activity.
In the meantime, you should also keep track of your account activity by checking it online every couple of days after your laptop goes missing. If personal information such as tax returns, bank account numbers or Social Security numbers are on the stolen laptop, then consider freezing your credit records.
- Use cable locks on laptops as visual deterrents. They’re largely ineffective to a motivated thief, but they are worth inducing a would-be thief’s second thought.
- That said, don’t leave your unsecured laptop unattended or in plain sight. Even if you have your laptop on your person, choose a bag that doesn’t scream, “laptop bag!”
- Back-up your data on a schedule. Just do it. (Note: Backing up to the cloud is a security blessing and a curse. Tread carefully.)
- Keep your antivirus and firewall software patched and in order. It might just buy you some time in preventing your identity from being harvested from a stolen laptop.
- Create a contingency plan. How would your family, customers, or fellow employees be affected if something goes wrong?
- Understand the greater security risks as you open up your corporate network to mobile employees.
- Be proactive — there’s always another hole to plug. Data security is a moving target.
Using the Prey Control Panel
If you choose to create an account on Prey’s site, you can take advantage of their Control Panel for more granular control of your stolen hardware. After you sign up for the service, you will get an activation key, which you will enter in the configuration screen. You will also have to add a new device in the Control Panel. Click the Add New Device button once you have logged in. In this new screen (Figure B), you enter a name, select the device type, select the OS, and then click the Create button. When you create the device, you will be given a device code that you will then enter into the configuration screen.
Join or sign in
Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.
Use FacebookUse Linkedin
File a police report and report the loss to the manufacturer
Truthfully, this step may not yield results, but it’s possible that your device can be recovered if someone tries to sell it or get tech support. File a report with local law enforcement, who may request your laptop’s serial number (more on that in a minute). Both ASUS and Dell will open stolen device cases.
A police report may also be required if you want to submit an insurance claim.
5. LockItTightA Windows-specific program, this provides location tracking, screenshots, webcam support, key logging, file tracking, and encrypted reports. There is no indication on the product’s site that it will expand its reach to other devices and operating systems. LockItTight provides free and tiered monthly subscription plans. The paid plans offer wider coverage for more devices. Available for Windows (XP, Vista, and 7) LockItTight, Free and monthly plans: $1.99, $2.99, and $4.99
Step One: Set It and Forget It
Head to Prey's download section, grab the package for your system (again, Prey supports Windows, Mac, Linux, and Android), then install it as normal, creating an account as you do so. The only major issue to address is how you want to control your system and track it if it goes missing. Most people will want to stick with the default, web-based standard method, but those who would prefer an email-based, server-controlled tracking setup can explore an "Advanced" option. I'm focusing on the default Prey + Control Panel setup.
Because it's tracking software that doesn't want to be seen, Prey is almost invisible when it's running on your system, without any configuration or executable files to be seen. In fact, once you've deleted the installer, you shouldn't be able to find Prey at all in your system, because that's the idea. It quietly and quickly checks in with Prey's servers in the background, at an interval you decide, to see if the owner has logged in and marked it as stolen. That's all it does—until you flip the switch on Prey's servers to note that it is, in fact, stolen, or ask for an update on the hardware profile.
After you've installed Prey and set your defaults, log into Prey's web center, and peek at the basic configuration tools. You can give each of your devices a unique name, clarify its details, and change the frequency of its reporting time. You can set the frequency to a reasonable 20 or 30 minutes now, but don't worry—you can update it as soon as your device is swiped, so you won't be wasting those precious early minutes wondering what's up.
3. GadgetTrakA cross-platform tracking app, this provides information tailored to specific groups of devices. On laptops, GadgetTrak provides Wi-Fi positioning and webcam support. GadgetTrak also gives users the ability to file police reports with over 150 police stations. On iOS devices, it provides camera support, location reports, hybrid (GPS, Wi-Fi, and cell tower) positioning, and push notifications that entice the thief to initiate a tracking report. On Android and BlackBerry devices, it provides hybrid positioning, remote data wipe, SIM change detection, and a piercing alarm that can be remotely enabled. Available for Mac OS X, Windows, iOS, Android, and Blackberry GadgetTrak, 7-day free trial and paid yearly plans
2. Get your data back
Backup in the cloud. The cloud is one way to go, but options are limited, you can get several GBs for free from Dropbox and up to 50 GBs for £6 a month. For the gamers out there, this is cheaper than a World of Warcraft subscription, so you don’t have much of an excuse to not do it if you are worried about protecting your data. Your data on Dropbox is encrypted by default, but you can encrypt it yourself before sending it to them for an additional layer of security.Backup on an external hard drive. Most external hard drives offer backup software that can do incremental backups of your data as you go, and include facilities to restore the data afterwards. Windows 7 and 8 have a reasonable restore and recovery tool included, and you should use these if you don’t want to lose your files. What’s more, a 2TB external hard disk costs less than £100 – and that’s a price most people would consider cheap for all of their data.
↓ 10 Laptop Alarm [ Outdated ]
Yes, Laptop Alarm is a freeware, it doesn’t monitor or track your stolen laptop, it prevents. Once installed, Laptop Alarm will emit a LOUD ALARM on
- A/C Power Removal provided the battery is attached
- Mouse Removal
- Mouse Movement
- Attempt to Shutdown / Suspend
Recommended for you:
6 Freeware To Lock & Disable USB Drives – Prevent Data Theft In Office 3 Free Employee GPS Location Apps – Tracks And Monitor 4 Free GPS Apps – Track & Share Your Location Real Time 6 Privacy Respecting Search Engines – No Log And No Tracking