Pages

Labels

Friday, July 13, 2012

How to track and recover your stolen laptop/iphone with Prey

Prey is a useful and easy-to-use application that would help recover your laptop/iphone from stolen. Once installed, this application will sleep in the background of your device's operating systems. And when your laptop is stolen you can tell it to awake and do magic things. For example, you can tell it to report the locations of your stolen laptop. You can also request it to pop up an alert or lock the laptop. This client application can also take pictures of the thief with your laptop's web cam. These information are stored in Prey servers and you can then access them from any computer by visiting Prey Control Panel and logging using your account or by accessing your emails.

To start, you will need to download and install the Prey software. Visit the Prey homepage and, when the page appears click the Download now button. If the File Download Security Warning dialogue box appears, click Save and then choose a location for the downloaded file. Firefox users should select Save File to save the download to Firefox's default download folder. Now click the purple Close button in the web browser window.

Now locate and double-click the downloaded file to launch the installation wizard. Work through this, accept the default options and, at the last screen, ensure the ‘Configure Prey Settings' box is ticked before clicking Finish. At the Prey Configurator dialogue box click OK. At the next stage, ensure ‘Setup reporting method' is selected and click Next. Select the ‘Prey + Control Panel' reporting method and click the Next button to continue.

As this is the first time Prey has been launched, select New user and then click Next. At the following screen type in your name, email address and enter a password. Now type in a name for the computer so it can be easily identified later and choose Desktop or Portable from the Device dropdown list. Then click the Create button to open a Prey account. Click the OK button to confirm and then click OK again to close the Prey Configurator.
Prey will now send a confirmation email, so launch your email program and check for the message. When it arrives, open it and click the link in the body of the email to complete the sign-up process. After a moment the web browser will launch and display the Prey login page. Type in the email address and password entered in Step 3 and then click the Login button.
The Prey control panel appears with the device listed - a notebook PC, in our case. To set up how Prey monitors and reports on this PC, click the picture of the device. Scroll down the settings and ensure that the Notify new reports option is set to Yes (as Prey will send emails when it wants to alert you of something) and then set the frequency of the reports to an appropriate number of minutes - the default is 20 which should be fine. To finish setting up Prey, click the Modules link at the top.
Now we need to set up the Report modules that tell Prey what information we want to see should our laptop get lost or stolen. Start by turning the Network setting to On. This opens a selection of options that can help trace a missing computer. Ensure that all three options - Active Connections, Wifi Hotspots and Trace Route are also set to On. Then turn the Session button to On. The key setting here is Get Screenshot, which will allow Prey to surreptitiously grab a picture of whatever is currently being displayed on the PC's screen.
Finally, be sure to set both the Webcam and Geo switch to On. This will allow Prey to take control of your PC's webcam (if it has one) and take a photo of whoever is using the computer, as well as using any nearby Wifi hotspots to generate a Google Map showing an approximation of its location. When done, click the orange Save changes button at the bottom right of the screen. To test it, click the Configuration link at the top again and then set the Missing option to Yes. Then click Save changes.
Prey now believes that our notebook PC is missing and has been set up to report back every 20 minutes. Obviously the information that Prey can deliver depends on whether the PC is being used, has a camera and is connected to the Internet. As soon as an Internet connection is detected, you will receive an email from Prey confirming that your device is marked as missing. Then, 20 minutes later another will arrive to say that a report is available. Open the email and click the link.

If necessary, sign into the Prey website again. The missing computer will be flagged with a red screen and a large green button next to it labelled ‘New report'. As reports come in, they will be flagged here and listed down the left-hand side. The free version of Prey will store up to 10 reports per registered device. Click the New report button to continue.

If everything is working, here is what you will get. A report that shows the location of the missing computer based on nearby Wifi networks. If the computer has a webcam attached (our missing notebook has one built in), you will even get a photo of the perpetrator. All of this information is recorded covertly, so a thief has no idea what's going on. If the traced computer was stolen, we would strongly advise passing the information gathered by Prey on to the police.

1 comment:

  1. I haven't used any tracking software like Prey before, and i wonder whether it is effective to install it after your iPhone has already been stolen?

    ReplyDelete