Editor Picks

Welcome to ABHIJEET VISHEN's Blogger Register YourSelf For Ethical Hacking Classes To Be an Expert & Win Prizes"    Register Your Self to Learn Ethical Hacking,Hardware & Networking,HTML,DOT NET,PHP

Sunday 17 June 2012

Track Stolen Phone/Laptop/Tablet Using PREY


Track Stolen Phone/Laptop/Tablet Using PREY

1. Laptop protection
step 1
Prey works on a centralised service basis. It’s installed on multiple devices and managed via its web control panel. There’s an alternative mode but we’ll choose this option. Download the laptop client from preyproject.com, install it, choose Prey + Control Panel and create a new user name with password.
2. Control Panel
step 2
Log into the preyproject.com website and you’ll have access to the Control Panel. The opening page shows you all the devices you have registered. The free service has a limit of three, with 10 reports, but that’s enough to provide security. Click the icon to confi gure this further.
3. You are the Quarry
step 3
The main page is where you can set all the juicy bits. Geo and Networking enables you to pin down a rough locality for the device; the Session section will take screenshots of activity and monitor files; while the webcam will grab images of the perp.
4. It’s gone
step 4
If a device is lost, setting the Missing switch to On will send an email to you the instant the Prey system detects the device is online and is in a state it has been able to run the client-side Prey app. The default setting sends updates every 20 minutes.
5. We’ve got one!
step 5
So how did it do? We initially had problems getting the webcam to work but it finally activated, was taking screengrabs and logging IP traces. It’d be better if it took targeted grabs and browser log-ins but it’s certainly a very good step in the right direction.
6. Mobile protection
step 6
Prey works on more than just PCs, Macs or Linux: it also supports Android devices, including phones and tablets. A version for iOS devices, such as the iPhone, is apparently in the works. Phone devices are activated and controlled via SMS and it can play a loud sound if you’ve misplaced them.
————————————————————————————————

Key features

  • Geo location aware

    100% geolocation aware

    Prey uses either the device’s GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. It’s shockingly accurate.
  • Wifi autoconnect

    Wifi autoconnect

    If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.
  • Light as a feather

    Light as a feather

    Prey has very few dependencies and doesn’t even leave a memory footprint until activated. We care as much as you do.
  • Prey webcam module

    Know your enemy

    Take a picture of the thief with your laptop’s webcam so you know what he looks like and where he’s hiding. Powerful evidence.
  • Prey screenshot feature

    Watch their movements

    Grab a screenshot of the active session — if you’re lucky you may catch the guy logged into his email or Facebook account!
  • Prey Secure module

    Keep your data safe

    Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.
  • Prey Lock module

    No unauthorized access

    Fully lock down your PC, making it unusable unless a specific password is entered. The guy won’t be able to do a thing!
  • Prey hardware scan

    Scan your hardware

    Get a complete list of your PC’s CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.
  • Prey Auto update

    Full auto updater

    Prey can check its current version and automagically fetch and update itself, so you don’t need to manually reinstall each time.
Watch the video below:

0 comments:

Post a Comment