Skip to main content

How to recover your stolen laptop

What do you do if someone steals your computer and its precious data that comprises your work life?

Tracking services such as LoJack for laptops and GadgetTrak come in handy.

You install an application on your laptop, and if it is stolen, these services can help track down and try to recover your computer or at least disable it so the thief cannot access the contents of the hard drive.

Most of these services require a monthly or annual subscription fee, ranging from $20 to $60 a year.

For the budget conscious there are few free, open-source options for tracking a stolen laptop. Apart from the price tag, one reason you might want to use an open-source tracker over commercial product is that you can examine the code to ensure it is not doing anything shady with your private data, and compile it yourself.

How reliable and stable are these tracking services?

With a well established company, you can feel pretty sure it will be around in two years if your laptop is stolen. But can you have the same confidence in a free alternative?

While you can still download the LaptopLock tracking application, the site is rarely updated and one wonders whether it is functioning properly.

Currently, the two open-source laptop tracking services in standing are: Prey and Pombo.

Since Pombo works only with Linux, I will focus on Prey which supports Windows, Mac OS and Linux; it is useful to a much wider audience and also I have experience in using their services since 2008.

Not only does Prey look good and work well, it is in steady development by an active community that is improving and adding features to it.

On the downside, Prey does not have the resources to work with the police to recover your laptop, as many paid services do. Furthermore, it provides no way to physically delete files from the stolen computer, and the tracking software can be removed by savvy thieves.

In version 0.3.3, the Prey laptop recovery software runs in the background processes of your laptop.

It "awakes" at a specific interval;, goes online (if your laptop is not already connected to the Internet, Prey tries to connect to the nearest WI-FI access point) and checks in with a specified web address to see what you have ordered it to do.

If said address doesn't issue a command to the laptop (such as telling your computer that it is considered stolen), the Prey software returns to sleep and will wake up again at the next time interval.



What to do when your laptop is stolen?

If your laptop is stolen, you can use another computer to sign in to the Prey web site, mark it as missing, and follow its whereabouts through a control panel; assuming the thief takes your laptop online or the software manages to connect to a WI-FI access point.

Be aware that Prey and many other laptop recovery services whether free or paid is that the tracking programme itself can be stopped, removed or deleted if found by a tech savvy thief. Of course the programme will be useless if the thief reformat your laptop's hard drive.

This can somewhat be resolved by going into your laptop's BIOS settings and disabling the option for the computer to boot from USB device or network connections, and locking down access to the BIOS with a password.

Note: I say somewhat because the thief could simply remove the hard drive from your laptop, and access its contents by connecting it to another computer.

Some of the paid laptop recovery services are difficult to render unworkable because they are not written to your laptop's hard drive. For example, LoJack for Laptop's software resides in the BIOS of your laptop. Prey does not do this.

How it Works?

In Prey, interacting with your stolen laptop works in standalone mode or through a web control panel.

In Standalone mode, you get messages from your laptop by e-mail but setting up remote-control operation can be awkward.

Using a web control panel is easier to set up and run individual remote operations. Through this panel, you can flag your laptop missing. Then, if your laptop manages to connect to Internet, you can tell it to send you a report detailing the IP address it is connected to, command it to take a screenshot of the desktop and if your laptop has a camera, take a snap-shot to capture the image of the person using the computer. You can even send an instant message to the suspect to tell him you are watching him.

So is using Prey better than using nothing at all? Definitely. Still, it would not hurt to use a security cable to protect your laptop

Comments

  1. Make a better life through life coaching with life coach......

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Verify Your Land Title Deed is Genuine

Cases of forged title deeds are on the increase. Therefore, people are losing money to con men as they are taken advantage of due to their ignorance regarding land transaction matters. While thinking of owning land, it is vital to be aware of how you can verify a title deed before investing your hard earned cash. As you plan to commit your money to buy and construct your dream home, verify that, the seller is the genuine owner, the land exists and is free from restrictions. Also be sure that you are not buying land on a road or railway reserve and above all, that the title deed is genuine.

Acne Treatment for Women at Age 30

Acne Treatment reviews In her 30s, a woman's skin begins to lose its earlier elasticity and looks less bright because your cell turnover is slower. Rather than rushing out and buy an expensive skin care product, you should do three things. What you need is a good exfoliate that will help your skin shed faster to bring out that fresher, younger looking skin. Retinoid is the other thing you need. Retinoids are great when you have acne and fine lines as most women find themselves fighting against both. Its recommended you use retinoid eye cream in the eye to reduce the visibility of lines. If applied well all over the face, retinoid tones your skin. Retinoid based face creams are the 30-something woman's best friend. Retin A is the most popular over the counter retinoid and also the most mild. For a stronger retinoid it has to be a prescription. The other is a good antioxidant. AHAs, glycolic and lactic acid should be key ingredients as they are gentle ways of helping your ...

How to Identify an original and fake mobile phone

What are your chances of buying an original phone, taking into consideration that we are swamped with fake mobile phones? Fake phones are often practically the same from genuine ones, since they are made with the intention of misleading buyers that they have the real product while fake product are made to look as close as possible like the real ones but have a twist, only noticeable at closer look. In Kenya for instance, it could be a tainted  brand name for example, Nokia for Nokla, hi phone instead of iPhone, samsvng instead of Samsung. While there are a handful of people who knowingly buy fake phones, mostly because they are cheap, most people are unsuspecting victims of counterfeits because they cannot distinguish the real from the fake. Some of the ways to differentiate between which of the phones are genuine and which are fake include: Made in China does not always mean fake. Many international corporations manufacturing handsets have factories in different parts...