Prey, monitors and finds stolen or lost laptop or phone - video tutorial

Hi friends, tutorial today we will talk about a software that will help us recover lost or stolen devices be it tablet Android smartphone Android, iPhone iOS, iPad, Netbook or Notebook running Windows or Linux products Apple running Mac OS operating system
It's about Prey, an open source project gives us a software called Prey that will help us to monitor our devices portable if we lose them or they are stolen. Because the software is cross platform, it runs on any operating system. All you have to do is create an account on the website preyproject.com, Prey software to download and configure properly. Once installed and configured on our dispozitvele portable devices we can monitor a web interface from which we can make the device as "missing" (lost / stolen / missing). Once we do this, Prey software installed on our devices will start to send reports in web administration interface that you can access from any device with an internet connection.
Reports containing Prey?
- Geolocated information lost or stolen device obtained through GPS device
- Information about the network to which the device is connected, IP private and public MAC address of the network card
- Data about the latest device connections
- A list of wifi hotspots besides that passed our device
- Route internet connection device (traceroute)
- Data about user sessions run current incluzad screenshots of the desktop
- Data files that have been changed
- A list of programs that were running on the device when the report was made
- The possibility to activate webcam obtaining a photo of the thief or the person who found our lost device
All this information can be enabled or disabled individually depending on the information that we want to get the report that we can set us be sent at intervals of: 10, 15, 20, 25, 30, 35 or 40 minutes.
If the device has been stolen, Prey software can take some action for us such as:
- We can activate an alarm that sounds powerful device 30 lost for seconds (very useful if we react once we see that the device is missing and it is still near)
- An alert will be displayed on the lost or stolen device that will alert the thief that is watched
- We can lock the device so that it can not be accessed until a password is entered
- We delete all data saved in browsers, all passwords and accounts so they saved thief can no longer use browser history or existing accounts data in the device to access our email accounts or social networking accounts.
Users with a slightly diabolical mind can use this software for spying or monitoring people close (child, girlfriend, wife, mistress)
That being said I invite you to watch the tutorial to see exactly how we can monitor and recover portable devices if they are lost or stolen.

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!
On the comments box trying to get somewhat on the subject so other visitors can offer a tutorial + comments relevant comments may be extra support for user errors, or desire to learn.
Before asking a question try looking through the comments oldest, most times there already answered your question.
Use more categories at the top of the site and the search engine from the right corner to quickly get to what you are interested, we have over 800 tutorials that cover almost every genre of software, we have realized, I you just have to search for them and watch them.

Instructions for use videotutorial.ro

Search Engine.
If for example you have a problem with Yahoo Messenger, you can enter in our search engine terms like Yahoo, Mess, Messenger, id mess, multimess problem messenger, messenger error, etc., you will see that you will have a choice.

Categories.
If you use category drop-down, they find the bar under Home categories: Office, Graphic-Design, Hardware, Internet, Multimedia, Security, System, Storage, Backup, under these categories are organized sub-categories and sub-sub -categorii, that's a more accurate filtering. To find something related to Yahoo Messenger using the categories you can lead the category:InternetThere will open other subcategories where you choose Voice-ChatFrom there you can go on the subcategory YahooFinally, with these filters will arrive on a page where the only items related to Yahoo Messenger or Yahoo Mail.

Archives.
On the page Archives You can find all our tutorials organized beautiful days saptameni, months and years.
Everything is logical, just follow the logic.

Enjoy !

Adrian...... ..linux.videotutorial.ro

Get the Flash Player to see the video.


Related Tutorials



about Adrian

Flemish information and knowledge, I like everything about art and share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful fellows. I enjoying this privilege, I will never say "do not know" but "not yet know"!

Comments

  1. Adrian but when he steals leptop and Windows formats??? Prey will be able to monitor leptop stolen ....

    • quote
      - We can lock the device so that it can not be accessed until a password is entered
      -oare can be formatted ???????? I think it takes some time to break a good password

  2. interesting . I really going to use it and to recommend it to others. It is one of the programs that are worth paying for. 5 $ / month is not much at all if you want to protect your investment by 20, 30 million or more. but it looks pretty good and free version. Thank you for your presentation.

  3. If HDD formatting control adieu (mobile device), such programs would be useful for monitoring the location of an employee, child or who know me, No way for thieves, now if a longer and thieves "fools" , then we must proud of them.

    flo13:
    quote
    - We can lock the device so that it can not be accessed until a password is entered
    -oare can be formatted ???????? I think it takes some time to break a good password

  4. Alexandru-Stefan said

    Oktav:
    Adrian steal but when leptop siiiformateaza windows ????? Prey will be able to monitor leptop stolen ....

    Right!

  5. Interesting, but if your device is password protected as you start the network card if you can not get into Windows? Similarly, if the block device stops working as GPS or WiFi to send your message? This soft to walk must first install the device, if not go uninstalled.
    I for one would think otherwise such software. The software should look in the internet network or GPS device that has the MAC address or GPS monitored, so even if the device is resoftat these data remain.

  6. AdrianGudus said

    Friends, MOCA's service! ! !
    What I want to get to a product for which you pay absolutely nothing? Did not want that when the device is stolen, the "militia" to refer only and they will bring "jointed" device on the door?
    There is no such thing!
    This software makes it very much to our advantage and mocha nose brings valuable information. Learn to appreciate.
    There are other steps you can take before you get to Prey such as encryption device (subject that already existed here), create a user account with a password, set your browser not memorize history, cache and coockie- sites, some settings made Plicy Group Editor that we can restrict access to the task manager and other functions so it Stunned head the bastard who stole device.

  7. Hello to all, I use PREY and I used successfully last month broke my trunk and I ran out of 13 MacBookAir "and new iPad 64GB (approx £ 9500).
    After a day I receive mail report that were connected to Wifi MBA, I located after IP and I went with ploitia there, and I recovered my toys.
    There are several aspects to be considered, if password or lock you can not connect online, formatted or gives restore if no longer safe for you to do, but not all thieves are experts in computer science.
    I used the free version, in the evening we left without toys 5 I paid eur and moved PRO to automatically receive reports 2 2 in minutes.
    In my example the thief sold leptop 6000 400 Ron RON and iPad was BONUS.
    PREY so use does not cost anything, and might not be an expert thief or someone who buys the hot ...
    Soon to appear and my story here: http://preyproject.com/blog/cat/recoveries
    PS POLICE CONTINUE SEARCH IN thief unsuccessfully :))

  8. Once installed this software you can even be seen by the producer or owner may disclose certain information about you to companies interested ... ..

  9. AdrianGudus said

    Ervin:
    Hello to all, I use PREY and I've used successfully last month broke my trunk and I ran out of 13 MacBook Air "and the New iPad 64GB (approx 9500 RON).
    After a day I receive mail report that were connected to Wifi MBA, I located after IP and I went with ploitia there, and I recovered my toys.
    There are several aspects to be considered, if password or lock you can not connect online, formatted or gives restore if no longer safe for you to do, but not all thieves are experts in computer science.
    I used the free version, in the evening we left without toys 5 I paid eur and moved PRO to automatically receive reports 2 2 in minutes.
    In my example the thief sold leptop 6000 400 Ron RON and iPad was BONUS.
    PREY so use does not cost anything, and might not be an expert thief or someone who buys the hot ...
    Soon to appear and my story here: http://preyproject.com/blog/cat/recoveries
    PS POLICE thief still looking unsuccessfully)

    With I said in tutorial, thieves are dumb, Tampa ... did her idea of ​​computer science, IT, security, tracking ... as just that-s thieves, he does not go head to anything good, they are not capable of producing one lion of a clean and honest and then all they know to do is to run away, to hide and steal ...

  10. AdrianGudus said

    Nelu:
    Once installed this software you can even be seen by the producer or owner may disclose certain information about you to companies interested ... ..

    Paranoia is big ... big .paranoia

  11. Howdy,
    It is a good softulet. But if you're a little smarter you can pass him.
    I noticed that if you forced a restart to reset the computer and lock panel can quiet it uses, until you get to connect to the Internet and then dinou blocking you again.
    The second point; weakness is that if you know the "safe mode" when soful is lost because you get quiet and uninstall the program. My advice is to use it only provides that the program will no longer put altceva.Asa a password or to have a picture of the person and login. So you can recover and know that someone is watching laptopul.Daca first thing it will do is to delete the program or Windows altogether, if he does not know will not take any action so you will get :))

    • I was thinking to another intrebare.Daca can capture images who or what would prevent them do not always like Big Brother.?

  12. Howdy,
    I use this program for a long time, but I have a little problem with it, even if I have activated the option that those reports to include pictures made the thief with the camera, always place the picture is is a black screen, otherwise all other functions go as it should. That is the problem?

  13. AdrianGudus said

    Viorel:
    Howdy,
    I use this program for a long time, but I have a little problem with it, even if I have activated the option that those reports to include pictures made the thief with the camera, always place the picture is is a black screen, otherwise all other functions go as it should. That is the problem?

    You can not install the driver for the webcam. In other applications such as Yahoo Messenger, Skype, your webcam works?

    • I was thinking to another intrebare.Daca can capture images who or what would prevent them do not always like Big Brother.?
      What do you think?

    • The webcam works perfectly in yahoo messenger, skype and this kind of programs. I have an Asus Intel Core K53SJ i7-2630QM CPU @ 2.00GHz, Windows 7 not know if it's worth your laptop model. When gotta make picture camera light comes on for a few seconds. You may need to reinstall the software?

  14. Michael Cirtog said

    to me does not work prey.Ajutama please id:[Email protected]

  15. AdrianGudus said

    razvan:
    I was thinking to another intrebare.Daca can capture images who or what would prevent them do not always like Big Brother.?
    What do you think?

    Our duty is to present software and not to convince you to use. If you read the official project page to which you link in the text above tutorial you would have seen it tested, verified by giants and publishers abroad.
    If it was a project of a governmental or an organized group unknown more ... I said you had every right to have doubts about the fairness and privacy policies.
    If we take the concept we ... then how do we know that when you go and take a shower, those who did block or renovations in your home have slipped a tiny camera (and Believe they can achieve microscopic size of these rooms) in a corner of the bathroom ...
    I knew that Romanians are generally conservative but like any paranoid so it's good to be ...
    You how to get public market with such a service, to be so popular and not get ferifice nobody, not anybody you control what you do with the data, what data you collect. Being an open source project, transparent tops and you have all the information about these details on the official website of the project.

    • Hello,
      Sorry if I disturbed by the question asked.
      But it was just an idea.
      I do not think it is necessary to rev up the job.
      I thought about saying what they think exactly like your urge
      thanks

  16. AdrianGudus said

    Michael Cirtog:
    to me does not work prey.Ajutama please id:[Email protected]

    What does not work? If you want answers when we need details as to answer. Stop being so vague that we do not have to guess the gift in crystal balls.
    Do not you tell us what operating system you use, if you have the firewall enabled or not, if you're connected to the Internet via a router or directly, if you had no internet or when you test software ...

  17. AdrianGudus said

    razvan:
    Hello,
    Sorry if I disturbed by the question asked.
    But it was just an idea.
    I do not think it is necessary to rev up the job.
    I thought about saying what they think exactly like your urge
    thanks

    I do not know where you deduce that bothered by the question asked
    I do not know where you deduced that I packed
    I do not know what my answer cataloged as one offensive
    You posted a question (because in your review is found questionable "?")
    I've just posted a few arguments which do not have to worry about application
    You've noticed that your question is rhetorical and that it should not necessarily be answered.
    We are here to clarify
    It's still good to think deeper and broader label chicken before big brother
    When ask rhetorically and would not answer please write to us at the end of the comment in parenthesis (my question is rhetorical, not wanting response and am aware that my ides are due to a failure to inform and deepen subject hasty but tend to fortune occasionally)
    everything will be OK and we will not take seriously and we will not answer your question

  18. Welcome. When I install my program crashes NSIS Error (Error launching installer) why and what to do

  19. AdrianGudus said

    relload:
    Hello. When I install my software gives me eroareNSIS Error (Error launching installer) by CESI what to do

    Download the executable with a different browser.
    Somehow you use the Firefox browser in Romanian language to download Prey?

  20. Smart guys will amend it if it published the source code, and make it a successful backdoor

  21. I am close to retirement ... Instead of watching football ...., stand as lunatic and watch on your materials! :)) .. Congratulations! .... Many miracles are in this world ...

  22. Congratulations for tutorials! I bought myself a laptop and I registered at Prey .... problem is, still Unverified Device. " have you?

  23. Hello and congratulations for tutorial !. Very useful this software, use it for some time and I can say that staying calm about the phone, I know that if someone steals million, or sal I look somewhere, to some extent we can recover him .........
    I see that put many questions on this subject, I think the best would be sal ask who invented this software, said yacon is called Carlos original in Chile, and is co-founder of the project PREY.
    http://twitter.com/cyaconi

  24. I installed Prey on a laptop with Ubuntu Linux operating system 12.04 32 bits was successfully installed, I configured (in prey configurator I logged) and on site (panel.preyproject.com) not my laptop appears what?

  25. I greet you,

    You spoke in a tutorial about the fact that some users VIDEOS work properly. I encounter this problem too. The problem apparently is not the connection quality (mine or yours) but the player used. Tutorials uploaded to YouTube and watch everything is ok. But handling movie that you Charged with integrated player in the film suddenly stops site. Give play ... ..nu do anything. Scroll ... ..merge again in 10 seconds then stops abruptly. All this in Chrome. We try and ... works perfectly with Firefox (it does not stop, everything is ok). I for one have had the patience to try another browser ... .altii not have the time or does not cause head. That este..oameni and people. If these guys can not exist and no website viostru would not have so many visitors.

    Continued good work

  26. I installed Prey but I have not closed the half to take it over again and make settings step by step with tutorialul.Acum if I want to download it again I say "prey already installed on this computer if you ll first year we want update Need to remove the previous version "give yes and I say CAN t Proceed with the update.try again."

  27. BUT "I turned it off," I was wrong in saying NO forms

  28. I love this soft and thank you for everything ... but I tutorial gadesc am I safe? if this Carlos yacon has access to the data from my PC?

  29. think apology

  30. Hello ! I was recently stolen a galaxy s plus, I installed and plan B, but I did not say that installs probably are not logged contu gmail, this application must be installed first, or configure by phone series etc. Thank you

  31. I have a question ..... software worked a month ... two, and suddenly I no longer give raspuns.Chiar computer when it's on the net "stealing" my yahoo ..... no longer receives raspunsuri.Multumesc .

  32. Adrian Gudus said

    marian:
    I have a question ... ..softul worked about a month ... two, and suddenly gives me no longer open net raspuns.Chiar computer if "stealing" ... my ..yahoo no longer receives raspunsuri.Multumesc .

    Probably Spam I get in the box. Do not use the wrong software! Reports must be enabled only when you lose it or it is stolen so not all day Hello to you all send reports. It's not a spy software that! His goal is quite another!

  33. Hello, I used and I software until I reinstalled the system ... and today I decided to download it again from the official website and install it, I mention that I like Norton antivirus 360, and surprise when I downloaded software Norton detected a type viruses (WS.Trojan.H) and I deleted it automatically ...
    My question is, if we want those who do not know how good they put viruses in the software, we can we trust him?
    Software version is prey-0.5.9-win.exe

    I have attached a screen ... to confirm this: http://content.screencast.com/users/Profesional/folders/Jing/media/7867c3ff-ebc4-40dc-b319-c6735946a6b8/2013-01-15_1027.png

    Thank you!

  34. Cyber:
    Hello, I used and I software until I reinstalled the system ... and today I decided to download it again from the official website and install it, I mention that I like Norton antivirus 360, and surprise when I downloaded software Norton detected a type viruses (WS.Trojan.H) and I deleted it automatically ...
    My question is, if we want those who do not know how good they put viruses in the software, we can we trust him?
    Software version is prey-0.5.9-win.exe

    I have attached a screen ... to confirm this: http://content.screencast.com/users/Profesional/folders/Jing/media/7867c3ff-ebc4-40dc-b319-c6735946a6b8/2013-01-15_1027.png

    Thank you!

    Ou May gad!

  35. Good evening! I've installed the software on your Sony Vaio notebook with Windows 7, duopa few days I've marked as stolen, and after a few hours I marked as recovered. Meanwhile notebook was always connected to the internet, but I get absolutely no report or any photos or filming anything. Instead, even after I marked as recovered, about once every minute I 15 as it appears that steal and starts the alarm. Of course no trace of reports! I despair, I came to want to uninstall the program, but I have a problem: I do not know how to do, because as we know, the program does not appear anywhere, not even realize that is installed (that's the order). So please help me: how do I uninstall Prey from my notebook? Already I can not stand that alarm!

    • I do not recommend you uninstall it if you want to have protection.
      First if you scored that is missing device and you did not change its location not receive reports (if you marked it's stolen and you have not removed from the house and there you went to another location to another wireless not priemsti no a report)
      If you receive alerts now on site means that your account still appears SONY device is Missing

      Sport

  36. Thanks for the reply Erwin! Indeed, as I did, but I was intrigued because the site from my account device appear OK, there was Missing, and I still receive alerts. I went in and disable the alert and message and now does not bother me, so I have no reason to disable it .. But I'd still like to know, in case I do not want him how to do this and where picking software in PC.

  37. Hello! One problem I myself, now I found that there are such programs, but he was already late ... I stole the laptop. What I do? I there a chance to get it back? I filed statement to the police ... but until anything.
    Thank you very much!

  38. Hi .. I have a problem I installed the program and I wanted to do a test on my laptop and I worked as missing settings and we did not receive any report mention that the PC and the laptop get to see reports and the laptop is connected to the internet through WiFi from PC thanks!

  39. Hello. I installed prey with the option to not put shortcut in the start menu, but now want to uninstall it and do not know how. I see this question been asked but not answered above. If we have advised all it's good for our secutitatea, and show us how to uninstall, for that I am interested in me. Furthermore, what do you think about posting the detection of a virus norton. He does not want to answer, do not check our questions, or do not know the answers to our questions? ... .Any Would say something, I would like to uninstall now not in the next century. Thank you hoped for an answer.
    PS The issue is not the purpose it is intended to use the software, is a matter of private choice, but if all you have checked and tried installing the activation-deactivation through options for a gain confidence in him and for him to get used to.

  40. I solved in the meantime. For those who have installed Hiding shortcut's Start menu, and will subsequently uninstall it because uninstaller in Windows does not see nor other software uninstaller (I Revo Uninstaller) must go to partition (location) where Intal (default is C), locate the folder pray / platform / windows / Uninstall ... here is the setting for executable (prey-config). To ask you uninstall an e-mail that you made on account of Prey .. Unfortunately I do not know to what extent is clean files as long as you do not uninstall with Revo Uninstaller eg .. If someone wants to know why I uninstalled it as some call it Enable / Disable the options they remain activated then no matter what you do later. But if you do not know is whether latent or even stay there permanently activated regardless of a subsequent deactivation. I tested in time, but the problem is annoying.
    The problem my question opposite the post above remains (for identifying a Trojan by Norton)

  41. Good. But how am I a laptop is not installed it ... I kind only after MAC address. I stole my laptop 2 days ago and the police will not do anything. Could you please help?

  42. Video does not work

    Server not found: rtmpt: // 188.215.51.197: 80 / simplevideostreaming / mp4: /

    • Empty the browser cache or enter other browser.
      This is an error that sometimes browsers give, because misinterpret an address to our streaming server.
      In this case the browser has introduced artificial port in 80 when I had to leave link address as it were.
      incorrect address
      rtmpt: // 188.215.51.197: 80 / simplev .......
      Correct address
      rtmpt: // 188.215.51.197 / simplev ......

  43. Ovidiu said

    Reports not receive any mail. I wanted to do a test if it works, but I get nothing.

  44. Hello! how can I go on 10 blackberry application?

  45. So I installed application ... and do not know how I did and I blocked the phone ... now tells me to type a password that is not found in the mail but
    🙁

  46. I locked phone with a password ... and goes password

  47. Hello,
    Lost Vayo duo13 in taxi .... THIS PRESENT tablet PC uses Windows 8.1 and has a password at startup ... The Sony told me that I can send MAC series if submitted Plates complaint to the police ... but I did not militiamen gave me ... they said no evidence handle them. Deviceul mention that the net has a built-sim. How can I locate him? I mention that in that folder is a file with complicated medical tests, home address, contact tel ... .multumesc

Speak Your Mind

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.