Prey, monitor and find stolen or lost laptop or phone - video tutorial

Hi friends, tutorial today we will talk about a software that will help us recover lost or stolen devices be it tablet Android smartphone Android, iPhone iOS, iPad, Netbook or Notebook running Windows or Linux products Apple running Mac OS operating system
It's about Prey, an open source project gives us a software called Prey that will help us to monitor our devices portable if we lose them or they are stolen. Because the software is cross platform, it runs on any operating system. All you have to do is create an account on the website preyproject.com, download the Prey software and configure it accordingly. Once installed and configured on our portable devices, we have the ability to monitor devices from a web interface from which we can mark the device as "missing" (lost / stolen / missing). As soon as we do this, the Prey software installed on our devices will start sending reports in the web administration interface that we can access from any device with an internet connection.
Reports containing Prey?
- information about the geolocation of the lost or stolen device obtained through the GPS of the device
- information about the network to which the device is connected, public and private IP, MAC address of the network card
- data about the latest device connections
- a list of wifi hotspots that our device has passed
- the route of the internet connection to the device (traceroute)
- data about current user-run sessions including desktop screenshots
- data about the files that have been modified
- a list of programs running on the device when the report was made
- the possibility to activate the webcam thus obtaining a photo of the thief or of the one who found our lost device
All this information can be enabled or disabled individually depending on the information that we want to get the report that we can set us be sent at intervals of: 10, 15, 20, 25, 30, 35 or 40 minutes.
If the device has been stolen, Prey software can take some action for us such as:
- we can activate a strong alarm that will sound on the lost device for 30 seconds (very useful if we react as soon as we notice that the device is missing and it is still nearby)
- an alert that will be displayed on the stolen or lost device that will warn the thief that he is being followed
- we can lock the device so that it can no longer be accessed until a password is entered
- we can delete all data saved in browsers, all passwords and accounts saved in them so that the thief can no longer use the browser history or account data existing in the device to access our email accounts or social network accounts.
Users with a slightly diabolical mind can use this software for spying or monitoring people close (child, girlfriend, wife, mistress)
That being said I invite you to watch the tutorial to see exactly how we can monitor and recover portable devices if they are lost or stolen.

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!
On the comments box trying to get somewhat on the subject so other visitors can offer a tutorial + comments relevant comments may be extra support for user errors, or desire to learn.
Before asking a question try looking through the comments oldest, most times there already answered your question.
Use more categories at the top of the site and the search engine from the right corner to quickly get to what you are interested, we have over 800 tutorials that cover almost every genre of software, we have realized, I you just have to search for them and watch them.

Instructions for use videotutorial.ro

 

Search Engine.
If for example you have a problem with Yahoo Messenger, you can enter in our search engine terms like Yahoo, Mess, Messenger, id mess, multimess problem messenger, messenger error, etc., you will see that you will have a choice.

Categories.
If you use category drop-down, they find the bar under Home categories: Office, Graphic-Design, Hardware, Internet, Multimedia, Security, System, Storage, Backup, under these categories are organized sub-categories and sub-sub -categorii, that's a more accurate filtering. To find something related to Yahoo Messenger using the categories you can lead the category:InternetThere will open other subcategories where you choose Voice-ChatFrom there you can go on the subcategory YahooFinally, with these filters will arrive on a page where the only items related to Yahoo Messenger or Yahoo Mail.

Archives.
On the page Archives You can find all our tutorials organized beautiful days saptameni, months and years.
Everything is logical, just follow the logic.

Enjoy !

Adrian.... linux.videotutorial.ro

 


Related Tutorials


about Adrian

Flemish information and knowledge, I like everything about art and share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful fellows. I enjoying this privilege, I will never say "do not know" but "not yet know"!

Comments

  1. Adrian but when he steals the laptop and formats its windows ????? Prey will be able to monitor the stolen laptop….

    • quote
      - we can lock the device so that it can no longer be accessed until a password is entered
      -oare can be formatted ???????? I think it takes some time to break a good password

  2. interesting . I really going to use it and to recommend it to others. It is one of the programs that are worth paying for. 5 $ / month is not much at all if you want to protect your investment by 20, 30 million or more. but it looks pretty good and free version. Thank you for your presentation.

  3. If the adio control (mobile device) hdd is formatted, such programs would be more useful for monitoring the location of an employee, child or I don't know who, not even for thieves, now if there are also "stupid" thieves , then we must be proud of them.

    flo13:
    quote
    - we can lock the device so that it can no longer be accessed until a password is entered
    -oare can be formatted ???????? I think it takes some time to break a good password

  4. Alexandru-Stefan said

    Oktav:
    Adrian steal but when leptop siiiformateaza windows ????? Prey will be able to monitor leptop stolen ....

    Right!

  5. Interesting, but if your device is password protected as you start the network card if you can not get into Windows? Similarly, if the block device stops working as GPS or WiFi to send your message? This soft to walk must first install the device, if not go uninstalled.
    I for one would think otherwise such software. The software should look in the internet network or GPS device that has the MAC address or GPS monitored, so even if the device is resoftat these data remain.

  6. AdrianGudus said

    Friends, MOCA's service! ! !
    What do you want to get for a product for which you pay absolutely nothing? Don't you want the "militia" to notice themselves when the device is stolen and they will bring the device to your door "in your teeth"?
    There is no such thing!
    This software makes it very much to our advantage and mocha nose brings valuable information. Learn to appreciate.
    There are other steps you can take before you get to Prey such as encryption device (subject that already existed here), create a user account with a password, set your browser not memorize history, cache and coockie- sites, some settings made Plicy Group Editor that we can restrict access to the task manager and other functions so it Stunned head the bastard who stole device.

  7. Hello to all, I use PREY and I've used successfully last month broke my trunk and I ran out of 13 MacBook Air "and the New iPad 64GB (approx 9500 RON).
    After a day I receive mail report that were connected to Wifi MBA, I located after IP and I went with ploitia there, and I recovered my toys.
    There are several aspects to be considered, if password or lock you can not connect online, formatted or gives restore if no longer safe for you to do, but not all thieves are experts in computer science.
    I used the free version, in the evening we left without toys 5 I paid eur and moved PRO to automatically receive reports 2 2 in minutes.
    In my example the thief sold leptop 6000 400 Ron RON and iPad was BONUS.
    PREY so use does not cost anything, and might not be an expert thief or someone who buys the hot ...
    Soon to appear and my story here: http://preyproject.com/blog/cat/recoveries
    PS POLICE CONTINUE SEARCH IN thief unsuccessfully :))

  8. Once installed this software you can even be seen by the producer or owner may disclose certain information about you to companies interested ... ..

  9. AdrianGudus said

    Ervin:
    Hello to all, I use PREY and I've used successfully last month broke my trunk and I ran out of 13 MacBook Air "and the New iPad 64GB (approx 9500 RON).
    After a day I receive mail report that were connected to Wifi MBA, I located after IP and I went with ploitia there, and I recovered my toys.
    There are several aspects to be considered, if password or lock you can not connect online, formatted or gives restore if no longer safe for you to do, but not all thieves are experts in computer science.
    I used the free version, in the evening we left without toys 5 I paid eur and moved PRO to automatically receive reports 2 2 in minutes.
    In my example the thief sold leptop 6000 400 Ron RON and iPad was BONUS.
    PREY so use does not cost anything, and might not be an expert thief or someone who buys the hot ...
    Soon to appear and my story here: http://preyproject.com/blog/cat/recoveries
    PS POLICE thief still looking unsuccessfully)

    As I said in the tutorial, thieves are lazy, they don't even know about computer science, IT, security, tracking, that's why they are thieves, that it doesn't lead to anything good, they are not able to produce one. of a clean and honest lion and then all they know how to do is run away, hide and steal

  10. AdrianGudus said

    Nelu:
    Once installed this software you can even be seen by the producer or owner may disclose certain information about you to companies interested ... ..

    Paranoia and the sea… .paranoia and the sea

  11. Howdy,
    It is a good softulet. But if you're a little smarter you can pass him.
    I noticed that if you forced a restart to reset the computer and lock panel can quiet it uses, until you get to connect to the Internet and then dinou blocking you again.
    The second weak point is that if you know the "safe way" then the driver is lost, because you can enter quietly and uninstall the program. My advice is to use it only with what it offers as a basis for the program not to put the password or anything else. This way you will have a photo of the person and the connection data. This way you can recover your laptop. If someone knows that he is being watched, the first thing he will do is delete the program or windows completely, if he doesn't know he won't take any action so he will be caught :))

    • I was thinking to another intrebare.Daca can capture images who or what would prevent them do not always like Big Brother.?

  12. Howdy,
    I use this program for a long time, but I have a little problem with it, even if I have activated the option that those reports to include pictures made the thief with the camera, always place the picture is is a black screen, otherwise all other functions go as it should. That is the problem?

  13. AdrianGudus said

    Viorel:
    Howdy,
    I use this program for a long time, but I have a little problem with it, even if I have activated the option that those reports to include pictures made the thief with the camera, always place the picture is is a black screen, otherwise all other functions go as it should. That is the problem?

    You can not install the driver for the webcam. In other applications such as Yahoo Messenger, Skype, your webcam works?

    • I was thinking to another intrebare.Daca can capture images who or what would prevent them do not always like Big Brother.?
      What do you think?

    • The webcam works perfectly in yahoo messenger, skype and such programs. I have an Asus K53SJ Intel Core i7-2630QM CPU @ 2.00GHz, Windows 7, I don't know if the laptop model matters. When he has to take the picture, the camera light comes on for a few seconds. Maybe I need to reinstall the program?

  14. Michael Cirtog said

    to me does not work prey.Ajutama please id:[email protected]

  15. AdrianGudus said

    razvan:
    I was thinking to another intrebare.Daca can capture images who or what would prevent them do not always like Big Brother.?
    What do you think?

    Our duty is to present software and not to convince you to use. If you read the official project page to which you link in the text above tutorial you would have seen it tested, verified by giants and publishers abroad.
    If it was a project of a government institution or of an unknown organized group, I would also say i you had every right to have doubts about the correctness and respect for privacy.
    If we take your conception… then how do we know that when you go and take a shower, those who have made the block or renovations in your home have not slipped a tiny room (and we believe that these rooms can reach microscopic dimensions) in a corner of the bathroom…
    I knew that Romanians are conservative in general, but it doesn't seem good to be so paranoid either…
    You how to get public market with such a service, to be so popular and not get ferifice nobody, not anybody you control what you do with the data, what data you collect. Being an open source project, transparent tops and you have all the information about these details on the official website of the project.

    • Hello,
      Sorry if I disturbed by the question asked.
      But it was just an idea.
      I do not think it is necessary to rev up the job.
      I thought about saying what they think exactly like your urge
      thanks

  16. AdrianGudus said

    Michael Cirtog:
    to me does not work prey.Ajutama please id:[email protected]

    What does not work? If you want answers when we need details as to answer. Stop being so vague that we do not have to guess the gift in crystal balls.
    You did not tell us which operating system you use, whether you have the firewall enabled or not, whether you connect to the internet through a router or directly, whether or not you had internet when you tested the software

  17. AdrianGudus said

    razvan:
    Hello,
    Sorry if I disturbed by the question asked.
    But it was just an idea.
    I do not think it is necessary to rev up the job.
    I thought about saying what they think exactly like your urge
    thanks

    I do not know where you deduce that bothered by the question asked
    I do not know where you deduced that I packed
    I do not know what my answer cataloged as one offensive
    You posted a question (because your comment contains the question mark "?")
    I've just posted a few arguments which do not have to worry about application
    You've noticed that your question is rhetorical and that it should not necessarily be answered.
    We are here to clarify
    It's still good to think deeper and broader label chicken before big brother
    When ask rhetorically and would not answer please write to us at the end of the comment in parenthesis (my question is rhetorical, not wanting response and am aware that my ides are due to a failure to inform and deepen subject hasty but tend to fortune occasionally)
    everything will be OK and we will not take seriously and we will not answer your question

  18. Welcome. When I install my program crashes NSIS Error (Error launching installer) why and what to do

  19. AdrianGudus said

    relload:
    Hello. When I install my software gives me eroareNSIS Error (Error launching installer) by CESI what to do

    Download the executable with a different browser.
    Somehow you use the Firefox browser in Romanian language to download Prey?

  20. Smart guys will amend it if it published the source code, and make it a successful backdoor

  21. I'm close to retirement… Instead of watching football…., I'm crazy and I'm looking at your materials! :)).. Congratulations ! .... Many miracles are still in this world…

  22. Congratulations for the tutorials! I also bought a laptop and registered it with Prey…. the problem is that "Device still unverified!". it has something?

  23. Hello and congratulations for the tutorial !. This software is very useful, I have been using it for some time and I can say that I am quiet about the phone, I know that if someone steals it, or I forget it somewhere, to some extent I will be able to recover it ………
    I see that put many questions on this subject, I think the best would be sal ask who invented this software, said yacon is called Carlos original in Chile, and is co-founder of the project PREY.
    http://twitter.com/cyaconi

  24. I installed Prey on a laptop with Ubuntu Linux operating system 12.04 32 bits was successfully installed, I configured (in prey configurator I logged) and on site (panel.preyproject.com) not my laptop appears what?

  25. I greet you,

    You talked in a tutorial about the fact that some users don't use videos properly. I also run into this problem. The problem seems to be not the quality of the connection (mine or yours) but the player used. Everything is ok with the tutorials uploaded on you tube. But the movies that are loaded with the player integrated by you in the site, the movie suddenly stops. I play… ..do nothing. I unroll… ..it goes again after which in 10 seconds it stops abruptly. All this in Chrome. We try with Firefox and it works perfectly (it doesn't stop, everything is ok). I had the patience to try on another browser…. Others do not have time or do not take his head. That is ... people and people. If they didn't exist, maybe your site wouldn't have so many visitors either.

    Continued good work

  26. I installed the prey program but I didn't close it halfway to start over and make the settings step by step with the tutorial. Now if I want to download it again it tells me "prey already installed on this computer if you want an update we ll first need to remove the previous version “dau yes si imi zice can t proceed with the update.try again.”

  27. BUT "I CLOSED IT", I was wrong in the wording saying NO

  28. I like this software and thanks for the tutorial… but I'm still thinking, am I safe? if this Carlos Yaconi has access to the data on my pc?

  29. think apology

  30. Hello ! I was recently stolen a galaxy s plus, I installed and plan B, but I did not say that installs probably are not logged contu gmail, this application must be installed first, or configure by phone series etc. Thank you

  31. I have a question ... ..softul worked about a month ... two, and suddenly gives me no longer open net raspuns.Chiar computer if "stealing" ... my ..yahoo no longer receives raspunsuri.Multumesc .

  32. Adrian Gudus said

    marian:
    I have a question ... ..softul worked about a month ... two, and suddenly gives me no longer open net raspuns.Chiar computer if "stealing" ... my ..yahoo no longer receives raspunsuri.Multumesc .

    Probably Spam I get in the box. Do not use the wrong software! Reports must be enabled only when you lose it or it is stolen so not all day Hello to you all send reports. It's not a spy software that! His goal is quite another!

  33. Hello, I used and I software until I reinstalled the system ... and today I decided to download it again from the official website and install it, I mention that I like Norton antivirus 360, and surprise when I downloaded software Norton detected a type viruses (WS.Trojan.H) and I deleted it automatically ...
    My question is, if we want those who do not know how good they put viruses in the software, we can we trust him?
    Software version is prey-0.5.9-win.exe

    I have attached a screen ... to confirm this: http://content.screencast.com/users/Profesional/folders/Jing/media/7867c3ff-ebc4-40dc-b319-c6735946a6b8/2013-01-15_1027.png

    Thank you!

  34. Cyber:
    Hello, I used and I software until I reinstalled the system ... and today I decided to download it again from the official website and install it, I mention that I like Norton antivirus 360, and surprise when I downloaded software Norton detected a type viruses (WS.Trojan.H) and I deleted it automatically ...
    My question is, if we want those who do not know how good they put viruses in the software, we can we trust him?
    Software version is prey-0.5.9-win.exe

    I have attached a screen ... to confirm this: http://content.screencast.com/users/Profesional/folders/Jing/media/7867c3ff-ebc4-40dc-b319-c6735946a6b8/2013-01-15_1027.png

    Thank you!

    Ou May gad!

  35. Good evening! I've installed the software on your Sony Vaio notebook with Windows 7, duopa few days I've marked as stolen, and after a few hours I marked as recovered. Meanwhile notebook was always connected to the internet, but I get absolutely no report or any photos or filming anything. Instead, even after I marked as recovered, about once every minute I 15 as it appears that steal and starts the alarm. Of course no trace of reports! I despair, I came to want to uninstall the program, but I have a problem: I do not know how to do, because as we know, the program does not appear anywhere, not even realize that is installed (that's the order). So please help me: how do I uninstall Prey from my notebook? Already I can not stand that alarm!

    • I do not recommend you uninstall it if you want to have protection.
      First if you scored that is missing device and you did not change its location not receive reports (if you marked it's stolen and you have not removed from the house and there you went to another location to another wireless not priemsti no a report)
      If you receive alerts now on site means that your account still appears SONY device is Missing

      Sports

  36. Thanks for the reply Erwin! Indeed, as I did, but I was intrigued because the site from my account device appear OK, there was Missing, and I still receive alerts. I went in and disable the alert and message and now does not bother me, so I have no reason to disable it .. But I'd still like to know, in case I do not want him how to do this and where picking software in PC.

  37. Hello! I also have a problem, now I found out that there are such programs, but already late… my laptop was stolen. What I do? Do I have a chance to get it back? I filed a statement with the police… but until nothing.
    Thank you very much!

  38. Hi .. I have a problem I installed the program and I wanted to do a test on my laptop and I worked as missing settings and we did not receive any report mention that the PC and the laptop get to see reports and the laptop is connected to the internet through WiFi from PC thanks!

  39. Hello. I installed prey with the option not to put a shortcut in the start menu, but now I want to uninstall it and I don't know how. I see that this question has been asked above but has not been answered. If you still advised us that it is good for our safety, show us how it is uninstalled, because I am also interested. Moreover, what do you think about the posting with the detection of a norton virus. Do they not want to answer, do they not check our questions, or do they not know the answers to our questions? … .Whatever it is, say something, I would like to uninstall it now not in the next century. Thanks in advance for a hopeful answer.
    PS The issue is not the purpose it is intended to use the software, is a matter of private choice, but if all you have checked and tried installing the activation-deactivation through options for a gain confidence in him and for him to get used to.

  40. I solved it in the meantime. For those who installed it with the option to hide the shortcut in the start menu, and later want to uninstall it, because the uninstaller in windows does not see it and no other uninstall software (I have Revo Uninstaller) must go to the partition (location) where it was installed (default is C), locate the folder pray / platform / windows / Uninstall,… here is also the executable for settings (prey-config). When uninstalling, you will be asked for the email with which you created your account on the Prey page. Unfortunately I don't know to what extent the files are cleaned as long as the uninstaller is not done with revo uninstaller, for example. he wants to know why I uninstalled it, I tell him that for some activations / deactivations of the options they remain activated then, regardless of what you do next. But I don't know if it's latent or if it really stays that way permanently regardless of a subsequent deactivation. I haven't tested it in time, but the problem is annoying.
    The problem my question opposite the post above remains (for identifying a Trojan by Norton)

  41. Good. But as I'm looking for a laptop, I didn't have this installed, only after the MAC address. they stole my laptop 2 days ago and the police will do NOTHING. Could you please help?

  42. Video does not work

    Server not found: rtmpt: // 188.215.51.197: 80 / simplevideostreaming / mp4: /

    • Empty the browser cache or enter other browser.
      This is an error that sometimes browsers give, because misinterpret an address to our streaming server.
      In this case the browser has introduced artificial port in 80 when I had to leave link address as it were.
      incorrect address
      rtmpt: //188.215.51.197 80 / simplev .......
      Correct address
      rtmpt: //188.215.51.197/simplev......

  43. Ovidiu said

    Reports not receive any mail. I wanted to do a test if it works, but I get nothing.

  44. Hello! how can I go on 10 blackberry application?

  45. so i installed the app… and i don't know how i did it and i locked the phone… now it tells me to enter a password i find it in the mail but it is not
    🙁

  46. I locked the phone with a password… and the password doesn't work 🙁

  47. Hello,
    I forgot vayo duo13 in the taxi…. this pc tablet uses windows 8.1 and has a password at start… Sony told me that they can send me the MAC series if I file a complaint with the police… I made the complaint but the militia did not give me any proof… they said that they take care of it. I mention that the device has a built-in net sim. How can I locate him? I mention that in that folder there is also a file with complicated medical tests, home address, contact phone… .thank you

Speak Your Mind

*