Prey, monitor and find stolen or lost laptop or phone - video tutorial

Hi friends, tutorial today we will talk about a software that will help us recover lost or stolen devices be it tablet Android smartphone Android, iPhone iOS, iPad, Netbook or Notebook running Windows or Linux products Apple running Mac OS operating system
It's about Prey, an open source project gives us a software called Prey that will help us to monitor our devices portable if we lose them or they are stolen. Because the software is cross platform, it runs on any operating system. All you have to do is create an account on the website preyproject.com, download the Prey software and configure it accordingly. Once installed and configured on our portable devices, we have the ability to monitor devices from a web interface from which we can mark the device as "missing" (lost / stolen / missing). As soon as we do this, the Prey software installed on our devices will start sending reports in the web administration interface that we can access from any device with an internet connection.
Reports containing Prey?
- information about the geolocation of the lost or stolen device obtained through the GPS of the device
- information about the network to which the device is connected, public and private IP, MAC address of the network card
- data about the latest device connections
- a list of wifi hotspots that our device has passed
- the route of the internet connection to the device (traceroute)
- data about current user-run sessions including desktop screenshots
- data about the files that have been modified
- a list of programs running on the device when the report was made
- the possibility to activate the webcam thus obtaining a photo of the thief or of the one who found our lost device
All this information can be enabled or disabled individually depending on the information that we want to get the report that we can set us be sent at intervals of: 10, 15, 20, 25, 30, 35 or 40 minutes.
If the device has been stolen, Prey software can take some action for us such as:
- we can activate a strong alarm that will sound on the lost device for 30 seconds (very useful if we react as soon as we notice that the device is missing and it is still nearby)
- an alert that will be displayed on the stolen or lost device that will warn the thief that he is being followed
- we can lock the device so that it can no longer be accessed until a password is entered
- we can delete all data saved in browsers, all passwords and accounts saved in them so that the thief can no longer use the browser history or account data existing in the device to access our email accounts or social network accounts.
Users with a slightly diabolical mind can use this software for spying or monitoring people close (child, girlfriend, wife, mistress)
That being said I invite you to watch the tutorial to see exactly how we can monitor and recover portable devices if they are lost or stolen.

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!
On the comments box trying to get somewhat on the subject so other visitors can offer a tutorial + comments relevant comments may be extra support for user errors, or desire to learn.
Before asking a question try looking through the comments oldest, most times there already answered your question.
Use more categories at the top of the site and the search engine from the right corner to quickly get to what you are interested, we have over 800 tutorials that cover almost every genre of software, we have realized, I you just have to search for them and watch them.

Instructions for use videotutorial.ro

 

Search Engine.
If for example you have a problem with Yahoo Messenger, you can enter in our search engine terms like Yahoo, Mess, Messenger, id mess, multimess problem messenger, messenger error, etc., you will see that you will have a choice.

Categories.
If you use category drop-down, they find the bar under Home categories: Office, Graphic-Design, Hardware, Internet, Multimedia, Security, System, Storage, Backup, under these categories are organized sub-categories and sub-sub -categorii, that's a more accurate filtering. To find something related to Yahoo Messenger using the categories you can lead the category:InternetThere will open other subcategories where you choose Voice-ChatFrom there you can go on the subcategory YahooFinally, with these filters will arrive on a page where the only items related to Yahoo Messenger or Yahoo Mail.

Archives.
On the page Archives You can find all our tutorials organized beautiful days saptameni, months and years.
Everything is logical, just follow the logic.

Enjoy !

Adrian.... linux.videotutorial.ro

 

Adrian: Hungry for information and knowledge, I like everything related to the technical field and I share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful to others. Enjoying this privilege, I will never say "I don't know", but "I don't know yet"!

View Comments (56)

  • Adrian but when he steals the laptop and formats its windows ????? Prey will be able to monitor the stolen laptop ....

    • quote
      - we can lock the device so that it can no longer be accessed until a password is entered
      -oare can be formatted ???????? I think it takes some time to break a good password

  • interesting . I really going to use it and to recommend it to others. It is one of the programs that are worth paying for. 5 $ / month is not much at all if you want to protect your investment by 20, 30 million or more. but it looks pretty good and free version. Thank you for your presentation.

  • If the hdd adio control (mobile device) is formatted, such programs would be more useful for monitoring the location of an employee, child or I don't know who, not even for thieves, now if there are "stupid" thieves , then we must be proud of them.

    flo13:
    quote
    - we can lock the device so that it can no longer be accessed until a password is entered
    -oare can be formatted ???????? I think it takes some time to break a good password

  • Oktav:
    Adrian steal but when leptop siiiformateaza windows ????? Prey will be able to monitor leptop stolen ....

    Right!

  • Interesting, but if your device is password protected as you start the network card if you can not get into Windows? Similarly, if the block device stops working as GPS or WiFi to send your message? This soft to walk must first install the device, if not go uninstalled.
    I for one would think otherwise such software. The software should look in the internet network or GPS device that has the MAC address or GPS monitored, so even if the device is resoftat these data remain.

  • Friends, MOCA's service! ! !
    What do you want to get for a product for which you pay absolutely nothing? Don't you want the "militia" to notify themselves when the device is stolen and they will bring the device to your door "in your teeth"?
    There is no such thing!
    This software makes it very much to our advantage and mocha nose brings valuable information. Learn to appreciate.
    There are other steps you can take before you get to Prey such as encryption device (subject that already existed here), create a user account with a password, set your browser not memorize history, cache and coockie- sites, some settings made Plicy Group Editor that we can restrict access to the task manager and other functions so it Stunned head the bastard who stole device.

  • Hello everyone, I use PREY and I used it successfully, last month they broke my trunk and I was left without a 13`` MacBookAir and a new 64GB iPad (approx. 9500 RON).
    After a day I receive mail report that were connected to Wifi MBA, I located after IP and I went with ploitia there, and I recovered my toys.
    There are several aspects to be considered, if password or lock you can not connect online, formatted or gives restore if no longer safe for you to do, but not all thieves are experts in computer science.
    I used the free version, in the evening we left without toys 5 I paid eur and moved PRO to automatically receive reports 2 2 in minutes.
    In my example the thief sold leptop 6000 400 Ron RON and iPad was BONUS.
    So using PREY will not cost you anything, and the thief or the one who buys from the thief may not be an expert ...
    Soon to appear and my story here: http://preyproject.com/blog/cat/recoveries
    PS POLICE CONTINUE SEARCH IN thief unsuccessfully :))

  • Once this software is installed, you can be tracked by the manufacturer, or the owner may disclose certain data about you to interested companies .....

  • Ervin:
    Hello to all, I use PREY and I've used successfully last month broke my trunk and I ran out of 13 MacBook Air "and the New iPad 64GB (approx 9500 RON).
    After a day I receive mail report that were connected to Wifi MBA, I located after IP and I went with ploitia there, and I recovered my toys.
    There are several aspects to be considered, if password or lock you can not connect online, formatted or gives restore if no longer safe for you to do, but not all thieves are experts in computer science.
    I used the free version, in the evening we left without toys 5 I paid eur and moved PRO to automatically receive reports 2 2 in minutes.
    In my example the thief sold leptop 6000 400 Ron RON and iPad was BONUS.
    PREY so use does not cost anything, and might not be an expert thief or someone who buys the hot ...
    Soon to appear and my story here: http://preyproject.com/blog/cat/recoveries
    PS POLITIA FINALLY FIND OUT WITHOUT SUCCESS)

    As I said in the tutorial, thieves are lazy, stupid ... they have no idea about computer science, IT, security, tracking ... that's why they are thieves, that it doesn't lead to anything good, they are not able to produce a clean and honest lion and then all they know to do is run away, hide and steal ...

  • Nelu:
    Once installed this software you can even be seen by the producer or owner may disclose certain information about you to companies interested ... ..

    Paranoia and sea .... paranoia and sea :)

Related Post

This website uses cookies.