Bienvenido! - Willkommen! - Welcome!

Bitácora Técnica de Tux&Cía., Santa Cruz de la Sierra, BO
Bitácora Central: Tux&Cía.
Bitácora de Información Avanzada: Tux&Cía.-Información
May the source be with you!

Monday, July 13, 2009

Theft Recovery Software

Preyproject.com
READ
When you install Prey, you set up an email address and optionally a URL
(i.e. http://mypage.com/stolen_laptop).
Prey runs at a specified interval and checks the URL you previously defined. If the URL exists, Prey will gather the information and send it to the email address you set up. You can also not define a URL and in that case the program will send the data every time it runs.
Of course, Prey needs to have an active Internet connection to send the information. If the computer isn’t connected, Prey will attempt to connect to the first public Wifi access point available.
Installation
Linux users
Just download the package, unzip it and run the install script:

$ chmod +x install.sh
$ ./install.sh


Mac users
Just download the DMG package, mount it and run the installer.

Windows users
First of all, if you’re using XP or lower you need to make sure you have the .NET framework installed. You can download it directly from Microsoft’s web site.
After downloading the package, unzip and execute as an administrator PreyConfig.exe. Fill in all the fields, tick the “Activar Prey” checkbox and then click on “Activar”.
Installation notes

  • We recommend you use the default installation path for your system, since it’ll make it easier for updating or removing Prey in the future.
  • You should use the full URL in Prey’s setup, such as http://preyproject.com (not just preyproject.com).
  • If you are using Gmail as your SMTP server (smtp.gmail.com), the correct port is 587 an you need to activate SSL.

Updating
Same as above, just download the package and run the installer.
In both systems, the installer checks if there’s already a Prey installation in your computer and allows you to skip the configuration. However we recommend you configure the data again since the new version may have new features to configure.
Información recopilada:
  • La dirección IP pública y privada de donde esté conectado el ordenador.
  • El IP del gateway de la red (router, puerta de enlace) que está usando para salir a Internet.
  • La dirección MAC de la tarjeta o controlador de red por el cual esté conectado a la Red.
  • Si está conectado a una red WiFi, el nombre e ESSID de esta.
  • Un listado de conexiones activas en el momento en que se ejecuta el programa.
  • Cuánto tiempo lleva encendido el aparato.
  • Número de usuarios activos.
  • Un listado con los programas en ejecución.
  • Un listado con los archivos modificados en un periodo configurable por el usuario.
  • En caso que el ordenador tenga cámara, una foto de lo que en ese momento esté viendo la cámara.
  • Un pantallazo del escritorio, para poder ver qué está haciendo la persona que lo está usando.
--------------------------
LocatePC is free software, and runs unobtrusively on your computer, with no icons, popups or saved emails. If your computer is stolen then the thief will not even know that LocatePC is running, and as soon as they connect to the internet a secret email is sent to you containing the details that you need to track your hardware.
Requirements
LocatePC is designed to work with the majority of systems, however you will need to set up your email account so that it works with LocatePC.
  • LocatePC runs on Windows Vista/XP/Me/98
  • You will need to have a POP email account for LocatePC to send you email. You can get a free POP account that works with LocatePC from AOL, Bluebottle, Gawab or @inMail24.
  • LocatePC can only send email if a user is logged in to the PC, and the PC is connected to the Internet.
  • LocatePC does not support HTTP proxy servers, mail servers that use SSL or SPA or IMAP (including Gmail and Hotmail), or email accounts that only work when the PC is connected to a specific ISP.
---------------------------------
http://www.thelaptoplock.com/

LaptopLock protects the data and aids in the recovery process of a computer if it's stolen. The LaptopLock can:

  • Delete files (secure data wiping now available)
  • Encrypt files
  • Show a message to the user
  • Execute a program
  • Play a sound
  • Visible or hidden from user
How do I setup The LaptopLock?
Sign up for a free account to register the computer(s). Install the LaptopLock agent for Windows 2000/XP/Vista. Complete the setup wizard.
How does The LaptopLock work?
If the computer is stolen, login into your account, mark the computer status as stolen. As soon as that machine connects to the Internet, the actions you set during setup will execute. The LaptopLock will also try to find out as much as possible about the connection to help in recovery of the machine.
THE LAPTOPLOCK DOES NOT MONITOR OR RECORD USER ACTIONS. THE LAPTOPLOCK DOES NOT ALLOW ANYONE ACCESS TO YOUR COMPUTER OR DATA. THE LAPTOPLOCK CAN ONLY EXECUTE ACTIONS THE USER HAS PRE-PROGRAMMED IT WITH.

What if there is no internet connection?
If after a while LaptopLock has been unable to connect to the Internet, it could ask the user to verify their identity by asking for a password. This option is set during installation and depends on how visible LaptopLock's presence should be.
It's free for now.
It comes with no adware or spyware.
The LaptopLock agent is now at version .94, last updated 2/05/2007.

No comments: