READ
When you install Prey, you set up an email address and optionally a URL
(i.e. http://mypage.com/stolen_laptop).
$ chmod +x install.sh
$ ./install.sh
Mac users
Just download the DMG package, mount it and run the installer.
Windows users
First of all, if you’re using XP or lower you need to make sure you have the .NET framework installed. You can download it directly from Microsoft’s web site.
After downloading the package, unzip and execute as an administrator PreyConfig.exe. Fill in all the fields, tick the “Activar Prey” checkbox and then click on “Activar”.
Installation notes
- We recommend you use the default installation path for your system, since it’ll make it easier for updating or removing Prey in the future.
- You should use the full URL in Prey’s setup, such as http://preyproject.com (not just preyproject.com).
- If you are using Gmail as your SMTP server (smtp.gmail.com), the correct port is 587 an you need to activate SSL.
Same as above, just download the package and run the installer.
- La dirección IP pública y privada de donde esté conectado el ordenador.
- El IP del gateway de la red (router, puerta de enlace) que está usando para salir a Internet.
- La dirección MAC de la tarjeta o controlador de red por el cual esté conectado a la Red.
- Si está conectado a una red WiFi, el nombre e ESSID de esta.
- Un listado de conexiones activas en el momento en que se ejecuta el programa.
- Cuánto tiempo lleva encendido el aparato.
- Número de usuarios activos.
- Un listado con los programas en ejecución.
- Un listado con los archivos modificados en un periodo configurable por el usuario.
- En caso que el ordenador tenga cámara, una foto de lo que en ese momento esté viendo la cámara.
- Un pantallazo del escritorio, para poder ver qué está haciendo la persona que lo está usando.
Requirements
- LocatePC runs on Windows Vista/XP/Me/98
- You will need to have a POP email account for LocatePC to send you email. You can get a free POP account that works with LocatePC from AOL, Bluebottle, Gawab or @inMail24.
- LocatePC can only send email if a user is logged in to the PC, and the PC is connected to the Internet.
- LocatePC does not support HTTP proxy servers, mail servers that use SSL or SPA or IMAP (including Gmail and Hotmail), or email accounts that only work when the PC is connected to a specific ISP.
http://www.thelaptoplock.com/
LaptopLock protects the data and aids in the recovery process of a computer if it's stolen. The LaptopLock can:
- Delete files (secure data wiping now available)
- Encrypt files
- Show a message to the user
- Execute a program
- Play a sound
- Visible or hidden from user
Sign up for a free account to register the computer(s). Install the LaptopLock agent for Windows 2000/XP/Vista. Complete the setup wizard.
How does The LaptopLock work?
If the computer is stolen, login into your account, mark the computer status as stolen. As soon as that machine connects to the Internet, the actions you set during setup will execute. The LaptopLock will also try to find out as much as possible about the connection to help in recovery of the machine.
THE LAPTOPLOCK DOES NOT MONITOR OR RECORD USER ACTIONS. THE LAPTOPLOCK DOES NOT ALLOW ANYONE ACCESS TO YOUR COMPUTER OR DATA. THE LAPTOPLOCK CAN ONLY EXECUTE ACTIONS THE USER HAS PRE-PROGRAMMED IT WITH.
What if there is no internet connection?
If after a while LaptopLock has been unable to connect to the Internet, it could ask the user to verify their identity by asking for a password. This option is set during installation and depends on how visible LaptopLock's presence should be.
It's free for now. It comes with no adware or spyware.
The LaptopLock agent is now at version .94, last updated 2/05/2007.
- Windows Vista Compatability
- Secure data wiping
- A number of bug fixes
No comments:
Post a Comment