Track your stolen computer with Locate PC

Martin Brinkmann
May 17, 2008
Updated • Nov 30, 2012
Software
|
25

If you travel a lot chance is that you will eventually fall victim to theft. If you happen to have your notebook or laptop with you most of the time chance is pretty high that the thief will have the desire to steal that one. Chances are pretty slim that you will see your notebook again after the theft but you can increase them a bit by using Locate PC.

Locate PC only works if the thief is stupid enough to boot your computer while being connected to an internet connection. I cannot really say how many thiefs would do that but it can happen and that's probably reason enough to use Locate PC. A slim chance is better than no chance at all, don't you think ?

Locate PC (via Cybernet News) will send emails periodically whenever the PC is connected to the Internet, by default one email is send per day and another one for every IP change. The application is running in the background with an obscured filename and no system tray icon making it harder to identify. I would say that you do not need to worry about that though, if the thief really boots the PC while it is connected to the Internet then you should not fear that he will discover the little tracking application.

One thing that actually might work pretty well is to create a bogus account that does not require a password. I mean, a thief that gets a password prompt will probably not be able to load the operating system which would make the whole configuration void.

The emails that are send contain several interesting information, not only the IP that it is being send from. It displays the computer's host name and logged in user. This will be probably your information though. More interesting are the network connections that are listed. A dialup connection would reveal the phone number and the user name which can lead directly to the thief.

A traceroute command is issued as well and identifying information are pulled from Windows. The important information that can lead to the thief are the IP address, the network connections and the traceroute command. Everything else will be your information unless the thief decides to chance the name and address of the owner to his own.

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. sakshi gandhi said on August 26, 2012 at 11:27 am
    Reply

    i am shreyash please help me because i am very poor and my family is deid and i am is alone

  2. Garry said on October 22, 2011 at 2:55 pm
    Reply

    As I know there are 3 methods how to detect location of laptop:

    a) GPS
    b) IP detected on server computer (from which we can obtain ISP and username or new user)
    c) ISP and username of new user detected by monitoring agent on client computer and reported to server computer (IP detection not used)

    Which methods this program is using?

    1. Martin Brinkmann said on October 22, 2011 at 4:18 pm
      Reply

      Well the program runs on the computer and detects if the IP changed. If it did it will send an email. It will also send an email once per day.

  3. Rajani kanta dash said on July 22, 2011 at 5:41 pm
    Reply

    Please locate the pc registered in the name of principal,peoples college,buguda

  4. LocatePC said on July 8, 2011 at 9:52 pm
    Reply

    Thanks for the great writeup! I was doing some SEO checking, and it’s funny how you show up before us! Hopefully, it won’t be that way for long. :)

    – Molly.

    Front end web developer for LocatePC

  5. T M said on January 29, 2011 at 12:48 am
    Reply

    The newest version of LocatePC:

    Recovering the physical laptop and data are the basic functions of LocatePC. http://www.locatepc.net

    Additional features include:

    Video Snap Shot – If a person has a camera connected to their laptop, LocatePC will take snap shots every 30 seconds of the person and/or everything in the room. It will then add the pictures to the LocatePC Control Panel with a date and time stamp.

    Key Logging – The ability to record all the keys the thief types. For instance, if they go to their Facebook page or decided to Twitter, a person will have the ability access their real name, username and password.

    Text Message –The ability to set your computer to text message your cell phone or email you every time the computers IP Address changes.

    Text to Screen- The ability to send a message to your computer screen that the thief can read.

    Shut Down – The ability to have the computer shut down every time the thief turns your computer on.

    Inventory – Nothing more of a headache, than to try to take inventory of the hundreds or even thousands of computers. LocatePC will take a detailed inventory of all your computers whether they are in your office, in the field, the United States or internationally.
    “The U.S. Federal Trade Commission recommends using tracking devices like LocatePC which can help track down the location of a stolen laptop. We are excited about this product launch and know this product will benefit our customers.”

  6. alfredo said on December 5, 2010 at 4:56 am
    Reply

    My computer was stolen in georgia

  7. Jim H. said on November 21, 2010 at 5:11 pm
    Reply

    Ha! If computer stolen it will continue to check for emails automatically. If you contact email server they will tell new IP address and MAC address of your laptop.
    I think police already using that …

  8. Richard said on June 4, 2010 at 9:23 pm
    Reply

    Proofread your posts! “Track your stolen computer with Locate PC” is full of typos poor grammar and bad “Engrish”!

    Ask a friend or colleague that speaks and writes English to help; Are you using Google translator ?

    “The emails that are send (SENT) contain (CONTAINS) several interesting (delete several interesting and substitute valuable) ….

  9. zhangxiaowu said on May 22, 2010 at 7:01 am
    Reply

    Good share,Attractive enough for me,thanks for your kind share, laptop tracking software can help you track you stolen laptop or mobile,I have to tell you that it will be your best choice.

  10. werner said on May 8, 2010 at 4:46 pm
    Reply

    Try and p[revent the pc from leaving. Have a look at the above website.

  11. bobbie morris said on April 15, 2010 at 2:08 am
    Reply

    The laptop is a LENOVO Think Pad and I even tried to get the company to see if they could track it and lock it and they said there was no way they could. What do I DO?

  12. bobbie morris said on April 15, 2010 at 2:03 am
    Reply

    Hello my laptop that was issued to me from school was stolen and i HAVE ALL THE NUMBERS ie. manufacturer numbers serial numbers and all that and I a police report how do i Track this computer?

  13. franc said on March 8, 2010 at 7:02 pm
    Reply

    i have a serial number i wondering if you could track this laptop YK3V002938

  14. mode said on September 23, 2009 at 8:35 pm
    Reply

    what if th epc have being stolen before now

  15. vishnu said on August 25, 2008 at 8:11 am
    Reply

    I want that software

  16. Cyberbite said on June 19, 2008 at 5:09 pm
    Reply

    Sounds gud!!
    Thank you for da info!!

  17. neill said on May 20, 2008 at 3:56 pm
    Reply

    guess the tricks with webcams etc work only as long as it’s a novelty
    booting with CD/DVD would stop it
    solution would be intregration into the BIOS, but even that is not perfect (re-flashing/swap chip)
    i keep pics of all my components so i have all serial/model # avail if needed

  18. Techbuzzard said on May 19, 2008 at 10:52 pm
    Reply

    Hi Martin,

    What you said above is right, only the dumb or the naive can ever think of such an idea. We can create as many bogus accounts like Admin of whatever as we like, but what’s the point in doing it. Maybe some years before, may be thieves could have thought about that, but in the present day, a thief who can stole the PC do very well know why and what for he is steeling the PC. So it does not matter how much we try to impersonate, the person who does it always find a way out….

  19. Martin said on May 17, 2008 at 10:18 pm
    Reply

    Techbuzzard: The bogus account should be the first, probably named admin or something that requires no password. I think that thiefs would actually try to boot the computer or connect the computer to another one to snoop on the hard drive contents for other valuable information before they format the hard drive.

    But it’s only the dumb that will fall for this. There is no real way to make sure you get your notebook back if the thief knows what he is doing.

  20. Techbuzzard said on May 17, 2008 at 10:13 pm
    Reply

    Seems like an interesting idea to track or locate laptops or PC’s which are stolen. But there are quite a few limitations here. On the one hand the thief needs to log-in and connect to the Internet for the software to get activated. But I do not think the thieves are so naive so much that they will connect to the Internet with a stolen PC. The first thing that they will do is format the drives and install a fresh OS rather than use the existing one. The other thing is that you mentioned is to create a bogus account. I do not think it makes sense because, unless and until you have all the user ID’s mentioned in the welcome screen (that’s an option), the thieves do not have a chance to try all the ID’s and get into the system. People who really care about their systems and their data would have easily disabled that option. It’s a technological limitation that this software gets invoked only when a person logs into the system and connects it to Internet. I would like that the BIOS should include the credentials of the owner like mail ID or other details, and once booted, it should run some program in the background which connects to the real owner through emails or mobile messages indicating the correct IP address and the location once the system gets connected to the Internet. Well, there are quite some loopholes in that too, but let’s assume that a technology will come wherein the BIOS can be reset or updated by the real owner. This is just my personal opinion and anyone has the right to contradict on this.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.