Prey is a program and service for desktop and mobile operating systems that enables you to keep track of the devices the software runs on.
There are a few things that laptop owners can do to prevent laptop theft. Probably the most important one is to keep an eye on the laptop or device all the time. Sometimes however that is not enough and the laptop gets stolen or is lost. There is little chance of getting the laptop back once it has been stolen and is out of your hands.
The laptop theft recovery software Prey tries to increase the chance of getting it back by collecting and sending a bunch of information over the Internet.The idea is to install Prey on the laptop to receive data whenever the "new owner" connects it to the Internet.
It obviously does not help if the thief is clever enough to format the laptop before using it. If the thief boots the operating system and connects the laptop to the Internet, then Prey will be able to submit the data.
Prey works by checking an url regularly for existence. If the url exists, it will sent the collected data to a specified email account. The date includes:
..the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and — in case your laptop has an integrated webcam — a picture of the thief
In list form:
About the url that has to be created. The laptop theft recovery program has been designed to use one so that it works normally while the device is still in your hands, and becomes active only when it is not anymore.
Users can for example sign up at a free web hosting service such as Blogger to create the url that the software program checks. Basically, what you do is publish the web address, e.g. example.com/stolen/ when your laptop is lost or stolen. Prey recognizes the URL, and will start submitting data per email.
The user needs to specify login data to a s SMTP server so that the email can be sent. The laptop theft recovery software Prey is available for the Windows, Linux and Macintosh operating system. The Linux and Mac version are currently more advanced and come with a bi-lingual interface, automatic connection to the first open Wi-Fi network.
You may communicate with the device as well, for instance to lock it remotely. Prey offers additional features, for instance an option to sound a super loud alarm, even if the device's volume is turned down or muted.
Update: Prey is still available as a free version but the developers have created a commercial Pro version as well that you can subscribe to.
The Pro version offers additional features such as an increased number of reports that get generated on the device, full SSL encryption support, higher frequency of reports and actions, automated deployment or on-demand modes where you send an activation signal, data protection features, and support for more devices.
The data protection features support wiping and file retrieval.
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.