Laptop Theft Recovery Software Prey - gHacks Tech News

Laptop Theft Recovery Software Prey

Prey is a program and service for desktop and mobile operating systems that enables you to keep track of the devices the software runs on.

There are a few things that laptop owners can do to prevent laptop theft. Probably the most important one is to keep an eye on the laptop or device all the time. Sometimes however that is not enough and the laptop gets stolen or is lost. There is little chance of getting the laptop back once it has been stolen and is out of your hands.

The laptop theft recovery software Prey tries to increase the chance of getting it back by collecting and sending a bunch of information over the Internet.The idea is to install Prey on the laptop to receive data whenever the "new owner" connects it to the Internet.

It obviously does not help if the thief is clever enough to format the laptop before using it. If the thief boots the operating system and connects the laptop to the Internet, then Prey will be able to submit the data.

Prey works by checking an url regularly for existence. If the url exists, it will sent the collected data to a specified email account. The date includes:

..the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and — in case your laptop has an integrated webcam — a picture of the thief

In list form:

  • Front and back camera screenshots.
  • Geolocation information.

 

About the url that has to be created. The laptop theft recovery program has been designed to use one so that it works normally while the device is still in your hands, and becomes active only when it is not anymore.

Users can for example sign up at a free web hosting service such as Blogger to create the url that the software program checks. Basically, what you do is publish the web address, e.g. example.com/stolen/ when your laptop is lost or stolen. Prey recognizes the URL, and will start submitting data per email.

laptop theft recovery

The user needs to specify login data to a s SMTP server so that the email can be sent. The laptop theft recovery software Prey is available for the Windows, Linux and Macintosh operating system. The Linux and Mac version are currently more advanced and come with a bi-lingual interface, automatic connection to the first open Wi-Fi network.

You may communicate with the device as well, for instance to lock it remotely. Prey offers additional features, for instance an option to sound a super loud alarm, even if the device's volume is turned down or muted.

Update: Prey is still available as a free version but the developers have created a commercial Pro version as well that you can subscribe to.

The Pro version offers additional features such as an increased number of reports that get generated on the device, full SSL encryption support, higher frequency of reports and actions, automated deployment or on-demand modes where you send an activation signal, data protection features, and support for more devices.

The data protection features support wiping and file retrieval.

Summary
software image
Author Rating
1star1star1star1stargray
5 based on 1 votes
Software Name
Prey
Software Category
Security
Landing Page

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:

Comments

  1. Mosh said on May 31, 2009 at 4:47 pm
    Reply

    Smart idea, especially the snapshot with the webcam. The only problem I can see, however, is that the thief has to log in. So if you have a password on your account, chances are the details will never make their way onto the web.

  2. Keith said on May 31, 2009 at 9:34 pm
    Reply

    Great idea though I cannot get the software to stop taking photos of me and e-mailing me them! Even though the URL I give it doesn’t exist (I confirmed it gives a 404 HTTP status response) it just keeps sending e-mails saying it’s found the thief.

    1. Sandy said on January 16, 2010 at 3:35 pm
      Reply

      That’s because the url SHOULD exist. Once you computer is stolen you delete and when Prey checks for the url and can’t find it, it assumes the computer is stolen lol. It thinks you’re the thief!

  3. drupal development guy said on May 31, 2009 at 7:45 pm
    Reply

    Good software

  4. xdmv said on June 1, 2009 at 2:25 am
    Reply

    Not working if a smart thief take your laptop. The very first thing I would do is to erase the hard disk or change it. I prefer small GPS unit (hidden, without any stupid stickers saying: “Protected by…”).

  5. xdmv said on June 1, 2009 at 2:30 am
    Reply

    By the way… In case you find your computer that person won’t be the thief. Sadly…

  6. Mosh said on June 1, 2009 at 9:04 am
    Reply

    xdmv – perhaps the first thing *you* would do is format it. But as the article says, a lot of thieves will look through a laptop for information. You’d not believe the number of people who keep financial details on their computers – or have auto-logins to sites where they can purchase goods. Or confidential documents that could be ransomed. Ask any member of the UK government or military who’s had their laptop pinched in the last few years!

  7. Lee said on September 21, 2009 at 3:21 pm
    Reply

    What people are forgetting is that this will need an internet connection to send the data anyway!

    1. Sandy said on January 16, 2010 at 3:37 pm
      Reply

      Yes, but part of Prey is that it automatically searches for an open connection. With all the hotspots around these days, what are the chances that it won’t find one?

      1. Mosh said on January 16, 2010 at 3:40 pm
        Reply

        Sandy, in the UK sadly it’s quite likely. There aren’t *too* many open connections and where they exist they often require you to enter an email address of click on a terms and conditions box before you can get to the internet. Prey won’t be able to do this.

        Still – it is better than nothing! :)

  8. Electronic Store said on October 7, 2009 at 1:51 pm
    Reply

    Thank you for the sharing information.

  9. Martin Neethling said on August 11, 2010 at 9:14 am
    Reply

    I have access to a cell-captive insuring a vry large number laptops and need to address the risk of theft and enhance the recovery proccess

    Who can i talk to to address the practical issues

    Regards

  10. Web Design said on January 7, 2011 at 10:55 pm
    Reply

    Good to know about.

  11. Sheffield Builder said on April 4, 2011 at 11:00 pm
    Reply

    “There are a few things that laptop owners can do to prevent laptop theft. Probably the most important one is to keep an eye on the laptop all the time”. Talk about stating the obvious lol.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

Please note that your comment may not appear immediately after you post it.