PREY -A WEB SERVICE
Prey is a Web service that allows remote tracking and monitoring of laptops, smartphones, and other electronic devices. Prey lets you keep track of your laptop, phone and tablet whenever stolen or missing -- easily and all in one place. It's lightweight, open source software that gives you full and remote control.
A software
agent is installed on the client device and connects in the background to
Prey’s host computer. If requested by the host, the agent sends it
information such as the device’s location and can trigger various actions.
In Standalone Mode (for “advanced users only”), the agent can alternatively
send the reports to the user’s e-mail inbox. A control panel can be set
up to manage multiple devices. If connected to a WiFi network it
supplies location information through the use of triangulation.
The Prey service is owned and operated by Fork Ltd., a small software
company that does business out of Hong Kong and Chile . Prey is written
primarily in Bash and runs on most versions of
Windows, Mac OS, Linux, Android, and iOS. Much of its source code is published
on GitHub and can be copied under the GNU General Public License.
Once you mark the device as “missing”, the application starts working
silently and starts sending reports with the information about the thief in a
preset interval.
Geo Location: Geographical location of the device. You will
get the approximate location of the device, which will be marked in Google Map.
Network: Network information includes Active connections,
Nearby WiFi Hotspots, Route Trace.
Session Details: Session details report gives the
screenshot, Modified files in a preset number of minutes, Modified files path
and a list of running programs.
Webcam: If your laptop is with webcam, this application
will silently take a photograph of the thief and include the same in report.
You can set an audio alert also to locate the PC, if it is nearby. If you
want to alert the thief, it’s also possible through a popup message. You
can hide the email ids, delete the
internet browsing history, cookies and password remotely
If a thief format the device before use, this
application will not work. Hence it is advisable to add a BIOS password
and disable booting from removable devices on your PC. For effective use of
this software, make a dummy account without password any privileges. Prey will
work from background as a root/admin user and send the reports.
Comments
Post a Comment