PREY -A WEB SERVICE



prey


Prey is a Web service that allows remote tracking and monitoring of laptops, smartphones, and other electronic devices. Prey lets you keep track of your laptop, phone and tablet whenever stolen or missing -- easily and all in one place. It's lightweight, open source software that gives you full and remote control.

 A software agent is installed on the client device and connects in the background to Prey’s host computer.  If requested by the host, the agent sends it information such as the device’s location and can trigger various actions.
In Standalone Mode (for “advanced users only”), the agent can alternatively send the reports to the user’s e-mail inbox.  A control panel can be set up to manage multiple devices.  If connected to a WiFi network it supplies location information through the use of triangulation.
The Prey service is owned and operated by Fork Ltd., a small software company that does business out of Hong Kong and Chile.  Prey is written primarily in Bash and runs on most versions of Windows, Mac OS, Linux, Android, and iOS. Much of its source code is published on GitHub and can be copied under the GNU General Public License.
Once you mark the device as “missing”, the application starts working silently and starts sending reports with the information about the thief in a preset interval.

Geo Location: Geographical location of the device. You will get the approximate location of the device, which will be marked in Google Map.

Network: Network information includes Active connections, Nearby WiFi Hotspots, Route Trace.

Session Details: Session details report gives the screenshot, Modified files in a preset number of minutes, Modified files path and a list of running programs.

Webcam: If your laptop is with webcam, this application will silently take a photograph of the thief and include the same in report.
You can set an audio alert also to locate the PC, if it is nearby. If you want to alert the thief, it’s also possible through a popup message. You can  hide the email ids, delete the internet browsing history, cookies and password remotely


If a thief format the device before use, this application will not work. Hence it is advisable to  add a BIOS password and disable booting from removable devices on your PC. For effective use of this software, make a dummy account without password any privileges. Prey will work from background as a root/admin user and send the reports.

Comments

Popular posts from this blog

What are some mistakes people make when they start learning HTML, CSS and JavaScript?

How to initialize Datatable plugin?

Datatables.net - Plugin options