Prey - bring back the stolen device (+ discount on the service)
Makradar Technologies / / December 19, 2019
company Apple presented their new smartphones. The new flagship of the company from Cupertino, the iPhone 5S, got a fingerprint sensor, which is several times increased the complexity of access to the data on the smartphone. With the new sensor Touch ID convenience locking and unlocking becomes simple and convenient. But these simple steps will be able to perform virtually everyone who is important the data. And what if your device with the data possessed physically?
Statement to the police, as a rule, do not give anything - but before you write it, it is better still to provide the investigating authorities with information about the intruder himself. And the more, the better.
So far we have not stolen anything (pah-pah-pah), let's immediately undertake safety measures. Of course, set a password for the account, and then log onto the site Excellent service Prey and pass registration. After completion of all formalities, we will be able to link to your account 3 devices (this restriction is the free version, and for most people this is quite enough). In case of loss of equipment for these three devices will be available until 10 reporting on them. Since the service works on a subscription, you can always choose the tariff plan of the soul, thereby increasing the amount of added devices and report to them. Or stay on the free version if its functionality is sufficient for your needs.
So, we have available one iPhone and a MacBook Air. Add to the list of devices to monitor your account. To do this, download the iOS app and installer for OS X.
Let's start with the latter. Installing the application is different from the familiar to us Drag and Drop, use a full installer instead. With him in the kit is a tool for removing and Prey. During the installation we will be asked to create a new account or use an existing one. Select the appropriate option, and utility installs the files. After these steps, the program in any way will not be visible on your Mac. She's not in the program and not in the System Preferences, so an attacker can not guess that for him already can follow. Your account on the site there is a new device model, and the name of the computer, as well as the installed operating system.
Ok, nothing fancy. Now we proceed to install an iOS application. Here everything is as usual: choose Prey from the App Store and install as well as all other applications. And to our account is added to the new device, after which you can follow.
In the application, there are only a few options, of which only interested Camouflage mode. It replaces the start screen of the program, masking its appearance at the online game. For the unsuspecting intruder will show the password entry screen and a single button Log in - never guess that this "game" may already be watching you.
Now comes the most interesting part. Consider a situation that one of your devices is missing. Let's say it was our MacBook. The first thing to do - is to go to your account and set the switch to Missing. Now you need to specify in the settings of interest to us: location tracking, data on the current connection, taking screenshots of your desktop and a photo with your webcam. Then, according to the established parameters specified interval will generate reports, which, in turn, will be stored in your account, as well as come to the post office (I advise to turn off this feature, especially if you use a mail client that came the letter was not issued us itself) in the form notifications.
In addition, if we do not so dear anonymous, you can do one of four things:
raise the alarm. The loud sounds will be issued within 30 seconds. Therefore, if you forgot where to put the laptop - it will be possible to find guided by the sound, if you are somewhere near.
- send a warning. Then we remove the veil of secrecy, and the computer displays a message with your message and request to return the stolen / found.
- lock your computer. Here, as usual: the account is locked, and is prompted for a password. The password itself is set in the setting for this action.
- protect privacy. The last of the action, which allows you to hide an email message, delete all cookies and saved passwords from your browser at all accounts, thus not allowing an attacker to get to sites with relevant information (eg, credit data cards).
On this with the settings for the OS X and finish. If desired, you can still enable the collection of statistics, even when the computer is of offline, but it is at your discretion.
Navigate to the application for iOS. It's all standard. The iTunes version is available for smartphones and tablets, just install as a regular application and its icon appears on the desktop. Be sure the settings include the Camouflage mode mode and for greater security, remove away an icon in a folder.
for iOS function is also quite interesting:
- location. You can track where in your stolen device in the moment. It is possible to adjust the accuracy of the determination geopozitsii, but beware - the higher the accuracy, the faster the phone sit charge!
- network information gathering. Gather data on its MAC-address IP.
- Webcam. With the help of the program will take pictures of who is holding a phone in his hand. Works is simple: on the smartphone comes a notice purporting to be from a bank linked to a valid credit card and a request to change the PIN. One has only attacker to encroach on your hard-earned money and go to the app - its front camera will take pictures immediately.
- alarm mode. In the same way, as well as on Mac, smartphone starts to emit loud sounds for 30 seconds.
- a warning. Similarly, Mac OS functions. It gives the thief to understand that he is being watched, send a message and, if possible, change the wallpaper.
As you can see, functions in an application quite a lot. Gathering information about the location of your device, and for one and saw the owner of the picture, you can try to contact the investigating authorities, provide them with the information and hope for your loss and take find "hot tracks. "
Well, at the end of the cons. In the iOS app work I did not notice any flaws, it works consistently. But in OS X, there are problems. Each time determining geopozitsii, the reports I receive the same address, unfortunately, not even close to being in a place where my laptop. And also very rare in the program turns out to take a photo on the camera. Instead, the alleged kidnapper's face in 95% of cases, comes a black rectangle, as if the picture was made in complete darkness.
Slight inconvenience delivers a function to send alerts. Alas, the text typed in Cyrillic is not displayed correctly. Instead, it will set a variety of characters and unreadable text. Only one way out: if you use the function to write exclusively in translit.
However, those functions that already exist in the Prey and working properly, enough for most. Therefore, I recommend to install Prey on your device, so that when the loss is always to be aware of where they are and what they do with them. You can leave and free version without buying a subscription. The decision you can always be changed later.
Prey Versions exist for all popular platforms: Mac, Windows, Android, iOS and Linux (with a separate distribution for Ubuntu).
Especially for our readers, the developers have provided us with a discount code of 10% for payment of the annual tariff (which is also 10% discount). Total, when paying an annual subscription you save 20%. Konami enter the word in the field for a discount before paying service.
Download Prey It can be on the developer's website.