Prey enables you to keep track in order to find your laptop, phone and tablet when stolen or missing – easily and all in one single destination. It’s lightweight, open resource computer software that offers you complete and remote control, 24/7.
You’ll quickly uncover what the thief looks like, what he’s doing in your product as well as where he’s concealing making use of GPS or WiFi Geo positioning. It’s payback time.
How it works: fundamentally you install a small broker within PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is delivered often from the web or through an SMS message. And allows you to gather information regarding the device’s location, equipment and community condition, and optionally trigger certain activities upon it.
You can easily quickly determine in which your computer is located, who’s utilizing it, and exactly what he’s doing onto it as a result of Prey’s effective reports system.
By marking your product as missing, Prey will gather most of the evidence you request and send it both to your control board account or straight to your mailbox, depending on the reporting method you decide on.
Besides gathering information, you may also trigger activities remotely. Particularly sounding a loud alarm or showing a message that will appear onscreen. In the event you want the man to learn he’s becoming chased at. It is possible to wipe your stored passwords for safety, or lock down your computer to stop accessibility. Quite simply, you’re in control.
- 100percent geolocation aware. Prey utilizes often the device’s GPS or the closest WiFi hotspots to triangulate and grab a fix on its area. It’s shockingly accurate.
- Wifi autoconnect. If allowed, Prey will make an effort to hook onto towards the closest available WiFi hotspot when no Internet connection is found.
- Light as a feather. Prey features hardly any dependencies and does not even leave a memory impact until triggered. We care around you do.
- Know your enemy. Take a photo associated with the thief with your laptop’s cam so that you understand what he seems like and where he’s hiding. Effective research.
- Watch their motions. Grab a screenshot regarding the energetic program. If you are happy you’ll catch the man logged into his email or Twitter account!
- maintain your information safe. Hide your Outlook or Thunderbird information and optionally eliminate your stored passwords, so nobody should be able to look into your stuff.
- No unauthorized accessibility. Completely secure down your computer, which makes it unusable unless a particular password is registered. The man won’t manage to do something!
- Scan your hardware. Get a whole range of your PC’s CPU, motherboard, RAM, and BIOS information. Works great when used in combination with Active Mode.
- Full automobile updater. Prey can always check its current version and instantly bring boost itself, so that you don’t need to manually reinstall every time.
Homepage – http://preyproject.com
Size: 15.5 MB