Prey is a free and open source computer tracking software developed by Fork Ltd, that provides information remotely on the location of a computer device (including smartphones), screenshots, images from a camera if fitted, etc. Its purpose is to assist in tracking a stolen device, particularly a portable one. The software connects in the background to a central server if an Internet connection is available, and if logged there as missing will send detailed reports either to the server (which a registered user can connect to), or directly to a specified email address.[1] It will supply location information if connected to a WiFi network.
Prey is almost purely written in Bash, and runs on various versions of GNU/Linux, Mac OS X and Microsoft Windows[2]. Its source code is hosted on GitHub and is free software, released under the GNU GPLv3.
Latest Prey features include Wi-Fi autoconnect, an alarm system, remote messaging, screenshot grabbing, screen locking, data securing, hardware scanning[3] and webcam capturing, if the computer includes one. All of these functions are managed as modules, which can be activated on demand by the user, and new functions can be added by adding new modules.
The application was released for Linux and Mac OS X on March 24, 2009 [4], and for Microsoft Windows on April 19, 2009.[5] The release current as of September 2011[update] was 0.5.3[6].
Rest safe.
Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.
http://www.preyproject.com/
How it works
Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.
Recover what is rightfully yours
You can quickly find out where your computer is located, who's using it, and what he's doing on it thanks to Prey's powerful reports system.
By marking your device as missing, Prey will gather all the evidence you request and send it either to your Control Panel account or directly to your mailbox, depending on the reporting method
They can run but they can't hide
Besides gathering information, you can also trigger actions remotely such as sounding a loud alarm or showing a message which will appear onscreen – just in case you want the guy to know he's being chased at.
You can also wipe your stored passwords for security, or even lock down your PC to prevent access. In other words, you're in control.
There's two ways in which you can send Prey the activation signal and get the reports.
1. Prey + Control Panel
Recommended for most users. You monitor your devices on Prey's web Control Panel, where you can watch new reports arrive and manage specific settings, such as changing the frequency for reports and actions. You can add up to three devices for free, and can optionally upgrade to a Pro Account in case you wish to bypass this limit.
2. Prey Standalone
For advanced users who wish more control. In this case, reports fly directly to your inbox but you need to set up your SMTP settings, and more importantly, you must generate a valid web URL which will trigger Prey to wake up when deleted -- otherwise Prey will keep sending reports on each interval!
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment