Download URL: http://preyproject.com/download
1. Laptop protection
Prey works on a centralised service basis. It’s installed on multiple devices and managed via its web control panel. There’s an alternative mode but we’ll choose this option. Download the laptop client from preyproject.com, install it, choose Prey + Control Panel and create a new user name with password.
2. Control Panel
Log into the preyproject.com website and you’ll have access to the Control Panel. The opening page shows you all the devices you have registered. The free service has a limit of three, with 10 reports, but that’s enough to provide security. Click the icon to confi gure this further.
3. You are the Quarry
The main page is where you can set all the juicy bits. Geo and Networking enables you to pin down a rough locality for the device; the Session section will take screenshots of activity and monitor files; while the webcam will grab images of the perp.
4. It’s gone
If a device is lost, setting the Missing switch to On will send an email to you the instant the Prey system detects the device is online and is in a state it has been able to run the client-side Prey app. The default setting sends updates every 20 minutes.
5. We’ve got one!
So how did it do? We initially had problems getting the webcam to work but it finally activated, was taking screengrabs and logging IP traces. It’d be better if it took targeted grabs and browser log-ins but it’s certainly a very good step in the right direction.
6. Mobile protection
Prey works on more than just PCs, Macs or Linux: it also supports Android devices, including phones and tablets. A version for iOS devices, such as the iPhone, is apparently in the works. Phone devices are activated and controlled via SMS and it can play a loud sound if you’ve misplaced them.
————————————————————————————————
Key features
100% geolocation aware
Prey uses either the device’s GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. It’s shockingly accurate.Wifi autoconnect
If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.Light as a feather
Prey has very few dependencies and doesn’t even leave a memory footprint until activated. We care as much as you do.Know your enemy
Take a picture of the thief with your laptop’s webcam so you know what he looks like and where he’s hiding. Powerful evidence.Watch their movements
Grab a screenshot of the active session — if you’re lucky you may catch the guy logged into his email or Facebook account!Keep your data safe
Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.No unauthorized access
Fully lock down your PC, making it unusable unless a specific password is entered. The guy won’t be able to do a thing!Scan your hardware
Get a complete list of your PC’s CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.Full auto updater
Prey can check its current version and automagically fetch and update itself, so you don’t need to manually reinstall each time.
Watch the video below:
No comments:
Post a Comment