1

Track stolen Smartphones, Laptops & Tablets using Prey
Track stolen Smartphones, Laptops & Tablets using Prey
If you are human being, I’m sure you would have done some mistakes like forgetting stuffs, doing something wrong and more. If you are reading this probably you would have lost your Smartphone, Smart watch, Tablets or Laptops! Well, first of all calm down & contact your Telecom provider to shut down your phone number to avoid any illegal usage of your number. Getting your laptop or your phone stolen sucks, but there is something you can do about it. Prey is a lightweight theft protection software that lets you keep an eye over them whether in town or abroad, and helps you recover them if ever lost or stolen!

Prey is an open source security tool that can not only locate your laptop and smartphone remotely via GPS, but is also able to subtly control key functions and give you the option of locking them down completely. In short, if the tool has been installed on a device that has gone missing, you can head to Prey’s website and report it as stolen. Once the thief connects to the internet, Prey will regularly send you e-mails with data such as the approximate location of your device, a screenshot of the current desktop activity and several webcam or smartphone photos, if possible. Alternatively, you can also activate Prey with an SMS (containing “GO

PREY” by default) if you are using it on a Smartphone and wish to get immediate results. It goes without saying that all this can be invaluable information for the police and can help the quest to retrieve your property immensely.

Useful Features Of Prey to find Stolen devices

1. More than just Geo-Location

After installing the software on your laptop, tablet or phone, Prey will sleep silently in the background awaiting your command. Once remotely triggered from your Prey account, your device will gather and deliver detailed evidence back to you, including a picture of who’s using it – often the crucial piece of data that police officers need to take action.

2. Prevent unwanted access

When your data is at stake, bad things can happen. Prey allows you to remotely lock down your devices and delete your stored passwords, to ensure that no one will have access to your private stuff.

3. Find my everything

Prey works on all major operating systems, so it lets you keep track and trigger actions on all your devices from a single place. Like a universal remote control, but for laptops and mobiles.

4. Tough as an old boot

When theft happens, time is always against you. That’s why every single thing Prey does is battle-hardened and made to work under the hardest conditions. This also means consuming the least possible amount of battery, always.

3. Privacy comes first

Prey should mention that sensitive data is gathered only when you request it, and is for your eyes only ‐ nothing is sent without your permission. You can always check Their source code if you want to make sure.
Please note: You need to have the prey App pre-installed in your device.

Download Prey:

How to Install Prey & Configure it

Prey runs on Windows, Linux, Mac, iOS and Android operating systems. Download the Setup file your for your respective system and install it as a normal Software. You can reefer the below images.
If you have never used Prey before, just select the “New user” option from the menu to continue to next step & follow the below image.
Once the setup has finished, your current device will have been added to the watchlist of your Prey account and the client will integrate itself deeply into your OS, so that will neither be visible, nor removable by the thief (typically only occupying 5 MB of memory in Windows). While dormant, its only function is to subtly check online every 10 minutes to see if the device has been reported as stolen.

Reporting devices as stolen– How to activate Prey & locate your device

If you’ve decided to use the “Control Panel method“, you have multiple options to handle thefts. The first thing to do in any case is to head to the Prey website, select your device and switch  to “Missing”. Prey will then ask you to define the time delay between each individual report.  Please See the Screen Shots Below
This is The List Of Action You Can Perform After Installing Prey
  1. Set Device to Missing
  2. Send Sound Alarm (You can also do this using Android
  3. Get Location Of Your Device
  4. Send Message to Thief.
  5. Lock Your Device
If you suspect to be in close vicinity to your device, you can even enable an acoustic 30 seconds alarm or send the thief a message. Both options can be found under “Actions to perform”. Obviously, don’t use these functions carelessly or to taunt your adversary as stealth is key. Once discovered, Prey is quickly rendered useless and thieves will likely try to get rid of it in one way or another.

Lastly, if all this work has payed off and Prey has indeed helped you locate your lost device, it is still strongly discouraged to approach the thief on your own. Instead, contact the police (if you haven’t already done so) and provide them with the evidence that you have collected. Let’us know prey helped you finding your stolen device. If you need any help, you can comment your issue below or you can also contact us, we’ll help you track your stolen device. Cheers!

Post a Comment

 
Top

;