Hard Light Productions Forums
Off-Topic Discussion => General Discussion => Topic started by: jr2 on July 12, 2011, 02:06:20 pm
-
http://preyproject.com/en
Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.
You can quickly find out where your computer is located, who's using it, and what he's doing on it thanks to Prey's powerful reports system.
By marking your device as missing, Prey will gather all the evidence you request and send it either to your Control Panel account or directly to your mailbox, depending on the reporting method you choose (http://preyproject.com/en#usage).
Besides gathering information, you can also trigger actions remotely such as sounding a loud alarm or showing a message which will appear onscreen – just in case you want the guy to know he's being chased at.
You can also wipe your stored passwords for security, or even lock down your PC to prevent access. In other words, you're in control.
There's two ways in which you can send Prey the activation signal and get the reports.
1. Prey + Control Panel
Recommended for most users. You monitor your devices on Prey's web Control Panel, where you can watch new reports arrive and manage specific settings, such as changing the frequency for reports and actions. You can add up to three devices for free, and can optionally upgrade to a Pro Account (http://preyproject.com/plans) in case you wish to bypass this limit.
2. Prey Standalone
For advanced users who wish more control. In this case, reports fly directly to your inbox but you need to set up your SMTP settings, and more importantly, you must generate a valid web URL which will trigger Prey to wake up when deleted -- otherwise Prey will keep sending reports on each interval! (For more information please check our FAQ (http://preyproject.com/faq)).
(http://preyproject.com/i/prey-actions.png)
-
Yeah, seen it used it... no real life circumstances required it yet.
-
The only function I'd use is the lockdown thing. To prevent people finding certain... Things.
I'd also like dead-man's switch.
-
Soooo, if someone had a global password to any Prey install, they effectively own your computer? Good thing it's open source, is all I have to say.
-
THERE IS NO WAY THAT THIS COULD EVER BACKFIRE. SERIOUSLY. :ick:
Also, it sounds like this is purely software, in nature. So, you know, /fdisk. :rolleyes:
-
yeah, but most people who steal laptops are not going to think about that right away.
-
If someone tries to steal my desktop I think they'll be easy enough to find...
I'll just call the local chiropractor looking for people with a thrown out back.
-
If someone tries to steal my desktop I think they'll be easy enough to find...
I'll just call the local chiropractor looking for people with a thrown out back.
you just reminded me of the time me and a mate carried my PC to his house for a little LAN, the walk was 20 mins Without computer, so you can imagine what it was like carrying a 15" CRT, a midi tower, my 5.1 speakers + cables (speakers and cables were in a large gym bag). ohhh and we got stopped by the police enroute because they figured 2 teenagers carrying a pc down a road which had a bit of a reputation was suspicious.
-
Man, I remember lugging my 19" CRT (in its massive original cardboard box, no less) up three flights of stairs in senior year of college. Move-in and move-out days were never fun.