Website link below:
Prey is a special security program that allows you track and lockdown your laptop, phone, or tablet, should it be stolen. It works by installing Prey on the device, and creating an account through preyproject.com
Once logged on, set the device to missing, and prey will activate and give you a variety of options to help track the stolen device and possibly locate the thief.
The program is free to use, can be installed on Mac, Windows, Linux, Android, and iOS, up to 3 devices and can save up to 20 reports. A very affordable paid version is also available that gives you more reports, secure more devices, and more tracking options.
Prey is also available at the app store.
THINGS TO NOTE ABOUT PREY
“Q: Will Prey still phone home even if there’s no user logged in?
A: On Mac and Linux PC’s, yes, since Prey runs in the background as the root (system)
user. On Windows PC’s, Prey does require that there’s a logged in user, so we recommend
creating a dummy account with no admin privileges and no password, just to lure the thief
in. You can do this on Windows’ Control Panel, or even through the Prey Configurator (in
for Windows users:
• The thief must be logged into the computer so a guest account or non-password account
has to be made on the windows machine.
• The thief must not be in Safemode or not disable the services needed for Prey to run.
Safe Mode disables all the services not needed run Windows, or if the thief can find
and deactivate the Prey service and a few others the program won’t work.
Those scenarios however are unlikely because unless your a computer geek, hacker or tinkerer you
won’t know to do those things without the administrator password that the owner created.