Maureen Azuh highlights ways to prevent theft of laptops and phones.Losing a laptop or phone to thieves gives uneasy feelings, especially if the stolen device has a lot of personal or corporate information. But there are software or applications that can help track any stolen device at all times.One of them is Prey, described as lightweight and open source software free for anyone to use. According to preyproject.com, the basic thing one needs to do is install the tiny tracking agent in the computer or phone, which silently waits for a remote signal to get to work. This signal is sent either from the Internet or through an SMS message, and allows the user to gather information regarding the devices location, hardware and network status, and optionally trigger specific actions on it. It enables whoever is using it to quickly find out where the stolen computer is located, who is using it, and what he is doing on it. By marking the device as missing, Prey will gather all the evidence requested and send it either to a Control Panel account or directly to the supplied mailbox, depending on the reporting method the user chose. Besides gathering information, an individual can also trigger actions remotely - such as sounding a loud alarm or showing a message which will appear on the screenjust for the thief to know he is being watched. The user can then wipe stored passwords for security, or even lock down the computer to prevent access. Prey uses either the devices GPS or the nearest WiFi to navigate and grab a fix on its location. If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.It also comes with a webcam module that can take a picture of the thief as well as a feature that can fully lock down the computer, rendering it unusable to the thief. It can equally check its current version and automatically fetch and update itself.Like Prey, GadgetTrak also provides protection for stolen computers. Although it does not have some of the unique features of Prey, it can track stolen laptops and view its location history, with detailed email reports, including webcam images of the thief. It, however, will not retrieve or delete sensitive files.Undercover is theft-recovery software but works more for Mac, iPhone or iPad. This program, orbicle.com reports, helps to locate and recover stolen devices. Through its UndercoverCenter web application, users can follow their stolen devices. This web app also allows users to manage all their protected devices - Macs, iPhones, iPads and iPod touches - in one, convenient place.LoJack is a software that gives maximum protection to laptops. It helps users to remotely locate, lock and delete the data on a stolen computer before it falls into the wrong hands. LoJack also protects computers from prying eyes in public places. A user can use the programme to block a computer remotely, denying potential identity thieves access to your computer and personal data. One can also choose to display a customised lock-out message on the screen, for instance, displaying contact information that would help a good Samaritan return the computer if stolen. LoJack uses GPS and Wi-Fi geo-location to track devices.The popular Norton also has anti-theft protection for devicesjust as it does for viruses. An individual can use the Norton anti-theft website from any browser to find out where a stolen computer is and who has it to remotely lock the device. The interesting thing about these applications is that they are all downloadable, and while most of them are free, others go for certain amount of money. But even if they are expensive, their prices cannot be equated with acquiring a new laptop or phone.
Click here to read full news..