{"id":622,"date":"2010-11-30T17:28:43","date_gmt":"2010-11-30T09:28:43","guid":{"rendered":"http:\/\/www.computersolutions.cn\/blog\/?p=622"},"modified":"2010-11-30T17:28:43","modified_gmt":"2010-11-30T09:28:43","slug":"things-that-go-missing-in-the-night","status":"publish","type":"post","link":"https:\/\/www.computersolutions.cn\/blog\/2010\/11\/things-that-go-missing-in-the-night\/","title":{"rendered":"Things that go missing in the night."},"content":{"rendered":"<p>First my tale of woe:<\/p>\n<p>I just got burgled back home, and they took two of my laptops.  One was a small hackintosh Mini9, which I&#8217;m not too worried about, but the other was a top of the line IBM Thinkpad which I&#8217;d just donated it to my cousin for his studies.<br \/>\nSadly we didn&#8217;t have insurance, and the likelyhood of getting it back is close to zero.  I will be watching <a href=\"http:\/\/capetown.gumtree.co.za\">Gumtree<\/a> closely though for the next few weeks!<\/p>\n<p>As anyone who owns a laptop can tell you, the most worrying things to worry about are:<\/p>\n<p><strong>The dreaded coffee spill <\/strong><br \/>\n(only 1 client this month &#8211; get those keyboard&#8230; er&#8230;  condoms!)<br \/>\n<strong>The whoops I dropped it, now my hard drive is dead \/ screen is broken<\/strong><br \/>\n(Too many to mention, you do have backups right?)<br \/>\n<strong>and the most dreaded of all&#8230;<\/strong><br \/>\nThe <em>oh @#$!<\/em> I left it in a Taxi.  Or if you live in South Africa &#8211; someone affirmative actioned it..<\/p>\n<p>While #1 and #2 are relatively easy to recover from (albeit costly), #3 does pose issues.<\/p>\n<p>There are solutions though.<\/p>\n<p>One such solution is one I&#8217;d suggested to my brother to install prior to the theft &#8211; install Prey.  Unfortunately for me he hadn&#8217;t done it, doh!<\/p>\n<p>Prey (http:\/\/preyproject.com\/) is an elegant solution to hardware protection.<br \/>\n Its an install and forget free service that tracks up to 3 computers (more on a paid basis).<\/p>\n<p>How does it work?<\/p>\n<p>You install the Prey software on your computer, and signup for an account (all part of the install).<br \/>\nTheir software then silently runs in the background.   There are zero options to set, just install, and setup a user account.<br \/>\nIts really set, and forget.<\/p>\n<p><a href=\"http:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-control-panel.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-control-panel-300x144.jpg\" alt=\"\" title=\"prey-control-panel\" width=\"300\" height=\"144\" class=\"aligncenter size-medium wp-image-625\" srcset=\"https:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-control-panel-300x144.jpg 300w, https:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-control-panel.jpg 959w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Nothing happens until the computer goes missing &#8211; then you can choose from a variety of different useful actions, ranging from taking a photo of the person using the computer (assuming like most laptops these days it has a built in webcam), to monitoring what they&#8217;re doing by taking snapshots of the current screen.  This is all done silently without the thief knowing that its going on.<\/p>\n<p>This is great for catching them on <del>Facebook<\/del>, uh Kaixin001 and spotting their user name.<\/p>\n<p>Below is a view of the logged in screen for my current laptop<\/p>\n<p><a href=\"http:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-logged-in.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-logged-in-300x152.jpg\" alt=\"\" title=\"prey-logged-in\" width=\"300\" height=\"152\" class=\"aligncenter size-medium wp-image-627\" srcset=\"https:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-logged-in-300x152.jpg 300w, https:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-logged-in.jpg 930w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The modules page shows the list of items I can turn on when needed.<\/p>\n<p><a href=\"http:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-modules.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-modules-300x247.jpg\" alt=\"\" title=\"prey modules\" width=\"300\" height=\"247\" class=\"aligncenter size-medium wp-image-630\" srcset=\"https:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-modules-300x247.jpg 300w, https:\/\/www.computersolutions.cn\/blog\/wp-content\/uploads\/2010\/11\/prey-modules.jpg 607w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The useful ones will be the webcam, and session photo captures.  Geolocation is a crapshoot in China, and having the IP info is pretty useless here unless you know someone at China Telecom.<\/p>\n<p>Hopefullly this will be one piece of software that I never use \ud83d\ude42<\/p>\n<p>Highly recommended for those with expensive equipment that moves around.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>First my tale of woe: I just got burgled back home, and they took two of my laptops. One was a small hackintosh Mini9, which I&#8217;m not too worried about, but the other was a top of the line IBM Thinkpad which I&#8217;d just donated it to my cousin for his studies. Sadly we didn&#8217;t [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-622","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/posts\/622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/comments?post=622"}],"version-history":[{"count":7,"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/posts\/622\/revisions"}],"predecessor-version":[{"id":632,"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/posts\/622\/revisions\/632"}],"wp:attachment":[{"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/media?parent=622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/categories?post=622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computersolutions.cn\/blog\/wp-json\/wp\/v2\/tags?post=622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}