Cookie

TheJoe.it Into the (open) source

23Oct/090

“Prey” for your laptop

Caution!

This article was written in the 2009, there may have been some developments in the subject matter.
If in doubt please leave a comment in the bottom of the article.
Thanks.

prey-vulture-logo-condor-chileno

In the previous post we have already talked about how important it is to maintain a certain amount of security on your PC, especially if there are within sensitive data the Personal Information we do not want to disclose.

As already said Prey is the best program that I have been able to find among the programs for tracking stolen pc. E’ un software open source, released under the GNU Public License v3.0 and developed natively for Linux, but also supported by Microsoft and Mac OS X. Prey helps us to rediscover our computer stolen sending emails to our address containing a real "photography"The status of the pc. Prey sends us information about:

  • l'uptime,
  • the public and private IP,
  • the "route" packets,
  • il gateway,
  • eventuali reti wifi (clearly if the protocol is installed and wifi if the PC has wifi antenna Wink),
  • files modified in the last 60 minutes,
  • running programs,
  • open connections,
  • one screenshot of the desktop,
  • a photo from the webcam if available.

Prey works in background, clearly the thief will not have the impression of being "spied”. Statistically the thief "average" is not very computer savvy, more than anything else turns it on, and will tour in its webmail. Unlikely to make a scan of running programs, more difficult for them to find out what it's Prey. Conversely, if it is a user average expert who will reformat the computer just stolen we have no way to recover, but as mentioned statistically rarely happens.

How much of the park open source software, Prey offers no guarantee tracing actual computer. Even OpenOffice.org, eg, makes no warranties about the program, but it works equally very well and the number of users is constantly TransFlash expansion. We can say that the warranty on the software is relatively little. The programs on which leans such as "traceroute"And"iwconfig"Trusted system utilities are installed regardless of Prey and independent by the same.

Download, installation and tips:

To install Prey is necessary to have a bit of familiarity with the terminal.

  • First we connect to the official website and discharge package,
  • Unzip the package into a directory of your choice:
           $ unzip prey-0.2-linux.zip
           $ cd prey*
  • Make it executable program "install.sh" and begin installation:
           $ chmod  x install.sh
           $ ./install.sh

The program will make us any questions about where we want the program to go to settle, at what time will start, the language to use for the installation and so on.

One thing not to overlook is the question about the URL. Operation of Prey is simple and I will explain in a few short passages:

  • At regular intervals after installation Prey is started through an entry on crontab,
  • at each startup Prey controls a URL passed by us during installation.
  • If the URL does not exist Prey sends no report on our email
  • If the URL does not exist Prey sends reports on our email. (sending the report is to detail the functions described earlier in this article)
  • composition of the email
  • forwarding

We may also decide to not specify any URL during installation. In this case Prey will send its report to each check. Prey means to communicate the URL to avoid clogging your mail each time the computer for as long as it remains connected.

About

I keep this blog as a hobby by 2009. I am passionate about graphic, technology, software Open Source. Among my articles will be easy to find music, and some personal thoughts, but I prefer the direct line of the blog mainly to technology. For more information contact me.

Comments (0) Trackbacks (0)

No comments yet.


Leave a comment

No trackbacks yet.