Home > Technologies’ zTrace Gold > What to Do When a Laptop is Stolen???
What to Do When a Laptop is Stolen???
Posted on Friday, June 24, 2011 by Arman Zulhajar

I had my laptop stolen once, about fve years ago, from the trunk of a locked car parked at a shopping mall. You never forget that experience of being violated, of being stupid. (And it seems to be getting more common, according to a story in the LA Times about thieves who follow customers home from Apple Stores.)
So what can users do to be more proactive, given the number of laptops that go missing every month? One way is to use one of a growing number of recovery software tools that automatically “phone home” (in the Internet sense of the word) and help you and the authorities, should they be interested, in trying to track it down. Think of what LoJack does for locating cars, with the added information that having an Internet connection can bring (indeed, the company is one that offers a laptop tool).
While it sounds like a great idea, there are several issues with using these tools.
First, most of them are designed for individuals, not corporations. Absolute Software’s Computrace has an enterprise version called Complete in their LoJack for Laptops line, which has tools that offer more asset tracking and remote hard disk destruction that aren’t found in an individual product. zTrace Technologies’ zTrace Gold, MyLaptopGPS for Windows, and Brigadoon’s PC/Mac PhoneHome products all offer quantity pricing for business customers, but not much else in terms of added features over their individual versions.
Turn the Tables
A second alternative is to look at central monitoring and image automation tools, such as Symantec’s Altiris and Kaseya that can be used in a stolen laptop situation. Greg Hemig, a Sacramento Kaesya VAR, did exactly that and was able to recover two independently stolen laptops by using the remote control features.
“I was able to fnd out not just an IP address, which is what a typical anti-theft product like LoJack would provide, but an actual physical address, the names of the user’s girlfriend and family, how to access their bank accounts, and even turn on the microphone on the laptop and listen to what they were saying while they were typing,” says Hemig. Scary stuff, but within two weeks of contacting law enforcement, he was able to get back both machines to their original owners.
OS-Based Options
Third, the versions that are offered differ as to features between Mac and Windows, with the Mac (if it is supported at all) usually being a poor cousin. If you have a mixed network, this could be a determining factor as to which product you end up deploying. Taking Computrace as an example again, the Mac version doesn’t include the special embedded BIOS agent that comes with their Windows product.
Phoenix Technologies offers something similar for its OEM BIOS customers called FailSafe, but not for the general public. And GadgetTrak has software for both Mac and Windows, but prices them differently.
Well-Rounded
Next, these tools are just part of an overall laptop security solution that should also include disk encryption and password-protecting the boot drive. If these tools live on the hard disk and if you haven’t enabled a frmware or disk password, any intelligent thief can just reformat your hard drive and remove this protection, or just remove the hard drive itself. So it makes sense to start by putting password protection on all of your machines as frst line of defense. Disk encryption is especially important if you need to protect confdential corporate or business data, not to mention personal data, such as bank account passwords as well.
That brings me to my last point: Do you really need a vendor-operated central monitoring station, or can you set up your own central place where alerts can be sent? GadgetTrak, Oribicule’s Undercover for Macs and iPhones, Prey (for Mac, Windows, and Linux), and PC/Mac PhoneHome are all tools that don’t make use of any central monitoring station. Instead, the software sends info to your e-mail (and for GagetTrak, to Flickr) accounts directly. With some of these products, upon booting they look for the presence or absence of a special URL that indicates the laptop has been stolen. If so, they send information, such as the current IP address, a snapshot from a Webcam, screen-
shots, and other details to your e-mail address.
One user of Undercover had his laptop stolen about two years ago, also from his car. (Have you realized never to leave a laptop in a vehicle now?) “Within a few days, we had screenshots and camera images of the thief and working with local authorities, we were able to recover the laptop within a week,” said Lenny, a friend of mine who has run several major corporations and is a big fan of their software.
While options vary depending on need, OS, and budget, the ideal approach to protecting laptops is to cover your bases: use password protection and disk encryption, and employ a collection of tools, including a monitoring product with a corresponding tracking piece on each laptop and remind users to never leave a laptop in a car.
Category Article Brigadoon’s PC/Mac PhoneHome, Laptop Stolen, laptops, MyLaptopGPS for Windows, Seciurity, Technologies’ zTrace Gold
Random Posts
-
In Angry Birds 2-14, you have 4 white Angry Birds that can drop explosive eggs. You must beat 4 pigs to pass this level. If you're look...
-
Using WiFi Access Point (WAP) is actually tricky. If you use a different modem and WAP brands such as TP Link modem and WAP SMC or Asus br...
-
Angry Birds 5-12 walkthroughs are so useful for you who need idea to beat Angry Birds 5-12 Mighty Hoax. Maybe, Angry Birds level 5-12 is ha...
-
I am growing tired of this winter. It JUST can't decide how to act. It's -20 celsius. No, wait, it's +4 celsius! Ok, it's -5...
-
My apologies to the vast majority who voted for a facebook page. I have read through the privacy policy on facebook and rushed to delete my ...
Powered by Blogger.
Blog Archive
-
▼
2011
(3255)
-
▼
June
(184)
- Ghost Scepter - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - Facebook Games News
- Etheral Blade - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Isla Dorada Episode 1: The Sands of Ephranis [BETA]
- Midsummer creatures
- Download Dota Ringtone for Your Cellphone
- Google Alert - FrontierVille Latest Cheats
- Oddly Enough Pied Piper [BETA]
- Sphera [BETA]
- 4 Elements 2 [BETA]
- Cradle Of Egypt [BETA]
- Ninja Puzzle [FINAL]
- Urn of Shadows
- Mahjongg Artifacts 2 [FINAL]
- Nanda's Island [FINAL]-BFG
- QuadSmash [FINAL]
- The Microbie Story [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Herofy [FINAL]
- Garden Spirits [BETA]
- Google Alert - Facebook Games News
- Khadgar's Pipe of Insight
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Sandra Fleming Chronicles: The Crystal Skull [BFG-...
- Differences between HTML 4 and HTML5
- Increase Traffic to Your Blog
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Tales From The Dragon Mountain: The Strix [FINAL]
- Grim Facade: Mystery of Venice Collector’s Edition...
- Google Alert - FrontierVille Latest Cheats
- Camy Adventures - Episode 1 [FINAL]
- Google Alert - Facebook Games News
- What to Do When a Laptop is Stolen???
- Review: Cisco RV220W Wireless-N Network Security F...
- The Fall Trilogy: Chapter 3 - Revelation [FINAL]
- New Dota Hero: Ymir - Tuskarr
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Val'Gor 2: The Beginning [FINAL]
- Jessica's 2 Dash Pack [FINAL]
- Virtual Farm 2 [FINAL]
- Jessica's Bow Wow Bistro [FINAL]
- Energy Vampires: Strange Comments and Emails
- Dota 6.70 Map Free for Download
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Ghost Towns: The Cats Of Ulthar [BETA]
- Mystery Valley: Extended Edition [FINAL]
- Blossoms at home
- Smoke of Deceit - New Dota Item on Dota 6.70
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- How Public Key Cryptography Works ?
- Protecting Your Sensitive Information with Encryption
- Ancient Janggo of Endurance - New Dota Item on Dot...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Juliet's Fashion Empire [BETA1]
- Research time: What questions do you want answered?
- Medallion of Courage - New Dota Item on Dota 6.70
- The pilot outfit
- Veil of Discord - Dota Item
- Secrets of the Dark: Temple of Night Collector's E...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Hello!
- Classic Fishdom 2 in 1 Pack [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Short vs Long
- Doodling while rendering....Looks like some animal...
- Grand Magnus (Rubick) - Dota Hero
- Hide and Secret 4: The Lost World [FINAL]
- Death Under Tuscan Skies: A Dana Knightstone Novel...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- The perfect light conditions
- Short Natural Hair: The Flat Twist
- "7 Secrets of Internet Millionaires"
- Proactive Password Auditor
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Puppy Sanctuary [BFG-FINAL]
- Bicycle Skat [FINAL]
- The Timebuilders 2: Caveman's Prophecy [FINAL]
- Echoes Of The Past 3: The Citadels Of Time [BETA]
- Google Alert - Facebook Games News
- Short Natural Hairstyles: Curly Chellez
- Download Dota Map 6.72c
- Angry Birds 1.5.2 [FINAL]
- It's not enough!
-
▼
June
(184)