Prey lets you keep track and find your laptop, phone and tablet whenever stolen or missing – easily and all in one place. This lightweight, open source software gives you full and remote control, 24/7.
You can quickly find out what the thief looks like, what he’s doing on your device and actually where he’s hiding by using GPS or WiFi geopositioning. It’s payback time.
How it works: Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
This signal is sent either from the Internet or through an SMS message. And it allows you to gather information regarding the device’s location, hardware and network status, and optionally trigger specific actions on it.
You can quickly find out where your computer is located, who’s using it, and what he’s doing on it thanks to Prey’s powerful reports system. By marking your device as missing, Prey will gather all the evidence you request and send it either to your Control Panel account or directly to your mailbox, depending on the reporting method you choose.
Besides gathering information, you can also trigger actions remotely. Such as sounding a loud alarm or showing a message which will appear onscreen. Just in case you want the guy to know he’s being chased at. You can also wipe your stored passwords for security, or even lock down your PC to prevent access. In other words, you’re in control.
- 100% geolocation aware. Prey uses either the device’s GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. It’s shockingly accurate.
- Wifi autoconnect. If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.
- Light as a feather. Prey has very few dependencies and doesn’t even leave a memory footprint until activated. We care as much as you do.
- Know your enemy. Take a picture of the thief with your laptop’s webcam so you know what he looks like and where he’s hiding. Powerful evidence.
- Watch their movements. Grab a screenshot of the active session. If you’re lucky you may catch the guy logged into his email or Facebook account!
- Keep your data safe. Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.
- No unauthorized access. Fully lock down your PC, making it unusable unless a specific password is entered. The guy won’t be able to do a thing!
- Scan your hardware. Get a complete list of your PC’s CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.
- Full auto updater. Prey can check its current version and automagically fetch and update itself, so you don’t need to manually reinstall each time.
Changes in Version 1.11.8:
- New configuration data for Factory Reset in Windows. Changes task’s priority to ensure it’ll run even on multiple unexpected cases.
- For Windows clients, Prey tries to send two different webcam pictures and there was an issue because those two tasks were interefing with each other. Now one runs after the other eliminating that error. A new screenshot software was added, now Prey’s capable to take a screenshot of all screens
Changes in Version 1.11.7:
- For screenshots there was a limit of 1.5 MB to upload, but now it’s increased to 20 MB.
- New wpxsvc (WinSVC) version 2.0.15. It adds a new feature to delete Fenix from Task Scheduler in Windows.
- Fix on taking screenshot and pictures on stolen reports for Mac OS.
- Correction for Screen Lock issue when the user has multiple virtual desktops and is not in the main desktop, now all desktops are locked succesfully on Mac OS.
- Improvement for checking the winsvc version against the server version to upgrade for minimize further errors.
- Fix to mitigate errors when prey-user binary periodically checks on the main service on Mac OS.
Changes in Version 1.11.6:
- Information gathering optimizing for Missing Report feature, and bug fix to image retrieval process when the camera is being used on zoom/teams calls
- Accuracy improvement for location data going back to version 1.11.4’s when sorting wifi network data. Enhancement includes network filtering.
- Database storage revision for created actions that are not persistent. If they trigger over certain conditions, even if the system fails to call them, then they won’t be saved in the database.
- ESLint npm package was updated, going from 8.39.0 or above, to 8.44.0 or above.
- xml2js npm package was updated going from 0.4.19 to 0.5.0 or above.
- SemVer npm package was updated going from 5.6.0 or above, to 5.1.2 or above.
- JSDoc npm package was updated going from 3.6.10 or above, to 4.0.2 or above. Package changes to dev dependency
- npm package was updated to async from 2.6.1 to 2.6.4.
- SQLite3 npm package was updated from 5.1.2 to 5.1.5.
- Updates to Loan creation/modification process. The browser requests a change verification call from Prey to ensure data reliability.
- Package.json modification to differentiate “npm install” instruction from “npm run post_install/pre_uninstall/post_update”
Homepage – https://www.preyproject.com
Size: 47.1 MB