Since you are a human being as well, I’m sure you would have made some mistakes like forgetting stuff, doing something wrong and more. If you are reading this probably, you would have lost your Smartphone, Smartwatch, Tablets or Laptops! Well, first of all, calm down & contact your Telecom provider to shut down your phone number to avoid any illegal usage of your name.
Getting your laptop or your phone stolen sucks, but there is something you can do about it. Prey is a lightweight theft protection software that lets you keep an eye over them whether in town or abroad, and helps you recover them if ever lost or stolen!
Prey is an open source security tool that can not only locate your laptop and smartphone remotely via GPS but is also able to subtly control critical functions and give you the option of locking them down completely. In short, if the tool has been installed on a device that has gone missing, you can head to Prey’s website and report it as stolen.
Once the thief connects to the internet, Prey will regularly send you emails with data such as the approximate location of your device, a screenshot of the current desktop activity and several webcams or smartphone photos, if possible. Alternatively, you can also activate Prey with an SMS (containing “GO PREY” by default) if you are using it on a Smartphone and wish to get immediate results. All this can be invaluable information for the police and can help the quest to retrieve your property immensely.
Useful Features Of Prey to find Stolen devices
1. More than just Geo-Location
After installing the software on your laptop, tablet or phone, Prey will sleep silently in the background awaiting your command. Once remotely triggered from your Prey account, your device will gather and deliver detailed evidence back to you, including a picture of who’s using it – often the crucial piece of data that police officers need to take action.
2. Prevent unwanted access
When your data is at stake, bad things can happen. Prey allows you to remotely lock down your devices and delete your stored passwords, to ensure that no one will have access to your private stuff.
3. Find my everything
Prey works on all major operating systems, so it lets you keep track and trigger actions on all your devices from a single place. Like a universal remote control, but for laptops and mobiles.
4. Tough as an old boot
When theft happens, time is always against you. That’s why every single thing Prey does is battle-hardened and made to work under the hardest conditions. This also means consuming the least possible amount of battery, always.
5. Privacy comes first
Prey should mention that sensitive data is gathered only when you request it, and is for your eyes only ‐ nothing is sent without your permission. You can always check Their source code if you want to make sure.
How to Install Prey & Configure?
Prey runs on Windows, Linux, Mac, iOS and Android operating systems. Download the Setup file your for your respective system and install it as a normal Software. You can refer the below images.
1. Prey Setup
2. Prey Setup
3. Prey Setup
4. Prey Setup
5. Prey Setup
If you have never used Prey before, just select the “New user” option from the menu to continue to next step & follow the below image.
1. Prey Login
2. Prey Login
3. Prey Login
Once the setup has finished, your current device will have been added to the watchlist of your Prey account and the client will integrate itself deeply into your OS, so that will neither be visible, nor removable by the thief (typically only occupying 5 MB of memory in Windows). While dormant, its only function is to subtly check online every 10 minutes to see if the device has been reported as stolen.
Reporting devices as Stolen – Activate Prey & locate your device
If you’ve decided to use the “Control Panel method“, you have multiple options to handle thefts. The first thing to do in any case is to head to the Prey website, select your device and switch to “Missing”. Prey will then ask you to define the time delay between each individual report. Please See the Screen Shots Below
This is The List Of Action You Can Perform After Installing Prey
- Set Device to Missing
- Send Sound Alarm (You can also do this using Android
- Get Location Of Your Device
- Send Message to Thief.
- Lock Your Device
1. Prey Dashboard
2. Prey Alarm
3. Prey Send message
4. Prey Notifications
5. Prey lock down stolen device
If you suspect to be in close vicinity to your device, you can even enable an acoustic 30 seconds alarm or send the thief a message. Both options can be found under “Actions to perform.” Don’t use these functions carelessly or to taunt your adversary as stealth is critical. Once discovered, Prey is quickly rendered useless, and thieves will likely try to get rid of it in one way or another.
Lastly, if all this work has paid off and Prey has indeed helped you locate your lost device, it is still strongly discouraged to approach the thief on your own. Instead, contact the police (if you haven’t already done so) and provide them with the evidence that you have collected. Let us know if prey helped you in finding your stolen device. If you need any help, you can comment your issue below, or you can also contact us, we’ll help you track your stolen device. Cheers!