How To Protect Your Laptop From Thieves And Catch Them In Act

As much as we’d like to think of coffee shops and libraries as idyllic places for safe work and study, there’s always someone willing to steal your stuff. After all, that elderly woman at the adjacent table may look innocent, but we’re not going to take any chances.
Of course, when it comes to laptop security, we’d recommend the obvious — watch your stuff. Five minutes is all it takes to grab a coffee, or head to the washroom, but that’s all it takes for a thief to swipe your stuff too. And while physical locks can be a good deterrent in public places, they aren’t always possible — or convenient — to set up.

That’s why today, we’re going to show you how to use an awesome piece of anti-theft software called Prey to deter would-be thieves, and help you get your laptop back should it ever be stolen.  


How It Works
Prey uses both hardware and software to keep track of a missing laptop. If you’re lucky, it may even help identify the thief responsible. This is because Prey leverages your webcam, wireless network and desktop screenshots to gather as much peripheral information about a missing device as possible — with the hope of identifying who’s stolen your laptop, and where it may be located. All of this is done discreetly, unbeknownst to a potential thief, and activated shortly after your laptop is marked missing.

There are a few caveats, however. On Mac and Linux, Prey is run as a root process so that it can continue to stay active across user accounts (those concerned about security will be happy to know the developers are investigating a user-space solution for the future revisions). But on Windows, this sort of behaviour isn’t possible; Prey will only activate if a user is logged in. There are a couple solutions — creating a guest account to lure in thieves, or removing login passwords, for example — though the path you choose is up to you.
Those concerned about limited system resources needn’t worry either; both the Mac and Linux client run outside of memory until your laptop is marked as missing, while the Windows build requires only 2-3 MB of RAM. That’s a pretty decent tradeoff for security and piece of mind. As far as configuration goes, you’ll be offered two choices during setup — Control Panel and Standalone — and we’re going to examine the pros and cons for each.

Taking Control
Taking Control Choosing Control Panel is considered the easiest way to setup Prey, and allows you to configure settings and report a missing device via the application’s website. After setting up an account, you can flag your laptop as missing online, and view what information is sent back in the report. By default, this includes things like IP address, geolocation data (if available), and a webcam photo that might just help you identify the culprit. There’s even the option to activate potentially discouraging actions on the remote machine, including an audible alarm, screen lock, or on-screen messages to the supposed culprit. 

That alarm is, in fact, loud. Trust us. And a damn good way to ward of potential thieves.

However, as simple as Control Panel mode may be, it does come with a few caveats. For example, only three devices can be activated and tracked at a time, and only the 10 most recent reports for each device will be stored once marked as missing. That’s probably not a big deal for most, but if you’re yearning for more options and control over your missing reports, read on.

Going It Alone
When Prey is run in standalone mode, the client bypasses the online Control Panel entirely, and sends reports to an email account instead. This is useful for a number of reasons — namely, the ability to view reports on a smart phone or mobile device, instead of at your desk, and send more frequent reports than the online interface’s 10 minute limit. In fact, you can register as many laptops or devices as you wish using Standalone mode, making this an attractive option for those with many machines. However, it changes a few things as far as setup is concerned.

For example, you’ll need to know the SMTP information for your email account, so that Prey knows where to send its reports. More importantly, because the Control Panel interface isn’t being used, you’ll need a different method for marking your device as missing — in this case, an active URL. For example, I’ve set Prey to watch theft.jpg. If my laptop ever goes missing, I simply delete theft.jpg from my server, causing the URL to return a “404 Not Found” and activate Prey. 

We’ve gone through all this trouble because standalone is, in fact, one of Prey’s most powerful features, and gives us the chance to modify some useful settings that can’t normally be adjusted via the only interface. These are settings which are, unfortunately, very poorly documented on Prey’s website, but we’ve done a bit of digging with the hopes of showing you how to configure things more easily.

Windows users can, by default, find Prey installed to their hard drive’s root directory (C:). On Mac and Linux, all of Prey’s files are run from /usr/share/Prey, though you’ll likely need to reveal hidden files in Finder using the following Terminal command:   

defaults write AppleShowAllFiles YES

Inside, you’ll find various modules with which Prey uses to compile its reports, ranging from webcam data to geolocation settings. Each module has a folder with a configuration file within that can be edited in any basic editor. The webcam module, for example, actually allows us to record brief video clips for each report, something not possible via the Control Panel interface. You can even change the message contents of the on-screen alert, with the hope that light-hearted humour will cause the thief to have a change of heart. 

Before someone points out my lack of possessive apostrophe, I should note its inclusion would have broken the configuration file. Sometimes, grammar sacrifices must be made.

However, you’ll notice not all of the modules are active by default; in each module’s “core” folder, there is a file called “run” whose icon appears as a miniature terminal when active. For those that aren’t, you can set the module’s execute bit with the following Terminal command (substituting -x for those modules you’d like to deactivate):   

 sudo chmod +x /usr/share/prey/modules/alert/run     

Windows users simply need to create a file called “activate” in the root folder of each module, and set a value of “1”. To test everything out, flag your device as missing by removing the URL path that Prey has been set to watch, and check your inbox for new reports (with great candid shots like this, we hope). A bit of trial and error is all it takes to get everything set up nicely, and if all goes well, you’ll have a lightweight, anti-theft setup that should hopefully keep all but the most dedicated of thieves at bay. 
Prey is by no means the only piece of anti-theft software out there, but it’s definitely one of the most robust. Do you bother to secure your laptop (or desktop, even) with software like this? What are methods have you used to discourage would-be thieves? Be sure to let us know below!

This post originally appeared on Tested.

Business Insider Emails & Alerts

Site highlights each day to your inbox.

Follow Business Insider Australia on Facebook, Twitter, LinkedIn, and Instagram.