January 26, 2022

Prey 1.9.15 Obtain | TechSpot


It is light-weight, open supply software program, and free for anybody to make use of. And it simply works.

The way it works

Principally you put in a tiny agent in your PC or cellphone, which silently waits for a distant sign to get up and work its magic.

This sign is distributed both from the Web or via an SMS message, and permits you to collect data relating to the machine’s location, {hardware} and community standing, and optionally set off particular actions on it.

100% geolocation conscious

Prey makes use of both the machine’s GPS or the closest WiFi hotspots to triangulate and seize a repair on its location. It is shockingly correct.

Know your enemy

Take an image of the thief together with your laptop computer’s webcam so you understand what he seems like and the place he is hiding. Highly effective proof.

No unauthorized entry

Totally lock down your PC, making it unusable until a selected password is entered. The man will not be capable of do a factor!

Wifi autoconnect

If enabled, Prey will try and hook onto to the closest open WiFi hotspot when no Web connection is discovered.

Watch their actions

Seize a screenshot of the lively session * when you’re fortunate you could catch the man logged into his e mail or Fb account!

Scan your {hardware}

Get a whole listing of your PC’s CPU, motherboard, RAM, and BIOS data. Works nice when used with Energetic Mode.

Mild as a feather

Prey has only a few dependencies and would not even depart a reminiscence footprint till activated. We care as a lot as you do.

Maintain your information secure

Conceal your Outlook or Thunderbird information and optionally take away your saved passwords, so nobody will be capable of look into your stuff.

Full auto updater

Prey can verify its present model and automagically fetch and replace itself, so that you needn’t manually reinstall every time.

What’s New:

Bitlocker Disk Encryption

Use our new Disk Encryption device to simply encrypt information on appropriate Home windows gadgets remotely utilizing Home windows’ native BitLocker device.

Enterprises with fleets utilizing Home windows as an working system can now reap the benefits of Microsoft’s native BitLocker disk encryption device utilizing Prey! Allow us to introduce you to our new Disk Encryption motion. This device permits you to simply activate BitLocker’s disk encryption remotely on appropriate gadgets (Home windows 10 Professional, Enterprise, or Schooling) and defend the info on their laborious drives!

BitLocker is a local encryption device that comes with Home windows 10 Professional, Enterprise, or Schooling and doesn’t have to be put in or purchased individually.

This new device has been added to our Enterprise plan, and it’s the subsequent step into higher serving to organizations safe their information. Encryption is a key threat mitigator! Information theft, information breaches, or machine loss gained’t lead to compromised information if mentioned data is encrypted.

Learn how to use the Disk Encryption Software

This motion shall be obtainable on any Home windows 10 machine utilizing a Home windows Professional, Enterprise, or Schooling model and with {hardware} that possesses the TPM (Trusted Platform Module). To activate BitLocker:

1) Discover a appropriate Home windows machine in your Prey management panel, and entry its particular person view by clicking it on the machine listing. As soon as there, you could find the Disk Encryption motion on the right-hand motion bar.

2) Click on on the motion’s button to start the method. You will want to pick out the drives on the pc that you just wish to encrypt with BitLocker.

3) Choose the encryption methodology you wish to apply. Deciding on ‘Full Disk’ takes longer, however protects the entire disk (unused, and used). That is ultimate for computer systems which can be in lively use; however, choosing the ‘Used Area Solely’ shall be quicker, however doesn’t defend unused house. That is ultimate for model new computer systems that haven’t had information saved but.

4) Lastly, choose the encryption customary. AES_128 is good for mounted inside drives, and XTS_AES128 is good for detachable drives like a flash drive. This selection represents the kind of encryption utilized.

5) Click on Begin Encryption to use!

What’s going to occur subsequent?

Prey will attain out to the machine and, as soon as linked, will request BitLocker to start the encryption course of. You may click on the motion to see a progress bar and comply with the encryption course of because it protects the chosen drive.

Notice that the encryption course of shouldn’t be prompt, as Home windows might want to encrypt all obtainable information as an entire. The completion time will fluctuate in accordance with the pc’s specs and the disk’s information dimension.

The encryption course of is ongoing and the machine can be utilized repeatedly even when encrypting, and when accomplished all newly generated information shall be encrypted by default. This, nevertheless, does imply that the pc’s efficiency shall be barely modified as a minor a part of processing energy will run this steady encryption course of. The restoration key (or encryption key) and disk password shall be obtainable on the gadgets’ {hardware} particulars in your account.

Learn how to Decrypt a Disk Encrypted With Prey

  • The decryption course of is pretty simple. You will discover the Decrypt possibility in the identical motion as earlier than, Disk Encryption.
  • Discover a Home windows machine in your Prey account that had been beforehand encrypted utilizing the identical platform, and click on on it to entry its particular person view.
  • Open the Disk Encryption device, and choose the goal disks to be decrypted.
  • Click on decrypt and Prey will provoke the method.

What’s going to occur subsequent?

Prey will hook up with the Home windows machine and disable BitLocker, commencing the decryption of the chosen disks. This course of takes anyplace from 20 minutes to a few hours relying on the disk’s dimension, and the pc’s traits. If the machine is turned off, will probably be interrupted and resumed when turned again on.

Leave a Reply

Your email address will not be published.