Follow Us

Friday, October 14, 2011

Prey: A Phenomenal Advancement to Internet Security

Burglaries seem to advance using the latest technology, but this also means that we have access to comparable types of technology for burglary counteraction. Prey, a project by Fork Ltd., uses cloud technology to help users pursuit their stolen items. By pursuit, Prey means geolocation software, Wi-Fi autoconnect, hidden webcam activation, and many more significant features. By creating an account and installing configuration software on laptops the user would like to track, Prey connects to any form of Internet (including Ethernet) to "spy" on the suspected robber.

Geolocation Awareness
Prey is Wi-Fi hungry- it will connect to Internet as soon as it has the opportunity to, and will also connect to 3G and 4G. By acquiring the location of the laptop, presets in Wi-Fi settings will allow Prey to access nearby areas. This feature narrows the search even more.

Webcam Activation
A webcam doesn't just come in handy for taking pictures and online conferences, it's also helpful to snap a few photos of the suspected burglar. Screenshots also come with the free package and pay off especially when the burglar visits a social networking site with his/her profile in display. A few months ago, a former FBI agent and NASA engineer was able to trace his Macbook Pro using Prey; he notified police of the burglar's address through screenshots of the thief's Facebook page. Obviously, the burglar did not know who and what he was dealing with.

Hidden Access
The moment someone accesses your data from your stolen computer, chances are that your identity is at risk. Prey includes the option of disallowing access to specific programs, including Microsoft Outlook and Thunderbird data. An editable message can be enabled to notify the burglar that he is fried and won't get away with the theft. Another feature allows the user to set a lockout screen, requiring the thief to type in a specific password. Chances are that the thief will guess the wrong password and will be locked out permanently until the rightful owner unlocks the device again.

Compatibility
The Prey platform is compatible with Windows, Ubuntu, Android, Mac OS, and Linux. An iPhone/iPad version is yet to come and is still being worked on. The website has not given an official release date. For access to three or more devices per account, you will need to purchase a Pro account. As Prey mentions on its website, the Home option allows for a balance between cost and security. On the other hand, if you really want to go security-heavy for your house, the Max option is available at $399 a month.

Most people use the free account as it provides sufficient security measures. For those who have expensive hardware, Pro solutions may just be the best path towards full protection. Overall, Prey is the best cloud security service I've seen, not to mention that it's also free and 100% legal.

No comments:

Post a Comment