Locate Stolen laptops and Smart phones Using Prey Tool in Ubuntu

March 17, 2015 | By
| Reply More

Prey is an open source, cross platform tool which helps recover your stolen laptops, desktops, tablet computers and smart phones. It has gained vast popularity and has claimed to help recover hundreds of missing laptops and smart phones. The working of this tool is pretty simple, install it on your Laptop or smart phone, and if your device goes missing, login the Prey website with your credentials and mark your device as “Missing” there.  As soon as the thief connects your device with internet, it will immediately send you the Geo location of your device. If your laptop is having webcam, it will also capture the screenshot of the thief.

Prey consumes minimum system resources; it does not affect your device’s performance in any way. You can also use it alongside any other anti-theft application you had installed on your device. It uses secure and encrypted channels to communicate your device data with Prey servers.

Installing and configuring Prey on Ubuntu

Let’s see how we can install and configure Prey on ubuntu, note that during configuration process, we will have to register an account at Prey official website. Once done, it will be able to monitor your devices. Its free account monitors up-to 3 devices, if you need to add more devices to its watch list, you need to purchase appropriate plan.

Considering the popularity and use of Prey, it has been added to the official ubuntu repository now. That means you don’t need to add any additional PPA to the package manager. Simply launch your terminal application and run the following command to install it:

sudo apt-get install prey

Install Prey

 

Install Prey 1

It is a very lightweight application, uses only few MB of space on the system, once installation is completed, launch it from Applications >> Prey and it will ask you for the configuration.

Choose “New user” if you are using this app for first time.

Prey New User

This second step is actually the process to sign you up on Prey official website. Please provide your username, email address and password for free account.

Register Prey

Hit “Apply” once done, that’s all, your computer is now protected by Prey.

Prey Configuration
Login your  newly created Prey account and you should be able to see your device information there under “Devices” menu.

Prey Web Login

As soon as your laptop or any other device goes missing, simply login your Prey web account and change the device status to “missing” by clicking “Set Device to Missing” option.

Prey Missing Page

Choose report frequency from here and hit “Yes, my device is missing”. Report Frequency option is the time interval after which this app will send you status updates for your device location. It will email you as soon as the device status is changed from web interface.

Prey Missing Email

As soon as your stolen device is connected to the internet, it will immediately send you report, containing your device's  Geo whereabouts and IP address.

Prey Found Report

 

Click the report link and you should be able to see your device’s Geo location and IP address.

Prey Final

 

There is one known drawback in Prey , It needs your device to be connected to internet for sending Geo location, if thief is smart enough to format your device hard disk before connecting it to the network, then you’ll never get report of its recovery. But there is still a work around to overcome this drawback, make sure to add a BIOS password and disable booting the system from removable devices.

Conclusion

It is a small, very useful security application which lets you track all of your devices on a single place, although not perfect, but still provides good level of recovery chances for your stolen devices. It runs seamlessly on Linux, Windows and Mac operating system. Here are details about Prey Pro plans.

Filed Under : OPEN SOURCE TOOLS, UBUNTU HOWTO

Free Linux Ebook to Download

Leave a Reply

Commenting Policy:
Promotion of your products ? Comment gets deleted.
All comments are subject to moderation.