AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Absolute lojack test call session2/18/2023 ![]() Smile! Prey can take a surreptitious picture of the person using your Mac, as well as a screenshot of what they were looking at, and then post it online. Hidden’s basic plan starts at $15 a year for one machine, with up to five licenses costing $45 annually. ![]() You can also enable the computer to take photos of the illicit user. Close enough for government work? I tried a second test, which successfully located the machine. Using nearby Wi-Fi points, the app placed my computer about a block and a half south of where I actually live. Hidden “boasts the most advanced theft tracking software for your Mac.” I tested Hidden on my desktop computer, an iMac. You can run: As with many Mac security options, Hidden can pinpoint your missing computer on a map. All of these programs can also take surreptitious screenshots and photos using the device’s iSight camera, and all include features that allow remote monitoring, locking, and deletion. All of them provide variations on the same service: When you report your equipment missing through a Web-based control panel, the software will attempt to locate your device using its geolocation features, if the device is connected to the Internet. Several third-party applications promise superior theft protection. Weeks after my incident, the remote-erase action for my laptop still shows up as “pending” in Find My iPhone. The good news is that even without location services, you can still lock or erase the machine remotely, but only when the device connects to the Internet. (The Find My Mac service does have its potential drawbacks,Īs Wired’s Mat Honan learned-someone who cracks your password could theoretically use it to erase your computer.) On location: You must enable Location Services, available in the Privacy section of the Security pane, for Find My Mac to work to its fullest. For whatever reason, I had either forgotten to enable or absentmindedly disabled the location services on the MacBook. Within a few minutes after my laptop was stolen, I launched my iPhone’s Find My Phone app, which keeps track of all of my registered devices. It was untethered, uninsured, and-as I realized a few minutes after the theft occurred-unconnected. My MacBook Pro was less than a month old. What once was lost: The Find My iPhone service and app can help you locate an iOS device or Mac. The advantage, however, is that users may be able to lock or delete the contents of their device remotely, thereby securing their data and making it harder for thieves to resell the machine. (Find My Mac works only with Macs running OS X Lion or later.) Even then, police say, simply turning off the device easily defeats the feature. In both cases, the location tracking functions only if you’ve enabled the device’s location services. But what should you do while you wait for law enforcement?Īpple’s solution is the “Find My Mac” or “Find My iPhone” service. See FAQ for more details.ĥ Only available for Chrome browser, on Windows and Chromebook devices.Ħ Absolute Insights for Endpoints is available as an add-on module and requires an existing Absolute Visibility, Control, or Resilience subscription.When a thief absconds with your phone, tablet, or computer, naturally you call the police. Learn moreģ Only available on specific Lenovo devices.Ĥ Terms and Conditions apply. Any other application of your choice may be supported through a Professional Services engagement, which can be quoted upon request. 2 Applications supported directly through the product: Endpoint Management (Microsoft SCCM, VMware Workspace ONE, Tanium, Citrix Workspace, Ivanti Endpoint Manager), VPN (Cisco An圜onnect, F5 BIG-IP Edge Client, Pulse Secure, Palo Alto GlobalProtect, Netskope), Endpoint Protection (Dell Advanced Threat Prevention, VMware Carbon Black Cloud, ESET Endpoint Antivirus, CrowdStrike Falcon, McAfee ePO, Ziften Zenith), and Data Protection (Microsoft BitLocker, Dell Encryption Enterprise, Dell Data Guardian, WinMagic SecureDoc Encryption).
0 Comments
Read More
Leave a Reply. |