


{"id":660,"date":"2009-05-28T11:55:13","date_gmt":"2009-05-28T18:55:13","guid":{"rendered":"http:\/\/xmission.com\/blog\/?p=660"},"modified":"2014-12-19T12:17:28","modified_gmt":"2014-12-19T19:17:28","slug":"a-program-for-tracking-stolen-laptops-prey-upon-thieves","status":"publish","type":"post","link":"https:\/\/xmission.com\/blog\/2009\/05\/28\/a-program-for-tracking-stolen-laptops-prey-upon-thieves","title":{"rendered":"A program for tracking stolen laptops. &#8220;Prey&#8221; upon thieves."},"content":{"rendered":"<p>Chilean programmer, Tom\u00e1s Pollak, developed a very cool little application that allows the owner to track a laptop if it is ever stolen. It is called<a href=\"http:\/\/bootlog.org\/prey\"> Prey<\/a> and best of all, it is totally free.<\/p>\n<p>What is <em>Prey<\/em> ?<\/p>\n<p><em>Prey<\/em> helps you find your stolen laptop by sending timed reports to your email, including information of its whereabouts. <em>Prey<\/em> reports the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and \u2014 in case your laptop has an integrated webcam \u2014 a picture of the thief. Pretty cool!<\/p>\n<p>You need to have the software installed on your laptop for it to work. With enough luck you may just get your machine back.<\/p>\n<p>The program runs on Mac OS , Linux, and Windows. <\/p>\n<p>I&#8217;ll be installing this on my laptop tonight.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2009\/05\/prey_laptoptracker_logo.png\" alt=\"prey_laptoptracker_logo\" width=\"300\" height=\"288\" class=\"alignleft size-full wp-image-661\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chilean programmer, Tom\u00e1s Pollak, developed a very cool little application that allows the owner to track a laptop if it is ever stolen. It is called Prey and best of all, it is totally free. What is Prey ? Prey helps you find your stolen laptop by sending timed reports to your email, including information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,5],"tags":[445,31,444],"class_list":["post-660","post","type-post","status-publish","format-standard","hentry","category-security-safety","category-tips-helpful-information","tag-my-laptop-was-stolen","tag-security","tag-stolen-laptops"],"_links":{"self":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/comments?post=660"}],"version-history":[{"count":6,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions"}],"predecessor-version":[{"id":3425,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions\/3425"}],"wp:attachment":[{"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/media?parent=660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/categories?post=660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xmission.com\/blog\/wp-json\/wp\/v2\/tags?post=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}