This tutorial is going to
benefits every students or individual who own a phone, tablets or PC
because what am about to share with you, is what some individuals pay
heavily to learn. So fastened up your seat belt and ride straight with me. credit to MR YOMI for this tutorial.
Have you ever imagine your laptop or phone being stolen and all you could just say is
‘how I wish God will touch this person to just return only my sim card’ eeh..!
It sounds so weird when you can mercilessly track and trace the thief down to
where he/she lives.
I know you are already
curious to know; but relax your mind
lets take it step by step because I am still the pilot of this ship. Lol!
At the end of this tutorial, you will be able to keep track of
your Phone, System or Tablets.
How Do I Keep Track of My Phone And System When It Is Stolen?
Let me
introduce you to PREY.
Prey lets you keep track of your laptop, phone and tablet whenever stolen or
missing
-- easily and all in one place. It's lightweight, open source software that
gives you full and remote control of your device anytime and anywhere. Prey
will automatically get the details of the thief ranging from photographs,phone
number and email it to you without the thief being aware of it.
On a
laptop with a webcam, a Wi-Fi chip, and Prey installed, it's a good bet you'll
have a photo of your thief and an approximate location on them just as soon as
they have your computer running for a few minutes.
Prey
currently supports computers running Windows, Mac, or Linux to Android devices.
To
begin with Prey, follow this simple steps
1.
Download
Prey here and
click on install to run on your system. During the installation period, create
a new account for your self and enter all your details as pictured below
including your device type
2.
Once
you click on create, you will receive a congratulation message telling you that
your device is now set up and being tracked by prey.
3.
Head
straight to their site and login to your control panel with your user name and
password – click on Device – Click on Report(0) from the tracked device -
Click on Main as pictured below
4.
It’s
time to configure our MODULES so set the
following parameters as seen on the pic below
Once you are done, save changes.
The most important module to turn on is Geo, which uses Google's Wi-FI
location API to try and triangulate a laptop's location—or the GPS chip in an
Android for very accurate positioning. But you can turn on every thing for
effective performance.
For Android Users
Android phones set
up with Prey actually have fewer reporting and alarm modules than laptops, but
they do have one unique feature: SIM card protection. One of the useful feature
is that you can set Prey to SMS the phone number of any new SIM that is
inserted into your phone to another number. So even if a thief replaces the SIM
card, you'll have the new phone number you can use to report at the same time,
track the calls made with that phone.
5.
Finally,
the moment you noticed that your phone or laptop is been stolen, just log
in to your account and click on missing and the tracker will begin to take
snapshots, and details of the thief ; immediately, you will receive the reports
in your email account.
Track the thief and
keep your device safe and secured. Don't forget to ask question where you seems
to be confuse.
No comments:
Post a Comment
WE LOVE IT WHEN YOU COMMENT ...