Home »  Software »  Security Software

How Do I Track a Stolen Laptop or PC

June 18, 2012  |  Difficulty: Medium

how to download and install the Prey© application.

Theft of a laptop or desktop can be a very unpleasant experience, not only for dealing with the stolen hardware, but also for stolen data as well (this is one reason why it is so important to back up your data, read the article that focuses on storing photos, music or documents online). Reclaiming your hardware will be easier if you have anti-theft protection like the Prey© application installed. It will help detect and then catch the thief. After installation, the program will run in the background of the operating system and monitors if the device is stolen via the Internet. It can take a photo of the thief (if the webcam is available), lock the screen, display predefined text, find the stolen device’s location (using GPS and Wi-Fi), send reports with photographs of the thieves, etc. The free version allows managing of three devices. Each of them can send a maximum of ten reports. In the instructions below you can learn how to download and install the Prey© application.

Downloading and installing Prey©:

  1. Go to the Prey© home page in your Internet browser.
  2. Click on the green “Download Now” button.
  3. Run the downloaded file.
  4. Click on the “Next” button on the welcome screen.
  5. Read and accept the license agreement by clicking on the “I Agree” button.
  6. Select the folder where the application will be installed and click on the “Next” button.
  7. Click on the “Install” button.
  8. When the installation process finishes, click on the “Finish” button.

Setting Prey©:

  1. The first launch of the application will ask you to set a reporting method, click on the “OK” button.
  2. Leave the “Setup reporting method” radio button selected and click on the “Next” button.
  3. Leave the “Prey + Control Panel” radio button selected and click on the “Next” button.
  4. Leave the “New User” radio button selected and click on the “Next” button.
  5. Enter your name, email and password to set up your account, and device title. Type it in the “Device setting” section. Click on the “Create” button.
  6. Two confirmation windows will pop up. Click on the “OK” button in both of them.
  7. The activation email will be sent to your mailbox. Click on the activation hyperlink in the email.
  8. Log in to your account, you can see the added device. Click on it and you can configure all functions of the application then click on the “save changes” button.

Tips and Tricks:

  • If you don’t have your own email address, read the article that focuses on setting up an email account.
  • If are not sure how good your password is, read the article that focuses on creating a strong password.
  • To add another device for monitoring click on the “Add new device” button after you log in.


Most Popular Articles:

What Is the Best Backup Software for Me

Internet Security Solutions Detect Legitimate Soft

How Do I Block Internet Intruders from Spying

How Do I Choose a Data Backup Software

How Do I Install a FREE Spyware and Adware Blocker

Related Articles:

How Do I Create a Strong Password

How Do I Create a Strong Password

how to remove infections from your computer using Spyware Terminator 2012 application.

How Do I Remove a Spyware/Malware Infection

How to set System Protect to secure both your personal files and system files

How Do I Prevent the Loss of Photos and Documents

process of enabling complete security and protection, in Spyware Terminator 2012

How Do I Completely Protect My Computer

how to download and install KidsWatch™ parental control software

How Do I Get KidsWatch™ Family Protection Suite

Help Us Spread the Word!

Love us on Facebook to stay updated.

Stay aware and get our best content on health, celebrity, travel, living, career and the technologies that will change the world.