Now you all can invite me on skype for any kind of help required as my username is krackoworld

01 June 2012

Pin It

How to Track your Stolen Laptop?

Track laptop with PreyLast month i buy a new Dell Inspiron 15R Laptop worth Rs 45,000 from Dell showroom with Intel i5 processor and NVidia 1 Gb dedicated graphics. It was all possible with my own pocket money generated via this blog and thanking God/Parents for that. But sometimes i thought if my laptop gets stolen or lost, what should i do then? All my personal information and data gets erased for forever. This lead me to scroll at Google search engine again and successfully founded an result. Hence the result comes with an software named as Prey which is known to be a free stolen laptop tracking tool. So lets explore it in more details and learn how to use it for various safety measures in our future.


What is Prey?

Prey lets you keep track of your laptop, phone and tablet whenever stolen or missing -- easily and all in one place. It's lightweight, open source software that gives you full and remote control, 24/7. It helps you to find your stolen laptop by sending timed reports to your email with a lot of information includes general status of the computer, a list of running programs, active connections, Wi-Fi information, a screenshot of the running desktop and if your laptop has an integrated webcam it will include a picture of the thief also.

Salient Features of Prey:

1. 100% Geo-location aware

Prey uses either the device's GPS or the nearest Wi-Fi hotspots to triangulate and grab a fix on its location. It's shockingly accurate.

2. Know your enemy

Take a picture of the thief with your laptop's webcam so you know what he looks like and where he's hiding. Powerful evidence.

3. No unauthorized access

Fully lock down your PC, making it unusable unless a specific password is entered. The guy won't be able to do a thing!

4. Wi-Fi auto connect

If enabled, Prey will attempt to hook onto to the nearest open Wi-Fi hotspot when no Internet connection is found.

5. Watch their movements

Grab a screenshot of the active session -- if you're lucky you may catch the guy logged into his email or Facebook account!

6. Scan your hardware

Get a complete list of your PC's CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.

7. Light as a feather

Prey has very few dependencies and doesn't even leave a memory footprint until activated. We care as much as you do.

8. Keep your data safe

Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.

9. Full auto updater

Prey can check its current version and automagically fetch and update itself, so you don't need to manually reinstall each time.

10. And many more…

How to Use it?

1. First of all download and install this software from here. It is also available for Mac users.


2. Then open it and run. Now configure this soft with your name, device, email id and create a new account at Prey along with password.

3. All Done! Check your mail and confirm account respectively. After that, Login to your web panel and manage your settings as per your choice at prey.

How it Works?


Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

What to do if laptop lost?

Just go to web panel and change the laptop status to missing. Select report timing, operating system and add webcam in modules. Then Save your all settings and check mail after 5 min.

Now Prey will try to hook onto the nearest open Wi-Fi hotspot when no internet connection is found, prey automatically communicate with web panel and check your status in panel. If panel showing missing status software automatically start working in your laptop. It will take details of your laptop like opened software details, network details, screen shot and take a picture of the thief with your laptops webcam so you know what he looks like and where he’s hiding and send to your email id already configured in this software. Pray also hide your Outlook or Thunderbird data from thief. Hence you will get the stolen details in your mail ID by which your laptop thief can be detected very easily. Enjoy freedom!

I Hope this article will be very helpful to the Hostel boys in their college. Please share and award proper credits to this blog.

Respected Readers :-
As a 18 years old student, running the top most blog in today's world is something quite difficult to do or handle as we bring the best things available related to ethical hacking and security tips to our readers every day. To keep us strong with this attitude, a small contribution from your side will highly be appreciated.


E njoyed this post very much – So why not you Subscribe to our regular Email Updates ! and stay connected with us forever .  

Kindly Bookmark and Share it with your friends :


  1. but what if person FORMATS the laptop?

    1. Nice question buddy! But i am sorry for this case. If your laptop gets formatted by another user Prey cant detect it anymore.


Your feedback is always Precious to us.
I will try to answer all the queries as soon as possible.

karan chauhan


Recent Posts

Review this blog on

Recent Comments

| KrackoWorld (KoW) © 2014. All Rights Reserved | Style By All Web Designing | | Contact |