homeAppSaved.com WINDOWSWINDOWS WEBWEB MACMAC IOSIOS ANDROIDANDROID LINUXLINUX

Prey for Mac

find a lost phone or laptop

thumb of Prey for Mac
  • Publishers:
    Fork Ltd
  • License: Free
  • Capacity: 17,7 MB
  • Saved: 51
  • Update:
  • System: Mac OS X 10.5/10.6/10.7

Prey for Mac 1.8.3 is a compact application, handy and very easy to manipulate, specially designed to allow you to track your phone or laptop anytime and quickly find it in lost or stolen case.

Basically, you install a compact client on your PC or phone, then wait for a remote signal to activate. This signal is sent from the Internet or via an SMS, allowing you to collect information regarding the location of the device, hardware and network status.

You can quickly find out the location of the computer, who is using it and what the thief is doing on the computer thanks to Prey's powerful warning system. By marking your device as missing, Prey will gather all the evidence that you request and send it to your Control Panel account or directly to the mailbox, depending on the warning method you have. selective.

In addition to the ability to collect information, you can set an alarm sound or display a message on the screen just in case you want the thief to know that he is being chased. You can also delete stored passwords for security or even lock your computer to prevent access. In other words, you are gaining control.

Picture 1 of Prey for Mac

Main feature:

  • Automatically connect to WiFi
    If enabled, Prey for Mac will try to access the nearest WiFi port when no Internet connection is found. Thanks to that, you can locate the lost device.
  • Automatically update
    Prey for Mac can check its current version and automatically update, so you don't need to reinstall.
  • Scan your hardware
    You will get a complete list including: CPU, motherboard, RAM and BIOS information. This software will work better when used with Active Mode.
  • No unauthorized access
    Completely lock your computer, making it unusable unless a specific password is entered.
  • Keep your data safe
    Hide your Outlook or Thunderbird data and remove stored passwords, so no one will be able to view your data.
  • See the movements of the thief
    Perform screenshots. If you're lucky, you can catch the guy trying to log into his email or Facebook account. In addition, it can send continuous email to your email address, report on its location until the user finds the device.
  • Know your enemy's face
    You can take a picture of the thief with the webcam included in your laptop, so you'll know the thief's shape and its hiding place.

Pactimza