Pro Users: Did you lose your company’s device, with all your customers’ data on it? Don’t worry. The latest version of Prey for Android now can wipe your device clean, in case you need to protect that sensitive information. Just a click on your Prey account will effectively reset the device to factory defaults, securing your company’s secrets.
Just a quick fix for our Bash desktop client, mainly for compatibility.
- [FIX] Detection of OS version for Mac and Windows now works as expected.
- [FIX] Updated location of `updates_url` from Github to S3.
These fixes act as a progression over what was included in 0.6.0:
- [FIX] Fixes for Gentoo (pryoidain’s patch from Github issue #339).
- [FIX] Update endpoints for `update_device_info` request (ie. hardware info).
- [FIX] Ensure SSL certificate validation in Linux configurator.
If you want to check out new features you might want to take a look at the Node client we’ve been working on — it’s already in the oven!
Sometime during the past few years the old saying “pics or it didn’t happen” mutated into “YouTube video or you don’t exist,” or something like it. That’s precisely why we decided to bring life to our YouTube channel,
to prove our existence to show you what we’re into, to answer your questions, and also to share with you all our media appearances.
Surprisingly enough, we didn’t have many YouTube videos, tutorials, or anything. It wasn’t because we’re lazy, we promise! It was just that we wanted to do something really, really good, and we couldn’t find the time. But videos are finally here, and they’re here to stay. They’re simple, they’re honest, and (we hope), they’re useful. Enjoy!
Some things are better off controlled remotely.
You know, like giant robots, Solid Snake’s Nikita missiles, or even cockroaches. Since we really like robots (but not as much cockroaches), starting from today, you can also control your Android device using SMS commands. And honoring Solid Snake, from now on you can also hide Prey’s icon at will with a simple call, effectively infiltrating any thief’s defenses.
We just pushed the update to Google Play, so you should be getting it during the next few hours. It basically gives you full remote control over your mobile skipping the need of logging to the Prey Control Panel.
Warning: this post is geeky as hell. However, it’s written in a way that you’ll still enjoy reading it, even if you know less about computers than my grandma.
Well, to be honest my grandma actually blogged regularly and was able to fix her internet connection on her own — but anyway, you get the point.
So, a couple of months ago we pushed a release candidate for the new evented, asynchronous, ruthless client that will replace the one we have in production right now (more details here). This, however, is not a mere rewrite: it’s a whole new beast.
I wanted to give a deeper insight to some of the new concepts behind this upcoming new Prey client for Mac, Windows and Linux lappies. I won’t dive into boring details like versioning strategy or API design, but instead focus on the decisions we made to make this beast smarter and more reliable to protect our babies.
So here you go. The road to Prey 1.0.
Our dear client for the Google platform got updated during the past few weeks, and we haven’t even talked about it! If Prey is installed on your Android device, then you’re most likely running the latest version, but did you know what’s knew? Keep reading to learn more.
When we first thought about this contest we never imagined how many people would apply. We got tons of emails from all over the world, from China to Iceland, showing how Prey can protect devices we never knew about. Last year we had Fernanda’s story on how to protect a bicycle from theft, but now it was so much creativity that it was too difficult to choose. You won’t believe how many geek things can run Prey!
Since we know you’re dying to know who the winners are we’ll make it quick. Just keep reading.
Hello everyone! Remember the Prey Contest? You were supposed to run Prey on your weirdest devices to get a free Prey Pro account for life and an OUYA console. Well, we picked the ten most awesome devices running our software and the team chose two big winners. Now you can vote the third!
The 8 runner-ups are:
- 3D Printer, Brazil.
- AM/DM3730 Development Board, Canada.
- Google Glass, USA.
- Hospital Bedside Entertainment Terminal, Germany.
- MOTOACTV, USA.
- Raspberry Pi Rack, Italy.
- Router Linksys E900 (DD-WRT), Chile.
- Toaster, New Zealand.
The three winners will be announced on Monday 12th, August.
We want an OUYA here at the office. It’s an awesome device, powerful enough to run lots of great native games, and can also run emulators. It’s small, practical, beautiful, and runs Android. And as the geeks we are, we had the following conversation:
—Wait a second… Android? Google Play and all?
—Not exactly, but you can still install apps.
—I bet it would run Prey.
And well, we bet it would.
We’re going to show you how to enable guest accounts on Windows and Mac OS X so that you can protect your devices from identity theft, or from it just getting stolen.
If your laptop is ever stolen, there’s a very high chance the guy will turn it on and try to use it, either to see if there’s anything of interest to him, or maybe just to surf the good ‘ol internets for a while — which is when Prey is meant to kick in.
But what happens if your computer is password protected and he’s unable to?
Even though Prey works even if no user is logged in, it’s hard to imagine someone staring at the login box for more than a minute, after trying the usual “123456″ and “password” combinations.
In other words, chances of recovery are drastically reduced when there’s no way for these guys to use your computer, at least for a while.
That’s why creating a dummy guest account is so important for Prey to work its magic. Guest accounts have been woefully overlooked as merely an account for guests, but as you see, having one is a pretty good idea, just as protecting your documents with an account password.
Plus, if someone logs into a guest account in your lappy, he or she won’t be able to mess with your stuff or remove applications, because guest accounts are unprivileged and restricted to a tiny sandbox.
Here’s how to achieve it.