Tech

Prey 1.9.15 Download | TechSpot

It is lightweight open source software, free for everyone. And it just works.

How it works

Basically, you install a tiny agent on your computer or phone that silently waits for a remote signal to wake up and do miracles.

This signal is sent either from the Internet or via SMS and allows you to collect information about the location of the device, the state of the equipment and the network, as well as, if necessary, trigger certain actions on it.

100% geolocation

Prey uses either GPS devices or nearby Wi-Fi hotspots for triangulation and positioning. This is amazing for sure.

Know your enemy

Take a picture of the thief with your laptop’s webcam so you know what he looks like and where he is hiding. Solid evidence.

No unauthorized access

Lock your computer completely, rendering it unusable unless a specific password is entered. The guy can’t do anything!

Auto Wi-Fi connection

If enabled, Prey will try to connect to the closest open Wi-Fi hotspot when not connected to the Internet.

Watch them move

Take a screenshot of your active session * if you’re lucky you might catch a guy logged into his email or Facebook account!

Scan your hardware

Get a complete list of information about your PC’s processor, motherboard, RAM, and BIOS. Works great in active mode.

Light as a feather

Prey has very few dependencies and doesn’t even leave a trace in memory until activated. We care as much as you do.

Keep your data safe

Hide your Outlook or Thunderbird data, and if necessary, delete saved passwords so that no one can see your data.

Full automatic update

Prey can check its current version and automatically download and update itself, so you don’t have to manually reinstall every time.

What’s new:

Bitlocker Drive Encryption

Use our new Disk Encryption tool to easily encrypt data on compatible Windows devices remotely using the native Windows BitLocker tool.

Businesses with a fleet of machines running Windows as their operating system can now take advantage of Microsoft’s built-in BitLocker Drive Encryption with Prey! Let me introduce you to our new “Disk Encryption” campaign. This tool makes it easy to activate BitLocker Drive Encryption remotely on compatible devices (Windows 10 Pro, Enterprise or Education) and protect the data on their hard drives!

BitLocker is a built-in encryption tool that ships with Windows 10 Pro, Enterprise, or Education and doesn’t need to be installed or purchased separately.

This new tool has been added to our corporate plan and is the next step towards helping organizations more effectively protect their data. Encryption is a key risk reduction factor! Data theft, data leak, or device loss will not lead to data compromise as long as the specified information is encrypted.

How to use Disk Encryption Tool

This action will be available on any Windows 10 device running Windows Pro, Enterprise or Education and on hardware with TPM (Trusted Platform Module). To enable BitLocker:

1) Find a compatible Windows device in the Prey Control Panel and access its custom view by clicking on it in the device list. Once there, you can find the Disk Encryption action on the right action bar.

2) Press the action button to start the process. You will need to select the drives on your computer that you want to encrypt with BitLocker.

3) Select the encryption method you want to apply. Selecting Full Disk takes longer, but protects the entire disk (unused and used). This is ideal for computers that are heavily used; on the other hand, selecting “Used space only” will be faster, but will not protect wasted space. This is ideal for new computers that do not yet have data backed up.

4) Finally, choose an encryption standard. AES_128 is ideal for fixed internal drives, while XTS_AES128 is ideal for removable drives such as flash drives. This parameter represents the type of encryption applied.

5) Click “Start Encryption” to apply!

What will happen next?

Prey will contact the device and, once connected, will ask BitLocker to start the encryption process. You can click an action to see a progress bar and monitor the encryption process as it protects the selected drive.

Note that the encryption process is not instantaneous as Windows will need to encrypt all available data in general. Completion time will vary depending on the specifications of the computer and the size of the data on the disk.

The encryption process continues and the device can be used continuously even with encryption, and upon completion, all newly generated data will be encrypted by default. This does, however, mean that the performance of the computer will be slightly altered as a tiny fraction of the processing power will be performing this continuous encryption process. The recovery key (or encryption key) and password for the drive will be available in the hardware information of the devices in your account.

How to decrypt a drive encrypted with Prey

  • The decryption process is pretty straightforward. You can find the “Decrypt” option in the same action as before, “Encrypt Disk”.
  • Search your Prey account for the Windows device that was previously encrypted using the same platform and click on it to access its customized view.
  • Open the Disk Encryption tool and select the target drives for decryption.
  • Click Decrypt and Prey will start the process.

What will happen next?

Prey will connect to the Windows device and disable BitLocker, starting to decrypt the selected drives. This process takes anywhere from 20 minutes to a couple of hours, depending on the size of the drive and the specifications of your computer. If the device is turned off, it will be aborted and resumed when turned back on.


Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button