
The result isn’t only location data, but an exceptionally detailed dossier of evidence about the person in control of the laptop.įor those giving their devices up as lost, the final stroke is remotely destroying your data. All this is hidden from the owner’s view in the name of giving the relevant police force a single point of contact, and preventing the kind of vigilante action that saw a New Jersey man arrested after assaulting someone he wrongly suspected of stealing his iPhone, after tracking it to the wrong location in May. Geolocation data is also gathered and reported. LoJack begins capturing screen grabs and logging keystrokes and sends them back to Computrace, where a member of the team begins collating them and sending them to the police. In return, you get the ability to lock your laptop remotely and display an unmovable message on the screen – perhaps your phone number or details of a reward for the safe return of your machine.Īlternatively, you can declare your laptop stolen, which provokes a more dramatic response. For consumers, there are a few high-quality packages that are easy to set up.įor those happy to spend cash, you can opt for a service such as Computrace’s LoJack for Laptops, which will set you back $US29 for a year of coverage. There are plenty of options out there, including very high-end, expensive options for IT managers with many devices to take care of.

#Hidden vs absolute lojack install#
If you’re using an Android device, or a laptop without preinstalled anti-theft software, you’ll need to install something yourself.
#Hidden vs absolute lojack software#
Others, such as certain Dell Vostro laptops, come with software preinstalled with a year’s subscription to tracking and remote deletion services. Some devices, such as iOS hardware, come with tracking and remote wiping capabilities preinstalled you only need to activate the service.

Alternatively, you can prime a service to destroy everything as soon as it checks into the internet. With the right software, your purloined hardware can seize the opportunity to phone home, delivering a wealth of information that could help you see it again. Join Australia’s most influential channel partners at CRN Pipeline 2022 to reconnect after two extraordinary years of change!
