Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Tutorial Windows: Track and Hopefully Recover Your Stolen Windows Laptop or Phone

Posted on July 26, 2015

Mobile devices, laptops, and computers are no longer vanity objects, with one individual owning at least one of them. Coming in different shapes and size specifications, these can easily be carried around, which means they can become an easy prey for experienced thieves.

This is where the good part of global monitoring gets to show its face, and the technology exists to track almost any kind of device that’s connected to the Internet. For instance, the next time someone tries to sell you a phone down the street, imagine what measures you’d take if it were your own, with all the family pictures, or even business documents.

Sure enough there are chances that a stolen device is immediately flashed, or disconnected from any kind of connections, but if not, you still have a chance to locate it. There’s no built-in method to do this in Windows, but just like other activities, there’s an app for that.

Setting up an account and adding devices

Needless to say that you need to set up a few things before you get started, so that the application knows what it’s tracking and for whom. As such, a personal account needs to be created to act as the central command console, while a tracking application needs to be installed on all devices you decide to monitor.

Step 1: The first thing you need to do is go ahead and grab Prey for the device you want to track. It’s available for Windows PC, Mac OS X, iOS, as well as Android.

Step 2: Carefully run the installer. On a Windows PC, you also need to make sure .NET Framework is installed.

Step 3: When installation is done, choose to Set Up Prey and press Finish.

Step 4: Choose to create a New User and press Next.

Step 5: Fill in the Name field, email address, as well as password, and then press Sign Up.

Note: Be sure to write down an email address and password that are relatively secure and you won’t forget, because it’s the only way to access your account and manage devices.

Step 6 (adding a different device): Repeat steps 1 to 4 on the new device you want to add. When you reach Step 4, choose to sign in to an Existing User instead of a new one.

Note: If you haven’t added the email address you wanted, or simply want to add the device to a different account, simply run the installer again and go through the same steps.

Caution: When installing the application on a mobile phone, make sure to create a backup of all important data and contacts. In order for everything to run smooth, permission is required to erase all data or close the phone if declared missing, or one too many wrong login attempts are made.

Accessing the account and managing devices

The application you install as described in the steps above doesn’t have an interface or any controls. This prevents thieves from knowing something fishy is going on, with all controls and actions managed from a web interface, accessible from any location or platform that has Internet access.

Step 1: Open up a web browser and visit this website.

Step 2: In the top right corner, press Sign In and write down your credentials.

Step 3: Click on devices to view locations and gain access to actions.

With all devices now reached, security measures are a few mouse clicks away. Selecting a device shows its location, as well as a list of actions and info to grab.

Taking action

SOUND THE ALARM
Pressing the Sound Alarm button sends a signal to the specific device. For a duration of 30 seconds, the system volume is maxed out, while one of the sounds you select is played out loud.
SEND A MESSAGE
Maybe your laptop or phone didn’t get stolen after all, and someone just found it where you forgot about it. Even if you can’t tell when or if this happens, you can send a message to the specific device.
LOCK THE DEVICE
If there’s personal info on the lost device and Prey tells you it’s online, it’s best to lock it down so it can’t be used. Pressing Lock Device asks for a password, covering the target device’s screen with a black layer and password field, making it unusable until the code is provided.
DECLARE A MISSING DEVICE
Choosing to declare a device as missing doesn’t perform any noticeable actions on the target device. A report is instantly generated, with options to set frequency of getting new ones. Screenshots are taken, as well as pictures if any camera is connected.
RECOVERED DEVICES
In the joyful event that you successfully recover missing devices, you can make the service stop sending reports and pictures. Simply select the specific device from the list, and choose to Set Device To Recovered.

Hint: If you’re tracking a laptop or mobile phone, it’s sure to be equipped with a Wi-Fi adapter. Just to make sure the device is reachable, go to the Settings page in the web interface, down to Device Management, and choose to Try to Connect to an Open Wi-Fi Hotspot if no Internet Access is Detected.

Important Note: Everything works just fine as long as the device can access the Internet. Make sure to enable Wi-Fi for mobile devices and let your laptop connect to any hotspot.

In conclusion

Sure enough, this method is not fool-proof, and is sure not to work against expert thieves, the device manages to have its memory wiped, or there’s no Internet for the device to connect to. However, there’s still some hope left for humanity, and chances are the one that’s got your phone or laptop simply found it where your brain decided to leave it without telling you.

Terbaru

  • Inilah 9 Aplikasi Penghasil Saldo DANA Tercepat dan Terbukti Membayar Tanpa Perlu Deposit
  • Inilah Cara Mengaktifkan Fitur Vertical Tab di Google Chrome Biar Tampilan Browser Kalian Makin Lega dan Rapi
  • Inilah Alasan Kenapa elementary OS Adalah Pilihan Paling Pas Buat Pengguna macOS yang Ingin Coba Linux
  • Inilah Alasan Kenapa Windows Server Kalian Restart Terus Setelah Update April 2026
  • Inilah Alasan Layar TV Kalian Sering Kedip Hitam Saat Main Game dan Cara Mengatasinya
  • Inilah Rekomendasi HP Redmi Note RAM 12 GB dan Koneksi 5G Paling Worth It Buat Kalian
  • Inilah Bocoran Event FF Mei 2026 yang Siap Bikin Dompet Kering, Ada Kuda dan MP40 Cobra!
  • Inilah Kejutan Kompensasi Bug FC Mobile 18 April 2026, Ada Kartu Flashback Gratis yang Bikin Skuad Makin Gahar!
  • Inilah Greenwashing: Trik Nakal Perusahaan Biar Terlihat Ramah Lingkungan Padahal Enggak!
  • Inilah Rekomendasi Parfum Segar untuk Cuaca Panas Agar Kalian Tetap Wangi Seharian Tanpa Bikin Pusing
  • Inilah 12 Aplikasi TV Online Terbaik 2026, Nonton Siaran Langsung Jadi Makin Gampang!
  • Inilah Rekomendasi Kipas Angin Dinding Terbaik Buat Ngatasin Cuaca Panas Tanpa Bikin Kantong Jebol
  • Inilah Cara Sewa Mobil yang Aman dan Nyaman Biar Liburan Kalian Makin Seru Tanpa Drama
  • Inilah Cara Daftar Lowongan 30.000 Manajer Koperasi Desa Merah Putih, Cek Jadwal Lengkapnya Di Sini!
  • Inilah Cara Daftar Lowongan 1.369 Manajer Operasional Kampung Nelayan Merah Putih Jadi Pegawai BUMN!
  • Inilah Perbedaan Skin Tint, Cushion, dan Foundation Biar Kalian Nggak Salah Pilih Base Makeup Natural
  • Inilah Rekomendasi Sepeda Lipat Dewasa Terbaik 2026 yang Paling Praktis untuk Kebutuhan Commuting dan Olahraga Harian
  • Inilah 5 Rekomendasi Sepeda Lipat Listrik Jarak Tempuh Terjauh Biar Mobilitas Kalian Makin Praktis!
  • Inilah 30 Ucapan Hari Kartini 2026 Paling Bermakna untuk Caption Media Sosial dan Pesan Personal yang Inspiratif
  • Inilah Cara Daftar Manajer Koperasi Merah Putih, Peluang Karir BUMN dengan 30.000 Formasi
  • Inilah 5 Rekomendasi Bedak Two Way Cake Anti Oksidasi Supaya Wajah Nggak Terlihat Kusam dan Gelap
  • Inilah Syarat dan Cara Mengurus Surat Sehat Jasmani Rohani untuk Daftar Manajer Kopdes Merah Putih
  • Inilah Alasan Harga Plastik Naik dan 7 Alternatif Kemasan Ramah Lingkungan yang Lebih Hemat buat UMKM
  • Inilah Profil Syekh Ahmad Al Misry dan Rekam Jejaknya yang Sedang Viral di Media Sosial
  • Inilah Alasan HP Nokia Jadul Harganya Masih Selangit dan Banyak Diburu Kolektor di Tahun 2026
  • Inilah HP Samsung A Series Terbaru yang Pakai Layar AMOLED, Mewah Tapi Harganya Terjangkau Banget!
  • Inilah Vivo T5 Pro, HP Midrange dengan Baterai 9.020 mAh yang Siap Comeback ke Indonesia!
  • Inilah Cara Daftar Manajer Koperasi Desa Merah Putih 2026, Ada 30.000 Formasi yang Bisa Kalian Lamar!
  • Inilah Alasan Kenapa Kemkomdigi Ancam Blokir Wikipedia dan Dampak Seriusnya Buat Masa Depan Pendidikan Kita
  • Inilah Cara Cek BLT Desa 2026 Tahap 2, Cair Rp900 Ribu Langsung ke Tangan Kalian!
  • Is it Time to Replace Nano? Discover Fresh, the Terminal Text Editor You Actually Want to Use
  • How to Design a Services Like Google Ads
  • How to Fix 0x800ccc0b Outlook Error: Step-by-Step Guide for Beginners
  • How to Fix NVIDIA App Error on Windows 11: Simple Guide
  • How to Fix Excel Formula Errors: Quick Fixes for #NAME
  • How to Use Claude Design to Create Prototypes, Slides, and One-Pagers Effortlessly
  • Claude Design Tutorial: How to Master AI-Powered SEO Design: A Beginner’s Guide
  • How to master realistic and uncensored cinematic AI image generation using DeepDream Generator
  • How to Capture Your Best Ideas Instantly Using Apple Shortcuts, n8n, and Ollama
  • How to Create Viral AI Animal Haircut Videos in Minutes
  • CrownPlay Konto‑Verifizierung – Schritt‑für‑Schritt Anleitung für deutsche Spieler
  • Coronavirus disease 2019
  • La modernidad de Chamartín, distrito financiero de Madrid.
  • New Text Document
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin

©2026 emka.web.id | Design: Newspaperly WordPress Theme