Help      |      Chebucto Home      |      News      |      Contact Us     

25. Install tracking system to foil laptop thieves

By Mark Alberstat

With laptop computers being so small, portable and powerful they have become a prime target for thieves. The FBI reports that only three percent of all stolen laptops are recovered. There have always been chain and lock devices to bolt your computer to the desk it resides on but a pair of bolt cutters and an extra five seconds can make fast work of that deterrent. These devices are also often clumsy for the user and detract from a laptop's main feature, portability. In the last few years, however, a handful of software companies have produced products and services to help retrieve your pilfered PC should it decide to go on a tour with someone other then the owner.

These software programs could be seen as the computer-world's equivalent to LoJack, the stolen car tracking system. LoJack, however, uses a hidden transmitter in the cars while the computer equivalent is a hard-to-detect software program will allow the user and/or software vendor to know when the PC is connected to the internet.

These small program are installed on your laptop like any other program but they cannot be found by cruising the directory structure, looking at the task manager for programs that are running or examining what is running in RAM. These programs are so stealthy that under most situations they cannot be erased from the hard drive with a normal format command, Fdisk command or even drive partitioning.

Once installed these programs are registered with the vendor and a unique ID is assigned to that particular installation. Each time the laptop is connected to the internet the software sends out a small signal to the vendor letting them know that machine is online. In the event of a theft, the user contacts the vendor, gives them the unique ID and when the laptop is next attached to the internet the software contacts the vendor and then the tracing begins with IP Address, dial-up numbers and local police, unknown, of course, to the person using that stolen laptop.

Some vendors even have products now that when the laptop reports in and it is listed as stolen a command will be sent to the laptop to delete specified files or directories. Although for most home users this isn't too critical, for business users, however, confidential data, company plans or strategies are often worth far more than the laptop itself.

One of the leading companies in this field is Vancouver-based Absolute. Their product ComputracePlus has developed over the years to be a computer tracking, inventory and theft prevention product.

At $70.00/year ComputracePlus is not too shabby an investment on that new top-end laptop that you just shelled out $2500 for. The yearly contract includes all recovery services, and also forensic data recovery just in case the evil villains who stole your laptop erased your hard drive.

Caveo produces another option in laptop security. Their products come in the shape of an add-in card for your laptop. These cards that look like typical laptop LAN cards but have a built-in processor that determines if the laptop is being stolen. If it is being stolen the card emits a loud sound, prevents access to the operating system and secures the data.

http://www.computrace.com

http://www.ztrace.com/zTraceGold.asp

http://www.pcphonehome.com/product.html

http://www.caveo.com/products/anti-theft.htm

The Mousepad runs every two weeks. It's a service of Chebucto Community Net, a community-owned Internet provider. If you have a question about computing, email mousepad@chebucto.ns.ca. If we use your question in a column, we'll send you a free mousepad.

 

The Mousepad Index

 

Originally published 4 January 2004


 


Our community is online here!

 


A feature of the Halifax Herald
and