Hacker News
- Do You Use An Anti-Theft App On Your Apple Device ? https://preyproject.com/ 5 comments macapps
- Is there a self hosted alternative to Prey Project? https://preyproject.com 6 comments selfhosted
- Unable to log in to newly created user accounts [Win10] http://preyproject.com/ 7 comments techsupport
- Outbound DNS queries for google.com to 32.1.68.184 https://preyproject.com/ 4 comments techsupport
- Create a honeypot account to track your stolen computer http://preyproject.com/ 6 comments apple
- I need some help tracking down a PC. X_X http://www.preyproject.com 4 comments techsupport
- Opinions on disk encryption vs retrievability http://preyproject.com/ 14 comments privacy
- Every laptop, Smart phone owner needs Pray. A free opensource program that lets you take photos of the thieves when your laptop is stolen, or transmits the GPS of your phone to you when it is stolen. http://preyproject.com/ 14 comments technology
- OpenSource app to track your stolen laptop or mobile (Linux, Ubuntu) http://preyproject.com/ 4 comments linux
- Someone waltzed into my apartment between 2 AM and 8 AM and stole my laptop. http://preyproject.com/ 15 comments reddit.com
- Memory stick automatically opens web page on insertion? http://preyproject.com/ 6 comments techsupport
- Track and find your laptop if it ever gets stolen for free! http://preyproject.com/ 14 comments software
Linking pages
- Protecting a Laptop from Simple and Sophisticated Attacks - Grepular https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks 270 comments
- How I Went From 100 To 0 Things (Or How I Was Robbed of All My Stuff) http://levels.io/100-to-0-things/ 170 comments
- How Tracking Down My Stolen Computer Triggered a Drug Bust - Make: http://blog.makezine.com/2012/08/31/how-tracking-down-my-stolen-computer-triggered-a-drug-bust/ 62 comments
- GitHub - dkhamsing/open-source-ios-apps: :iphone: Collaborative List of Open-Source iOS Apps https://github.com/dkhamsing/open-source-ios-apps 31 comments
- How to Secure Your Mac From Potential Theft - Jeff Reifman http://jeffreifman.com/2014/02/24/how-to-secure-your-mac-from-potential-theft/ 11 comments
- What Would Happen If Your Digital Life Was Destroyed? | TechCrunch http://techcrunch.com/2012/08/07/what-would-happen-if-your-digital-life-was-destroyed/ 1 comment
- 700+ Free Stuff on The Internet. Whatwhatgoose — major list of free… | by whatwhatgoose | Free Stuff | Medium https://medium.com/free-stuff/500-free-things-on-the-internet-to-start-your-new-year-11ae72266b66#.a91hppc51 0 comments
- Ten Things To Do to Secure an Important Person's Computer (or even Ashton's or a Kardashian's) - Scott Hanselman's Blog http://www.hanselman.com/blog/TenThingsToDoToSecureAnImportantPersonsComputerOrEvenAshtonsOrAKardashians.aspx 0 comments
- Lost-Phone Apps Protect Your Device, Not Your Privacy | Mashable http://mashable.com/2013/01/08/lost-phone-apps-privacy/ 0 comments
- The Undead laptop.. The bond of a laptop and its owner and… | by Steven Fourie | Medium https://medium.com/p/b01bf30c1422 0 comments
- Useful Web Services, Tools and Resources For Web Designers — Smashing Magazine http://www.smashingmagazine.com/2011/02/08/useful-web-services-tools-and-resources-for-web-designers/ 0 comments
- GitHub - prey/gdpr_rails: Rails Engine for the GDPR compliance https://github.com/prey/gdpr_rails 0 comments
- What You Can Learn From Wired Reporter's Epic Hack | Mashable http://mashable.com/2012/08/08/honan-hacked-details/ 0 comments
- Security considerations when developing web applications | by Rumen Manev | Code Runners Blog | Medium https://medium.com/code-runners-blog/security-considerations-when-developing-web-applications-858ea5cbacf0 0 comments
- GitHub - quantopian/PenguinDome: Simple Linux Mobile Device Management https://github.com/quantopian/PenguinDome 0 comments
Would you like to stay up to date with Unix? Checkout Unix
Weekly.
Related searches:
Search whole site: site:preyproject.com
Search title: Prey: Laptop Tracking & Data security. Find & Protect lost devices.
See how to search.