Skip to content

frajmen/prey

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

60 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

##############################################
# Prey README
# For updates visit prey.bootlog.org
##############################################

Prey is a script for tracking your stolen laptop.
It is licenced by the GPLv3 which means you can do just
about anything with it. It runs in *NIX systems and Windows as well.

##############################################
1. How it works
##############################################

The script runs at a specified interval in your machine,
and checks for a specified URL in the web. If the URL exists
it means the computer/laptop has been stolen, and thus
goes through the information-gathering routine and sends
all that info through to a previously defined email address.
You can also not define a URL and in that case the program
sends the data every time it runs.

##############################################
2. Installation
##############################################

For Windows users: download, extract and execute PreyConfig.exe.
Fill in all the fields, tick the "Activar Prey" checkbox and then
click on "Activar".

If you ever want to uninstall Prey, just execute PreyConfig.exe again
and untick the box "Activar Prey". You should also delete the key
"HKLM\SOFTWARE\Prey" from Windows registry as well.

For Mac & Linux users, just download the package, unzip it and run the
install script:

	$ chmod +x install.sh
	$ ./install.sh

Note: You should use the full URL in Prey's setup, such as
http://prey.bootlog.org (not just prey.bootlog.org).

##############################################
3. Requisites for Linux
##############################################

Mac comes with everything needed to run Prey. However Linux users should make
sure they have the following installed: (note the installer does this automatically!)

	o wget
	o traceroute
	o scrot or imagemagick (for screenshot capture)
	o streamer (for webcam capture) --> in Fedora the xawtv package includes it
	o Perl libs IO::Socket::SSL and NET::SSLeay

##############################################
4. Usage
##############################################

The idea is that when your laptop gets stolen -- hopefully never, that is --
you should immediately create the URL you specified in Prey's
configuration with some text in it. Prey expects a status code 200 to run.

##############################################
5. Credits
##############################################

	o Tomás Pollak - http://bootlog.org
	o Julián Mejio - http://mehio.co.cc
	o Juan Carlos Mardones - http://juanmardones.com
	o Diego Torres - http://warorface.com

##############################################
6. Acknowledgements
##############################################

Prey works thanks to Michal Ludvig's excellent command-line SMTP client
and Axel Bauer's iSightCapture program for capturing pictures on the
Mac. And of course, a bunch of powerful open source utilities!

Command line SMTP client: http://www.logix.cz/michal/devel/smtp/index.xp?show_selected=1&msgid=31
iSightCapture: http://www.intergalactic.de/pages/iSight.html

--

About

Prey is a simple bash script for tracking stolen computers.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published