Prey11

Prey is a cross-platform (Android, Linux, iOS, Mac OS X, and Windows desktop) anti-theft tracking software that, when installed and activated on a supported device, makes it possible for the owner to remotely locate, lock, wipe and recover it, if it’s stolen or missing.

If Prey is news to you, read the introduction at How to integrate Prey into the security posture of your Linux PC, then create a free account at preyproject.com.

This rest of this tutorial will show how to install and manage it on Linux Mint 17.1.

There’s no binary package for Prey in the repository, so you’ll have to download a .deb package from the project’s download page here. Since you’ll be installing it on a Ubuntu-based distribution, download the one for Ubuntu. Save it to the Downloads folder.

Now, launch a shell terminal and change to the Downloads folder by typing cd Downloads. Before installing it, you’ll have to install some dependencies. How to install those and then install Prey is shown in this code block. Be sure to install the exact Prey package you downloaded:

# Install the dependencies

sudo apt-get install -y streamer scrot mpg123

# Install Prey

sudo apt-get install -y prey_1.3.6_amd64.deb

If installation completed successfully, a window similar to the one shown in Figure 1 should open. If you’ve not created an account yet, do so by clicking on the appropriate option. Otherwise select the option shown, then click Forward.

Prey anti-theft Linux
Figure 1: Prey setup window.

You will be prompted to log in. After a successful login, you should get the message shown in Figure 2.

Prey Linux Mint 17.1
Figure 2: Prey successfully installed on Linux Mint 17.1

This screenshot shows the Prey Web UI of my account before any device was registered.

Prey Web UI
Figure 3: Prey Web UI before a device is registered

And this one shows the same interface after a device was registered and is being tracked.

Prey Web UI anti-theft
Figure 4: Prey Web UI after a device is registered

The registered device just happens to be a desktop installation of Linux Mint 17.1 Cinnamon. Yes, desktop, not notebook. Desktop’s can be stolen too.

Prey Linux Mint 17.1
Figure 5: A tracked Linux Mint 17.1 computer on Prey Web UI.

Geolocation works with WiFi access, but the desktop did not have one, so I did not test that feature.

Figure 6: A tracked Linux Mint 17.1 computer on Prey Web UI.
Figure 6: A tracked Linux Mint 17.1 computer on Prey Web UI.

In the event of a loss or theft, you log into your account and take any number of actions, including sending a message that will be seen by the person using the computer.

Prey11
Figure 6: A tracked Linux Mint 17.1 compuer on Prey Web UI.

And that’s the benefit of installing an anti-theft application like Prey. But consider this: If your computer is stolen and you can send a message through Prey that can be seen by the thief, then you failed to do something very important – encrypt the disk. That’s far more important than an anti-theft application.

Related Post:  How to dual-boot Linux Mint 10 and Windows 7

But nothing stops you from encrypting your disk, then installing Prey, because, like I wrote in How to integrate Prey into the security posture of your Linux PC:

…in the unlikely event the disk is decrypted without the configured passphrase, Prey will be able to call home and hopefully, help you recover the unit. If you go this route, remember to also have a backup system in place. You can’t lose your data by backing it up.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

5 Responses

  1. I installed Fedora17 (Gnome edition) and used Easylife to install flash and true type fonts. Very useful program. It works really well, so that after few minutes you can easily have a very friendly installation of Fedora …

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.