New Articles
Windows 11 users have discovered a funny bug that benefits older computers....
It's easy to turn off the transmission — we tell you how to do it....
Such photos have been taken by models and social media users for a long time,...
A famous musician? A schoolteacher? Mom? Tell us about the people you looked up...
Thanks to the instructions of Artyom Kozoriz, you can cope no worse than a...
5 interesting exercises that will help you develop flexibility....
From "Starship Troopers" and "The Matrix" to...
The return of Garfield and Mufasa, the new Transformers and the Lord of the...
Trickben.com » Technologies » Undercover — bad news for a thief

Undercover — bad news for a thief

05 May 2023, 10:47, parser
0 comments    1 Show
Laptops often become the object of theft, which is understandable — they are compact, lightweight and at the same time valuable. Some models can cost several thousand dollars. And if theft cannot always be prevented, then it is quite possible to return the stolen thing. In the case of Apple laptops, the Undercover program, which John Gruber recently mentioned in his blog, can help.

Undercover is a development of the Belgian company Orbicule. The program, in case your laptop is stolen, will begin to help in every possible way in its search. When the thief or the person who bought the stolen mac connects to the Network, Undercover will start transmitting data. These can be IP addresses (already good), which will allow you to reach the provider and then directly to his client. Another interesting feature is sending screenshots to the real owner. Such screenshots can be useful if they flash email addresses or a chat conversation. Finally, the third intriguing possibility is the use of the built—in iSight camera. So it will be possible to see the thief remotely.

If nothing has helped, Undercover will try to make the Mac simply unusable — the program will gradually darken the screen to such a state that it will be impossible to work.

What is the principle of Undercover? After purchasing and installing the program, the user receives a special identifier. When connected to the Network, Undercover will start checking whether the laptop is in the stolen list. As soon as the «mac» is stolen, you report the issued ID to the developers and they will start tracking. If the search is unsuccessful, they promise to return the money spent on the purchase of the program.

Read also:
22 May 2023, 13:19    0    0
How does the morning usually begin? It usually starts with an alarm clock ringing. Then another...
Comments
reload, if the code cannot be seen