IT departments use techniques like encryption and remote wiping to protect data stored on laptops. While these methods may prevent the data from being compromised, they don't help locate the actual machine. A free program called Prey might. During this episode of TR Dojo, I'll show you what Prey can and can't do.
For those who prefer text to video, you can click the Transcript link that appears below the video player window or read Jack Wallen's article, "How do I use Prey to help recover a stolen laptop?" on which this episode is based.
You can also sign up to receive the latest TR Dojo lessons through one or more of the following methods:
Bill Detwiler has nothing to disclose. He doesn't hold investments in the technology companies he covers.
Bill Detwiler is Managing Editor of TechRepublic and Tech Pro Research and the host of Cracking Open, CNET and TechRepublic's popular online show. Prior to joining TechRepublic in 2000, Bill was an IT manager, database administrator, and desktop support specialist in the social research and energy industries. He has bachelor's and master's degrees from the University of Louisville, where he has also lectured on computer crime and crime prevention.