The various equipment and electronic devices have connectivity features that allow them to stay connected to the Internet, either through Wi-Fi or over the mobile network. In addition to geolocation service, users have an ideal combination that lets them know the location of their personal computers, tablets and smartphones.
For the location of a team to theft or misplacement is cash requires configuring a monitoring software. The main platforms of mobile phones and tablets offers this service free of charge, and serves both to identify both the geolocation and the remote deletion of personal data from the device. It also tends to capture a picture using the camera used for video conferencing, an option used by Mike Fabrikant, a user who denounced social networks to a certain Paul for stealing your Macbook (and created a site to track it, so managed to recover the computer).
In the end, the defendant had purchased the team in good faith, and research continued on the seller’s side.
Apple has for its entire line equipment the Find My iPhone feature, available for the entire line of iOS mobile devices like the iPhone, iPad and iPod touch in addition to also cover Mac computers. No cost, the application requires an account Apple ID to register equipment and, thus, enable remote monitoring.
Windows Phone users can activate the location and remote wipe their mobile phones from the site www.windowsphone.com/find while those owners of a smartphone with Google’s mobile operating system Android have Device Manager service, which can be configured in www.google.com/android/devicemanager. For tool called BlackBerry Protect.
Prey, the option mutliplataforma
To ensure effective monitoring of a Windows, Mac or Prey Linux is an open source platform that also supports tracking of mobile devices with Apple iOS and Google Android. Requires install the corresponding program for each operating system and configure the service with a username and password.
Once completed these steps, Prey monitoring can be done from the web site and provides a series of powerful tools to lock, locate or remotely wipe data from a lost or stolen computer. The service is free of charge up to three computers, and if higher performance is required, there are plans from $ 5 per month.
One way or another, the dilemma is to perform a remote wipe or maintain active team up that police authorities to initiate the procedure to arrest the suspect and recover lost personal items.
Of course, it is always recommended that you configure the preform services backup to protect the images, documents and other important files. Some of the strategies that can be adopted for an automatic backup to external hard drives or platforms like Dropbox, Google Drive or OneDrive of Microsoft are detailed in www.lanacion.com.ar/1568031.
The assistance of the Police
As background, journalist Maria O’Donnell managed to recover their stolen thanks to the geolocation feature of your mobile phone, objects while a tablet allowed a family San Antonio de Padua could track down criminals with the assistance of the police.
“Time is vital for such cases, and for this specialized staff are employed in tracking devices based on the various tracking software. Once the complaint filed with the participation of the respective specialized units, the agents involved with the findings required by the case, such as the area of tracking and identification of the home, “Gabriel said at the time Rojas, head of Telematics Research Special Area Metropolitan Police said in a note that detailed the steps to the theft of a tablet, a phone or other electronic equipment. .
No comments:
Post a Comment