Feeds

How to trace stolen notebooks over the Net

Nice little earner

  • alert
  • submit to reddit

Mobile application security vulnerability report

Software which pinpoints the exact location of laptop thieves via the Net is due to land in Europe by the end of this year.

The software, developed by US company zTrace, activates a tracing technology when stolen laptops are connected to the Internet.

Computer owners sign up to zTrace, then notify the company if their machine is stolen (a police report must also be submitted).

The tracing technology inside the laptop, which zTrace says cannot be detected or uninstalled, is then activated the next time anyone tries to get the notebook online.

Within seconds, zTrace's call centre is alerted and the company is able to locate the machine through either the IP address or the dial-up connection being used.

zTrace has a batch of retired police officers at its disposal at its Massachusetts HQ, and their job it is to contact the police department nearest the stolen laptop. It says that in the past year the three laptops that have been reported stolen to the company, which claims to have around 25,000 users, have all been recovered.

According to zTrace, this included the laptop of a company employee, who claimed his machine had been stolen while he was at the airport. The tracing technology kicked in, only to find the laptop was located in the same employee's house. The laptop was recovered and the worker, previously unaware of the software inside the machine, was sacked.

zTech currently operates only in the US and Canada, but is in talks with German distributor Softline in regards to selling the products in Europe.

The company is also talking with distributors in South America and South Africa, while in the US the software can be bought direct or through resellers such as Athena Corp or Meyring Corp.

The software, which costs $49.95 per year, is available solely for Windows-based applications, but a verson for the Palm operating system is in the pipeline. ®

Related Link

zTrace site
Text message alerts planned to stop notebook theft
Second spy loses laptop

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.