Home » Windows OS » Anti-theft

Phoenix Anti-theft
Laptop theft is a significant threat to users where it is not just the lost of hardware, software, but also essential data that man contain important and confidential data.

Passwords are no longer adequate to protect laptops, where there are a number of tools available, both commercial and open source that enable a user to circumvent passwords for Windows, Mac OS X, and Linux.

Get your laptop and yourself protected with Phoenix Anti-theft software. When a laptop is stolen, it is not just the loss of the machine only but also the sensitive and valuable information stored in it!

How it works?
The stealth program can pinpoint the location of the thief and collects vital details to assist in the recovery of a stolen laptop!

When connected to an internet network, an authentication dialog will request the user to enter a password. If the user fails to enter the correct password within the pre-defined timing, hidden alerts (email and twitter message) and location will be sent out immediately to alert the owner.

Location of thief
With the use of location based service, the geolocation of the stolen laptop will be packed into a web address and be sent out.

Location Based Service

Note: Wifi and landed positioning may not work 100% in all areas due to limited coverage from the service providers.

Alert Message
Send out silently in the background with no indication that the software is running when connected to the internet.

Repetitive alerts can be set to send Alert Message every minute on the background.

IP Addresses
Capture addresses when stolen computer is on the internet (wired or wirelessly) to identify and pinpoint the location via the computer network utilizing the Internet Protocol standard (IP).

Twitter Service
With Twitter service, owner can also receives the alerts via IM, email, from the web and even as SMS Alert Text to your phone. Twitter.com

Total Privacy (No 3rd party monitoring)
Owners have full control of their privacy as Phoenix Anti-theft do not involve any 3rd party monitoring including BAK2u itself, but only directly between the owners to their machines.

Hidden Software Icon
Do not appear in home screen nor program screen.

Machine Serial Number
Serial number of the computer to verify against the theft when recovered.

MAC Hardware Address
A quasi-unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter.

Phoenix will consolidate this information and be sent out together to the pre-defined email address.

Tamper Proof
Password protection to ensure no unauthorized access to the software.

Customizable Message
Owner can personalize the alert message to be sent to the pre-defined numbers to notify others of the theft.

Auto Start Up
Software autoruns every time the computer is powered up.

Low Memory Resource
Phoenix will automatically shut down once the correct password is entered.


Works on all Windows OS powered laptops & desktops.

Trial Copy

Windows XP, Vista

Trial Copy

Windows 7

US$29.90 (01 license)

US$59.90 (03 licenses)
One time purchase only (No subscription or annual fee)

Screen shots
Phoenix Anti-theftPhoenix Anti-theft

Anti-theft software for Windows Brothersoft.com Alert Message to your mobile phone!

FAQ: I need to log into the Window/Mac Operating System first before I can access the laptop. Otherwise the anti-theft software will not be triggered without internet connection. How do I work around it?

If you are using Windows/Mac authentication for login, you can setup a dummy account (with administrative privileges). Do not put any password in that account.

Install Phoenix and configure the settings in that account. This will allow the thief to login to the system without any windows based authentication. Once the thief is logged into the dummy account, Phoenix will be triggered.

BAK2u software are patent-pending and copyrighted to BAK2u Pte Ltd
"BAK2u" and "PhoneBAK" are trademarks of BAK2u Pte Ltd. "Windows" is a registered trademark of Microsoft Corporation in the United States and other countries. "Symbian" and "Symbian OS" based trademarks are brands of Symbian Software Ltd. "Nokia" is a registered trademark of Nokia in the United States and other countries. "Sony Ericsson" is a registered trademark of Sony Ericsson Mobile Communications AB in the United States and other countries. "Twitter" is a registered trademark of Twitter, Inc. in the United States and other countries. Mac, iSight and the Mac logo are trademarks of Apple, Inc., registered in the U.S. and other countries. RIM and Research In Motion are registered trademarks of Research In Motion Limited.

All product titles, publisher names, trademarks, artwork and associated imagery are trademarks, registered trademarks and/or copyright material of the respective owners.