Laptop theft is a significant threat to users where it is not just the lost of hardware, software, but also essential data that man contain important and confidential data.
Passwords are no longer adequate to protect laptops, where there are a number of tools available, both commercial and open source that enable a user to circumvent passwords for Windows, Mac OS X, and Linux.
Get your laptop and yourself protected with Phoenix Anti-theft software. When a laptop is stolen, it is not just the loss of the machine only but also the sensitive and valuable information stored in it!
How it works?
The stealth program can pinpoint the location of the thief and collects vital details to assist in the recovery of a stolen laptop!
When connected to an internet network, an authentication dialog will request the user to enter a password. If the user fails to enter the correct password within the pre-defined timing, hidden alerts (email and twitter message) and location will be sent out immediately to alert the owner.
Location of thief
With the use of location based service, the geolocation of the stolen laptop will be packed into a web address and be sent out.
Location Based Service
Note: Wifi and landed positioning may not work 100% in all areas due to limited coverage from the service providers.
Send out silently in the background with no indication that the software is running when connected to the internet.
Repetitive alerts can be set to send Alert Message every minute on the background.
Capture addresses when stolen computer is on the internet (wired or wirelessly) to identify and pinpoint the location via the computer network utilizing the Internet Protocol standard (IP).
With Twitter service, owner can also receives the alerts via IM, email, from the web and even as SMS Alert Text to your phone. Twitter.com
Total Privacy (No 3rd party monitoring)
Owners have full control of their privacy as Phoenix Anti-theft do not involve any 3rd party monitoring including BAK2u itself, but only directly between the owners to their machines.
Hidden Software Icon
Do not appear in home screen nor program screen.
Machine Serial Number
Serial number of the computer to verify against the theft when recovered.
MAC Hardware Address
A quasi-unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter.
Phoenix will consolidate this information and be sent out together to the pre-defined email address.
Password protection to ensure no unauthorized access to the software.
Owner can personalize the alert message to be sent to the pre-defined numbers to notify others of the theft.
Auto Start Up
Software autoruns every time the computer is powered up.
Low Memory Resource
Phoenix will automatically shut down once the correct password is entered.
Works on all Windows OS powered laptops & desktops.
Windows XP, Vista
US$29.90 (01 license)
US$59.90 (03 licenses)
One time purchase only (No subscription or annual fee)
FAQ: I need to log into the Window/Mac Operating System first before I can access the laptop. Otherwise the anti-theft software will not be triggered without internet connection. How do I work around it?
If you are using Windows/Mac authentication for login, you can setup a dummy account (with administrative privileges). Do not put any password in that account.
Install Phoenix and configure the settings in that account. This will allow the thief to login to the system without any windows based authentication. Once the thief is logged into the dummy account, Phoenix will be triggered.