How to Remotely Track Any Lost Smartphone, Tablet, or PC



Similar documents
How to wipe personal data and from a lost or stolen mobile device

Backing up your digital image collection provides it with essential protection.

ios How to Back Up from icloud

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

The End is Near. Options for File Management and Storage

Students Mobile Messaging Registration & Configuration

Office of Information Technology Connecting to Microsoft Exchange User Guide

Carroll Hospital Center

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

Wireless Presentation Gateway. User Guide

Discovering Computers

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Remote Desktop Connection user guide for Android.

Product Guide Nintex. All rights reserved. Errors and omissions excepted.

PARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1

Chromebook Reference Document

Mobile Communicator for Mobile Devices

Mobile Operating Systems & Security

FAQ for ipad (ios 5.x)

Connecting Your Device to a Wireless Network

How to get Office 365 through your Student

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform

Install and End User Reference Guide for Direct Access to Citrix Applications

Do you know what makes NetSupport Manager so unique?

Smart Ideas for Smartphone Security

Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us...

Installing Logos SSL Certificates on Mobile Devices

RDM+ Remote Desktop for Android. Getting Started Guide

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

WebEx what is it and how can I use it?

1:1 ipad Program Device Setup Guide

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

IT user guide. Campus WiFi eduroam. September Information Services

Why you need. McAfee. Multi Acess PARTNER SERVICES

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

Flexible Identity Federation

Google 2 factor authentication User Guide

Sophos Mobile Control user help. Product version: 6.1

RingCentral Meetings QuickStart Guide

How to Use? SKALICLOUD DEMO

NEC CLOUD STORAGE. Demo Guide

BT Lancashire Services

Q. I use a MAC How do I change my password so I can send and receive my ?

Remote Access End User Reference Guide for SHC Portal Access

Skype for Business for Android

Getting Started with Zoom

Dacorum U3A Computer Support Group. Friday 27th March 2015

Kaspersky Security for Mobile

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

Managing Mobility. 10 top tips for Enterprise Mobility Management

Novell Filr. Mobile Client

Getting Started. with VitalSource Bookshelf. How to Access your ebooks Using VitalSource Bookshelf

BACKUP AND RECOVERY File History + Push Button Reset + Advanced Recovery Tools + System Image Backup

How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0)

Reboot, reset, erase, power off, restore - what's the difference?

Quick Start Guide. Version R9. English

Mobile Banking FAQ for Business

Mobile Iron User Guide

Getting Started with VMware Horizon View (Remote Desktop Access)

OUTLOOK WEB ACCESS. User Guide

Apple Deployment Programs Apple ID for Students: Parent Guide

Backup Basics Presentation. Presented by Tom Crittenden RASCALs 2015

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

IT Quick Reference Guides How to Find Your MAC Address

Mobility with Eye-Fi Scanning Guide

RingCentral Meetings QuickStart

Florida Department of Education TECHNOLOGY GUIDELINES

Cloud Print Edition Quick Start Guide

PLEASE READ THIS FIRST

Mail in Outlook Web App

Simple Backup Strategy for Home Computers

Information Technology Services. Your mailbox is moving to the cloud. Here is what to expect.

User s manual for Android Application

Using your ios device, open the App Store, Search for, download and install the WeMo App.

Mobile App Frequently Asked Questions

How to Remotely Access the C&CDHB Network from a Personal Device

MDM User Guide June 2012

Sophos Mobile Control User guide for Apple ios. Product version: 4

MelbourneOnline Hosted Exchange Setup

GLOBALMEET FOR DESKTOP GLOBALMEET FOR DESKTOP USER GUIDE

Quick Installation Guide

Getting Started. Version 3.1 Last updated 2014/3/10. Orbweb ME: Getting Started

User Guide FOR TOSHIBA STORAGE PLACE

Using GIGABYTE Notebook for the First Time

IBM Endpoint Manager for Mobile Devices

Case Study: Smart Phone Deleted Data Recovery

Don t Miss Your Chance to Become an Android POS Trusted Advisor

Welcome to XO WorkTime

Information Systems. Connecting Smartphones to NTU s System

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

MOBILE APPS. QA Testing for mobile applications

Outlook Web App (OWA) Quick Start Guide

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices

Transcription:

How to Remotely Track Any Lost Smartphone, Tablet, or PC Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don t wait until you ve l hardware to think about this these features need to be enabled ahead of time. This requires that the device is powered on and has a connection to the Internet. This is easy if you re tracking a a data connection, but harder if you re tracking a laptop that may be offline or powered off. iphones, ipads, and Macs Apple s Find My services are integrated into iphones, ipads, and even their Mac computers. Enable it in your de icloud options and you can track down your device from the icloud website. You can also mark it as lost, lock it, remotely. Whatever you think of Apple, their solution is the best. When you put an iphone or ipad into lost mode, icloud tracking its movements over time so you can see a complete history. This also survives a factory reset, so you ca remotely manage an iphone or ipad even if the thief resets it. Apple won t activate iphones and ipads if they re m lost.

You can also remotely lock a Mac the Mac will immediately shut down and the thief will have to enter a firmw password to boot it. They won t be able to boot any operating system without the password you set remotely. Y remotely wipe any ios device or Mac if you have especially sensitive data stored on them. Android Phones and Tablets Android s built-in Android Device Manager allows you to track, lock, and wipe lost Android phones and tablets. Y enable this feature on each Android device you own by launching the Google Settings app, tapping Android Dev Manager, and activating it. After it s enabled, you can visit the Google Play website, click the gear icon, and select Android Device Manager the location of the device on a map. Unlike Apple s solution, Android Device Manager will be wiped after a factor thief can reset your device and you won t be able to track it down. Android Device Manager also won t monitor a history of a lost device s movements it only fetches the location of the device when you sign in. It discards any data when you sign out. Android also allows for third-party tracking solutions, some of which are more powerful. For example, Avast! s A app can be installed onto the system partition if you have root access, so it will survive a factory reset. However, new ROM to the device or re-flashing the original ROM will erase the tracking software.

Android Lost allows you to start tracking a device remotely, even if you never set up tracking software ahead of tracking solutions offer more powerful features like the ability to take photos with the phone s camera or listen phone s surroundings with its microphone. Windows Phones Microsoft s Windows Phone includes a tracking solution named Find My Phone. Tap Settings > Find My Phone on Windows Phone to configure it. You can then visit the Windows Phone website and click Find My Phone in the m top-right corner of the screen to remotely track, lock, and erase it. Like Google s Android Device Manager, the Find My Phone feature can be disabled if someone with the phone p factory reset.

Windows PCs and Tablets Microsoft doesn t offer an integrated way to track lost Windows PCs and tablets. You ll need a third-party compu solution such as Prey for this. Prey offers a free plan, so you won t have to pay anything if you just want ba This software must be installed and configured ahead of time. If your device is lost, you can sign into the service to remotely track and lock it. Such services just aren t as powerful as what Apple offers there s no way to remotely lock the device with a firmware password that will prevent it from turning on again, for example. Simply reinstalling Windows or booti operating system on the PC or tablet will be enough to eliminate the tracking software. You can t use this trick to track a Windows RT device like the Surface RT or Surface 2, as Windows RT doesn t allo install third-party desktop software. You may be able to install a device-tracking app like Windows Location Trac the Windows Store. We didn t test how well this particular application works, but it won t be able to remotely loc your device due to the limitations placed on Windows Store apps. These apps are toys that can offer GPS trackin

Linux PCs As with Windows PCs, you ll have to use a third-party software program to track a lost PC running Linux. Prey als Linux, so you can use the same software. The same limitations apply it s just a software program running on y computer, so you can t remotely set a BIOS password to lock the entire PC down. If an attacker boots or installs operating system, you won t be able to track the Linux PC down. Chromebooks Chrome OS doesn t provide an integrated lost-device-tracking solution, either. Some software packages promise and locate lost Chromebooks, but they re generally commercial products marketed to large organizations. For e GoGuardian promises to aid you in tracking and recovering stolen Chromebooks, but it s targeted at schools roll large numbers of Chromebooks.

Google and Microsoft have promised they ll be adding iphone-like kill switches in future versions of Android an Phone to deter phone theft. Microsoft is also working on bringing Windows Phone and Windows 8 together, so p next version of Windows will include a built-in tracking feature. JOIN THE DISCUSSION (2 REPLIES) Chris Hoffman is a technology writer and all-around computer geek. He's as at home using the Linux terminal as he is digging into the Windows registry. Connect with him on Google+. Published 07/14/14