forked from prey/prey-bash-client
-
Notifications
You must be signed in to change notification settings - Fork 2
/
README
107 lines (81 loc) · 4.15 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
##############################################
# Prey - Track down your stolen laptop
# http://preyproject.com
# A project by Tomas Pollak
##############################################
Prey is a lightweight application for tracking your stolen laptop.
It runs in Windows and *NIX systems as well (Mac, Linux). It is licensed
by the GPLv3 which means you can do just about anything with it.
##############################################
1. How it works
##############################################
The script runs at a specified interval in your machine, and checks
for a specified URL in the web. If the URL exists it means the
computer/laptop has been stolen, and thus goes through the information
gathering routine and sends all that info through to a previously defined
email address. You can also not define a URL and in that case the program
will send the data every time it runs.
You can also use the Prey web control panel (control.preyproject.com)
to manage the computer state, as well as toggling different modules for
triggering certain behaviours remotely. In this case you don't have to
worry about the URL thing since it takes care of that for you. You only
need to register and insert the API and Device keys in the Prey
configuration.
##############################################
2. Installation
##############################################
-- Windows, Mac & Ubuntu Linux users
Download the package/installer and run it.
Once all files are in place you’ll need to configure Prey, where you’ll
be able to choose between both operation modes. In case you want to use
Prey along with the control panel (recommended), you’ll have to register
and add your device to obtain your API and Device keys. Prey needs them
both so make sure you add them correctly.
If you want to use Prey in an independent way, you’ll have to set up your
mail server (SMTP) settings. Sometimes email sending doesn’t work at once,
so please try using a different target mailbox just in case — in fact
that’s how the problem generally gets fixed.
-- Linux users (not Debian/Ubuntu)
Once you’ve downloaded the package, unzip it and execute the installation
script. It will prompt for all the necesary fields, and even sign up in
Prey for you if case you haven’t registered yet:
$ chmod +x install.sh
$ ./install.sh
Note: You should use the full URL in Prey's setup, such as
http://preyproject.com (not just preyproject.com).
##############################################
3. Requisites for Linux
##############################################
Mac comes with everything needed to run Prey. However Linux users should make
sure they have the following installed: (note the installer does this
automatically!)
o curl / wget
o scrot or imagemagick (for screenshot capture)
o streamer (for webcam capture) --> in Fedora the xawtv package includes it
o Perl libs IO::Socket::SSL and NET::SSLeay
##############################################
4. Usage
##############################################
The idea is that when your laptop gets stolen -- hopefully never, that is --
you should immediately activate Prey, by declaring the device as missing
in the control panel, or by creating the URL you specified in Prey's
configuration. This depends on the operation mode (post method) you set up
when installing Prey.
Prey expects a status code 200 to run. If it receives a status 404 it will
simply shut down and wait for the next interval tu check the URL.
##############################################
5. Acknowledgements
##############################################
Prey is a collaborative project which has kept alive thanks to the help of
diverse contributors, specially these amazing people:
o Diego Torres - http://warorface.com
o Juan Carlos Mardones - http://juanmardones.com
o Newstart/MKHCB
o Rodrigo Linfati - http://linfati.cl
o Michael Smith
Prey also works thanks to Brandon Zehm's excellent command-line SMTP client
and Axel Bauer's iSightCapture program for capturing pictures on the
Mac. And of course, a bunch of other powerful open source utilities.
Command line SMTP client: http://caspian.dotconf.net/menu/Software/SendEmail
iSightCapture: http://www.intergalactic.de/pages/iSight.html
--