Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Bash client for the Prey anti-theft software (Mac, Windows, Linux). The original.
Perl Shell Python

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
lang
.gitignore
LICENSE
README
TODO
config
install.sh
isightcapture
prey.sh
sendEmail

README

##############################################
# Prey README
# For updates visit prey.bootlog.org
##############################################

Prey is a small script for tracking your stolen laptop.
It is licenced by the GPLv3 which means you can do just
about anything with it. It runs in *NIX systems and Windows as well.

##############################################
1. How it works
##############################################

The script runs at a specified interval in your machine,
and checks for a specified URL in the web. If the URL exists
it means the computer/laptop has been stolen, and thus
goes through the information-gathering routine and sends
all that info through to a previously defined email address.
You can also not define a URL and in that case the program
sends the data every time it runs.

##############################################
2. Installation
##############################################

For Windows users, execute PreyConfig.exe, fill in all the fields, tick the
"Activar Prey" checkbox and then click on "Activar".

For Mac & Linux users, just download the package, unzip it and run the
install script:

	$ chmod +x install.sh
	$ ./install.sh

##############################################
3. Requisites for Linux
##############################################

Mac comes with everything needed to run Prey. However Linux users should make
sure they have the following installed: (note the installer does this automatically!)

	o wget
	o traceroute
	o scrot or imagemagick (for screenshot capture)
	o streamer (for webcam capture) --> in Fedora the xawtv package includes it
	o Perl libs IO::Socket::SSL and NET::SSLeay

##############################################
4. Usage
##############################################

The idea is that when your laptop gets stolen -- hopefully never, that is --
you should immediately create the URL you specified in Prey's
configuration with some text in it. Prey expects a status code 200 to run.

##############################################
5. Credits
##############################################

	o Tomás Pollak (bootlog.org)
	o Julián Mejio (julianmejia.co.cc)
	o Juan Carlos Mardones (juanmardones.com)

##############################################
6. Acknowledgements
##############################################

Prey works thanks to Michal Ludvig's excellent command-line SMTP client
and Axel Bauer's iSightCapture program for capturing pictures on the
Mac. And of course, a bunch of powerful open source utilities!

Command line SMTP client: http://www.logix.cz/michal/devel/smtp/index.xp?show_selected=1&msgid=31
iSightCapture: http://www.intergalactic.de/pages/iSight.html

--
Something went wrong with that request. Please try again.