Looks like Lock It Tight it's Android / Windows only, so not really that useful for a group of people mostly focussed on i OS and Mac. We have 2 shell scripts that we can install/enable when a computer is lost/stolen.Once installed the script will install it's own Launch D instance so it then runs independently.Jamf Nation, hosted by Jamf, is the largest Apple IT management community in the world.
In this case, it is highly likely that photos taken by your camera are too heavy to be uploaded by the device’s current internet connection, and will start arriving when the signal is stronger.
As a safety measure, we suggest keeping your camera’s resolution lower than normal when you travel, so in case you lose your phone or tablet (We really hope you never do! If this happens randomly and the camera isn’t broken, it is possible that the executable file that triggers the webcam isn’t working and needs a reboot.
I have recovered several stolen computers as well as documented when computers (although not in fact stolen) are inappropriately removed from the campus to which they are assigned.
The software is available from works with OS X through Mavericks.
We kept forwarding information of the ip-address to the Police but they were having a hard time tracking it down.
With our casper setup we don't have a Casper Distribution Point available to us externally. So we ran this command to download and install prey using a free account.We've tried adding this on our script and it never seemed to work.In testing I was able to get it to display the serial number of the laptop, but not with the date, it only allowed me to do one or the other, seemed like it was being shortened. Is there a way to capture all the screens attached using the screencapture tool?We also tried to make it name a folder with the $serial Number variable and that do anything at all. I looked at the help file but wasn't really sure.We have a lot of users that have 3-4 screens connected.This is why we created a trap push notification claiming to be about billing information that the thief will tap, allowing the device to take a photo of him.