Solved

A friend of mine's laptop stolen. Any ideas how to backtrace it?

Posted on 2011-03-23
9
534 Views
Last Modified: 2013-12-07
Hi there;

A friend of mine's laptop stolen. Any ideas how to backtrace it?

The OS is Win 7.

Kind regards.
0
Comment
Question by:jazzIIIlove
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +3
9 Comments
 
LVL 8

Accepted Solution

by:
jimmyray7 earned 72 total points
ID: 35202748
Unless he had some monitoring/tracking software installed *before* the laptop was stolen, the odds of tracing it are slim.  Even then, a sophisticated criminal could have wiped the hard drive.

Best bet is to file a police report with the serial number and hope it turns up at a pawn shop.
0
 
LVL 13

Assisted Solution

by:Rick
Rick earned 72 total points
ID: 35202754
Can you remote into it and access the webcam?
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
ID: 35202764
If you didn't have a trace program installed or a software to remote into it before it was stolen then no its most likely gone.
0
Plug and play, no additional software required!

The ATEN UE3310 USB3.1 Gen1 Extender Cable allows users to extend the distance between the computer and USB devices up to 10 m (33 ft). The UE3310 is a high-quality, cost-effective solution for professional environments such as hospitals, factories and business facilities.

 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
ID: 35202774
If the computer had some tracing software "calling home" installed before it got stolen, there might be a slim chance and even that assumes there was no passwords required to use the computer.

If there was a password required to login, then the harddisk will probably be formatted and a new instance of OS and software installed so even any pre-installed tracing software won't help.

0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 35202795
what about mac address? How unique is that?

Kind regards.
0
 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
ID: 35202816
Theoretically MAC-address is unique to each computer but it is not visible beyond the local network where the computer is connected to so unless the thief connects the stolen computer to the same LAN where you are, you won't be able to identify it with that.



0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 35202877
what kind of surveillance tools should be installed to prevent/find the computer being stolen? I mean ok, wiping OS finishes everything, but what should be installed to be proactive?

Kind regards
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
ID: 35202899
0
 
LVL 27

Assisted Solution

by:David-Howard
David-Howard earned 72 total points
ID: 35203071
Lojack (as mentioned) is good. However, if you want to protect any data that resides on your system once it is stolen, lost, etc. I suggest this.
http://www.mcafee.com/us/products/data-protection/endpoint-encryption.aspx
It used to be known as SafeBoot. And I can tell you from experience (working in a financial institution) that you can't be it for data encryption.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes a user will call me frantically, explaining that something has gone wrong and they have tried everything (read - they have messed it up more and now need someone to clean up) and it still does no good, can I help them?!  Usually the standa…
Whether you believe the “gig economy,” as it has been dubbed, is the next big economic paradigm shift (https://www.theguardian.com/commentisfree/2015/jul/26/will-we-get-by-gig-economy) or an overstated trend (http://www.wsj.com/articles/proof-of-a-g…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question