Solved

A friend of mine's laptop stolen. Any ideas how to backtrace it?

Posted on 2011-03-23
9
499 Views
Last Modified: 2013-12-07
Hi there;

A friend of mine's laptop stolen. Any ideas how to backtrace it?

The OS is Win 7.

Kind regards.
0
Comment
Question by:jazzIIIlove
  • 2
  • 2
  • 2
  • +3
9 Comments
 
LVL 8

Accepted Solution

by:
jimmyray7 earned 72 total points
Comment Utility
Unless he had some monitoring/tracking software installed *before* the laptop was stolen, the odds of tracing it are slim.  Even then, a sophisticated criminal could have wiped the hard drive.

Best bet is to file a police report with the serial number and hope it turns up at a pawn shop.
0
 
LVL 13

Assisted Solution

by:Rick
Rick earned 72 total points
Comment Utility
Can you remote into it and access the webcam?
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
Comment Utility
If you didn't have a trace program installed or a software to remote into it before it was stolen then no its most likely gone.
0
 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
Comment Utility
If the computer had some tracing software "calling home" installed before it got stolen, there might be a slim chance and even that assumes there was no passwords required to use the computer.

If there was a password required to login, then the harddisk will probably be formatted and a new instance of OS and software installed so even any pre-installed tracing software won't help.

0
Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

 
LVL 12

Author Comment

by:jazzIIIlove
Comment Utility
what about mac address? How unique is that?

Kind regards.
0
 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
Comment Utility
Theoretically MAC-address is unique to each computer but it is not visible beyond the local network where the computer is connected to so unless the thief connects the stolen computer to the same LAN where you are, you won't be able to identify it with that.



0
 
LVL 12

Author Comment

by:jazzIIIlove
Comment Utility
what kind of surveillance tools should be installed to prevent/find the computer being stolen? I mean ok, wiping OS finishes everything, but what should be installed to be proactive?

Kind regards
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
Comment Utility
0
 
LVL 27

Assisted Solution

by:David-Howard
David-Howard earned 72 total points
Comment Utility
Lojack (as mentioned) is good. However, if you want to protect any data that resides on your system once it is stolen, lost, etc. I suggest this.
http://www.mcafee.com/us/products/data-protection/endpoint-encryption.aspx
It used to be known as SafeBoot. And I can tell you from experience (working in a financial institution) that you can't be it for data encryption.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

If you want to move up through the ranks in your technology career, talent and hard work are the bare necessities. But they aren’t enough to make you stand out. Expanding your skills, actively promoting your accomplishments and using promotion st…
Whether you believe the “gig economy,” as it has been dubbed, is the next big economic paradigm shift (https://www.theguardian.com/commentisfree/2015/jul/26/will-we-get-by-gig-economy) or an overstated trend (http://www.wsj.com/articles/proof-of-a-g…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now