Solved

A friend of mine's laptop stolen. Any ideas how to backtrace it?

Posted on 2011-03-23
9
528 Views
Last Modified: 2013-12-07
Hi there;

A friend of mine's laptop stolen. Any ideas how to backtrace it?

The OS is Win 7.

Kind regards.
0
Comment
Question by:jazzIIIlove
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +3
9 Comments
 
LVL 8

Accepted Solution

by:
jimmyray7 earned 72 total points
ID: 35202748
Unless he had some monitoring/tracking software installed *before* the laptop was stolen, the odds of tracing it are slim.  Even then, a sophisticated criminal could have wiped the hard drive.

Best bet is to file a police report with the serial number and hope it turns up at a pawn shop.
0
 
LVL 13

Assisted Solution

by:Rick
Rick earned 72 total points
ID: 35202754
Can you remote into it and access the webcam?
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
ID: 35202764
If you didn't have a trace program installed or a software to remote into it before it was stolen then no its most likely gone.
0
Instantly Create Instructional Tutorials

Contextual Guidance at the moment of need helps your employees adopt to new software or processes instantly. Boost knowledge retention and employee engagement step-by-step with one easy solution.

 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
ID: 35202774
If the computer had some tracing software "calling home" installed before it got stolen, there might be a slim chance and even that assumes there was no passwords required to use the computer.

If there was a password required to login, then the harddisk will probably be formatted and a new instance of OS and software installed so even any pre-installed tracing software won't help.

0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 35202795
what about mac address? How unique is that?

Kind regards.
0
 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
ID: 35202816
Theoretically MAC-address is unique to each computer but it is not visible beyond the local network where the computer is connected to so unless the thief connects the stolen computer to the same LAN where you are, you won't be able to identify it with that.



0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 35202877
what kind of surveillance tools should be installed to prevent/find the computer being stolen? I mean ok, wiping OS finishes everything, but what should be installed to be proactive?

Kind regards
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
ID: 35202899
0
 
LVL 27

Assisted Solution

by:David-Howard
David-Howard earned 72 total points
ID: 35203071
Lojack (as mentioned) is good. However, if you want to protect any data that resides on your system once it is stolen, lost, etc. I suggest this.
http://www.mcafee.com/us/products/data-protection/endpoint-encryption.aspx
It used to be known as SafeBoot. And I can tell you from experience (working in a financial institution) that you can't be it for data encryption.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IPv6 and IPv4 Subnetting scheme 4 103
Cant Extend Laptop screen 6 95
ASUS V551L Laptop - will not turn on 19 87
Dell Latitude E6420 no sound 13 24
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
Live is the evolution of Q&A. Get your technology problems solved instantly by connecting with technology experts instantly. Pair programming has never been easier.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question