Solved

A friend of mine's laptop stolen. Any ideas how to backtrace it?

Posted on 2011-03-23
9
517 Views
Last Modified: 2013-12-07
Hi there;

A friend of mine's laptop stolen. Any ideas how to backtrace it?

The OS is Win 7.

Kind regards.
0
Comment
Question by:jazzIIIlove
  • 2
  • 2
  • 2
  • +3
9 Comments
 
LVL 8

Accepted Solution

by:
jimmyray7 earned 72 total points
ID: 35202748
Unless he had some monitoring/tracking software installed *before* the laptop was stolen, the odds of tracing it are slim.  Even then, a sophisticated criminal could have wiped the hard drive.

Best bet is to file a police report with the serial number and hope it turns up at a pawn shop.
0
 
LVL 13

Assisted Solution

by:Rick
Rick earned 72 total points
ID: 35202754
Can you remote into it and access the webcam?
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
ID: 35202764
If you didn't have a trace program installed or a software to remote into it before it was stolen then no its most likely gone.
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
ID: 35202774
If the computer had some tracing software "calling home" installed before it got stolen, there might be a slim chance and even that assumes there was no passwords required to use the computer.

If there was a password required to login, then the harddisk will probably be formatted and a new instance of OS and software installed so even any pre-installed tracing software won't help.

0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 35202795
what about mac address? How unique is that?

Kind regards.
0
 
LVL 9

Assisted Solution

by:AriMc
AriMc earned 142 total points
ID: 35202816
Theoretically MAC-address is unique to each computer but it is not visible beyond the local network where the computer is connected to so unless the thief connects the stolen computer to the same LAN where you are, you won't be able to identify it with that.



0
 
LVL 12

Author Comment

by:jazzIIIlove
ID: 35202877
what kind of surveillance tools should be installed to prevent/find the computer being stolen? I mean ok, wiping OS finishes everything, but what should be installed to be proactive?

Kind regards
0
 
LVL 34

Assisted Solution

by:jamietoner
jamietoner earned 142 total points
ID: 35202899
0
 
LVL 27

Assisted Solution

by:David-Howard
David-Howard earned 72 total points
ID: 35203071
Lojack (as mentioned) is good. However, if you want to protect any data that resides on your system once it is stolen, lost, etc. I suggest this.
http://www.mcafee.com/us/products/data-protection/endpoint-encryption.aspx
It used to be known as SafeBoot. And I can tell you from experience (working in a financial institution) that you can't be it for data encryption.
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Download Logs File from Cisco Switch 1 63
no display on laptop 5 83
Cable modem to laptop? 36 87
I don't want to use Fn or Fn lock for F1 to F11 key on a Lenovo t460p laptop 13 71
Computer running slow? Taking forever to open a folder, documents, or any programs that you didn't have an issue with before? Here are a few steps to help speed it up. The programs mentioned below ALL have free versions, you can buy them if you w…
With the shift in today’s hiring climate (http://blog.experts-exchange.com/ee-blog/5-tips-on-succeeding-in-the-new-gig-economy/?cid=Blog_031816), many companies are choosing to hire freelancers to get projects completed efficiently and inexpensively…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question