Monday, 15 July 2013

Filled Under: , ,

How to Recover a Stolen Laptop



Think quick, Where's your laptop right now? 
You feel worried until you remember its location.
Imagine how you'd feel if it was lost, misplaced, or stolen? How would you get it and your data back?
When you can't find your laptop, the first thing you want to know is its current location.
It's possible to determine the device's location based on the IP address of the network to which it's connected.

Follow these Steps-
  • Download the software Adeona from here. 
  • Save the setup of this software in CD or Pen Drive because you will need it when your laptop is stolen.Open the file and install it.
  • A window will open and you will see two options Adonea client and Adonea recovery recovery tools.Tick both options.
 


  • Follow the installation process and enter a strong password.You will need this password at the time of recovery of your stolen laptop.
  • After entering the password press next and a command prompt window will appear.
  • Wait a few seconds for all the tools to be installed and then  press any key to escape. 
  • After everything is installed, the program will put a file on the desktop with a ".ost" extension.This file is the KEY to tracking your stolen laptop so KEEP IT IN A SAFE PLACE.Better save it as email.
Steps to be followed when your Laptop is Stolen-
  • Now when your laptop has been stolen having installed Adonea in it, go to another computer and install Adonea on it but this time tick only the recovery option.
  • Go to the start menu and select the recovery tool option of Adeona then browse and select the file with you have saved in email with 'ost' extension.
  • Now you will be given an option to select the interval of the time and date from the day the laptop was stolen and the number of results you want to see. 
  • Follow the screen instructions and proceed.
Note- The thief has to use the laptop on the internet so that the software installed (ADEONA) on it can get information about the IP address and local network topology. With the info we can pin point the person's location. Sadly if the person does not connect to internet or changes the operating system we can never catch him.

Don't forget to like us on facebook.

0 comments:

Post a Comment