Tag Archives: laptop

Do You Need a Tablet?

imageTablets have exploded in the marketplace in the same way that smart phones did a few years ago. Just like with smart phones, Apple led the pack and soon dominated the market. However, other manufacturers have caught up, and there are now dozens of models available.

If you haven’t already purchased a tablet, you may be asking yourself whether you need to buy one. Is it a replacement for your laptop? An upgrade on your smart phone? Here are some of the reasons why you might consider buying a tablet:

Affordability

Compared to a laptop, most tablet models are quite affordable. While prices for the iPad still rival those of laptops — with the high-end iPad models costing more than low-end laptop models — there are many other tablets that are available for $200 or even less. Depending on the features you need in your laptop or tablet, you could end up saving hundreds of dollars and still get the functionality you need by choosing a tablet over a laptop.

Portability

While laptops are also portable, tablets offer more ease in portability. You don’t have to bring bulky adapters to recharge a battery, and you don’t have to find a table or other surface to setup comfortably. You don’t even need a carrying case for a tablet.

You can easily carry a tablet in your hand and work with it anywhere — no setup or surface space required.

Adaptability

A tablet combines the features of a laptop and your smart phone. You can download apps to do just about anything you need to do. Depending on the model of tablet, you can take photos, type documents, surf the web, and much more. For more advanced work, there are programs or add-ons you can purchase to expand the capabilities of your tablet.

Entertainment

Tablets are a great source of entertainment. You can use them to connect to the web, or you can download games and other fun apps. You can also use it as an e-reader, or you can watch movies and television shows on it. You can do all of these things anywhere, at any time, right in the palm of your hand.

The question of whether or not you need a tablet is a personal one that only you can definitively answer. However, a tablet offers many benefits that you can consider when making your decision, including affordability, portability, adaptability, and entertainment.

Do you own a tablet? Which model did you choose? Tell us what influenced your decision in the comments!

This guest post is contributed by Heather Green.  Heather is a Christian mom, freelance writer, pet lover and the resident blogger for OnlineNursingDegrees.org, a free informational website offering tips and advice on different types of nurses and online resources.

17 Comments

Filed under Connected Devices, Guest Writers, Interconnectivity, Tablet Computing

Windows 8 Satisfies The Need For Speed

imageI’m a speed sensitive kind of guy – when it comes to computing, that is. Late last year, to satisfy my need for speed, I installed a Solid State Drive – running Windows 7 Enterprise – in place of a Western Digital HDD, as a boot drive.

The benefits of running with an SSD were immediately noticeable – faster boot times, faster system shutdown, faster application load times (including games), along with faster sleep and hibernation modes.

In the meantime, Windows 8 Consumer Preview was dropped on my doorstep – and, since there is some degree of SSD optimization built into Windows 8, taking the opportunity to race with this new engine was a natural fit.

It’s been quite a race – Windows 8 is perceptibly faster on my hardware than on the same configuration running Windows 7. Not milliseconds faster – but, measurable faster. Still, there’s little real value in a single user’s Windows 8 running experience. Hardware is a variable – system configurations are variable – usage factors need to be considered, and so on.

So, rather than write a full report on my personal experience running Windows 8, I gave Sandro Villinger from TuneUp Software (the developers of TuneUp Utilities 2012) a buzz to get his take on Windows 8.

Thank goodness for Skype – a planned 15 minute call to Germany turned into a 2 hour conversation – much of it focused on the state of Internet journalism. A conversation so satisfying, that it led me to craft an article on a number of issues raised in conversation, which I’ll post in the next few days.

But, I digress.

As it turns out, Sandro and his team had tested Windows 8 extensively – not just on a single system – but, on a mix of hardware which included Desktops, Laptop/Tablets, and a low powered Intel Atom Netbook.

Sandro has generously shared his extremely comprehensive report with me – which I’ve posted below. If you’ve had any questions regarding Windows 8 performance capabilities, then Sandro’s report is just what you’ve been waiting for.

Enjoy the read.   Smile

A Close Look at Windows 8 Performance: Winners and Losers

Don’t let the shiny new Metro interface of Windows 8 fool you—the new operating system (OS) has been improved not just with a spanking new outfit but also in the performance department. For instance, Microsoft’s future OS needs to work with both high-end PCs as well as small-factor devices like ARM and low-powered Intel tablets, which is why its overall footprint needed to be reduced drastically.

As VentureBeat noted, “Windows 8’s secret feature [is] resurrecting old PCs.” Microsoft promised that Windows 8 would run equally well or better on low-powered machines than Windows 7. This is a bold statement, but the real question is, did the company deliver? In this blog post, we’ll explore that with early benchmarks, showing if and how much Windows 8’s performance compares to Windows 7’s on the very same machines.

image

Windows 8 has been optimized from the ground up to work great with low-powered mobile devices. But how fast is it really? Our lab tests will give you the answers.

Our Test Beds: A Broad Range

To get comparable results, we put Windows 8 through a variety of tests on several very differently equipped systems. We used:

  • Two Desktop PCs: We installed the Windows 8 Consumer Preview on both a 2007-era desktop PC (Core 2 Duo, 2.66 GHz) and a recent Alienware gaming rig (Core i7 930, 8 GB RAM).
  • Two Laptops/Tablets: We also tested a low-powered Core i7 1.8 GHz, 4 GB RAM 13” laptop, which includes a 256 GB SSD, as well as an Asus EP121 tablet sporting a Core i5 processor, 4 GB of RAM and a 64 GB SSD.
  • Netbook: We used a very common Samsung NC10 netbook running a 1.6 GHz Intel Atom and 2 GB of RAM.

We didn’t install any tools on those machines except for the applications that we frequently use for benchmarking. As usual, we performed all tests three times to get a good idea of the results. As usual, we put both OSs through the typical rounds of analyzing boot time, raw processing power and application launch speed. However, since this is a Consumer Preview, we just want to give a quick impression rather than perform a full-blown review—we’ll save that for later!

#1 – Boot Time Performance

image

Windows 8 is widely known for booting up extremely quickly. I used a stopwatch to determine how long it took until the desktop under Windows 7 and the new Metro user interface under Windows 8 was visible. The results will blow you away.

On all machines, Windows 8 was able to surpass its predecessor—right out of the gate, the new OS booted much more quickly. Once the final version hits, we’ll go through our usual paces of running Windows Performance Analyzer to determine if and how much background activity during boot was reduced.

#2 – Processes on a Fresh System

Last September, Microsoft boasted about less processes and reduced RAM consumption. Obviously, the less things that are running in the background, the better performance and longer battery life will be, as idle times are much higher. Right after we clean installed both Windows 7 and Windows 8, we compared the usage.

What we found was not necessarily a big achievement, but an achievement nonetheless. We saw a decrease of five processes as well as a drop in RAM usage by about 100 MB. In your day-to-day routine, this won’t be of particular help. What is helpful, however, are the drastically reduced idle activities. On Windows 8, Microsoft managed to reduce overall background activity noticeably—both on the software and on the driver side. By default, the bare OS’s processes and services rarely cause any noticeable spikes.

#3 – Application Start-up Times

Application start-up times give us a good indication of the OS’s ability to pre-load data and quickly manage smaller file chunks. To test this, we “trained” Windows’s own SuperFetch feature by loading Outlook 2010 every morning at exactly 9 a.m. and keeping it running on both the Windows 7 SP1 and the Windows 8 OSs all day long. After a couple of days, Windows had adapted. Then, we were able to use the trusty AppTimer, which automatically launches applications and measures start-up times down to the millisecond.

image

image

Now, how long does it take? We only performed this test on the Core i7 1.8 GHz laptop.

There was a difference in so called “cold” and “warm” startups – cold refers to the first startup of the application right after boot, and warm refers to subsequent launches that are all completely loaded from memory and, thus, faster. The differences were hardly noticeable, but there was a clear trend towards Windows 8 loading applications a tad slower; however, this could be attributed to hard disk controller drivers.

#4 – Office Performance

To test day-to-day performance, we used the dependable PCMark 7 benchmark tool that automatically performs tasks such as website rendering, virus scans, photo manipulation and video editing. It should easily prove how well Windows 8 can handle both CPU and hard disk heavy tasks.

We found mixed results. While Windows 8 achieved quite a leap in performance on the faster machines, the lower-end devices, especially the netbook, actually suffered a bit. This ran noticeably slower during the tests, which was also noticeable during day-to-day usage.

#5 – Gaming Performance

The S.T.A.L.K.E.R. benchmark is a very well established test program designed to measure frames per second in DirectX games. As usual, we performed all tests three times and averaged the results.

The gaming front seems to profit from Windows 8’s reduced memory usage and apparent optimization to DirectX. But, those results should be taken with a grain of salt: Windows 8 installed some more recent beta drivers that were not available for Windows 7 SP1.To compensate for the effect, we downloaded the most recent beta drivers for nVIDIA and Intel onboard graphics. Overall, the netbook suffered a small amount again, while the faster machines gained quite a bit of performance.

#6 – Overall Verdict: Good Improvements, Some Losses

The Windows 8 Consumer Preview runs well on higher-end devices, but we were surprised to see that it lost some performance on lower-end machines—the very exact devices that it’s supposed to run well on. However, I’ll wait for the release candidate to make a final judgment. We may have an odd combination of unfinished drivers and code and bugs that may affect benchmarks (which is exactly why I only used a handful of my tests to get a general feel for new OS’s performance).

Overall, Windows 8 is going in the right direction. However, judging bare operating systems can only reveal so much.We’ll find out how it really works when we’re able to test third-party applications and the Metro-style apps. Do these negatively impact performance over time? We’ll find out in part two of our Windows 8 performance series.

A Close Look at Windows 8 Performance: Winners and Losers (Part 2)

In last week’s blog post, we performed some early performance benchmarks and compared Windows 7 SP1 with the recently released Windows 8 Consumer Preview. While speed improved in some scenarios, other aspects suffered a bit. However, the important thing to remember is, performance doesn’t just depend on the underlying operating system (OS); it also relies on the applications that run constantly in the background.

Third-Party Applications: Still a Problem

I’ve now been productively working with Windows 8 for a couple of weeks! I have been using this OS day in and day out and have installed all of my applications.

While I was surprised by the system’s initial responsiveness, overall speed reduced after installing about 80 programs, which consisted of Skype, Live Messenger, SnagIt and games and office applications. It didn’t slow things down to a crawl, but it introduced quite a bit of lag and noticeably less performance—so I found myself again having to use tools such as TuneUp Program Deactivator, Autoruns, Startup Manager and Windows’ own service tools to turn off certain applications. This isn’t out of the ordinary though. It’s a fact of life, and Microsoft will likely stay away from this department, despite the fact that the company has introduced quite a nice Task-Manager that shows the impact of start-up applications.

image

Closed Apps Still Run in the Background

Having worked with Windows 8 on both a desktop and a tablet, in addition to switching between a variety of apps, I noticed a bit of a lag when handling apps. First, switching between apps had a delay of between one second and several seconds. Second, the system slowed down in “classic desktop” mode although no applications were running.

Microsoft promised several times on its Engineering 8 Blog that inactive applications would be frozen and couldn’t consume PC resources. When looking at the multi-tasking switcher on the left, I was proven right. Windows 8 actively held about six apps at a time before apparently closing them. What I found instead, however, annoyed me a bit. The so-called frozen applications remain in the background.

image

image

While only the most critical of those apps were active in the background (Mail, Messaging, Music, etc.), all other apps just sat there consuming memory. Overall, I had about 500 MB worth of apps sitting in memory and not doing a whole lot. That’s not as bad as some browsers, but it’s still not quite as effective as it could be.

Why is this happening? The memory is actually consumed by the frozen state of the app. This means that once an app is closed (which is done by a swiping gesture from the top to the bottom of the screen), it can be resumed instantly. Even though this is a good feature, most users likely aren’t aware that this instant resume may have a detrimental effect on performance—and there are applications that most people only start once, use for 10 minutes and don’t touch again. So why keep those apps =running in the background?

Of course, a restart purges the memory of all app states, but many users go a long time without ever shutting down or restarting their PCs. In fact, Microsoft has designed Windows 8 to be more of an “Always On Standby” experience—they hide the restart and shutdown buttons in the charms menu and encourage users to use their power buttons to go to standby.

Is this really a problem? Well, it all depends on the usage of the user. If you’re just using three or four of your favorite apps, this doesn’t concern you. A hundred MB won’t make a huge difference. If you’re using a wide array of Metro-style apps and switch back to your classic desktop applications, this might affect performance. Having half a gig of apps sitting in memory just waiting for you to start them again is detrimental to performance. I wish apps would actually close if you perform the aforementioned swipe gesture.

Again, it’s very early to talk about these things. Windows 8 is in its Consumer Preview stage, but I am not sure if Microsoft really is considering giving back more control to the user who actually wants it. We’ll keep you up-to-date on this.

Sandro Villinger’s professional background – IT Journalist/Consultant

Managing Editor: Hewlett-Packard HPIO Germany

PR Manager/Technical Consulting: TuneUp Software GmbH

Publications US: IDG ITWorld, HP Input/Output, TuneUp Blog

Publications DE:  ComputerBILD, PC Pr@xis, MS Press, Windows-Tweaks.info

5 Comments

Filed under Operating Systems, Reports, Software, Windows 8

Protect Your Bits With BitDefender Internet Security 2011

imageIf it’s true that 50% of computer users run without adequate security protection, as some statistics indicate, then I can understand why. Given the complexity of a typical anti-malware product in both setup and operation, it’s little wonder that many users throw up their hands in frustration.

To be sure, computer security is a complex issue, but that shouldn’t mean that the average end user of a security application, needs to be exposed to a labyrinth of choices in either application setup, or in monitoring activity.

It’s hard to overstate the fact that typical computer users require a simple, intuitive, and easy to use interface in order to get the most out of a security suite, and BitDefender’s Internet Security 2011 breaks new ground here. More on this later.

By combining an efficient Firewall, an Antivirus engine, an Antispyware engine, Spam filtering, a parental control system, privacy control, home network and game/laptop modes – BitDefender has built a suite of applications that provides powerful protection.

Taken together, the components provide excellent protection from hackers, cybercriminals, unauthorized software, network attacks, and more.

The application is straightforward to setup, customize, and run – as the following screen captures illustrate. (Click on any graphic to enlarge).

Following installation the application automatically runs a quick scan to ensure the system is clean prior to setup completion.

image

Very cool! No malware found on the test system.

image

BitDefender’s Internet Security 2011 is all about simple initial choices – average users can sit back and allow the application to choose the most appropriate settings.  Sophisticated users, on the other hand, can get their hands dirty.

image

The user has an opportunity to choose a simple, intuitive, and easy to use interface, rather than the more complex intermediate, or expert mode. When I installed this application, I did so with 10 average users in attendance – each one agreed that the “Basic View”, would be the most appropriate for their needs.

image

The additional tools menu is push button simple, as the following screen shot indicates.

image

On the completion of the installation, a summary of installed application modules is provided.

image

Finally, a guided tour is a helpful tool which makes it easy for an average user to become familiar with the application.

image

Fast facts:

Firewall

Antivirus & Antispyware

Antispam

Anti-phishing

Chat Encryption

Identity protection and privacy controls

Parental Control

Family Network Protection – Home network monitor

Smart Scan

Quick Scan

Smart Schedule

Smart Help

Smart Sense

System requirements: Windows XP SP3, Vista (SP1), Wind 7 (both 32 bit and 64 bit).

Note: Recommended hardware –

  • CPU: Intel CORE Duo (1.66 GHz) or equivalent processor
  • Memory (RAM):
  • 1 GB (Microsoft Windows XP and Microsoft Windows 7)
  • 1.5 GB (Microsoft Windows Vista)

Having tested this application on a number of machines, I suggest you don’t install this application unless your computer meets, or exceeds, these requirements.

Download 30 day trial version at: BitDefender

Purchase product at: BitDefender (3 PCs for 1 year $49.95).

A personal note: BitDefender is one of my favorite security providers, since it offers a bevy of free virus removal tools, as well as a number of free specialty security tools.

A final word: Choosing a security application correctly depends on a number of variables including – how you use a computer on the Internet. In the final analysis though, the application should simply work –  unobtrusively and silently, with a minimum of fuss and bother – without presenting complex questions that average users simply can’t grasp.

Overall, BitDefender Internet Security 2011 handles this issue very well, and its overall detection and malware removal rates, place it in the top tier of security applications.

A word of caution here regarding tests carried out by antimalware labs. By and large, these tests are one time “snap shots”, and are not always indicative of an applications strengths, or weaknesses. Applications tend to change relative positions based on these tests, very often.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under 64 Bit Software, Antimalware Suites, BitDefender, cybercrime, Don't Get Scammed, Don't Get Hacked, Malware Protection, Software, Software Trial Versions, spam, Spyware - Adware Protection, System File Protection, Windows Tips and Tools

Use Free Prey To Track Your Lost Or Stolen Laptop Or Cell Phone

imageRecent statistics indicate that more than 10,000 Laptops are lost, or stolen, each week at U.S. airports alone. Broken down, this same set of statistics indicate that a Laptop is stolen, not lost but stolen, every 53 seconds!

If you are a Laptop owner, you should consider what can you do now, to increase the probability that should your Laptop be lost or stolen, you can increase the chances that it will be returned to you.

One solution is offered by Prey, an Open Source application, that can enhance recovery chances. Stolen Laptop recovery is always a hit and miss proposition, but without an application such as Prey on board, the chances of recovery, at least statistically, are virtually nil.

image

What is Prey?

Prey is a small applet for your Laptop or Android Cell Phone, which, when activated by a remote signal, either from the Internet, or through an SMS message, will provide you with the device’s location, hardware and network status, and optionally – trigger specific actions on the device.

According to the developer – “Prey helps you track and find your Laptop or Phone if it ever gets out of sight. You can quickly find out what the thief looks like, what he’s doing on your device and actually where he’s hiding by using GPS or WiFi geopositioning. It’s payback time.”

There have been substantial changes and improvements to Prey, since I last reviewed it here on January 28, 2010.

Installation is very simple, as the following screen captures indicate. BTW, Prey can protect your desktop/s, as well.

image

image

image

image

Fast facts:

100% geolocation aware – Prey uses either the device’s GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. It’s shockingly accurate.

Wifi autoconnect – If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.

Light as a feather – Prey has very few dependencies and doesn’t even leave a memory footprint until activated. We care as much as you do.

Know your enemy – Take a picture of the thief with your laptop’s webcam so you know what he looks like and where he’s hiding. Powerful evidence.

Watch their movements – Grab a screenshot of the active session — if you’re lucky you may catch the guy logged into his email or Facebook account!

Keep your data safe – Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.

No unauthorized access – Fully lock down your PC, making it unusable unless a specific password is entered. The guy won’t be able to do a thing!

Scan your hardware – Get a complete list of your PC’s CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.

Prey can check its current version and automagically fetch and update itself, so you don’t need to manually reinstall each time.

You monitor your devices on Prey’s web Control Panel, where you can watch new reports arrive and manage specific settings, such as changing the frequency for reports and actions.

You can add up to three devices for free, and can optionally upgrade to a Pro Account in case you wish to bypass this limit.

Full auto updater.

System requirements: XP, Vista, Win 7, Mac OS, Ubuntu Linux, Linux – all other distributions, (64 bit where appropriate), Android.

There is no guarantee that even with Prey on board that a stolen, or lost device, will be recovered – but, it seems sensible to make every effort to increase that likelihood.

Download at: The Prey Project

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under 64 Bit Software, Android, cell phone, Cloud Computing Applications, Connected Devices, downloads, Free Surveillance Applications, Freeware, GPS, Interconnectivity, Laptop recovery, Linux, Mac OS X, Open Source, Software, Ubuntu, Utilities, Windows 7, Windows Vista, Windows XP

Laptop Computer Stolen from Hospital Room – Irreplaceable Photos GONE

image Just a few days ago, here in Toronto, as reported in the Toronto Star,   a despicable crime was committed (not the first such crime of this type, this year), when a Laptop computer was stolen from a hospital room.

The story, more or less in chronological order, went something like this:

  • Laptop stolen from hospital…
  • Hospital theft suspect may be involved…
  • Laptop theft suspect captured …
  • Owner hopes for recovery of photos from stolen laptop“A woman whose stolen laptop was recovered without its photos of her dead daughter will likely get them back, computer experts say.”

Kudos to the Toronto Police Service, who recovered the Laptop within a few days – only to find that the irreplaceable photos had been erased.

As well as newspaper coverage, this sad story received massive play on Toronto’s seven television stations. It was evident that the victim was extremely distraught over the loss of her dead daughter’s photographs.

While I had great sympathy for the Laptop owner, at the same time I was mystified that:

  • No recovery software was installed on this machine; despite the fact that Laptops are at high risk for thief.

Recent survey results from the Ponemon Institute, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports alone, coupled with statistics which show that a laptop is stolen, not lost but stolen, every 53 seconds.

Free recovery applications are widely available on the Internet – see Download Prey – A Free Recovery Solution to a Lost or Stolen Laptop, here.

  • The irreplaceable photos of the victim’s dead daughter were not backed up to another medium.

USB flash drives cost virtually nothing – prices range from less than $8 (2 GB), to under $30 (16 GB). That’s a lot of photo storage per dollar. A simple Windows Explorer right click menu command “Copy to folder”, would have copied the photos to a USB stick in seconds.

Copy to

Worse however, was the realization that the Laptop Hard Drive was not backed up. This, despite the fact that that there are some very substantial free backup applications available for download on the Internet – see Free Paragon Backup and Recovery – Incremental Backup Included, here.

Finally, while I’m unsure as to the cost of recovery this woman faced, the newspaper story did mention a cost of $80 to $150, for a simple recovery operation such as this.

This expense could easily have been avoided if the victim had been aware, that free software is readily available on the Internet to effect photo recovery – see Recover Picture Files On Your Digital Camera Card, on regular guest writer Rick Robinette’s site What’s On My PC.

The recovery application Rick reviewed, Recuva, is capable of recovering photos from virtually any media – including Hard Drives.

image

I’m not trying to be a big “meanie” here but, it seems to me, that this woman was the architect of her own misfortune. A little pre-planning, particularly with a high risk item like a Laptop, could have saved her considerable distress. But, like too many computer users, her interest stopped with the on/off switch.

As is usual with mainstream media, the Toronto Star failed to grasp the significance of this event, and use it as a teaching tool so that other computer users could learn from the mistakes evident in this occurrence.

Perhaps, I expect too much.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

29 Comments

Filed under Backup Applications, Backup Tools, downloads, Free File Recovery Applications, Freeware, Hard Drive Cloning, Hard Drive Imaging, Software, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download Prey – A Free Recovery Solution to a Lost or Stolen Laptop

image I’ve been planning for some time on writing an update on lost or stolen Laptops, the costs involved, and the consequences that often follow.

Following last night’s news story on “Laptops containing sensitive records belonging to thousands of Ontario teachers have been stolen”, on my local (Toronto) CBC News – now seems like the perfect time. So, let me mount my soapbox for just a moment.

What I found particularly offensive in this news story:

The Laptops were stolen December 3, 2009, and yet it took until January 27, 2010 to notify the affected parties. This, despite the fact, that stolen information of this type can be used to obtain false passports and fake credit cards, or for re-mortgaging a victim’s home.

As is often the case in this type of situation, the data on the Laptops was not encrypted.

Officials involved in this debacle were quoted as saying “but the computers were password-protected”. Officials, who obviously have no understanding, that readily available and legal, free software, can be downloaded from the Internet that can break, or reset passwords, in minutes.

This type of occurrence begs the question: is this just a “one off” or, is this type of occurrence a continuing problem?

If we are to be guided by recent survey results from the Ponemon Institute, which indicate that more than 10,000 laptops are lost, or stolen, each week at U.S. airports alone, coupled with statistics which indicate that a laptop is stolen, not lost but stolen, every 53 seconds,  it would be hard to dismiss this as an isolated occurrence.

Reportedly, 65% of lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information, which, in most cases, is not encrypted.

One would assume, that encrypting sensitive data on enterprise or government laptops, or portable media, would be SOP. Instead, it seems that when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – “200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week”.

There are substantial hard costs incurred in the loss or thief of a Laptop, and again, statistics available from the Ponemon Institute “Cost of a Lost Laptop”, indicate that these hard costs can approach $50,000 per occurrence, for enterprise.

It’s not only business or government that should be concerned with the loss, or theft, of a Laptops – it’s every bit as likely to happen to individual Laptop owners.

If you are a Laptop owner, you should consider what can you do now, to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you.

One solution is offered by Prey, an open source application, that can enhance recovery chances. Stolen laptop recovery is always a hit and miss proposition, but without an application such as Prey on board, the chances of recovery, at least statistically, are virtually nil.

Prey  web service

According to the developer:

Prey helps you locate your missing laptop by sending timed reports with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and – in case your laptop has an integrated webcam – a picture of the thief.

Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. The thief will never know his movements are being watched.

image

There is no guarantee that even with Prey on board that a stolen, or lost Laptop, will be recovered – but it seems sensible to make every effort to increase that likelihood. Prey, may be just the solution you’ve been looking for.

Fast facts:

Wifi autoconnect – Prey checks if there’s an active internet connection to send the information.

Geo-location aware – Prey uses wifi hotspots to locate devices geographically. This not only includes lat/lng coordinates, but also an altitude indicator.

Lightweight – Prey is written in bash which means it has virtually no dependencies, only what it different modules need to work. This also means Prey is portable and should run in just about any computer.

Modular architecture – You can add, remove and configure the different parts of Prey as you wish. Prey is composed by modules, each one performing a specific task.

Powerful report system – Get the list of current running programs, the recently modified files, active connections, running uptime, take a screenshot of the running desktop or even a picture of the guy who’s using the computer.

Messaging/alert system – You can alert the thief  he’s being chased at by sending messages which will appear on screen. You can also trigger alarms to make the message clear not only to him but also to whomever is nearby.

Module auto-installer – You don’t have to reinstall Prey to keep up with the latest and greatest modules. We keep a repository from where Prey will fetch what it needs to get the job done.

System requirements: Windows 2000, XP & Vista, Mac OS, Ubuntu Linux, Linux – other distributions.

Download at: The Prey Project

For a review and download links to free encryption software please read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this site.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under downloads, Free Laptop Tracking Software, Freeware, Laptop recovery, Open Source, Software, Windows Tips and Tools

Prey – A Free Stolen Laptop Recovery Solution

clip_image001You’ll never lose your Laptop computer, and you take particular care to ensure it won’t be stolen, right? Of course you do. But does loss, or theft, of laptops happen? You bet.

Recent survey results from the Ponemon Institute, indicate that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of those lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you?

One solution is offered by Prey, an open source application, that can enhance recovery chances significantly.

Prey web service

According to the developer:

Prey helps you locate your missing laptop by sending timed reports with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and – in case your laptop has an integrated webcam – a picture of the thief.

Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. The thief will never know his movements are being watched.

Stolen laptop recovery is always a hit and miss proposition, but without an application such as Prey on board the chances of recovery, at least statistically, are virtually nil.

There is no guarantee that even with Prey on board that a stolen, or lost laptop, will be recovered – but it seems sensible to make every effort to increase that likelihood. Prey, may be just the solution you’ve been looking for.

Fast facts:

Wifi autoconnect – Prey checks if there’s an active internet connection to send the information.

Geo-location aware – Prey uses wifi hotspots to locate devices geographically. This not only includes lat/lng coordinates, but also an altitude indicator.

Lightweight – Prey is written in bash which means it has virtually no dependencies, only what it different modules need to work. This also means Prey is portable and should run in just about any computer.

Modular architecture – You can add, remove and configure the different parts of Prey as you wish. Prey is composed by modules, each one performing a specific task.

Powerful report system – Get the list of current running programs, the recently modified files, active connections, running uptime, take a screenshot of the running desktop or even a picture of the guy who’s using the computer.

Messaging/alert system – You can alert the thief  he’s being chased at by sending messages which will appear on screen. You can also trigger alarms to make the message clear not only to him but also to whomever is nearby.

Module auto-installer – You don’t have to reinstall Prey to keep up with the latest and greatest modules. We keep a repository from where Prey will fetch what it needs to get the job done.

System requirements: Windows 2000, XP & Vista, Mac OS, Ubuntu Linux, Linux -other distributions

Download at: The Prey Project

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under downloads, Freeware, Interconnectivity, Laptop recovery, Open Source, Software, Windows Tips and Tools

Stolen or Lost Laptop Tracker Software – Adeona Free

stolen-laptopYou’ll never lose your Laptop computer, and you take particular care to ensure it won’t be stolen, right? Of course you do. But does loss, or theft, of laptops happen? You bet.

Recent survey results from the Ponemon Institute, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of those lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you, than the above statistics indicate?

adeona

Adeona (named after the Roman goddess of safe returns), is a recently released small software client for tracking the location of a lost, or stolen laptop, that does not rely on a proprietary central service, but instead, is offered free by the Open Source community.

This powerful free software has been developed through collaboration involving the University of Washington, the University of California San Diego and the University of California Davis.

The developer’s website describes the application as follows:

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop.

The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.

The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Quick facts:

Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.

Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates. (See caveat)

Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.

The Mac OS X version can capture pictures of the laptop user, or thief, using the built-in iSight camera.

System Requirements: Windows XP/Vista, Mac OS X, Linux

Download at the developer’s web site: Adeona

A caveat: According to the development team, “OpenDHT has been experiencing some problems. We are working on a new private version, that does not depend on OpenDHT”.

For a review and download links to free encryption software read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this site.

5 Comments

Filed under Free Laptop Tracking Software, Freeware, Geek Software and Tools, Open Source, Software, Surveilance Tools, Windows Tips and Tools

Adeona – Free – Stolen/Lost Laptop Tracker Software

You’ll never lose your Laptop computer, and you take particular care to ensure it won’t be stolen, right? Of course you do. But does loss, or theft, of laptops happen? You bet.

Recent survey results from the Ponemon Institute, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of those lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you can increase the chances that it will be returned to you, than the above statistics indicate?

Adeona (named after the Roman goddess of safe returns), is a newly released small software client for tracking the location of a lost, or stolen laptop, that does not rely on a proprietary central service, but instead, is offered free by the Open Source community.

This powerful free software has been developed through collaboration involving the University of Washington, the University of California San Diego and the University of California Davis.

The developer’s website describes the application as follows:

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop.

The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.

The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Quick facts:

Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.

Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates.

Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.

The Mac OS X version can capture pictures of the laptop user, or thief, using the built-in iSight camera.

System Requirements: Windows XP/Vista, Mac OS X, Linux

Download at the developer’s web site: Adeona

For a review and download links to free encryption software read “Lose Your USB Stick and You Lose it All – Encrypt Now with Free Software!” on this Blog.

2 Comments

Filed under Free Laptop Tracking Software, Freeware, Geek Software and Tools, Interconnectivity, Open Source, Software, Utilities, Windows Tips and Tools

Lost or Stolen Laptop – Get it Back With Adeona (Maybe)

Survey results released this past week by The Ponemon Institute, which was sponsored by Dell, indicates that more than 10,000 laptops are lost, or stolen, each week at U.S. airports. Are you as surprised as I am?

Not surprised? Well, how about this astonishing statistic from the same survey: 65% of these lost or stolen laptops are not reclaimed, despite the fact that half the laptops contain confidential corporate information.

One can only hope that the data on these laptops was encrypted, although it seems when we read news stories about a lost or stolen laptop, the pattern seems to be as follows; – 200,000 (insert your own number here), bank account numbers, Social Security Numbers, names, addresses and dates of birth were on an unencrypted laptop stolen/lost earlier this week.

Other available statistics indicate that a laptop is stolen, not lost but stolen, every 53 seconds and 97% of stolen laptop computers are never recovered.

So what can you do to increase the probability that should your laptop be lost or stolen, you have a better chance that it will be returned to you, than the above statistics indicate?

Adeona is a newly released small software client for tracking the location of a lost or stolen laptop that does not rely on a proprietary central service, and which is offered free by the Open Source community.

The developer’s website describes the application as follows:

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner’s laptop. The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location.

The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the cipher texts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Stolen Laptop Pic from an onboard camera.

Quick facts:

  • Private: Adeona uses state-of-the-art cryptographic mechanisms to ensure that the owner is the only party that can use the system to reveal the locations visited by a device.
  • Reliable: Adeona uses a community-based remote storage facility, ensuring retrievability of recent location updates.
  • Open source and free: Adeona’s software is licensed under GPLv2. While your locations are secret, the tracking system’s design is not.
  • The Mac OS X version can capture pictures of the laptop user or thief using the built-in iSight camera.

System Requirements: Windows XP/Vista, Mac OS X, Linux

Download at the developer’s web site: Adeona

Please note: I have been advised that these files are currently available for download.

For a primary on what happens to stolen information read, Another Advantage of Credit Cards, on my good friend TechPaul’s Blog

2 Comments

Filed under Freeware, Geek Software and Tools, Interconnectivity, Mobile Applications, Open Source, Software, Surveilance Tools, Surveillance, System Security, Utilities, Windows Tips and Tools