[amazon_auto_links id="16922"]

Undercover Mac Recovery


UnderCover
by Orbicule

Sure, there is LoJack for PC’s, GPS location for smart phones, and a sound maker for your keys, but what is protecting your {expensive} MacBooks from theives? THe people over at Orbicule have come out with UnderCover 3 which another tool Mac users have to keep their investment safe. The software works very similary to the LoJack version for PC’s. When and if your computer is ever stolen, Under Cover 3 is able to take a picture of the wouldbe theif (if your computer is fitted with a iSight) and transmit its location to Orbicule.

The software works quietley in the background is near impossible to detect. If the software is unable to get into contact with Orbicule, for example the computer is in a remote area with no network connection it moves to a "Plan B." This part, the software simulates a screen failure, thus making the laptop less valuable ot the thieves and might motivate them to either return the laptop or get rid of it. Hopefully whichever option they choose, the Mac Book makes it back to its right full owner.

A private testing of the software found Orbicule to be highly responsive, TechiTeens employs three MacBooks in its operations. One is currently outfitted with Under Cover 3 and the other two are days away from recieving their UnderCover 3 installations.

For anyone looking to protect their MacBook from the ultimate lost, Orbicule offers piece of mind that cannot be had once your precious computer, full of pictures, music and personal information is stolen.



Undercover requirements
—————————–
Undercover needs Mac OS X Tiger (10.4) or Leopard (10.5)
Installing Undercover
—————————–
– Double-click the Undercover installer and follow the instructions
– Reboot your Mac when prompted by the installer
– If your Mac is not set to auto-login, please login into your
account
– About 10 seconds after login, the Undercover registration window will
appear
– Click Enter License and enter your license key exactly as printed below
(you can copy/paste the key)
– Please read and print the important confirmation e-mail containing your
Mac’s Undercover ID (see below)
– Remove the undercover.dmg file (it’s on your Desktop or in your downloads
folder)

In case of theft

As soon as your Mac
is stolen, you send us the Undercover ID you received upon
registration. We will add this code to our list of stolen Macs.

The first phase

The
next time your stolen Mac goes online (using dial-up, WiFi, ethernet,
Bluetooth, …) it will notice that its Undercover ID is flagged as
stolen. This will initiate the first phase, in which Undercover will
send geographical information based on the built-in Skyhook Wireless
technology, the same technology used in the iPhone and iPod Touch. This
will enable us to accurately locate your stolen Mac within a 10-20
meter range. In addition, Undercover transmits network information and
screenshots of your stolen Mac. Together with law enforcement, we work
to recover the Mac. If your Mac has a built-in iSight, or if the thief
attached an external iSight, Undercover will send iSight pictures of
the thief. Think of it as running Photo Booth in the background.

Plan B

If
law enforcement fails to recover the stolen Mac, Undercover switches to
plan B. In this mode, Undercover will simulate a screen failure, slowly
making the Mac’s screen unusable. At this point, we think the thief has
two options: to send the computer to a reseller for repair, or to get
rid of it by selling it on the Net. In either case, Undercover will
show a full-screen message alerting the reseller or someone who bought
the Mac from the thief that the Mac has been stolen, that it has become
unusable and that it needs to be returned as soon as possible. Our
contact information and a promise for a finder’s fee (which will be
covered by us) will be displayed as well. This message can be fully
customized by the user and when dismissed, this message will instantly
reappear. Additionally, your Mac will start shouting at the highest
volume level, using its built-in text-to-speech capabilities. You can
decide when Undercover switches to plan B and what message is
displayed. Note that this message is NOT displayed to the thief.

Recovery

Because
of the message Undercover displays, technicians will quickly notice
that the Mac has been stolen. As soon as you get back your Mac, we will
remove it from our database of stolen Macs. Your Mac will immediately
start to behave normally, as if nothing happened. Undercover can not be
disabled by the thief. If you install Apple’s firmware password, your
Mac can not be formatted without knowing your firmware password.


Leave a Reply

Your email address will not be published. Required fields are marked *