Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Development
    • Development

    Computrace Locates Stolen Laptops

    By
    eWEEK EDITORS
    -
    June 18, 2001
    Share
    Facebook
    Twitter
    Linkedin

      Lojack for laptops? After testing a preview version of Absolute Software Corp.s Computrace 8.0 software/ monitoring service combo, eWeek Labs found it hard to avoid the analogy. In this case, police do not track a radio beacon but are ultimately provided a warrant and a street address, courtesy of a covert call (IP or phone) from the purloined device.

      Computrace 8.0, which will be released next month, can be an effective, affordable recovery device when properly installed and tested. This version could also deter theft if an organization chooses to disclose the agents presence. Sensitive user data on the drive, however, still needs to be encrypted to be protected.

      New options for next months release are lease management; software license management; “user drift” tracking, which logs who is using which computer; and a hardware profile that determines if the computer is a candidate for a system software upgrade. These features make use of data logged routinely by the new, more inquisitive agent.

      Computrace 8.0 costs $49.95 per machine, including one year of monitoring. Volume discounts apply at the 100-, 500-, 1,000- and 2,500-user levels. Discounts are also available for two- and four-year monitoring contracts.

      In tests, Computrace 8.0 worked as advertised, as long as it was installed strictly according to the instructions and tested rigorously. Absolute personnel expect to be involved in the setup process, and we found their telephone support to be essential.

      A second caveat: Because BIOS may vary from brand to brand, secure installation procedures may also vary. For example, Hewlett-Packard Co.s Vectra XU and Compaq Computer Corp.s ProSignia 150 machines were fussy about installation, whereas the Dell Computer Corp. Inspiron 7000 was not.

      Secret agent

      Computrace software inserts a stealthy agent—an 8KB virtual device driver—on the hard drive that contacts Absolutes monitoring service at set intervals. If the owner files a theft report via phone, fax or Web, Absolutes server instructs the agent to call more frequently.

      About half the computers reported stolen do call in—an annually rising figure corresponding to networked computers, according to Absolute Recovery Services, which logs phone numbers, IP addresses, time and date to generate a warrant request. Absolute claims that 95 percent of devices that call are recovered.

      Once a judge grants the request, a warrant is served on the Internet service provider, which then must reveal the address of the unsavory user. This process, speedier than it sounds, enables police to make entry and recover the computer. The agent mutes the modem speaker when making a call and deflects commands to delete the hard drive, allowing erasure or reformatting only after protecting itself.

      Naturally, we tried to kill the stealthy little agent. First we used the standard DOS “Format” utility to reformat the drive. Then we reinstalled the system software, and the agent immediately made its scheduled call. Next, using fdisk, we reformatted the drive and created a new partition before reinstalling the system software. The agent phoned home.

      We were finally able to kill the agent—we wont say how. The important point is that most thieves will not know it is there, and those who do probably will not figure out how to eliminate it before the agent makes its call.

      It is essential for IT departments to carefully test all installations and use a standard installation script across like units. Properly installed, the Computrace agent is probably as secure as it can be—for software. A savvy cutpurse might kill it if he or she knows it is there.

      The next logical step is to put the agent into hardware, which would reduce the amount of time needed to deploy it across multiple computers. More importantly, such a move would significantly enhance the agents survivability. Three major OEMs are developing the agent in hardware, Absolute officials said.

      There is no Mac OS version, which is odd, considering Powerbooks are highly prized and often stolen. Absolute officials have no current Mac OS plans, although they acknowledge the size of the Powerbook market.

      The setup wizard was straightforward. We did run across inconsistencies in the call management software that Absolute officials said will be fixed for next months release.

      Computrace 8

      .0″>

      Computrace 8.0

      USABILITY

      A

      CAPABILITY

      B

      PERFORMANCE

      B

      INTEROPERABILITY

      B

      MANAGEABILITY

      A

      Absolutes updated Computrace agent/recovery service combo makes available new hardware inventory features that leverage recovery technology to support mobile device management, making this edition a more effective transparent laptop recovery product than earlier versions.

      SHORT-TERM BUSINESS IMPACT // Upon installation, this low-cost tool immediately starts working to limit loss from theft.

      LONG-TERM BUSINESS IMPACT // Computrace 8.0s options to track hardware configurations and to manage software licenses and leases make it a cost- effective addition to any corporate security arsenal.

      Small; inexpensive; effective; allows central device monitoring.

      Exacting installation; thorough testing is necessary before deployment; no Mac OS version.

      Absolute Software Corp., Vancouver, British Columbia; (800) 220-0733; www.absolute.com

      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×