issue60:tuto_prey
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue60:tuto_prey [2012/05/03 05:58] – créée fredphil91 | issue60:tuto_prey [2012/05/11 17:25] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
+ | ** | ||
Rest safe. That's the headline of the Prey project. If you have lost your laptop or your phone, or they were stolen, Prey gives you the chance to locate them anywhere in the world and get them back. Simply the possibility of locking a stolen laptop and denying a thief access to the data is worth thinking about. Prey is currently available for Linux, Mac, and Windows based computers, and Android based phones. The iPhone and iPad Apps are currently under Apple’s review. | Rest safe. That's the headline of the Prey project. If you have lost your laptop or your phone, or they were stolen, Prey gives you the chance to locate them anywhere in the world and get them back. Simply the possibility of locking a stolen laptop and denying a thief access to the data is worth thinking about. Prey is currently available for Linux, Mac, and Windows based computers, and Android based phones. The iPhone and iPad Apps are currently under Apple’s review. | ||
Ligne 4: | Ligne 5: | ||
The location of the lost or stolen computer or phone will be tracked by an Internet access, the nearest Wifi access point, or GPS. Prey will then send us an E-Mail or a SMS, and then we can access our computer remotely with the following options: | The location of the lost or stolen computer or phone will be tracked by an Internet access, the nearest Wifi access point, or GPS. Prey will then send us an E-Mail or a SMS, and then we can access our computer remotely with the following options: | ||
+ | ** | ||
+ | Soyez serein. C'est le mot d' | ||
+ | |||
+ | Comment ça marche | ||
+ | |||
+ | La localisation de l' | ||
+ | |||
+ | ** | ||
• take a snapshot of the current user if there is a built-in camera. | • take a snapshot of the current user if there is a built-in camera. | ||
Ligne 16: | Ligne 25: | ||
Sound interesting? | Sound interesting? | ||
+ | ** | ||
+ | • prendre une photo de l' | ||
+ | |||
+ | • prendre une capture d' | ||
+ | |||
+ | • cacher les données privées Thunderbird ou Outlook et/ou détruire les mots de passe stockés. | ||
+ | |||
+ | • verrouiller l' | ||
+ | |||
+ | • envoyer le son d'une alarme et afficher un message sur l' | ||
+ | |||
+ | Ça vous intéresse ? Continuons. | ||
+ | |||
+ | ** | ||
First, visit the Prey website (http:// | First, visit the Prey website (http:// | ||
Ligne 22: | Ligne 45: | ||
When that is done, it's time to install the tiny Prey client on every device we want to protect. Since Ubuntu 11.04, we'll find Prey in the Ubuntu Software-Center. Install it from there, or via Terminal, with | When that is done, it's time to install the tiny Prey client on every device we want to protect. Since Ubuntu 11.04, we'll find Prey in the Ubuntu Software-Center. Install it from there, or via Terminal, with | ||
+ | |||
+ | sudo apt-get install prey | ||
+ | ** | ||
+ | |||
+ | D' | ||
+ | |||
+ | Pour le tester, la version gratuite est tout à fait suffisante et nous allons continuer la procédure. Après avoir entré votre nom, mail, pays, et mot de passe, vous recevrez un mail pour activer votre compte Prey. | ||
+ | |||
+ | Quand cela sera fait, le moment est venu d' | ||
sudo apt-get install prey | sudo apt-get install prey | ||
+ | ** | ||
For older Ubuntu versions, chose the download from the projects website and install with Gdebi. Next thing to do is to open the Dash. In the category System, we'll find the Prey Configurator. | For older Ubuntu versions, chose the download from the projects website and install with Gdebi. Next thing to do is to open the Dash. In the category System, we'll find the Prey Configurator. | ||
Ligne 36: | Ligne 69: | ||
We accept the Reporting mode as recommended. | We accept the Reporting mode as recommended. | ||
+ | ** | ||
+ | Pour les versions antérieures d' | ||
+ | |||
+ | Après l' | ||
+ | |||
+ | D' | ||
+ | Si vous n' | ||
+ | |||
+ | Ensuite nous devons penser à activer un compte invité. C'est une obligation pour les ordinateurs protégés avec un mot de passe, pour obtenir un accés à distance complet. | ||
+ | |||
+ | L' | ||
+ | |||
+ | Nous acceptons le mode Reporting comme recommandé. | ||
+ | |||
+ | ** | ||
Because the Prey account is already created, the last step is to type our login data (e-mail and password). | Because the Prey account is already created, the last step is to type our login data (e-mail and password). | ||
Ligne 46: | Ligne 94: | ||
Before changing something, let's take a closer look at the panel. It is clearly structured in three groups. The function of every switch will be displayed when we move the mouse over the question mark beside it. Functions labeled with a little red pro are available only in the pay version. | Before changing something, let's take a closer look at the panel. It is clearly structured in three groups. The function of every switch will be displayed when we move the mouse over the question mark beside it. Functions labeled with a little red pro are available only in the pay version. | ||
+ | ** | ||
+ | Comme le compte Prey est déjà créé, la dernière étape est de taper nos données de connexion (adresse mail et mot de passe). | ||
+ | |||
+ | C'est fini. L' | ||
+ | |||
+ | Le Panneau de contrôle | ||
+ | |||
+ | Pour vérifier si ça marche, et pour voir quelle options activer lorsque l' | ||
+ | Avant de changer quoique ce soit, regardons le panneau de plus près. C'est clairement structuré en trois groupes. La fonction de chaque interrupteur sera affichée quand nous passerons la souris au dessus du point d' | ||
+ | |||
+ | ** | ||
Let's start with the settings in the section “Information to gather.” | Let's start with the settings in the section “Information to gather.” | ||
Ligne 55: | Ligne 114: | ||
Under the section “Actions to perform”, currently we don't change anything, because these functions will work whether the computer is registered as missing or not. | Under the section “Actions to perform”, currently we don't change anything, because these functions will work whether the computer is registered as missing or not. | ||
Caution particularly with the Secure button! | Caution particularly with the Secure button! | ||
+ | ** | ||
+ | Commençons par les paramètres de la section « Information to gather » (Informations à collecter). | ||
+ | |||
+ | Évidemment les options Geo et Network doivent être sur ON. Pour plus de détails sur le réseau, il sera utile de basculer sur YES pour recueillir les connexions actives. Si l' | ||
+ | |||
+ | Ensuite nous pouvons choisir de prendre une capture d' | ||
+ | |||
+ | Sous la rubrique « Actions to perform » (Actions à effectuer), actuellement nous ne changeons rien, parce que ces fonctions seront actives, que l' | ||
+ | Faites très attention avec le bouton Secure en particulier ! | ||
+ | |||
+ | ** | ||
At least let's activate the Missing-button, | At least let's activate the Missing-button, | ||
Ligne 67: | Ligne 137: | ||
To prevent a thief from installing another operating system, we should protect the BIOS with a password, and disable booting from CD/DVD or other removable devices. | To prevent a thief from installing another operating system, we should protect the BIOS with a password, and disable booting from CD/DVD or other removable devices. | ||
+ | ** | ||
+ | Activons au moins le bouton Missing (manquant), enregistrons les modifications, | ||
+ | |||
+ | Quand j'ai fait ce test avec mon PC, après quelques minutes, j'ai reçu un mail me disant que l' | ||
+ | |||
+ | A savoir | ||
+ | |||
+ | Si un appareil est annoncé comme manquant, Prey nous enverra 10 rapports. Le onzième rapport écrasera le premier et ainsi de suite. Ainsi, nous voyons toujours les dix derniers rapports (jusqu' | ||
+ | |||
+ | Pour prouver que nous en sommes les propriétaires légaux, il est important de noter les numéros de série de l' | ||
+ | |||
+ | Pour empêcher un voleur d' | ||
+ | |||
+ | ** | ||
To format the HDD, or to remove the Prey-software from our Computer, a thief needs to know the administrator-password. | To format the HDD, or to remove the Prey-software from our Computer, a thief needs to know the administrator-password. | ||
There is no need to worry about updates for the prey software. It will update automatically when necessary. | There is no need to worry about updates for the prey software. It will update automatically when necessary. | ||
Ligne 76: | Ligne 160: | ||
This article can only briefly cover the basic essentials of Prey. There is much more to learn about. For further information, | This article can only briefly cover the basic essentials of Prey. There is much more to learn about. For further information, | ||
+ | ** | ||
+ | Pour formater le disque dur, ou pour supprimer le logiciel Prey de notre ordinateur, un voleur a besoin de connaitre le mot de passe administrateur. | ||
+ | Il n'y a pas besoin de s' | ||
+ | |||
+ | Le logiciel est open source et peut être vérifié par tout le monde. | ||
+ | |||
+ | Les gens de Prey disent que la vie privée est leur priorité numéro un, et qu'ils recueillent des informations uniquement avec notre autorisation. | ||
+ | |||
+ | Cet article ne peut traiter que brièvement les éléments essentiels de base de Prey. Il y a beaucoup plus à apprendre. Pour plus d' | ||
+ | |||
+ | ** | ||
Conclusion | Conclusion | ||
Ligne 95: | Ligne 190: | ||
Editor’s note: There’s also an Android version of Prey (https:// | Editor’s note: There’s also an Android version of Prey (https:// | ||
+ | ** | ||
+ | |||
+ | Conclusion | ||
+ | |||
+ | Rien ne garantit que nous retrouverons notre bien, mais nous pouvons améliorer nos chances. J'ai décidé de laisser ce petit gardien sur mes ordinateurs. La seule possibilité de verrouiller un ordinateur volé m'a convaicu. Soit dit en passant, dans le cas d'un cambriolage, | ||
+ | |||
+ | Pour le stockage de données sensibles, j' | ||
+ | |||
+ | URL intéressantes: | ||
+ | Site Web du projet Prey : http:// | ||
+ | Adresse du code source de Prey : https:// | ||
+ | Forum : https:// | ||
+ | IRC : http:// | ||
+ | |||
+ | Note de l' | ||
issue60/tuto_prey.1336017498.txt.gz · Dernière modification : 2012/05/03 05:58 de fredphil91