Laptop trackers

Cables and locks, file encryption, passwords and biometrics — they all help physically secure notebook computers and protect their data. But once the horse is gone, is there anything you can do but close the barn door?

Fortunately, stealth tracking products can trace lost or stolen notebooks. I tested three of the leading products: Brigadoon Software's PC PhoneHome, Stealth Signal's XTool Computer Tracker and SyNet Electronics' nTracker.

According to stealth tracking software vendors, FBI statistics indicate that only 2 percent to 3 percent of stolen or misplaced computers are ever recovered. The products we reviewed look to improve that rate of recovery and provide some enterprise tracking benefits.

All three products work by sending configuration and tracking information — usually in the form of an e-mail — to the software manufacturer's servers or to servers and individuals specified by the systems administrator when the computer containing the stealth tracking software connects to the Internet.

The stealth message contains information useful to law enforcement agencies in attempting to recover a lost computer, such as ownership information, the machine's current IP address and hardware serial numbers. Two of the products, PC PhoneHome and XTool Tracker, also provide support staff to help you recover lost or stolen computers.

The software we tested is compatible with Microsoft Windows 98, Me, NT 4.0, 2000 and XP. PC PhoneHome and XTool Tracker also work with most versions of the Apple Computer Macintosh operating system. The software can be used with desktop and laptop computers.

I evaluated the products based on their ease of installation and use, invisibility to users, enterprise-tracking and management benefits, and price.

For a test bed, I employed a Hewlett-Packard desktop PC running Windows 2000 Pro, an HP desktop PC running XP Home Edition and a Winbook laptop configured with Windows 2000 Pro.

Smooth installation

Overall, installation of the products went smoothly, with only minor glitches. Most of my time was spent collecting the PC hardware and serial number information, not a difficult task for my three-PC test center, but a job that systems administrators in charge of a whole laptop fleet may find daunting. I also had to enter user registration information, including name, organization address, phone numbers and unique IDs or code words that would assist the administration of deployed computers.

XTool Tracker had the most understandable and intuitive graphical user interface (GUI) during installation. It also had the best installation options, enabling administrators to install a single client, push XTool Tracker out to multiple licensed clients, configure a package for mass deployment via third-party imaging software, such as Symantec's Ghost, or simply uninstall a pre-existing version of the application.

On the other hand, when we installed nTracker, its cryptically worded GUI and on-screen prompts forced us to repeatedly refer to the installation documents to make sense of what we were seeing on-screen.

On the positive side, nTracker's abundant documentation was easy to read. PC PhoneHome's installation was the most simple and straightforward of all three products, requiring us to fill out one brief screen, click Register and reboot.

After installation but before fully testing the software, I verified that the registration data was properly validated. An important caveat for users of stealth tracking software: Always abide by the purchased license agreements. Violation of the license agreements — for example, by deploying the same software on more PCs than your license is valid for — could prevent you from recovering a stolen laptop in court. A case can be thrown out if defense attorneys prove you violated the license agreement.

All of the vendors we tested help protect users from this problem by providing a unique license ID for each version of the software that is deployed. For enterprise deployments, software company officials typically work with your organization to ensure that license agreements are not breached.

After installing the software, I rebooted and immediately noticed an important feature of all stealth tracking software: its invisibility to the user. We did not notice PC PhoneHome, XTool Tracker or nTracker in the disk directory, Task Manager or Control Panel. All three were invisible to our scan of the Windows registry, so someone absconding with a computer would not

realize the software is armed.

The only indication I had that stealth tracking software was working was when my finely tuned software firewall detected PC PhoneHome and XTool Tracker's attempts to connect to the Internet — nTracker evaded detection completely. The firewall alert was not exactly a deal-breaker because a good systems administrator would configure the firewall to allow stealth traffic to pass through unhampered before deploying the software fleetwide.

All three applications we tested have possible drawbacks. If a laptop gets snatched by technically savvy thieves who have additional firewalls in place, they could detect and block the tracking messages. We noticed it took between 30 seconds and a minute of connection time for the applications to send their stealth

e-mail messages, so even the shortest Internet sessions are long enough to track a machine.

Although the covert nature of these applications is a plus, we also liked an overt feature that nTracker allows. Administrators can choose from three display messages that will appear on screen to a thief, ranging from "courteous persuasive" (message text: "This computer is now used by an unauthorized user. Please stop and call this number.") to "warning" (message text: "This computer has been stolen or lost. Call the owner or you may be involved in a legal problem."). It's an effective way to deter a would-be buyer of a stolen computer or to alert someone who simply found a lost laptop and wants to return it to the owner.

Unfortunately, my testing of PC PhoneHome hit a snag when I did not receive the automatic configuration e-mail in my inbox as promised. PC PhoneHome has problems with e-mail relaying, which is e-mailing yourself from your own PC, because some Internet service providers block e-mail sent through PC PhoneHome's Simple Mail Transfer Protocol (SMTP) settings.

Therefore, we did not receive the stealth e-mail containing tracking data until we switched to another connection using America Online dial-up service. Brigadoon Software officials say their next release will address this problem. I was also told that the stealth e-mail generally reaches the Brigadoon Software archive servers even if it does not reach you, so tracking a lost asset is still possible with their help.

A definite plus, nTracker avoided the mail relay problem with a built-in SMTP engine. However, because its brief activity alerted our firewall, we realized that motivated thieves could figure out a way to block nTracker's stealth signal if they suspect the software is installed.

Enterprise-level tracking

Also to its credit, Stealth Signal's XTool Tracker automatically sends tracking information to its control center servers. Advanced users can add their own SMTP server, but similar e-mail relaying problems could occur, depending on the ISP.

Administrators of the computer fleet can then view the tracking information from anywhere online via a secure, customer-specific control panel available on the Stealth Signal Web site.

XTool Tracker takes the LoJack theft-tracking and recovery approach of these applications a step further by offering tremendous enterprise tracking and management options for administrators via the secure Web site.

XTool Tracker's level of detail is almost chilling. With just a few clicks inside the control console, I saw a world map with my location perfectly marked. With a couple of clicks, I saw detailed IP address information, including my IP address, my Ethernet card's Media Access Control address, my ISP and contact information for the ISP.

For an added cost, more enterprise tracking and management options can be enabled on the XTool Web page, such as software inventory management and detailed reporting.

XTool Tracker's $49.95 per-license, per-year price tag gave me a bout of sticker shock at first. But I ultimately had to agree the product was worth it, especially for agencies looking for a comprehensive stealth tracking and enterprise-management solution.

Two other products, the XTool Asset Manager and XTool Data Protector — individually priced at $25 and $35, respectively — work hand-in-hand with XTool Tracker to provide comprehensive enterprise features such as software inventory management and remote data encryption.

When purchased in conjunction with the other products in Stealth Signal's suite, the company offers significant savings of 5 percent to 20 percent, depending on the number of licenses and products purchased.

By contrast, the considerably less expensive nTracker and PC PhoneHome leave the enterprise tracking largely up to you. With no fancy Web interface, you must sort through the stealth e-mails sent from your deployed fleet. I did find that some configuration options can be controlled by nTracker Viewer, a separate application that comes with nTracker.

PC PhoneHome Enterprise and nTracker Enterprise are designed primarily for efficient multiple-copy installations. Although the regular versions require an administrator to enter system and ownership information on each machine, the enterprise versions have that data hard-wired into the package before delivery. That way, administrators can use push technology or imaging to install the software on many machines at once.

Lack of a Web interface was disappointing, but nTracker and PC PhoneHome cost significantly less and work well. PC PhoneHome Lite is a free application that sends stealth e-mails. But unlike purchased versions, it can be removed from the hard drive by running simple format, low-level format or fdisk procedures. These programs prepare disk drives to hold data or dictate where data is stored on the disk.

PC PhoneHome Pro, which we tested, is appropriate for individuals or small- to medium-scale installations. Unlike the Lite version, it can withstand disk-formatting procedures by blocking common disk-formatting commands, such as "fdisk" or "format." PC PhoneHome Pro has a one-time price of $29.95 with no annual fees for use. Special bundle pricing is available for the PC PhoneHome Enterprise edition.

File encryption

SyNet's nTracker and nTracker Enterprise range from a one-time cost of $29.99 for a single version of nTracker to $49.99 and more for multiple computers licensed with nTracker Enterprise.

Aside from the differences in pricing, an important warning about PC PhoneHome and XTool Tracker is that they do not protect the data on a computer. A thief still has access to all unprotected data. To its credit, nTracker adds the critical ability to encrypt file directories of your choosing. Stealth Signal offers a remote data deletion service and the XTool Data Protector product to help secure data, but both of these services cost extra if utilized or purchased.

Stealth software caveats

Also, some general caveats about all stealth-tracking software: As vendors recommend, systems administrators should reset the boot sequence so a machine only boots from the hard drive and protect this setting with a supervisory password. Otherwise, someone could boot from the floppy or CD-ROM drive and possibly delete the stealth tracking software by installing another operating system.

What's more, motivated thieves could find ways to disable stealth tracking software. What's to stop a thief from simply discarding a pilfered laptop's hard drive and buying an inexpensive replacement? These alerts simply underscore that none of these software solutions are completely foolproof. All work best when used in conjunction with file encryption, password and biometric protection, and physical security measures.

As physical recovery devices, PC PhoneHome Pro and nTracker are inexpensive, effective ways to track the location of a missing computer. The programs are simple to install and manage for smaller deployments, and nTracker earns special accolades for its folder encryption and warning messages.

XTool is a more expensive answer to an agency's stealth tracking needs, but it's well worth a look for larger deployments. Its Web-based interface provides enterprise tracking options that are second to none, while the Enterprise versions of PC PhoneHome and nTracker merely remove some of the overhead associated with configuring a large mobile fleet.

Gray is a freelance writer based in Falls Church, Va.

STOP laptop theft

Solutions for tracking stolen laptop computers can be used in conjunction with stealth software such as Security Tracking of Office Property (STOP).

STOP is a rugged, plastic security plate compatible with any important equipment you wish to secure, computer-related or not. The STOP security plate displays a warning message with a URL and phone number that alerts would-be buyers of stolen property. The warning also provides a means for recovery when the item is discovered in an airport lounge or taxicab by a well-intentioned person who wants to get the item back to its owner.

Property bearing the STOP plate is registered with STOP, and company officials will work with you and law enforcement agencies to recover the item.

"We are not trying to be a LoJack for computer security; we're trying to be the Club," said STOP President Yves Berliet, referring to the popular theft prevention device for cars. STOP's main mission is theft deterrence. If people see the STOP warning on a piece of equipment, they know it is protected and they are less likely to steal it, he said.

STOP can thwart even the most motivated thieves. Once affixed with a special gel, the STOP security plate is designed to withstand up to 800 lbs. of force. Even if a persistent individual succeeds in removing the tag, he or she will find another warning message beneath it with a toll-free number and the words "stolen property." This message is permanently etched into the device's plastic.

STOP security plates cost $8.75 for 500. A 20-gram gel kit that helps make the plate stick and activates the permanently etched "stolen property" tattoo costs $13 and each 20-gram kit works on up to 75 plates. The company also provides a comprehensive barcode system, complete with a handheld barcode scanner and software, for $2,500.

Used with other means of security, such as stealth tracking software, file encryption and/or password, and biometrics authentication, STOP could be the final element to an agency's security system.

— Ed Gray

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.