FireFound is an add-on for Firefox and Fennec (mobile Firefox) that helps your find your computer (or mobile phone, in the case of Fennec) if it is lost or stolen. Every time your computer’s location changes, FireFound sends a secure message to a central server with its current location. You can then log into the server and see your computer’s current location.
All of the location data is encrypted, so no one can find out where your computer is without your password.
If you lose your computer, you can tell FireFound to clear your personal data (saved passwords, browsing history, etc.) if anyone starts your browser before you can retrieve it.
You can even run your own FireFound server; all of the code is open-source.

Note: All geolocation data is approximate, and should only be used as a guideline. If your computer has been stolen, do not try to retrieve it yourself – alert the police.


You can download the FireFound browser add-on from Mozilla Add-ons. The next time you restart your browser, you’ll be asked to choose a username and password for your account. You can use that username and password to log in at this website and view the latest locations of your computer.

Prey is a lightweight application that will help you track and find your laptop if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free. 

Find your laptop

Recover what is rightfully yours

Prey helps you locate your missing laptop by sending timed reports with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and — in case your laptop has an integrated webcam — a picture of the thief.
Prey web service

Silent but deadly

Prey uses a remote activation system which means the program sits silently in your computer until you actually want it to run. If so, it gathers all the information and sends it to your Prey web control panel or directly to your mailbox. The thief will never know his movements are being watched.

And because there’s always hope

You may be thinking “but what’s the point of this program if the guy will probably just format the thing right away?” and you’re completely right. However, experience shows that thieves tend to look in stolen computers for valuable information, so there’s actually a chance you can catch the guy (and there’s even some successful cases!).
Besides, if by using Prey you can keep alive a tiny bit of hope that you’ll recover your computer, isn’t it already worth it?

Prey auto connect

Wifi autoconnect

Prey checks if there’s an active internet connection to send the information. If not, it will attempt to connect to the nearest open wifi access point available. This gives you a better chance to locate the device.

Geo location aware

Geo-location aware

Prey uses wifi hotspots to locate devices geographically. This not only includes lat/lng coordinates, but also an altitude indicator — yes, that means you can also know (aprox.) in which floor the computer is.


Prey auto connect
Yes, this is a feature. Prey is written in bash which means it has virtually no dependencies, only what its different modules need to work. This also means Prey is portable and should run in just about any computer.
Prey auto connect

Modular architecture

You can add, remove and configure the different parts of Prey as you wish. Prey is composed by modules, each one performing a specific task, so you can have it as you like.
Powerful report system

Powerful report system

Get the list of current running programs, the recently modified files, active connections, running uptime, take a screenshot of the running desktop or even a picture of the guy who’s using the computer.
Messaging system

Messaging/alert system

You can alert the user he’s being chased at by sending messages which’ll appear on screen. You can also trigger alarms to make the message clear not only to him but also to whomever is nearby. Be careful with this one!
Module auto-installer

Module auto-installer

You don’t have to reinstall Prey to keep up with the latest and greatest modules. We keep a repository from where Prey will fetch what it needs to get the job done.

Prey runs in intervals

In plain English

Prey wakes up at a specified interval and checks a URL to see if it should gather the traces and send the report. If the URL exists, Prey will simply go to sleep again. Basically, that’s it.
However, there’s two ways to run Prey: synchronized with the web control panel or in a standalone fashion.
Prey web panel config

1. Prey + Control Panel

In this case, you manage your computer state and Prey’s configuration through a web page, which also keeps track of all reports sent by Prey from your device. This is the method we recommend for most users, since you don’t have to worry about the URL thingy and you can actually “talk” to Prey by triggering different behaviours.
Prey email sending

2. Prey Standalone

In standalone mode, the report goes directly to your inbox but it’s up to you to generate the URL to activate Prey. In this case you don’t need to sign up in Prey but you’ll have to set up the different modules by hand if you want to tune things up. This is actually the way Prey worked before version 0.3 was released.
Of course, Prey needs to have an active Internet connection to send the information. If the computer isn’t connected, Prey will attempt to connect to the nearest open wifi access point available.
In Linux/Mac, Prey can (and should) be run as root so it doesn’t depend on an active user session to run, but only on a successful boot.


You can download prey here



Amateur radio operator from Malaysia

Leave a Reply

Your email address will not be published. Required fields are marked *