The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Anti-theft Devices

    Discussion in 'Apple and Mac OS X' started by taelrak, May 13, 2011.

  1. taelrak

    taelrak Lost

    Reputations:
    860
    Messages:
    2,979
    Likes Received:
    0
    Trophy Points:
    55
    Orbicule Undercover+Witness vs. Prey vs. LoJack for Macs.

    So I bought Orbicule waay back when it was the only solution for OSX, and since then have been grandfathered into each new version and MBP I got. No clue how useful it is in practice since my laptop has never been stolen yet, but it has other uses (especially as I no longer subscribe to MobileMe).

    Since then though, a number of competitors have sprung up, the most notable of which are LoJack for Macs and Prey. Anyone have any opinions on the three, or have tried out all three and can offer any comparisons?
     
  2. SP Forsythe

    SP Forsythe Notebook Evangelist

    Reputations:
    173
    Messages:
    664
    Likes Received:
    0
    Trophy Points:
    30
    Undercover and Lojack are similar, though Undercover appears to be more feature rich, While Lojack is more established and well known (whatever that is worth). Both products can be defeated by a format and re-install, or by a HDD replacement. But in both cases, if you use a firmware password, at least you have some measure of data security, and even more if you use FileVault too. Lojack has one feature (that I don't see in Undercover) that may come in handy, that being "Remote Delete". You can delete sensitive data, while still retaining traceability by stealth. That can come in handy, as more stringent methodology might lead a thief to ditch the HDD first, if he knows it's running trace software.

    Prey, I am unfamiliar with.