- #REPORT STOLEN MAC SERIAL NUMBER SERIAL NUMBERS#
- #REPORT STOLEN MAC SERIAL NUMBER SERIAL NUMBER#
- #REPORT STOLEN MAC SERIAL NUMBER SOFTWARE#
- #REPORT STOLEN MAC SERIAL NUMBER DOWNLOAD#
- #REPORT STOLEN MAC SERIAL NUMBER MAC#
#REPORT STOLEN MAC SERIAL NUMBER MAC#
Network information giving you a list of active connections with the MAC addresses and public and private IP addresses.In addition to locating your Mac through wi-fi networks, displaying a message, triggering an alarm sound and locking the Mac, Prey adds a number of features to give you more information about your stolen Mac. You can opt to be notified by email when your Mac next comes online. Your Mac’s last known position and time will be displayed should it not be online at the time that you check. Remember the uproar in many countries when Google Streetview cars were collecting such information?. It is rumoured that Apple has been compiling its own such database. This is done using databases of wi-fi access points such as Skyhook.
It uses this information to triangulate its likely position from a database of known wireless access point locations. When, or if, it is next connected to the Internet, its location will be determined using the IP address and from the wi-fi base stations that your Mac can see. Whether or not you will be able to locate your Mac will depend on whether it is subsequently turned on and connects to the Internet. You can use this app on a friend or colleague’s iOS device to locate your Mac.
#REPORT STOLEN MAC SERIAL NUMBER DOWNLOAD#
Instead, download the free Find My iPhone app (for iOS 5 and later) from the app store. Tip: You can use an iPhone or iPad to locate your Mac but you will not be able to log into iCloud on Safari. The lock is placed through the loop of the wire that has been passed around a large, heavy or static object. The Kensington Lock is a length of steel wire formed into a loop at one end and a lock, usually combination or key-operated, at the other. Probably the most popular anti-theft device for Macs, both desktop and laptop machines (and even PCs) is the Kensington Lock. It is not a guarantee that a thief will not take your Mac. That is why you should consider a physical deterrent.Ī visible deterrent is just that. Physical DeterrentsĪ visible deterrent is just that.
#REPORT STOLEN MAC SERIAL NUMBER SERIAL NUMBER#
If the visible deterrent doesn’t work, the fact that your serial number is registered on a national database means there is still a chance your Mac will be identified as stolen and returned to you. Immobilize (US) feeds into the TraceChecker database which is gaining traction with businesses and police in the United States, particularly police departments in Boston and Texas. Immobilise (UK) feeds data into the NMPR (National Mobile Property Register) used by all 43 Police forces in the United Kingdom. Recipero, the company that operates Immobilise (UK) and Immobilize (US) maintains a database, CheckMend, used by companies and individuals to ensure they are not buying stolen equipment. A similar database for people in the United States is available at .Īn Immobilise asset tag on a piece of equipment. A range of stickers, that can be purchased from Immobilise, warn that equipment is registered and traceable in the event of a theft.
#REPORT STOLEN MAC SERIAL NUMBER SERIAL NUMBERS#
If you are a freelancer, or an individual who owns a Mac, you may wish to look into services such as, in the United Kingdom, which is a free to register database where serial numbers of your Mac (and other items) may be recorded. If this label is obvious and/or difficult to remove (some leave VOID markings if removed) then that may be enough to deter a thief. If you work for a large company, it is possible that you already have an asset tag affixed to your machine.
#REPORT STOLEN MAC SERIAL NUMBER SOFTWARE#
Tracking software is not a panacea it is far better to prevent a theft from happening than to have to recover your Mac following its theft.Ī visible deterrent can be as simple as an asset tag or “traceable” sticker on your Mac.
It is possible for software to locate your Mac, provided that you set it up before a theft. This article looks at preventing the theft of your Mac in the first place, and techniques to facilitate it's recovery should it be stolen. While the title says "MacBook," many of the points discussed in this article apply, equally, to desktop Macs. Let's examine the deterrents and technology. There are deterrents that you can use to prevent your Mac from being stolen and there is technology that can be employed to locate your Mac (and even who is using it). They will steal your Mac, given the opportunity, if it is left alone at the coffee shop, in the workplace, in your car or even in your home.