Stolen Dell Computer Tracked Down With Computrace. What Is Computrace In Dell?

Asked By 0 points N/A Posted on -
qa-featured

I purchased Dell D620 with the 4-year computrace package. What is computrace in Dell and how does it work?

SHARE
Best Answer by Sharath Reddy
Answered By 0 points N/A #286066

Stolen Dell Computer Tracked Down With Computrace. What Is Computrace In Dell?

qa-featured

Computrace is anti-theft software which is built into program laptops. If your laptop is stolen this software tracks it down and provides the tracker with the information they need to find it back. Those who have purchased a Dell laptop of series D610, D620, D630 and E6400 in the fall of 2007 and had 4-years Combat other years vary in other dimensions. Customers can avail this service for 4- years from the date of purchase.

Best Answer
Best Answer
Answered By 590495 points N/A #291003

Stolen Dell Computer Tracked Down With Computrace. What Is Computrace In Dell?

qa-featured

CompuTrace is now known as “LoJack for Laptops”. It is a proprietary laptop theft recovery application that is able to lock the laptop remotely, delete the files, and track the stolen laptop on a map. This persistent security feature is actually integrated into the firmware of the device itself.

Also, LoJack for Laptops offers extra services like an investigation and recovery team who teams up with law enforcement agencies around the world to return protected laptops to the owners. LoJack for Laptops or CompuTrace that were activated occasionally phones home, the Absolute Software server, to both announce its current location and to check if the machine has been reported stolen.

The CompuTrace persistence module from Absolute Software is preinstalled into many BIOS images by nearly all laptop vendors. When Kaspersky Lab analyzes CompuTrace, it reveals that the software has been pre-activated without user authorization. The software agent acts like a rootkit that reinstalls a small installer agent into the Microsoft Windows operating system during boot time.

This small installer agent will then later download the complete software agent from Absolute Software’s server using the internet. Unfortunately, this small installer agent is vulnerable to certain local attacks and hacker attacks which can then control the network communication of the victim.

Related Questions