Laptop Lojack
February 6th, 2014
CrackedEggs replied: I didn't even want to turn it on
Why? Is it stolen and you made up this whole story? Doesn’t make sense otherwise.
I think it is stolen I just don’t want to get busted trying to help a friend out
CrackedEggs replied: he wanted to do a fresh install on it and such and wanted to know if you could tell if it had lojack on it or not
So you or your friend never turned it on and did a fresh install? You just “wanted” to do the install?
Just never boot from the hard drive. Boot straight into a windows install and format the HDD. If there was anything on it, its gone now =D
CrackedEggs replied: I think it is stolen I just don't want to get busted trying to help a friend out
Gee,You think?,What made you reach that conclusion? This “friend” wouldn’t happen to be yourself would it?
Frankly,Your story is hard to believe.
As long as it’s not connected to any internet source Lojack can’t do anything. Boot into Setup (F2) and if it has lojack there will be a menu option for lojack (Computrace) in security tab.
Formatting the HDD will not get rid of lojack. It is a BIOS module.
KindGrower replied: Formatting the HDD will not get rid of lojack. It is a BIOS module.
There is more than one type of “lojack”. If it has Computrace Lojack, that can simply be removed by flashing the bios.
Also, I hear Computrace Lojack does not work on Linux operating systems (third party info, don’t catch me in a lie).
Or maybe it has this on it…
http://preyproject.com/#description
Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It’s lightweight, open source software, and free for anyone to use. And it just works.
How it works
Overview
Reports
Actions
Usage
Prey Overview
Silent but deadly
Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device’s location, hardware and network status, and optionally trigger specific actions on it. Next