ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Track your stolen Macbook with the progam -Hidden

Updated on July 14, 2011

Hidden-The Macbook tracking Application

Find out where your Computer is with "Hidden"

Getting you Mackbook stolen is the worst thing can happen to you for several reasons. You might not be too concerned with the machine itself but you documents it carries. With this small piece of software, you will be able to track your computers location and also get photos of the thief and screenshots of what they are doing. All you then have to do is report it to the police with the evidence you have accumulated.

How does the software Hidden work?

The software is installed on your system and runs in the background. On setting it up you will assign an email address where all the information it collects goes to. So when you machine is stolen. The software will send you reports such as screenshots of the thief's activities.It will also send you photos which are taken discreetly with the computers camera. Other information such as the network information including ip addresses can be made available to you from the software providers. Because the software "calls home", it can track a computer from any location and send you the information.


How to track your stolen computer using this information

An example of how it would work is, imagine you are writing an email. You have an address you are sending it to and your account displays your name.The "Hidden" app will take a screenshot of this and send it to the rightful owner.This means the owner will see what you are typing and to whom.All this becomes evidence to nail the thief because their contacts and email account are revealed. Add a photo of the user to that and you have a visual. Taking all this information to the police makes it easier for them to then trace the culprit and recover your machine.

Comments

    0 of 8192 characters used
    Post Comment

    • Alladream74 profile imageAUTHOR

      Victor Mavedzenge 

      7 years ago from Oakland, California

      @myi4u. Thanks thats good to know

    • myi4u profile image

      myi4u 

      7 years ago from United Kingdom

      I never really used them though. On my iPad2, I just register to MobileMe and I will be able to track my iPad2 through it's wifi connection.

      For PC laptops, there's this Prey and it's free. For Mac, there's Back to My Mac. Back to My Mac is connected through MobileMe too. When you Mac is online, you will be able to connect to it from any other PC or Mac and then make any changes to it like normal VNC connection.

    • Alladream74 profile imageAUTHOR

      Victor Mavedzenge 

      7 years ago from Oakland, California

      @ myi4u. Thanks, good to know,do you have any names of such?

    • myi4u profile image

      myi4u 

      7 years ago from United Kingdom

      Just want to add that there are also software that actually tracks the location of the laptop or Mac. When the machine is connected to the internet, it will automatically send the information to the owner. Then owner can then decide to lock the computer or even format the computer.

    • Alladream74 profile imageAUTHOR

      Victor Mavedzenge 

      7 years ago from Oakland, California

      Hi Nour

      I think that would be unfortunate and near impossible if they live in a city. But I do know that it ques all the information until there is a connection.

    • profile image

      Nour  

      7 years ago

      Woow , really it good thing , but how it will work if the theif doesnt connect to any local network ?

    • Alladream74 profile imageAUTHOR

      Victor Mavedzenge 

      7 years ago from Oakland, California

      @ J.S.Matthew-great move, nothing is as annoying as having it stolen and kicking your self for not being pro-active.

      @Rebecca.E-Thank you for stumbling this,I shall return the favour on your articles too,I love Stumbleupon.

    • Rebecca E. profile image

      Rebecca E. 

      7 years ago from Canada

      great information I've added this to StumbleUpon to get teh word out.

    • J.S.Matthew profile image

      JS Matthew 

      7 years ago from Massachusetts, USA

      In this day and age, everyone needs some kind of theft prevention tool. Personally, I have Lo-Jack for Laptops on mine. I ordered it when I customized a computer through Dell. Great article! Voting Up and Useful.

      JSMatthew~

    • Alladream74 profile imageAUTHOR

      Victor Mavedzenge 

      7 years ago from Oakland, California

      Yes,I did not put that in the write up, thanks for mentioning it.Amazing what you can do nower days!

    • justom profile image

      justom 

      7 years ago from 41042

      This just happened last week. It was on the news and they showed the photos of the thief taken by the guys computer. He got busted and the computer made it back to the owner. I think this software is brilliant. I always love to see jackass's that steal get the tables turned. Peace!! Tom

    • Dexter Yarbrough profile image

      Dexter Yarbrough 

      7 years ago from United States

      Great information. I will make sure to pass it along to all my Mac friends. I am sure they haven't heard of Hidden. Thanks!

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)