Undercover

Download Now (7.29 MB)

Version
5.6
License
Update
Date added
15 January 2014

Publisher's description

Undercover routinely checks with the Undercover server. In case of theft, the Mac's unique Undercover ID is added to the list on the Undercover server, initiating the recovery process. During the recovery phase, Undercover transmits its current location on the internet, enabling the Undercover team to identify the computer's exact physical location. Moreover, Undercover also sends screenshots of the stolen Mac, revealing details of the thief's identity. The Undercover recovery center will then work with law enforcement to recover the Mac.

In case recovery fails, the software has an ingenious plan B: it will simulate a hardware failure, urging the thief to send the computer in for repair or sell it. As soon as the thief gets rid of the Mac, Undercover will warn the new user that the Mac has been stolen and that it should be returned as soon as possible. The computer will shout from time to time that it has been stolen and Undercover will take over the screen, displaying how the Mac can be returned while making the computer unusable.

CNET Australia is not responsible for the content of this Publisher's Description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws. Any questions, complaints or claims related to any specific download should be directed to the relevant vendor.

Download Now (7.29 MB)

Recently Viewed Products