Are they worth it? I have a new laptop, and though I’ll stand by it whenever I am in a completely public setting, here at school there will inevitably be times when I have to leave it at a desk in search of a book. This justifiably terrifies me. Though there is limited security at the entrance, and though ‘everyone else does it’ it is still at risk.
I just installed ZeaSoft’s Homing Pigeon which will requires a $25.00 registration fee at the end of the 30-day trial. It loads quasi-invisibly at startup (I can see it under msconfig though) and promises to passively e-mail a selected account every time it detects a TCP/IP connection. The email it sends contains IP and traceroute information that in theory, could help me (or the police) locate the machine. It claims to be able to survive a typical reformat of my hard drive, and work through a firewall. Of course, nothing is perfect, but it seems to be able to survive a run of the mill (as opposed to professional) theft.
Are these programs worth it? Has anyone heard or know of real success stories? How does Homing Pigeon compare to other similar programs? $25.00 is really nothing compared to the piece of mind I would get. But if it is superfluous software that wouldn’t really do me much good in the first place, I’d rather buy beer.
OK I obviously missed this the first time. I don’t see how it could survive a reformat though. Does the test version have this capability? If so, I’ll be happy to test it on my laptop and give you a better review.
It seems that there are two ways Homing Pigeon tries to prevent being removed by a thief. They are clear in their descriptions and whatnot that it is not a perfect method, but seems to be a good measure that would work if the thief was not a professional and not on the lookout for such methods. From their FAQ page:
This seems pretty dramatic. I don’t know if I’d want to give up the ability to boot to a disk or boot up in safe mode. The other method is much more basic, though I wonder how much RAM it would take up. The machine has 256 on it now, so it probably wouldn’t be too much of an issue. The second method is:
The second tier seems much weaker and easier to spot if someone is on the lookout. But again, if someone is savvy enough to check for it before using the laptop, not much would help out. It seems to be designed for the case where a thief sells it to a third party- the thief doesn’t need to do much cleaning in the first place, and the third party wouldn’t be on the lookout.
I’ve logged in and out a few times today, and every time I did it I received an email shortly afterwards. Thanks for any help/ opinions.