This enables you to encrypt files and folders remotely if the laptop is stolen. Of most use is the incredibly handy RemoteKill option. Most of these features are geared more towards an individual or company that wants to make sure that a laptop is being used for the right purposes. The software tab offers more illuminating details of what programs have been installed on the laptop while Event Log keeps you up to speed on what your laptop's being used for. The Hardware/OS section, lists your devices' hardware configuration, and isn't much use unless you need to see if someone has changed any of the hardware in your laptop. The public IP address is also displayed, along with whether or not the device is connected to the internet. It was good, and got the right road, but was a few buildings out when some of its competitors were more accurate. When selecting an asset to track you'll be shown its location on Google Maps, using similar Wi-Fi triangulation technology as the other services we've tested here.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |