ENCORE Laptop Cop v2.0

ENCORE Laptop Cop v2.0

MPN: 11991
发送方式:
交货来源:
德国
更新价格... 📣 询问价格 Не поставляется
运输成本:
От

凡购买和价格 (Advertising *)

顶部
в наличии
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten. Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.

技术特点

顶部

系统要求

最低内存 256 MB
最低处理器 1GHz
最小硬盘空间 30 MB
推荐RAM 512 MB
Remote Access to Your Stolen Laptop The ultimate tool to help Law Enforcement recover your laptop and bring the criminals to justice

With so much important information being stored on computers today, recovering the laptop is only one part of the process. For most people, retrieving irreplaceable things like personal files and photos and stopping a thief from viewing private information is even more important. That's where Laptop Cop comes in.

Laptop Cop is an invisible piece of software that gives you secret access to your computer remotely over the Internet no matter where the thief takes the computer. By being able to take control of your computer without the thief's knowledge, a whole world of possibilities beyond just recovering the computer opens up to you

In the event of laptop theft or loss, Laptop Cop's patented technology allows you to geo-locate stolen laptops in real-time. You can also remotely delete/retrieve files from the stolen computer and also monitor and control the thief's every action. We'll also work with law enforcement to recover the physical property.

<b>Features:</b>
- Improved! Geo-locate laptops in real time no matter where an employee or thief goes.
- Improved! Monitor and control everything the thief does.
- Location of laptop plotted on map.
- Geo-location is determined by wi-fi signals, not IP address. Much more accurate.
- Geo-location is more accurate than GPS.
- Remotely delete files from the stolen laptop.
- Get confirmation of deletion of files.
- Deletion done at a US Dept. of Defense standard that ensures complete destruction of the files.
- Remotely retrieve files from the stolen laptop.
- Lock down the stolen laptop if desired.
- Our recovery team works with law enforcement to recover the physical machine.
- Purchaser entitled to 1 year subscription term for service to monitor one laptop.

<b>Additionally:</b>
- Supports different settings for each user of a machine.
- No hardware required.
- Can be used in a Terminal Server or Citrix environment.
- Ties in with Active Directory.
- Quick, easy, and silent deployment with no user prompts if desired.
Фотографии

    密码恢复
    要恢复您的密码,请在下面您的电子邮件地址框与您已注册请输入:
    The password reset code has been sent to your Email.
    Код уже был отправлен Вам ранее.
    Вы можете ввести его в поле выше, или получить новый код через сек.
    发生了错误。请检查您的电子邮件地址,然后再试一次。
    Ваш новый пароль:

    名称为空


    Выберите страну доставки

    您还没有写消息

    By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.

    已发送您的消息!

    親密

    1
    产品目录
    取消
    Бренды:
      Выберите бренды
        查看更多
          地區搜索
          全球
          Категории
            产品名称