computer security theft prevention - spacer

Software
computersecurity permanent marking company - PCPhoneHome PC PhoneHome™ is the pre-eminent computer tracking and theft recovery software in the world. Unlike other tracking agents, PC PhoneHome™ allows the user to do their own monitoring at a significant reduction in cost. With PC PhoneHome™ there is no yearly monitoring fees, no additional charges, and no hidden costs! How does PC PhoneHome™ work? Every time you boot your computer and have an Internet connection, PC PhoneHome™ sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the user. In the event the computer is stolen, you file a theft report with the local police and then notify Brigadoon Software's Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online, it will send a stealth message to the pre-determined e-mail address containing its exact location. Once this information is received, our recovery agents work with you and the investigating law enforcement agency to recover the stolen property. Worldwide tracking and recovery. Highly tamper-proof. Can't be removed by unauthorized parties. Compatible with Windows 95/98/ME/XP/NT/2K.

computersecurity permanent marking company - MacPhoneHome MacPhoneHome™ is the pre-eminent computer tracking and theft recovery software in the world for Macintosh computers. With MacPhoneHome™ there is no yearly monitoring fees, no additional charges, and no hidden costs! How does MacPhoneHome™ work? Every time you boot your computer and have an Internet connection, MacPhoneHome™ sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the user. In the event the computer is stolen, you file a report with the local police and then notify Brigadoon Software's Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address containing its exact location. Once this information is received, our recovery agents work with you and the investigating law enforcement agency to recover the stolen property. Worldwide tracking and recovery. Highly tamper-proof. We supply both Classic and OS X versions at no additional cost.

computersecurity permanent marking company - PCPhoneHome for PocketPC PC PhoneHome for PocketPC™ is without competition. It is the only tracking and recovery software application in the world specifically created for the PocketPC operating system. We based the design for PC PhoneHome for PocketPC™ on our award-winning PC PhoneHome™ and MacPhoneHome™ engine. PC PhoneHome for PocketPC™ allows the user to do their own monitoring at a significant reduction in cost. With PC PhoneHome for PocketPC™ there is no yearly monitoring fees, no additional charges, and no hidden costs! How does PC PhoneHome for PocketPC™ work? Every time PC PhoneHome for PocketPC™ makes an Internet connection via Wi-Fi or HotSync, it sends a stealth email message containing location information to a pre-determined email address of the user's choice. In the event the PDA is stolen, you file a report with the local police and then notify Brigadoon Software's Command and Tracking Center, which will provide full tracking and recovery support. When the stolen PDA goes online, it will send a stealth message to the pre-determined e-mail address containing its location. Once this information is received, our recovery agents will work with you and the investigating law enforcement agency to recover the stolen property. Worldwide tracking and recovery. Highly tamper-proof. Can't be removed by unauthorized parties.

computersecurity permanent marking company - PCPhoneHome Enterprise PCPhoneHome/MacPhoneHome Enterprise™ is the only computer tracking and theft recovery software in the world capable of large-scale network deployment to a large number of computers using different operating systems simultaneously. Imagine if you had to install and configure any software package on hundreds or thousands of computers. We've taken the hassle out of protecting your computers with Enterprise! Enterprise allows your organization to deploy either the Windows or Macintosh version of Enterprise via "Ghosting" or various "Network Push" techniques. Unlike our Pro version, which needs to be individually configured, Enterprise is configured for your organization here in our lab. We hard code your organization's ownership and reach information right into the source code. You simply deploy your customized Enterprise edition to your organization's machines. No hassle. No long term deployment time frame. Same specs as Windows and Macintosh Pro versions. Used by academic institutions, corporations and government agencies worldwide. Special low cost Enterprise versions allow organizations to safeguard their property at a fraction of retail cost.