Sunday, August 26, 2007

Orbicule | Undercover

Orbicule | Undercover

What happens when my Mac is stolen?

IP information

Transmission of network information

Like most other theft-recovery software, Undercover will transmit network information of the stolen Mac. This information includes both internal and external IP addresses and the router address, enabling our recovery center to accurately trace the Mac's physical location.


See what happens on your stolen Mac

Undercover is the world's first theft-recovery software that will send screenshots of your stolen Mac at regular intervals. These screenshots will sooner or later reveal the thief's identity (e.g. when chatting, reading and writing emails,...) making it much easier to work with law enforcement in order to recover your Mac.

iSight support

See who's using your Mac

Undercover introduces another world first: if your Mac has a built-in or external iSight, Undercover will transmit pictures of the thief and his surroundings every 6 minutes, making it even easier to identify the current user. It's like having a private detective working for you.