How To Recover A Stolen Computer With Prey Project

Prey Project Software
Secure Your Computer With Prey Project
Gear Review

I recovered my stolen computer using Prey Project software. Learn how to properly install & use this powerful free tracking program on your laptop.

If you haven’t done so already, you need to download Prey Project immediately. It’s a free computer tracking and recovery program that works around the world.

In my opinion this software should be included on every computer out of the box. Prey runs in the background, so you won’t even know it’s there. However it can save your ass if your computer ever gets lost or stolen!

But it must be set up correctly to work properly.

My Personal Experience

I first heard about Prey Project after following Sean Power’s stolen laptop story on Twitter. I immediately downloaded the program.

Months later, my MacBook Pro computer was stolen after I made some bad decisions while traveling in Panama.

I never thought it would happen to me.

But it did — and the theft was devastating to my life as a digital nomad.

Saved By Prey

Luckily I’d installed Prey Project on my laptop. But because I didn’t configure the software correctly, it took 3 months before the program began working they way it should. In the meantime, I’d already purchased a replacement computer — when I probably didn’t need to.

Eventually I recovered my stolen computer from over 2000 miles away.

But I could have done it a lot sooner, and with much less hassle, had I changed some settings immediately after downloading Prey.

This guide will show you how to properly install and configure Prey Project.

Prey Project Download
Download Prey Project for Free

Installing Prey On Your Computer

The first step is to get this free software on your computer.
It works with Windows, Apple OSX, Android, and iPhone.

Click Here to Download Prey Project »

Once installed, you’ll be able to log into the Prey Project website using the link they send via email. From there you can check the status of the software on your computer. Make sure you are online for this to work. It may take an hour or so before it’s active.

Prey Project Settings

The software is equipped with many different alarms and tracking capabilities. Once you’ve logged in online to the Prey Project control panel, click on the name of your computer to adjust settings. You’ll want to change a few of them from their default properties.

  • Geo: ON
  • Network: ON
  • Session: ON
  • Get Screenshot: YES
  • Get Modified Files: NO
  • Get Running Programs: NO
  • Webcam: ON
  • Alarm: OFF
  • Alert: OFF
  • Lock: OFF
  • Secure: OFF

In my opinion, you’ll want to keep all the alarms off at first. You don’t want to scare your “prey” into ditching the laptop before you get any good information about them.

Modified files and running programs aren’t really necessary for recovery, and if you have a password protected user account (we’ll go over that later), it shouldn’t matter. Keep it simple.

Prey Project Settings
Prey Project Settings

Your Laptop: Settings

You’ll also need to adjust a few settings on your computer to ensure Prey Project will work correctly. First of all, if you don’t use one already, create a password protected user account. This forces you to log in with a password every time you start your laptop or de-hibernate (I think I just made that word up).

Now if your computer is ever stolen, the thieves will not be able to access your personal information without your password.

Next, create a Guest account on your computer. This is where I screwed up when my laptop was recently stolen.

The guest account is a separate user account that will NOT require a password. Anyone can use this account.

It is very important to have a guest account because this ensures that a thief is able to use your computer right away.

NOTE: Do not enable parental controls on the guest account.

The thief will not have access to your personal files, but they will have access to the internet and other basic programs available through the guest account.

This is very important!

Your laptop needs to be online for Prey Project to start sending juicy information that will help you recover your computer quickly.

Prey Project Testing
Prey Puts YOU in Control

Testing The Software

Finally, make sure everything is working correctly. Log into, click on the name of your computer, and mark it as “missing”.

Then turn on one of the alarms, like the custom pop-up message.

Remember to save your settings. Now, wait and see what happens.

It could take up to an hour for the software to work. Be patient. Go do something else while you’re waiting. When the alarm eventually goes off, log back into Prey Project to view your new reports. They should contain webcam photos, screenshots, and WiFi location information. You will also get an email anytime a new report is available.

When you know Prey is working on your personal user account, test it again, but this time log into your password-free guest account. This is the account that a thief will have access to. Make sure it also works there.


If you can’t get Prey working on your laptop, search the Prey Project forum or check out their customer support. I had some issues getting the software to work on my new guest account because I use a program called Little Snitch that blocks all outgoing internet connections unless I say otherwise.

Eventually, I learned how to fix it on the forum.

Prey Project Tracking
Tracking Your Prey

Tracking A Stolen Computer

Your computer has just been stolen. What do you do now? The very first step should be to file a police report. Do that right away. The police will not do anything without a report on file, and you can’t make an insurance claim without a police report either.

Let the police know that you have tracking software on your computer, and you will call them if you start to receive tracking information. I urge you to try and work with the police to recover your laptop.

Once you begin to receive tracking reports, upgrade your free Prey Project membership to Pro for $5. This lets you save many more reports on the website.

You should also change your report frequency to every 2 minutes.

But to ensure you’re not overloaded with information, change it back to 10 or 20 minutes when the thieves are not actively using the computer.

Save any photos, screenshots, map locations, and personal information on a USB drive or another computer, so you can send it to the police or use it in court.

Wait until you have plenty of strong identifying information before you attempt any recovery.

Pro membership only allows you to save up to 100 reports before it starts deleting old ones. Record the best information before it gets deleted. Delete reports that don’t contain any good information to make room for new ones.

Recover Stolen Computer
Actual Screenshot from My Successful Recovery (he’s shopping for a tranny prostitute)

Recovering Your Computer

Now in my particular case, I recovered my computer without the police. While I initially filed a police report and notified them about the tracking software, my situation soon changed.

It took 3 months before I started receiving tracking information (because I didn’t have a guest account), and I was no longer in the country where the theft took place. Panama City’s police department didn’t inspire much confidence while I was there either.

I also didn’t want my computer to be held up as evidence in a court case 2000 miles away. The language barrier would be challenging when I couldn’t speak to authorities in person.

By now I had already assumed my computer was lost, so I decided to risk it and try for recovery on my own.

Using my website and the power of social media, I embarrassed the crap out of the people who were in possession of my stolen computer while simultaneously collecting personal details like their names, employers, family members, friends, email addresses, photos, phone numbers, home addresses, and more.

Had they tried to ditch my laptop, I could have made their lives absolute hell.

I decided to threaten them with police action & further humiliation instead, and it worked like a charm. They met with a friend of mine and gave up the MacBook Pro right away.

Use your best judgment depending on your own particular case. Happy hunting! ★

Travel Planning Resources
Software: Prey Project
Total Cost: Free to install, $5 to upgrade

Packing Guide

Check out my travel gear guide to help you start packing for your trip. Pick up a travel backpack, camera gear, and other useful travel accessories.

Book Your Flight

Book cheap flights on Skyscanner, my favorite airline search engine to find deals. Also read my tips for how I find the cheapest flights.

Rent A Car

Discover Cars is a great site for comparing car prices to find the best deal. They search both local & international rental companies.

Book Accommodation is my favorite hotel search engine. Or rent local apartments on Airbnb ($35 discount!). Read my post for tips on booking cheap hotels.

Protect Your Trip

Don’t forget travel insurance! I’m a big fan of World Nomads for short-term trips. Protect yourself from possible injury & theft abroad. Read more about why you should always carry travel insurance.


I hope you enjoyed my guide on how to recover a stolen computer with Prey Project! Hopefully you found it useful. Here are a few more wanderlust-inducing articles that I recommend you read next:

Ever had something expensive stolen before?


Hi, I’m Matthew Karsten — I’ve been traveling around the world for the last 10 years as a blogger, photographer, and digital nomad. Adventure travel & photography are my passions. Let me inspire you to travel with crazy stories, photography, and money-saving travel tips.
Matthew Karsten
Join 20,000 others who receive exclusive email updates!

7 Reasons To Subscribe →
As an Amazon Associate I earn from qualifying purchases. I'm also a member of other affiliate programs. For more info please read my policy page.

Leave a Comment

Comments (38)

  1. What will happen if the staler immediately format the computer/laptop. Will prey still work? This is what people first do when they steal a laptop.

  2. Most people who purchase laptops probably know this already, but in this issue, where price and performance are concerned, this scale is even worse in the high-end “gaming” laptop category.

  3. this is so great!
    i wish i knew before… 3 months ago i was stolen my pc and ipad from my house…
    now with this i will feel safer…especially when i will start travelling…
    i still haven’t installed properly but will do soon

    thank you so very much!

  4. Real-time Location
    You no longer need to set your devices to missing mode to know their whereabouts. With the new real-time location, you can check their position at any moment. Confirm that your computer is still at the office, or that your kids didn’t bring their iPad to school with just a click.

  5. If I know this few days ago. My backpack was stolen on the way from Langkawi to Kuala Lumpur. Lost almost $5k worth of goods and all my valuable photos were lost.

  6. Howdy,

    Just a quick and very important point, password protecting your account will NOT protect your files from any computer user more advanced than your average mom. Local security is easily bypassed by resetting the user password, or booting up a livecd. Only encryption with a strong password can protect your files. I would rather loose the hardware and know that full disk encryption protects my data, than get the hardware back and have the data compromised. If you want to try to have both, you could encrypt only your home directory, but you risk data leaks due to programs saving temp file in silly places.

  7. Prey sounds really cool! I’m just wondering if you have any experience with Prey on iPhone. I’m curious about the difference between Prey and Find my iPhone (Apple’s program for lost devices) since FMI also has a lost mode, ability to delete all data and track it on a map and so on. I’ve never had to use it thankfully but I’m wondering if I’m all good with just Find my iPhone or if Prey would be smart to install as well.

  8. I don’t completely understand this whole idea, can I use my phone to call prey or should I work from a different computer ? I just purchased an Emerson 7″ tablet that Im learning to use, I’m very computer illiterate and lucky to have found my dell inspirion 3521 last week after misplacing it. Thinking that it might have been removed from me. I wondered who should I contact.

  9. Great if it works straight after installation, but in my case it hasn’t.

    Users beware!…

    I know this is a free product and we thank you for making an effort, but there is no effective Support process for this product. To disguise the support as a ‘User Forum’ is scandalous.
    Handing over responsibility to users by way of a ‘Forum’ is a cheap trick. Take a look at this reply from the moderator as an example of shirking responsibility: “Pro accounts have a support link …Try that & see if you get responses, this is the free support forum that is provided by volunteers”. VOLUNTEERS!! Get real Prey! Count the number of current questions on your site unanswered. If this product is going to take off, you’ll need to employ more people in the support process.

    • Prey has to run at startup for it to work. If the operating system (e.g. Windows) is reinstalled, Prey is dead. Also if the hard drive is removed (changed).

  10. I’d add that, if you use an email client on your computer, change your email account passwords as soon as your computer goes missing, so that email is not downloaded to the client, especially not Prey emails. It may in fact be worth choosing an email address for Prey that you don’t access via the client.

  11. Thanks for the user guide to Prey Project. I’ve been looking for some software to protect my computer from the eventuality of theft but couldn’t find anything practical and affordable. I also enjoyed your laptop retrieval story – I have’nt had such a laugh for quite some time.

  12. We are going through the same right now. Four computers three cameras and all that goes with them. They kick down the door in ore apartment while we went out for half an hour. The police in Panama are of no help at all, it seem people here think it is O.K. to rob tourist and you will get no help at all. We have lost over $5000.00 on this trip of hell. All I can say, do not go to Panama because even if you do have this on your PC the police will not help you, the only way is to do what this lad did and it could get bad if you pick on the wrong people. I am now going to try install it on a cheap PC and see if we can get our stuff with this bait. Wish me luck.

  13. The problem with the guest account and the regular account that Prey makes is that there still is access to the C: drive, just where Prey gets installed so it’s pretty easy to find. What you can do to make it a bit stealth is to make the folder Hidden. I believe that if Prey isn’t installed on the C drive it probably won’t work in the guest account. This is for Windows with a locked admin account.

    • Thanks for the tip! This would be assuming that they’d even know to look for it. My guess is most thieves won’t be that technically savvy. But I guess the more people start using this software, the higher the chances your average opportunistic thief will know about Prey.

  14. I’v just found that when creating a guest account you CAN’T have access to networking settings, so I created a standard account, named it guest, blocked access to the folder Prey creates when installing so that the thief can’t delete Prey, and set it as missing, now I’m waiting for results…

  15. Hi Matt, I have one question, I have an Windows 7 notebook and installed prey, can you make a standard user account and not an guest account, because when I log in to the guest account I don’t have access to wifi settings?

  16. Thanks for this Matt. I am planning to bring with me my laptop when I will travel because I want to blog every end of the day. thanks a lot.

  17. Backing up your video/photos on flash drives is the way to go. Flash drives are portable, easy to carry around, it’s cost-effective and carries alot of information. And you can ship them back to the US without paying a huge shipping fee. They even come in 64GB versions.

  18. Reminds me of the guy who recovered his Mac a few years ago through the DynDNS client he’d installed:

    There is a spectrum of methods and controls to consider when deciding on security for your gear and data. It’s important to consider what’s really important to you on that spectrum. If it’s the hardware you want to protect, than an approach like what is described above makes sense.

    If you want a chance at recovering your hardware while also protecting the data, you need to consider encryption. You mentioned that one can’t get access to personal files from the guest account. With physical access to the machine, that is only true if you are also properly using encryption (like FileVault, dmcrypt or Bitlocker). Physical access to the machine makes it trivial to access any unencrypted data on the drive.

    If you’re willing to lower the chance of recovering your hardware while guaranteeing the data will never be compromised then you need to look at full-disk encryption with a boot-time password to access the drive decryption key. This is easy to setup using TrueCrypt on Windows or dmcrypt on Linux. I’m not sure what Mac users would do there.

    In my case, I’m using a $400 HP DM1Z laptop with a small SSD in place of the hard drive. The entire drive is encrypted with TrueCrypt. I backup my content to an external drive, also encrypted. I’m also going to subscribe to a cloud-based backup service so I have geographic redundancy should I lose all my gear. I’m not sure how well the wifi services I find on the road will cope with the backup service. If that doesn’t work out I will ship an encrypted SD card home from time to time.

    • I also use TrueCrypt on my Mac. Not for the whole drive, but for sensitive personal information.

      In addition to a regular external backup drive, I’ve also started shipping a cheap backup drive to the US every 4 months or so loaded with photos & video. All of these are smart practices. I’ve heard too many horror stories of people losing all their data when a drive fails or equipment gets stolen. :)