In addition to analyzing the registry and the running processes, Computrace Lojack Checker can also edit the HOSTS file of your PC so as to block all communications between the local system and the Computrace servers. If such entries are not found in the registry, the application shows you a message stating that no surveillance traces are found and that everything is fine. If the Computrace Agent is launched on your computer, the registry should contain the 'rpcnet' and the 'rpcnetp' services and processes with the same name should be running. Analyze the registry and edit the HOSTS file to block the Computrace Agent Its interface is simple, comprising one button designed to answer a single question: is your PC 'lojacked' or not? Pressing it instructs Computrace Lojack Checker to start analyzing the system registry and the running processes, in order to identify traces of Lojack. No installation is required, so you can access it in an instant. The application is very easy to work with and aims to detect the presence of the Computrace Agent within the system registry. Simple to use and minimalistic set of options Studies have shown that while this technology can prove extremely useful in determining the location or a stolen computer, its functioning mode might be exploited by cyber criminals to gain remote control over the PC. Computrace Lojack Checker is intended to help you discover traces of the Computrace Lojack anti-theft mechanism on your system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |