From ArchWiki
Revision as of 22:24, 7 April 2013 by Xpt (Talk | contribs) (Configuration)

Jump to: navigation, search

Prey is a set of bash scripts that helps you track your computer when it is stolen.

This guide shows you how to install Prey.


Install prey-trackerAUR from the AUR.


Edit /usr/share/prey/config and add your device key and API key in the appropriate place. Run /usr/share/prey/ as root to ensure that the configuration is correct.


To enable/disable modules, you must change the executable permissions for the the "run" files in prey's respective modules/core subdirectories. Adding executable permissions to a module will enable it, while removing permissions will disable the module.

GUI config

You can use a GUI to configure prey using the prey-config script:

# sudo /usr/share/prey/platform/linux/

Note that if this doesn't work you are missing a dependency, not sure if python alone suffices.

Standalone Mode

The GUI can be used to configure standalone mode.

Alternatively,/usr/share/prey/config can be edited to change post_method to email and edit the SMTP settings.

Note that in Standalone Mode, all modules in /usr/share/prey/modules run by default. To disable them, remove executable permissions on the module's run file (located within the module's core subdirectory). For example, the following command disables the alarm module:

# chmod -x /usr/share/prey/modules/alarm/core/run


To troubleshoot, run

# /usr/share/prey/ --check


If scrot is installed, prey will use it to take a screenshot if the session module is enabled. Unfortunately, scrot emits an annoying beep everytime it is run. To disable beeping, append xset -b to the beginning of /usr/share/prey/modules/session/core/run.


There seems to be a bug in version 0.5.3 which gives an error if the SMTP password is set when using "email" post_method, which returns an error, but works fine when executed normally without the --check option.