Prey is a set of bash scripts that helps you track your computer when it is stolen.
This guide shows you how to install Prey.
Install AUR.AUR from the
Add your device using the control panel on Prey's website.
/usr/share/prey/config and add your device key and API key, both of which are listed in Prey's control panel.
/usr/share/prey/prey.sh as root to ensure that the configuration is correct.
/usr/share/prey-tracker/folder, now (>0.5.10-2) it is in
Enable systemd service prey-tracker to automatically start Prey at boot
# systemctl enable prey-tracker.timer
To enable/disable modules, you must change the executable permissions for the the "run" files in prey's respective modules/core subdirectories. Adding executable permissions to a module will enable it, while removing permissions will disable the module.
You can use a GUI to configure prey using the
Note that if this doesn't work you are missing a dependency, not sure if Python alone suffices.
The GUI can be used to configure standalone mode.
/usr/share/prey/config can be edited to change
Note that in Standalone Mode, all modules in
/usr/share/prey/modules run by default. To disable them, remove executable permissions on the module's
run file (located within the module's
core subdirectory). For example, the following command disables the
# chmod -x /usr/share/prey/modules/alarm/core/run
To troubleshoot, run
# /usr/share/prey/prey.sh --check
Ensure you have enabled systemd service prey-tracker.service and prey-tracker.timer to start Prey at boot.
If you're not receiving webcam images in you reports, installfrom the official repositories.
If scrot is installed, prey will use it to take a screenshot if the
session module is enabled. Unfortunately, scrot emits an annoying beep everytime it is run. To disable beeping, append
to the beginning of
There seems to be a bug in version 0.5.3 which gives an error if the SMTP password is set when using "email" post_method, which returns an error, but works fine when executed normally without the --check option.