6/4/2023 0 Comments Absolute lojack support![]() ![]() The company also offers Premium users a degree of insurance up to $1,000 if a machine cannot be recovered, as long as certain conditions are met. model, and Service Tag number of the laptop at the time of request for the. Absolute Software has added a new feature to its Computrace Lojack anti-theft software that can remotely turn a stolen laptop into a useless, non-bootable 'brick'. For most users the extra $10 for the Premium version will be a better buy as it adds to this the ability to remotely delete data from the machine, a feature that will be foremost in the minds of most users. Absolute LoJack (made by Absolute) allows organizations likes UMass Boston to. The cheaper version offers only a basic theft-tracking feature, which allows a stolen laptop to be traced remotely should it connect to the Internet subsequently. ![]() ![]() On the good news front, the company has temporarily cut $25 from the subscription price of LoJack, which can currently be purchased in two versions, a Standard Edition at $24.99 (£16) per annum, and Premium version at $34.99 per annum. "It's early days," admitted Midgley, who said he believed more affordable models supporting the system would be announced in 2010. The irony is that these are relatively expensive business machines unlikely to be bought by many consumers who might benefit most from the new technology. One short-term problem is that the chip has only made its way into a limited number of machines, including a small number of X-Series laptops from Lenovo and a couple of Fujitsu Lifebooks. Contact Technical support at 88 or e-mail. EST) to answer any questions you may have. Absolute Software is available Monday through Friday from 6:00 a.m. Removing the hard disk makes no difference. Absolute Software, not Lenovo, is solely responsible for the Computrace LoJack for Laptops services. If stolen, a user alerts Absolute which issues a remote command that puts the machine into a locked state which makes it impossible to boot or access the OS, or even get at encryption keys if these are being used.Īt this point, the thinking goes, the laptop has become of no economic value and is more likely to be abandoned. Intel's new ATT chipset simply embeds the technology further, adding the consumer-friendly remote locking feature. This increases security by making it extremely difficult for the criminal to circumvent the LoJack software agent upon which the tracking depends. LoJack has been available on any laptop, including Apple Macs, for some time, though the company recommends users pair it with a more limited selection of machines supporting its own BIOS. "Losing a laptop is like losing a wallet." "Many consumers don't back up data on a frequent basis so when we wipe data it is gone for good," said Absolute Software's Stephen Midgley. Microsoft does not guarantee the accuracy of this third-party contact information.Absolute now reckons that for the technology to establish itself with consumers, the option of recovering data is probably essential. This contact information may change without notice. Microsoft provides third-party contact information to help you find technical support. If the device has remaining time on extended warranty, Microsoft can either cancel the rest of the remaining warranty or transfer the rest of the warranty to a new device.įor more information and support for Absolute Computrace, contact Absolute Computrace at the following website:įor more information about how to cancel or transfer the extended warranty, contact Microsoft Surface support for business at the following website: The following options are available for Surface business customers:Ĭontact your IT group to determine whether Absolute Computrace software was purchased and enabled on the device.Ĭontact local authorities to report device as stolen. Answer a few questions to help the Absolute Secure Endpoint community. This article discusses Surface support for business for a stolen device. Absolute Resilience adds further capabilities to secure endpoints from threats and. ![]()
0 Comments
Leave a Reply. |