Undercover routinely checks with the Undercover server. In case of theft, the Mac's unique Undercover ID is added to the list on the Undercover server, initiating the recovery process. During the recovery phase, Undercover transmits its current location on the internet, enabling the Undercover team to identify the computer's exact physical location. Moreover, Undercover also sends screenshots of the stolen Mac, revealing details of the thief's identity. The Undercover recovery center will then work with law enforcement to recover the Mac.
In case recovery fails, the software has an ingenious plan B: it will simulate a hardware failure, urging the thief to send the computer in for repair or sell it. As soon as the thief gets rid of the Mac, Undercover will warn the new user that the Mac has been stolen and that it should be returned as soon as possible. The computer will shout from time to time that it has been stolen and Undercover will take over the screen, displaying how the Mac can be returned while making the computer unusable.
Prepare for the Adobe Certified Expert (ACE) product proficiency exam.
Time Out reminds you to take regular breaks when using a computer for hours to avoid bad habits and over-straining.
Trilithon Protractors is a Mac OS X app for web developers and graphic designers...
Teaches the concepts of decision trees for regular pattern recognition.
GRE Calculator is designed to help you with long calculations.
ASL Dictionary allows you to learn American sign language.
Comments