Tactical Advice

Theft Tracker

LoJack for Laptops helps users retrieve stolen computers or delete their sensitive contents.
This story appears in the September 2010 issue of BizTech Magazine.

When I received the call to review Absolute Software’s Computrace LoJack for Laptops, I was excited. I had heard about LoJack but had not had an opportunity to try it myself. That’s not to say that the thought of theft had never crossed my mind.

What would I do if my notebook were stolen? What if the thief gets access to my data? Will I ever see my notebook again? Computrace LoJack for Laptops Premium Edition addresses these issues by allowing the end user to erase sensitive data.

End-User Advantages

I truly would not have known that LoJack was installed if I had not done the installation myself. There are no icons, program directories or even performance issues to indicate that LoJack is running. If a protected notebook were to land in the wrong hands, most thieves would never know that their every move was being tracked.

Why It Works for IT

I used a Toshiba Satellite A210 notebook, which was on the supported hardware list, to test LoJack for Laptops.

The premium edition comes with a $1,000 guarantee if Absolute Software cannot recover your device. What’s more important to organizations is that LoJack can delete data remotely on lost devices. However, I was unable to test this feature because the notebook has to be reported stolen in order to delete data or utilize tracking abilities.

One of the greatest attributes of LoJack for Laptops is its ability to reinstall itself should it be removed or the computer re-imaged. Absolute Software calls this “persistence,” and the feature appears to be supported on most business-class notebooks.

I installed Computrace LoJack for Laptops on a Windows XP partition and let it run for a few days before deciding to wipe it out and start over. I was skeptical of the software’s ability to reinstall itself and had to see it with my own eyes. Once Windows was installed, I let the computer sit overnight in order for the agent to reinstall. Though I couldn’t find the agent on the system, it was working the next day.



Average value of a lost notebook based on replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity, and legal, consulting and regulatory expenses

Source: Ponemon Institute

Not all systems are compatible with the persistence module, but compatability can be checked online. Some firewalls may prevent the program from checking in to Absolute Software’s server.

I also had an issue with response time from technical support. They typically took at least two days to respond via e-mail. If the notebook had been reported stolen, I would hope that support is more responsive. The website that indicated the agent status was also frequently incorrect. The website consistently showed that the last time the agent checked in was several days earlier. But I was assured by tech support that the agent was checking in.

Overall, the subscription price for Computrace LoJack for Laptops is small considering you’re upping the chances of having your stolen notebook returned. Additionally, with the premium subscription you can delete sensitive data that could jeopardize company security or cause a public-relations nightmare.

John Case is technology coordinator at the Ohio Hi-Point Career Center in Bellefontaine, Ohio.
Sign up for our e-newsletter


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.