{"id":11,"date":"2014-09-01T23:36:00","date_gmt":"2014-09-01T23:36:00","guid":{"rendered":"http:\/\/www.appledomination.co.za\/index.php\/2014\/09\/01\/review-undercover-bad-news-for-mac\/"},"modified":"2015-08-10T16:33:00","modified_gmt":"2015-08-10T16:33:00","slug":"review-undercover-bad-news-for-mac","status":"publish","type":"post","link":"http:\/\/www.appledomination.co.za\/index.php\/2014\/09\/01\/review-undercover-bad-news-for-mac\/","title":{"rendered":"[Review] Undercover &#8211; Bad news for Mac Thieves"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\">\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/logo_big-1024x980.png\" imageanchor=\"1\" style=\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/logo_big.png?resize=200%2C191\" height=\"191\" width=\"200\" data-recalc-dims=\"1\" \/><\/a>Undercover was easily one of the best pieces of software that I have had the privilege of reviewing for 2014!<br \/>\nLike any good Apple user, you probably have Find my Mac (Find my iPhone, you know what I mean) enabled, and hope to heck that you will never need to use it.<\/p>\n<p>Touch wood though, should that day ever come, will it be enough to get your own back?<\/p>\n<p>While I have the utmost respect for Apple&#8217;s native software and services, this is clearly a tool that is playing in a league of its own.&nbsp;<br \/>\nFmM feels like a lonely peg-leg pirate at a square-dance competition.<\/p>\n<p>So, once you head over to <a href=\"http:\/\/orbicule.com\/undercover\/mac\/\" target=\"_blank\">Undercover&#8217;s<\/a> website, you will be presented with an option to Try or Buy.<\/p>\n<p>While I recommend this software 110%, and urge you not to even bother with the trial and just go and buy it outright, I do get it.&nbsp;<\/p>\n<p>Press the Try button and get the process started. This will get you going with a 7-day trial.<\/p>\n<p>When you select the <a href=\"http:\/\/orbicule.com\/undercover\/mac\/request_trial.php\" target=\"_blank\">Try<\/a> option, you will be required to enter an email address.<br \/>\nDo it! There&#8217;s no getting the trial without it, as your email address becomes your username.<\/p>\n<p>You will receive an email with simple instructions, asking you to select a link that will take you to the <a href=\"http:\/\/www.undercoverhq.com\/\" target=\"_blank\">UndercoverHQ<\/a> dashboard and force you to select a new password.<\/p>\n<p>\nThat&#8217;s it, you are ready to get to the good stuff!<\/p>\n<p>\nIn the dashboard, you are presented with a side panel and a menu bar.<\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.52.35-1024x483.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.52.35.png?resize=640%2C299\" height=\"299\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<p>\nIn the side bar, you will see any and all Macs that you have enlisted for protection, and the menu bar will be specific to each machine you select.<\/p>\n<p>Since you have no Macs enrolled just yet, you can tap on the huge option called &#8220;Add your Mac&#8221;.<br \/>\nOnce selected, you will see 2 important items.<\/p>\n<ol style=\"text-align: left;\">\n<li>The link to download the pkg installer for version 6<\/li>\n<li>How many Macs you can still enrol under your registered licensing option<\/li>\n<ol>\n<li>For now it will be 1 \ud83d\ude42<\/li>\n<\/ol>\n<\/ol>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.53.08.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.53.08.png?resize=296%2C320\" height=\"320\" width=\"296\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nHit the download Link and install the magical software.<\/div>\n<div>\nIt&#8217;s just a normal installer, but there is a bit of voodoo in the background.<\/div>\n<div>\nFor instance, it doesn&#8217;t actually install an app, and it most definitely does not install a System Preference pane either. &#8220;So what does it do then&#8221; I hear you ask?<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.54.11.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.54.11.png?resize=320%2C241\" height=\"241\" width=\"320\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nFirst, it installs a Launch Agent in <i>\/Library\/LaunchAgents<\/i> called <u>com.orbicule.ucagent.plist<\/u><\/div>\n<div>\nThen it installs a Launch Daemon in <i>\/Library\/LaunchDaemon<\/i> called <i>com.orbicule.uc.plist<\/i><\/div>\n<div>\nAnd finally, the payload. It installs a folder called UC inside of <i>\/usr\/local<\/i> . This is where the actual agent is located.<\/div>\n<div>\n(These locations are great for when\/if it ever comes time to uninstall)<\/div>\n<div>\n<\/div>\n<div>\nAfter you install the agent, reboot the Mac and voila! Your Mac is now registered within your UndercoverHQ dashboard.<\/div>\n<div>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.54.25.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-11.54.25.png?resize=320%2C227\" height=\"227\" width=\"320\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nWithout doing anything further, you will be on the INFO tab on top of the page.<\/div>\n<p><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.25.03.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.25.03.jpg?resize=640%2C406\" height=\"406\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<div>\n<\/div>\n<div>\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.58.05.png\" imageanchor=\"1\" style=\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: center;\"><img border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.58.05.png?w=960\" data-recalc-dims=\"1\" \/><\/a>Here you will see 3 sections, including the basic information about your Mac, any recent activity logged and what the current status of the Mac is (Stolen or not)<\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nSo without further stalling, what can Undercover do exactly?<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.56.58.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.56.58.png?resize=400%2C172\" height=\"172\" width=\"400\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<div>\n<\/div>\n<div>\nIf that day every comes that your machine gets misplaced within the hands that are not your own, &nbsp;first things first, head to the THEFT REPORT tab.<\/div>\n<div>\n<\/div>\n<div>\nHere is the all-important button, <i>Report Stolen<\/i>.<\/div>\n<div>\n<\/div>\n<div>\nThis puts the Mac into Stolen mode, and kicks in all the various services to begin the hunt to get your own back.<\/div>\n<div>\n<\/div>\n<div>\nThis not only puts it into Stolen mode, but it actually generates an official-looking theft report.<\/div>\n<div>\nThe moment you put your machine into stolen mode, an email is generated informing you of the state of the Machine too, i.e. Stolen.<\/div>\n<div>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.56.17.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.56.17.png?resize=640%2C408\" height=\"408\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nYou can then tap on the button to set the <i>Police Contact Details<\/i> for this case.<\/div>\n<div>\n<\/div>\n<div>\nWhile this actually works in the USA, unfortunately SAPS does not play well with these auto-generated black-magic self-proclaimed police reports. They want to do it their own way, the hard way.<\/div>\n<div>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.56.44.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.56.44.png?resize=400%2C267\" height=\"267\" width=\"400\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<div>\n<\/div>\n<div>\nWith or without the Police contact details, you will be able to generate your theft report, and download a package with all the little goodies that Undercover has been collecting since your machine was marked as stolen.<\/div>\n<div>\n<\/div>\n<div>\nWhen you download your package (no snickering please, we&#8217;re all grown-ups here) it will include amongst other things, a PDF report with as much detail as you could hope for, for an official investigation.<\/div>\n<div>\n<\/div>\n<div>\nSo, what are these goodies that Undercover collects for you, to bust your perpetrator in the act?<\/div>\n<div>\n<\/div>\n<div>\nHead over to LOCATION.<\/div>\n<div>\n<\/div>\n<div>\nThe obvious thing to expect here is the current location of your stolen device.<\/div>\n<div>\nBut Find my Mac can also do that?<\/div>\n<div>\nBut what FmM cannot do, is scrub the timeline at the bottom of the screen, to see the history of locations since your machine was put into Stolen mode.<\/div>\n<div>\nThe location is transmitted every 30 minutes.<\/div>\n<div>\n<\/div>\n<div>\nI feel like <b>Nifty Points +1<\/b> is in order here.<\/div>\n<div>\n<\/div>\n<div>\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.40.40-1024x53.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.40.40.png?resize=640%2C32\" height=\"32\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nWhen you tap on your location marker, it will show you the GPS coordinates, the internal AND external IP addresses, as well as the network name that it is connected to.<\/div>\n<div>\n<\/div>\n<div>\n<b>Nifty Points +1 <\/b>anyone?<\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nNow that we know where the master-douche is hanging out, let&#8217;s take a look as to who exactly is behind this dastardly crime.<\/div>\n<div>\n<\/div>\n<div>\nTap on PHOTOS.<\/div>\n<div>\n<\/div>\n<div>\nThe built-in iSight camera will take a selfie every 8 minutes, hopefully catching the perp in the act, or&nbsp;at least enough to catch his\/her mug.<\/div>\n<div>\n<\/div>\n<div>\nIf you would like to see a photo within the 8-minute window, just tap on <i>take photo <\/i>for instant selfies.&nbsp;<\/div>\n<div>\n<\/div>\n<div>\nThe only cue is the green light on the camera, which is so quick, it is often missed.<\/div>\n<div>\nI don&#8217;t recall FmM taking photos?<\/div>\n<div>\n<\/div>\n<div>\n<b>Nifty Points +1<\/b> indeed.<\/div>\n<div>\n<\/div>\n<div>\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.43.31.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.43.31.png?resize=640%2C234\" height=\"234\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nWant to see what the bad guy\/girl is up to?<\/div>\n<div>\n<\/div>\n<div>\nHead over to SCREEN SHOTS.<\/div>\n<div>\n<\/div>\n<div>\nWhile you know it can&#8217;t be good, whatever it is they are doing, at least this way you will be able to see if they are after something super-specific, like data-espionage or simply looking for some juicy photos.<\/div>\n<div>\nScreenshots, like photos, take place every 8 minutes.<\/div>\n<div>\nBut these screenshots leave no visual cues behind, like the photos.<\/div>\n<div>\n<\/div>\n<div>\nWhile unnecessary, we are definitely adding this feature to the Nifty pile.<\/div>\n<div>\n<\/div>\n<div>\n<b>Nifty Points +1<\/b><\/div>\n<div>\n<b><br \/><\/b><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.44.12.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.44.12.png?resize=400%2C238\" height=\"238\" width=\"400\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nNot only can you see the screens that they are working on, but you will also be able to see physically what they are typing, character for character.<\/div>\n<div>\n<\/div>\n<div>\nEvery single little things gets logged under the KEY LOGS section.<\/div>\n<div>\n<\/div>\n<div>\nWell, all except for usernames and passwords!<\/div>\n<div>\n<\/div>\n<div>\nThis puts even my mind at rest.<\/div>\n<div>\nThis means the good folks at Undercover won&#8217;t be able to get into my sensitive accounts, and neither will the feds. (Apart from the 128-bit&nbsp;encryption between your machine and the mothership of course)<\/div>\n<div>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.59.10.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.59.10.png?resize=400%2C202\" height=\"202\" width=\"400\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<div>\n<\/div>\n<div>\nAt the bottom of the screen, you will be able to filter the Key logs according to apps, as well as text <i>typed<\/i> versus text <i>highlighted<\/i>.<\/div>\n<div>\nInteresting choices.<\/div>\n<div>\n<\/div>\n<div>\nKey logs are recorded continuously. No time intervals for this one.<\/div>\n<div>\n<\/div>\n<div>\n<b>Nifty Points +1<\/b> for sure!<\/div>\n<div>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-14.04.49.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-14.04.49.png?resize=640%2C569\" height=\"569\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<p>\nSo now that you know everything about the person that has mistakenly taken your laptop and is mistakenly trying to log into your internet banking sites, what else does Undercover provide yo with.<\/p>\n<p>Well you have a PRIVACY tab on top for, wait for it, privacy settings.<\/p>\n<p>Basically, do you want Undercover to be taking photos, logging key strokes, snapping screens and locations ALL the time, or only when Stolen?<br \/>\nI think we all have the same answer here&#8230;only when stolen please!<\/p>\n<p>No nifty points, but critical nonetheless.<\/p>\n<p><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.48.47.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.48.47.png?resize=400%2C261\" height=\"261\" width=\"400\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<p>Oh yeah, then there&#8217;s PLAN B. My fav!<\/p>\n<p>Plan B is taking the perp-tracking tool to a new level.<\/p>\n<p><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.48.16.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-13.48.16.png?resize=400%2C262\" height=\"262\" width=\"400\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<p>\nYou have 3 options for Plan B. Or Plans B, C and D if you will.<br \/>\nNo not really, they are all called Plan B, whether you will or&nbsp;won&#8217;t.<\/p>\n<p>Firstly, you can simply leave Plan B on the default option, which is <i>Off<\/i>.<br \/>\nI know it seems counter-intuitive, but this basically means <i>do nothing that will give our game away<\/i>, and keep tracking in the back ground.&nbsp;<br \/>\nApart from potential emails coming in, and the odd green-light selfies, there is no indication to the thief that you are tracking them.<\/p>\n<p><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-14.07.43.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-14.07.43.png?resize=640%2C350\" height=\"350\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<\/div>\n<p>\nYou could set Plan B into <i>Hardware Failure mode<\/i>.<br \/>\nThis is brilliant!<\/p>\n<p>It runs a script in the background that randomly adjusts the brightness of the screen at incredibly quick intervals, making it look like a hardware failure with the display.<br \/>\nDon&#8217;t worry, this won&#8217;t damage your Mac, but it will make the would-be thief want to get rid of it ASAP.&nbsp;<br \/>\nPerhaps this will lead to the recovery of your Mac, perhaps not.<\/p>\n<p>Either way, <b>Nifty Points +1 <\/b>in the bag!<\/p>\n<p>And finally, your 3rd Plan B option is to lock the screen with a good old-fashioned screen message.<\/p>\n<p>This message can be whatever you want it to be.<br \/>\nPolite and sincere or obnoxious and rude.&nbsp;<br \/>\nI would opt for somewhere in the middle.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5415-1024x768.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5415.jpg?resize=640%2C480\" height=\"480\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p>The nifty points for this will come from the fact that not only does this message take control of the screen, and does not allow for any other key stroke or mouse click, but it also calls the message back if you hard-reset the computer.<\/p>\n<p>A few moments after restarting the box, the message will take control of the screen, and the thief can see and do nothing, nada, zip!<br \/>\nAnd to top it all off, Voiceover kicks in at full volume and reads the contents of the message out LOUD! How&nbsp;embarrassing!&nbsp;<\/p>\n<p>Yes, you can turn the volume down, or even off, but once the voiceover finishes reading the screen, it starts all over again, and resets the sounds settings, to LOUD.<\/p>\n<p>Definitely <b>+1<\/b> in the Nifty Jar.<\/p>\n<p><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-14.10.46.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-14.10.46.png?resize=320%2C130\" height=\"130\" width=\"320\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<p>Anything else that Undercover can do to help get your machine back?<\/p>\n<p>Why yes, now that you ask.<\/p>\n<p>\nUndercover version 6.0 now supports <i>Undercover Watch<\/i>.<\/p>\n<p>This gives you 2 options to begin <b>Auto-Tracking<\/b> a machine, without you actually clicking on <i>Report Stolen<\/i>.<\/p>\n<p>The 2 options are:<\/p>\n<ol style=\"text-align: left;\">\n<li>When I leave this network (You can specify a few)<\/li>\n<li>When a user logs into a specific &#8220;dummy&#8221; account, or more commonly, OS X&#8217;s guest account.<\/li>\n<\/ol>\n<div>\nAny\/both of these options will auto-trigger the stolen attribute, and begin tracking and taking a few snaps shots for the photo album.<\/div>\n<div>\n<\/div>\n<div>\nThat deserves <b>+2 Nifty Points<\/b>.<\/div>\n<div>\n<\/div>\n<div class=\"separator\" style=\"clear: both; text-align: center;\">\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-15.10.11.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-01-at-15.10.11.png?resize=320%2C252\" height=\"252\" width=\"320\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nSo, that&#8217;s it. Finally!<\/div>\n<div>\n<\/div>\n<div>\nThat is <i>all<\/i> that Undercover can do for you and your home, business, studio or classroom. It will give you peace of mind, that no matter what, you will have options to get your own back again.<\/div>\n<div>\n<\/div>\n<div>\n<\/div>\n<div>\nSome overall thoughts?<\/div>\n<div>\n<\/div>\n<div>\nIn the beginning I was instantly put off by the <a href=\"http:\/\/sites.fastspring.com\/orbicule\/product\/undercovermac?source=appledomination\" target=\"_blank\">price<\/a> of the software.<\/div>\n<div>\n<\/div>\n<div>\nCosting R540 to cover 1 Mac or R640 to cover 5&#8230;there isn&#8217;t really a choice is there?<\/div>\n<div>\n<\/div>\n<div>\nYou can also up this license to cover up to 25 machines, but it will set you back R5500, or R220 per machine.<\/div>\n<div>\n<\/div>\n<div>\nWhen you look at all of the above features and consider the entirety of the 9 Nifty points, Undercover should be charging more!<\/div>\n<div>\n<\/div>\n<div>\n<a href=\"http:\/\/sites.fastspring.com\/orbicule\/product\/undercovermac?source=appledomination\" target=\"_blank\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/Screen-Shot-2014-09-02-at-0.04.06.png?resize=640%2C416\" height=\"416\" width=\"640\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nSo what are the pitfalls and considerations?<\/div>\n<div>\n<\/div>\n<div>\nWell, first and foremost; If someone manages to format and reinstall your Mac, your tracking days are over, since the agent will have been wiped off the machine for good.<\/div>\n<div>\n<\/div>\n<div>\nHow do you prevent this? Set a firmware password!<\/div>\n<div>\n<\/div>\n<div>\nReboot the Mac and hold CMD+R, tap on Tools, and choose to set a Firmware password.<\/div>\n<div>\n<\/div>\n<div>\n<a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5409-577x1024.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5409.jpg?resize=180%2C320\" height=\"320\" width=\"180\" data-recalc-dims=\"1\" \/><\/a><a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5410-577x1024.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5410.png?resize=180%2C320\" height=\"320\" width=\"180\" data-recalc-dims=\"1\" \/><\/a><a href=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5411-577x1024.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5411.png?resize=180%2C320\" height=\"320\" width=\"180\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nThen, why can&#8217;t someone just remove the agent manually, since I have listed the exact locations above?<\/div>\n<div>\n<\/div>\n<div>\nWell, firstly the user would need your administrator password in order to do this.<\/div>\n<div>\n<\/div>\n<div>\n&#8220;But what about the builtin Password Reset Utility found in the Recovery partition&#8221; I hear you say?<\/div>\n<div>\n&#8220;Please refer to the above point of setting a firmware password&#8221; you will hear me say in return.<\/div>\n<div>\nThis will prevent anybody from getting into the recovery console in order to reset your password.<\/div>\n<div>\n<\/div>\n<div>\nDoes Undercover play nice with FileVault2?<\/div>\n<div>\nNO!<\/div>\n<div>\n<\/div>\n<div>\nApple specifically designed FileVault2 to not allow any 3rd party utilities or apps to alter the booting process or drive encryption.&nbsp;<\/div>\n<div>\nSo unfortunately, you either use FileVault2 or Undercover, not both.<\/div>\n<div>\n<\/div>\n<div>\nBut what if you want the benefits of both? Tracking and drive encryption? Well, invest in a 3rd party drive encrypting utility out there, there are many to choose from.<\/div>\n<div>\n<\/div>\n<div>\n<a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5412-577x1024.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5412.png?resize=180%2C320\" height=\"320\" width=\"180\" data-recalc-dims=\"1\" \/><\/a><a href=\"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5413-577x1024.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5413.png?resize=180%2C320\" height=\"320\" width=\"180\" data-recalc-dims=\"1\" \/><\/a><a href=\"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5414-577x1024.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em; text-align: center;\"><img loading=\"lazy\" border=\"0\" src=\"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/IMG_5414.png?resize=180%2C320\" height=\"320\" width=\"180\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\n<\/div>\n<div>\nSo all in all, Undercover is definitely going into the hall of fame for 2014 of Apple Domination!<\/div>\n<div>\n<\/div>\n<div>\nI always feel that if I don&#8217;t personally believe in something, like a piece of software, I cannot endorse it.<\/div>\n<div>\n<\/div>\n<div>\nI am extremely happy to endorse Undercover!<\/div>\n<div>\n<\/div>\n<div>\nNot only will I be using it on my household Macs, but I will also be providing it as a service to my Mac Clients.<\/div>\n<div>\n<\/div>\n<div>\nGo out, get it, and feel better knowing that you have done everything that you can to prevent and recover your machine from theft!<\/div>\n<div>\n<\/div>\n<div>\nEnjoy!<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Undercover was easily one of the best pieces of software that I have had the privilege of reviewing for 2014! Like any good Apple user, you probably have Find my Mac (Find my iPhone, you know what I mean) enabled, and hope to heck that you will never need to use it. Touch wood though,<a href=\"http:\/\/www.appledomination.co.za\/index.php\/2014\/09\/01\/review-undercover-bad-news-for-mac\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":2,"featured_media":274,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[1],"tags":[18,19,20,21,4,22,23],"jetpack_featured_media_url":"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2014\/09\/logo_big2.png?fit=1600%2C1531","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6OBBc-b","jetpack-related-posts":[{"id":78,"url":"http:\/\/www.appledomination.co.za\/index.php\/2012\/01\/14\/use-one-keyboard-for-your-pc-or-mac-as\/","url_meta":{"origin":11,"position":0},"title":"Use one keyboard for your PC or Mac, as well as your iPhone\/iPod","date":"January 14, 2012","format":false,"excerpt":"In today's technology age, having your iPhone along side your production laptop is almost a given. Texting, searching contacts, map locations, even emailing, helps our generation to be more productive with multi-tasking. But changing between the iPhone and the laptop tends to slow us down, using the bigger and smaller\u2026","rel":"","context":"In \"iPhone\"","img":{"alt_text":"","src":"https:\/\/i1.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2012\/01\/rizer.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":68,"url":"http:\/\/www.appledomination.co.za\/index.php\/2012\/02\/20\/mac-os-x-mountain-lion-its-officia\/","url_meta":{"origin":11,"position":1},"title":"OS X Mountain Lion, It's official.","date":"February 20, 2012","format":false,"excerpt":"7 Months after the launch of Lion, Apple has announce its successor, Mountain Lion. Catchy name right? The Developer's preview is now available for download, and the official release should be available around May\/June (Summer in the States). There is a serious range of new features that have been added,\u2026","rel":"","context":"In \"AirPlay Mirroring\"","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2012\/02\/ML_GateKeeper_SS.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":64,"url":"http:\/\/www.appledomination.co.za\/index.php\/2012\/03\/05\/share-your-external-drive-between-mac\/","url_meta":{"origin":11,"position":2},"title":"Share your External drive between Mac and Windows","date":"March 5, 2012","format":false,"excerpt":"If you've ever tried to use your external storage between Windows and Mac, you will already know that it is not that simple. Props to AllNewsMac Here's why: Mac OS X Snow Leopard and Lion (and Mountain Lion?) can read drives formatted as NTFS, but cannot write to them. As\u2026","rel":"","context":"In \"Hard Drives\"","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2012\/03\/Mac_format.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":70,"url":"http:\/\/www.appledomination.co.za\/index.php\/2012\/02\/13\/turn-your-macs-into-motion-detection\/","url_meta":{"origin":11,"position":3},"title":"Turn your Macs into a motion detection alarm system.","date":"February 13, 2012","format":false,"excerpt":"Do you have a handful of Mac computers at your home right now? Maybe at the office, your department is filled with Macs? Your child's Mac-Lab at school is most certainly filled to the brim with iMacs. Are they safe? Well, as safe as they could be, I suppose? Try\u2026","rel":"","context":"In \"Apps\"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":87,"url":"http:\/\/www.appledomination.co.za\/index.php\/2012\/01\/01\/icloud-what-you-need-to-know\/","url_meta":{"origin":11,"position":4},"title":"iCloud: What you need to know.","date":"January 1, 2012","format":false,"excerpt":"Whether you managed to talk the bank manager into letting you get your hands on the new iPad 2 or iPhone 4s, or simply upgraded to IOS 5 on any other of your iThingies, you will have most likely already come into contact with iCloud. With the release of IOS\u2026","rel":"","context":"In \"iCloud\"","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2012\/01\/iCloud_screen.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1145,"url":"http:\/\/www.appledomination.co.za\/index.php\/2017\/05\/15\/mac-monitored-services\/","url_meta":{"origin":11,"position":5},"title":"Mac Monitored Services...","date":"May 15, 2017","format":false,"excerpt":"Just like a dog can sense a disaster before it happens, we can treat\u00a0issues on your Mac\u00a0before they turn into catastrophes... Apple Domination has partnered with an international Managed-Services Provider, Watchman Monitoring,\u00a0and is now offering this to all of our clients, old and new. Essentially, Managed-Services means that we will\u2026","rel":"","context":"In &quot;Guide&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/www.appledomination.co.za\/wp-content\/uploads\/2017\/05\/ccd8b816-021a-439c-9404-cec140361f90.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/posts\/11"}],"collection":[{"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":1,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/posts\/11\/revisions"}],"predecessor-version":[{"id":191,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/posts\/11\/revisions\/191"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/media\/274"}],"wp:attachment":[{"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/media?parent=11"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/categories?post=11"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.appledomination.co.za\/index.php\/wp-json\/wp\/v2\/tags?post=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}