
{"id":7339,"date":"2016-11-28T22:54:30","date_gmt":"2016-11-28T21:54:30","guid":{"rendered":"https:\/\/www.trucnet.com\/?p=7339"},"modified":"2016-11-28T22:54:30","modified_gmt":"2016-11-28T21:54:30","slug":"phrozen-computrace-detector-1-0","status":"publish","type":"post","link":"https:\/\/www.trucnet.com\/en\/phrozen-computrace-detector-1-0\/","title":{"rendered":"Phrozen Computrace Detector 1.0"},"content":{"rendered":"<p>Phrozen Computrace Detector is a small portable tool that helps you spot the presence of a possible Computrace agent on your machine.<\/p>\n<p>As a reminder, Computrace is software from Absolute that allows administrators to remotely track a machine, perform updates, see which software is installed on a PC, erase documents or the entire hard drive, and even obtain IP address information. In other words, Computrace can represent a gaping security vulnerability, as any hacker can exploit it to take control of your machine.<\/p>\n<p>Often pre-installed on PCs from manufacturers partnered with Absolute, Computrace is undetectable by your antivirus software because it appears on most whitelists. Furthermore, the software is sometimes even hidden in certain BIOSes, rendering any search futile.<\/p>\n<p>To detect the presence of a Computrace agent, simply launch Phrozen Computrace Detector. This basic program runs in a dedicated window and records all the locations where Computrace could potentially be hiding.<\/p>\n<p>If Phrozen Computrace Detector shows a green &quot;Clean&quot; next to each test line, Computrace is not present on your computer. Otherwise, you will need to disable Computrace via the BIOS settings, or terminate its processes immediately after startup.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>Summary:<\/strong><\/span><br \/>\n<strong>Software installed on over 2 million computers worldwide, marketed by the company Absolute, which OFFICIALLY allows:<\/strong><\/p>\n<p>\u2013 To secure the data of a fleet of remote workstations<br \/>\n\u2013 To always deploy updates, licenses, or launch audits remotely<br \/>\n\u2013 To geolocate stolen computers<br \/>\n\u2013 To produce reports concerning the machines<br \/>\n\u2013 To retrieve files<br \/>\n\u2013 To remotely erase documents or the entire hard drive\u2026<\/p>\n<hr \/>\n<p><span style=\"color: #008000;\"><strong>Configuration:<\/strong><\/span><br \/>\n\u2013 Windows (x32\/x64 Bits): XP, Vista, 7, 8, 8.1, 10<br \/>\n\u2013 Processor: Pentium 4 3GHz<br \/>\n\u2013 RAM: 512 MB<br \/>\n\u2013 Disk space: 4 MB<\/p>\n<hr \/>\n<p><span style=\"color: #0000ff;\"><strong>Facility :<\/strong><\/span><br \/>\n\u2013 Intel (32-bit) Run: <strong>ComputraceDetector_32.exe<\/strong><br \/>\n\u2013 Intel (x64Bits) Run: <strong>ComputraceDetector_64.exe<\/strong><\/p>\n<hr \/>\n<p><span style=\"color: #008080;\"><strong>- Language :<\/strong><\/span> English<br \/>\n<span style=\"color: #008080;\"><strong>- Size :<\/strong><\/span> 2.9 MB<\/p>\n<p><a href=\"http:\/\/uptobox.com\/diiouzmqqfxe\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Uptobox server<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/1fichier.com\/?4y0wggzr97\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Server 1File<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/mega.nz\/#!4lghiDRK!6Rt6FvcpjZdYSX3v8gIN0Evk2Mj6s45-x9LC0PpYsN8\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Mega Server<\/small><\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Phrozen Computrace Detector est un petit outil portable qui vous aide \u00e0 rep\u00e9rer la pr\u00e9sence d&rsquo;un \u00e9ventuel agent Computrace sur votre machine. Pour rappel, Computrace est un logiciel d&rsquo;Absolute permettant aux administrateurs de suivre une machine \u00e0 la trace, de faire des mises \u00e0 jour, de conna\u00eetre quels logiciels sont install\u00e9s sur un PC, d&rsquo;effacer [&hellip;]<\/p>","protected":false},"author":1,"featured_media":7340,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1749],"tags":[294,639,2938,2937,2936,1852,105,564,341,2935,382,131,1637],"class_list":["post-7339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-logiciels","category-securite","tag-antivirus","tag-bios","tag-clean","tag-computrace","tag-detector","tag-distance","tag-hacker","tag-logiciel","tag-ordinateur","tag-phrozen","tag-securiser","tag-securite","tag-trace"],"aioseo_notices":[],"modified_by":"Auteur","_links":{"self":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/7339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/comments?post=7339"}],"version-history":[{"count":0,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/7339\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media\/7340"}],"wp:attachment":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media?parent=7339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/categories?post=7339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/tags?post=7339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}