Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using LoJack® to Protect Your Macintosh Laptop Overview This document explains how to use Computrace LoJack® to help in the recovery of your Macintosh laptop in the event of theft or loss. LoJack is a software application available at no cost to University of Pittsburgh students. LoJack allows your laptop to be traced in the event that it is ever lost or stolen. To get a single use copy of LoJack for your laptop, please bring your Pitt ID card to the Software Licensing Services office at 204 Bellefield Hall. What is LoJack? Computrace LoJack® for Laptops is a service that tracks, locates, and assists the recovery process in the event that laptops are stolen or lost. You report the loss or theft to local police authorities, contact Computrace, and let the software installed on your computer work behind the scenes to silently and securely send its location to the Computrace Monitoring Center using any Internet connection. The Computrace Recovery Team then tracks your computer’s location and partners with local law enforcement to get your computer back. The Computrace LoJack for Laptops software is tamper-resistant and not easily removed by traditional tools and procedures. The software can only be removed by an authorized user with the correct password. Each license of the Computrace LoJack for Laptops software is unique and can only be installed on one computer. For more information about a theft or loss of laptop report, visit the “Reporting a Lost or Stolen Laptop” section of this document. CD Contents The Computrace LoJack for Laptops Activation software CD contains the following: • • • • • The LoJack for Laptops Installation package A Read Me text file with additional information about the software A copy of these installation instructions A Frequently Asked Questions document A LoJack for Laptops Theft Report Form Before Installing LoJack To install Computrace LoJack, please make sure that your Macintosh laptop meets the following requirements: • • • • • Mac OS X v10.3 or higher Macintosh® system with PowerPC G3/G4/G5 processor or Intel Core Duo processor Internet connection Safari or Firefox Browser Macromedia Flash Player Please review the following recommendations to help you avoid problems during your installation. Note: These suggestions should be followed on a temporary basis only and should be turned back on once LoJack for Laptops has been installed. Using LoJack to Protect Your Page 1 of 13 December 2009 Macintosh Laptop 1. Disable personal firewall – If you have a personal firewall installed, it is advised that you disable it temporarily during the installation of Computrace LoJack for Laptops. Please refer to your firewall software’s documentation for more details. 2. Disable anti-virus software – Sometimes anti-virus software products incorrectly identify Computrace LoJack for Laptops as a virus. To insure a successful installation, CSSD recommends that you temporarily disable your anti-virus software. During the LoJack installation process you will be asked to register your laptop. Please remember that registration is only good one time for a single laptop. You cannot use the same license to register multiple times. Please be sure to record and store your password in a safe location and not on any protected computer. Known Compatibility Issues McAfee product users - You must uninstall your McAfee product(s) before installing LoJack on a laptop. Computrace has determined that completely uninstalling your McAfee products is the only way to successfully install LoJack. Once LoJack is installed you can reinstall your McAfee product(s). Installing LoJack To install LoJack on your Macintosh laptop, complete the following steps: 1. Turn on your laptop. 2. Write down the License number from the LoJack CD you received. You will need it to register your software. 3. Insert the CD into the drive. Double click the LoJack image when it appears onscreen. Using LoJack to Protect Your Macintosh Laptop Page 2 of 13 December 2009 4. After a few moments the CD will open and you see its contents. Double click the LoJackLaptops file. 5. In the Thank You for Using Computrace LoJack for Laptops window, click either one of the Install buttons. Using LoJack to Protect Your Macintosh Laptop Page 3 of 13 December 2009 6. In the Install LoJack for Laptops window, click the Download button For MAC OS X v10.3 or higher. 7. You might be asked to allow or permit this download to continue. Then the L4Install.dmg file will be downloaded from the Internet to your desktop. Using LoJack to Protect Your Macintosh Laptop Page 4 of 13 December 2009 8. Double click on the L4LInstall.dmg file from the computer’s desktop. 9. Double click the l4linstall file that appears within the installation application folder. 10. A LoJack for Laptops Installation window appears. Click the Next button. Using LoJack to Protect Your Macintosh Laptop Page 5 of 13 December 2009 11. Check the I accept the terms in the License Agreement box and click the Next button. 12. A Registration Code window appears. Enter the ten digit License number you copied from the CD. Click the Next button. Using LoJack to Protect Your Macintosh Laptop Page 6 of 13 December 2009 13. A Create Your Account window appears. Enter your contact information. All fields must be filled out. This information will be used to contact you if your laptop is reported as lost or stolen. Remember to note your email address and password they will be used to login to the LoJack for Laptops Web site. When finished, click the Next button. 14. In the Tell Us About Yourself window, choose the appropriate selection from the Which of the following best describes you? pulldown menu. You must make a selection for the installation process to continue. Click the Next button. Using LoJack to Protect Your Macintosh Laptop Page 7 of 13 December 2009 15. In the Ready To Install window, click the Install button to begin the installation. 16. The Installing LoJack for Laptops window indicates that installation has begun. A descriptive status bar indicates installation progress. Using LoJack to Protect Your Macintosh Laptop Page 8 of 13 December 2009 17. If you use a user name and password to login to your laptop or if your laptop has multiple user accounts set up on it: the installation may require you to register as the administrative user. If it does, the Authenticate window will indicate that you should enter your Name and Password into the text fields that are provided. Provide the administrative account information used to login to your computer not the information you provided in order to register LoJack. Providing a user name and password that do not have administrative privileges may prevent the installation from finishing. When you have entered this information click the OK button. 18. The Installation Successful window indicates that the installation is complete and the LoJack software has been successfully installed on the laptop. When you are ready to continue, click the Finish button. Using LoJack to Protect Your Macintosh Laptop Page 9 of 13 December 2009 19. The LoJack for Laptops Web site will load. Login to your account with the Email and Password that were used to create your LoJack account. Using LoJack to Protect Your Macintosh Laptop Page 10 of 13 December 2009 20. The My Subscriptions window has information about your LoJack registration including: a. Registration Code b. Expire Date c. Laptop Status (should show “protected” in green letters) d. Computer Make and Model e. Serial Number f. Any Actions Required CSSD recommends that you use the Print License button to print a copy of your license information. Another feature you can use is the Test Call which lets you make a call from your computer to the Computrace LoJack Monitoring Center. To begin a Test Call click the Test Call button and follow the online instructions. You can click the Report a Theft button to report your laptop as missing or stolen. When you are finished, click the Logout button in the upper right side of the Web browser window. 21. Close the browser and all open LoJack applications files. Drag the L4Linstall files that were placed on your desktop to your Computer’s Trash. Reporting a Lost or Stolen Laptop If your Computrace LoJack for Laptops equipped computer is stolen, you will need to report it as soon as possible. It is vital that you complete the following steps: Using LoJack to Protect Your Macintosh Laptop Page 11 of 13 December 2009 1. Within 7 days of the loss or theft, file a police report with the local law enforcement agency authorities where the theft or loss occurred. Examples – If the loss or theft occurred on the University of Pittsburgh campus, file a report with the Campus Police Department. If the loss or theft occurred off campus, file a report with the local police department. Be sure to obtain a copy of the police report and the police report case number. 2. Contact the Computrace LoJack Recovery Team and report your computer as stolen. You will need to provide the following: a. b. c. d. 3. Your police report case number Contact information (for example, name and address) Computer specifications (for example, make and model) Details about the theft or loss (for example, time and location) The Recovery Team can be contacted in one of the following ways: a. Enter your Email address and Password at https://www.lojackforlaptops.com/customer/login.asp and click the Login button. File a report by clicking the Report a Theft button or tab on the My Subscriptions Web page. Using LoJack to Protect Your Macintosh Laptop Page 12 of 13 December 2009 The Report A Theft page lets you initiate a report to Computrace about a lost or stolen laptop. Follow the online instructions and click the Continue button to begin a report. b. Contact Computrace by phone: 1-604-676-3644. c. Print a fax report from http://www.lojackforlaptops.com/pdf/TheftReport_Form.pdf. Fill it out and fax it to: 1-604-608-3817. Get Help The Technology Help Desk at 412 624-HELP [4357] is available 24 hours a day, seven days a week to answer your technology-related questions. Questions can also be submitted via the Web at technology.pitt.edu. Using LoJack to Protect Your Macintosh Laptop Page 13 of 13 December 2009
© Copyright 2024