{"id":1843,"date":"2009-03-03T03:02:54","date_gmt":"2009-03-02T19:02:54","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=1843"},"modified":"2009-03-03T03:06:30","modified_gmt":"2009-03-02T19:06:30","slug":"bak2u-phoenix-anti-theft-software-review-test-results-conclusion-plus-special-offers","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2009\/03\/03\/bak2u-phoenix-anti-theft-software-review-test-results-conclusion-plus-special-offers\/","title":{"rendered":"BAK2U Phoenix Anti-Theft Software Review &#8211; Test Results, Conclusion plus Special Offers"},"content":{"rendered":"<p>This is my follow up with the BAK2U Phoenix Software Review. In this review, I hope to find out if Phoenix Anti-Theft software really can work in different scenarios. Be sure to check out the BAK2U software Promotion at the end of the post! Limited Period ONLY!<\/p>\n<p>If you have missed my other posts, you can checked out the link below: &#8211;<\/p>\n<ol>\n<li><a href=\"http:\/\/techielobang.com\/blog\/2009\/02\/28\/bak2u-phoenix-windows-software-review-setup-video-within\/\" target=\"_blank\">BAK2U Phoenix Anti-Theft Software Setup &#8211; Video Within<\/a><\/li>\n<li><a href=\"http:\/\/techielobang.com\/blog\/2009\/02\/28\/bak2u-phoenix-anti-theft-software-review-test-1-video-within\/\" target=\"_blank\">BAK2U Phoenix Anti-Theft Software Test1 &#8211; Video Within<\/a><\/li>\n<\/ol>\n<h3><!--more-->Overview<\/h3>\n<p>The Phoenix software, after installed, will NOT appear until it has detected an Internet Connection (WiFi or Broadband Connection). Once detected, it will start to request password within your stated timing during your setup. If the password is not key in correctly and the time has elapsed, it will send a secret email (and Twitter if it is setup properly) to you. If there is no Internet connection, the Phoenix software will not appear.<\/p>\n<p>The merit of this is that the person who has your laptop can configure the Internet Connection and this will allow the Phoenix Software to send out the email. The bad part of this is that if the person did not connect to the Internet, he is able to access the information on the laptop unrestricted.<\/p>\n<p>Of course, if you have set a profile password, the person who got hold of your laptop will not be able to access information at all.<\/p>\n<p>However, my opinion about this Phoenix software is that it is more than just an Anti-Theft software. Imagine if you have misplaced your laptop and another person tried to find out who is the owner of this laptop. In\u00a0 this case, after the Phoenix software is activated, it will show a page with information of your email and other contacts &#8216; email(s) where the person could contact to return the laptop.<\/p>\n<h3>Test Scenario<\/h3>\n<p>I have thought of a few scenarios for testing.<\/p>\n<ul>\n<li>Test 1 &#8211;<a href=\"http:\/\/techielobang.com\/blog\/2009\/02\/28\/bak2u-phoenix-anti-theft-software-review-test-1-video-within\/\" target=\"_blank\"> Confirmation of email receiving and Twitter update &#8211; Done<\/a><\/li>\n<\/ul>\n<ul>\n<li>Test 2 &#8211; Using Huawei Model Stick E-170 (from Starhub) at town area<\/li>\n<\/ul>\n<ul>\n<li>In this test, the location is Orchard Shaw Centre McDonald (indoor).<\/li>\n<\/ul>\n<ul>\n<li>Upon booting up, everything seems normal.<\/li>\n<\/ul>\n<ul>\n<li>When the Huawei modem was connected to the Internet, the Phoenix software sprang into action.<\/li>\n<\/ul>\n<ul>\n<li>Once the password time elapsed, the laptop freeze. An emailed was sent out, together with Twitter update of the location.<\/li>\n<\/ul>\n<ul>\n<li>However, for this test, the location was wrong. See below map screenshot.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1844\" data-permalink=\"https:\/\/techielobang.com\/blog\/2009\/03\/03\/bak2u-phoenix-anti-theft-software-review-test-results-conclusion-plus-special-offers\/phoenix_googlemap\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_googlemap.jpg?fit=643%2C468&amp;ssl=1\" data-orig-size=\"643,468\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"phoenix_googlemap\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_googlemap.jpg?fit=643%2C468&amp;ssl=1\" class=\"size-full wp-image-1844 aligncenter\" title=\"phoenix_googlemap\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_googlemap.jpg?resize=460%2C336\" alt=\"phoenix_googlemap\" width=\"460\" height=\"336\" srcset=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_googlemap.jpg?w=643&amp;ssl=1 643w, https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_googlemap.jpg?resize=300%2C218&amp;ssl=1 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><\/p>\n<ul>\n<li>This is not unexpected as the modem is using Telcos\u00a0 network.<\/li>\n<\/ul>\n<ul>\n<li>Test 3 &#8211; Using Ethernet cable direct to router.<\/li>\n<\/ul>\n<ul>\n<li>This test has the same results as the initial test that I have conducted (using wireless network).<\/li>\n<li>The software will activate upon detection of the Internet Connection.<\/li>\n<li>Email will be sent out, together with Twitter update.<\/li>\n<li>However, the location is inaccurate. It shows the same location as Test 2 above.<\/li>\n<li>I did a few more tests by unplugging the cable and using wireless (from the same router). This time, with wireless, it shows the correct location.<\/li>\n<li>I redo the test with the cable again and the same results shows.<\/li>\n<li>However, the software is performing as what is stated. Sending email and Twitter update.<\/li>\n<\/ul>\n<h3>Results Summary<\/h3>\n<ul>\n<li>One issue that I encountered is that during the setup phase, after I keyed in my Twitter account, it seems that I cannot remove it (of course, I can purposely key in the wrong password).<\/li>\n<\/ul>\n<ul>\n<li>Another issue is that when the information is sent to Twitter as an update, the link for the map location is broken. Paddy Tan, CEO of BAK2U is already talking to the Twitter Team to find a way to resolve this issue. In the meantime, if you are using widgets for Twitter update, you should be able to see the link correctly (as shown below).<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1859\" data-permalink=\"https:\/\/techielobang.com\/blog\/2009\/03\/03\/bak2u-phoenix-anti-theft-software-review-test-results-conclusion-plus-special-offers\/phoenix_test_twitter\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_test_twitter.jpg?fit=200%2C488&amp;ssl=1\" data-orig-size=\"200,488\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"phoenix_test_twitter\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_test_twitter.jpg?fit=200%2C488&amp;ssl=1\" class=\"size-full wp-image-1859 aligncenter\" title=\"phoenix_test_twitter\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/03\/phoenix_test_twitter.jpg?resize=200%2C488\" alt=\"phoenix_test_twitter\" width=\"200\" height=\"488\" \/><\/p>\n<ul>\n<li>The accuracy of the map varies depending on the location and the network. However, the information from the email is informative enough for owner to trace the laptop.<\/li>\n<\/ul>\n<ul>\n<li>As mentioned, the only downside is that if there is no Internet connection, the software will not activate and the person can have full access to your laptop.<\/li>\n<\/ul>\n<h3>Conclusion<\/h3>\n<ul>\n<li>The BAK2U Phoenix software is easy to install. With the few testing done, it proves that it can really identify the location using SkyHook technology but it is not always accurate.<\/li>\n<\/ul>\n<ul>\n<li>This software is effective if you don&#8217;t have a password profile. Reason is because it will only be activated with a Internet connection. On activation, it freezes up the screen (which is good) and send out information to the owner (information includes Location via SkyHook technology, IP addresses, unique MAC address and etc). These are good information to track down the person who is holding on to your laptop.<\/li>\n<\/ul>\n<ul>\n<li>Finally, with the Phoenix Anti-Theft Software installed, it gives you a peace of mind. If you ever lose your laptop, you can be very sure that the moment you receive an email notification from your Phoenix Anti-Theft Software, you already have information of the whereabouts of your laptop.<\/li>\n<li>I recommend this software to anyone who frequently needs to travel and to those who has to carry the laptop to various location daily.<\/li>\n<\/ul>\n<h3>Promotion<\/h3>\n<p>Paddy Tan, the CEO of BAK2U has made an irresistible offer of their products for a limited period. Click on the link below.<\/p>\n<h2 style=\"text-align: center;\"><a href=\"http:\/\/www.bak2u.com\/singapore.php\" target=\"_blank\">BAK2U Promotion Discount &#8211; Limited Period Only<\/a><\/h2>\n<p>[ad#boxlist]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is my follow up with the BAK2U Phoenix Software Review. In this review, I hope to find out if Phoenix Anti-Theft software really can work in different scenarios. Be sure to check out the BAK2U software Promotion at the end of the post! Limited Period ONLY! If you have [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[98,4,40,224,189,14,111],"tags":[577,575,576],"class_list":["post-1843","post","type-post","status-publish","format-standard","hentry","category-computer","category-information","category-laptop","category-mid","category-netbook","category-techie","category-umpc","tag-anti-theft","tag-bak2u","tag-phoenix"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-tJ","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/1843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=1843"}],"version-history":[{"count":7,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/1843\/revisions"}],"predecessor-version":[{"id":1868,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/1843\/revisions\/1868"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=1843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=1843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=1843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}