Step 1: Download and install miTracker
Click here to download miTracker setup file. After the download is finished, double click the setup file to complete the installing process.
Step 2: Register your user account and password
Input your user name, password and email to register your account in miTracker database. Take care of these confidential information.
Step 3: Input the serial number or use the trial version firstly
After registration, it will ask for a serial number. If you have already purchased the product, input your purchased license here. If you don't buy it, please click "Free Trial" button to get 15 days full function evaluation or you can click "Buy Now" button to purchase from miTracker online store.
Step 4: Run miTracker and start to protect your laptop & data
miTracker has simplistic interface which is easy for operation. From the main interface, we can see clearly that miTracker is composed of local features and cloud based functions. Local features include "File Encryption" and "File Shred". Cloud based features include "Locate stolen laptop", "Remotely delete files from stolen laptop" and "Remotely lock the stolen laptop". All these features are designed to keep your laptop and data security.
Step 5: Encrypt your important files with local File Encryption
miTracker employs military AES encryption standards and it can encrypt both files and folders. For individual file, click "Add Files" and then click okay to start encrypting. For many files, you can create a folder and put all the files into this folder, then click "Add Folder" to encrypt. If you want to decrypt the files, select it and click " Decrypt" button, then it will decrypt automatically.
Step 6: Delete all your unwanted but important files with local File Shredder
For unwanted but confidential files that you want to destroy, File Shredder is your right choice. Click "Add Files" to input individual file or click "Add Folder" to input batch files, then click "Shred" to delete all the files permanently and nobody can recover. There are five shredding algorithm for your choose, Gutmann Algorithm, Erase and random data, National safety association standard, United States military standard, North Atlantic Treaty Organization standard.
Step 7: Log into online control center to recover stolen laptop through cloud based features
When you find your laptop lost or stolen, you need the cloud based features to help you find back the laptop and protect your data stored in it. Go to the online control center entrance page, login it with your registered name and password. The login page address is http://www.mitracker.com/control/login.aspx
Step 8: Device information is displayed
Once you login, your device and account information including IP address, MAC address, license expiration date and device status. Click "Click here for further actions" to apply more actions on your stolen laptop through remote control.
Step 9: Locate the stolen laptop
Click "Location" tab, your stolen laptop location will be displayed. miTracker uses Wifi location technology, so it is shockingly accurate.
Step 10: Remotely lock down the stolen laptop
Firstly turn on the "Missing" button, this is the main switch. Then turn on the "Lock" button, choose to type the message or leave it blank, this is optional. The typed message will display in the stolen computer, or just black screen if you leave the message blank.
After several seconds, the lost computer is locked down totally. See below screenshot.
Step 11: Remotely delete the files from the stolen laptop
You can specify files by extension, if you have a specific type you want to get rid of. You also can select "Preset files" to Yes to delete files which are encrypted by miTracker local File Encryption feature. Some standard file types can also be deleted remotely such as Office, common file types (PDF, txt, etc), web browser caches, image files, and compressed file types. Mare sure the "Missing" button is turned on, then click the ones you want and hit save button.