Anti-Theft: Phantom Account

Status
Not open for further replies.

MrExplorer

Level 28
Thread author
Verified
Nov 15, 2012
1,765
Not able to understand it.

image.png


image.png
 
D

Deleted member 178

It is the Anti-theft feature, it create a "fake account" destined to lure the thief into it, this account has no password, and once in it , he will think he can use your laptop safely, in fact the location is transmitted to your web interface in ESET website where you can stealthily take pictures of the thief via the webcam; then the screenshot is transmitted to your web interface.
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
It's a dummy account, to allow ESET Anti-Theft features to fully operate so it can find and location your missing device and gather evidence for personal and legal reasons, if you wish to carry the case further.

May I ask, what part of the wording & structure did you not understand? Might be an idea to view ESET's website in your native language, if available.
 

Payback

New Member
Verified
Jan 7, 2013
325
Earth said:
It's a dummy account, to allow ESET Anti-Theft features to fully operate so it can find and location your missing device and gather evidence for personal and legal reasons, if you wish to carry the case further.

May I ask, what part of the wording & structure did you not understand? Might be an idea to view ESET's website in your native language, if available.

Actually...you stole the words from my mouth, I was going to say the same thing +neutral
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top