Vous êtes sur la page 1sur 23

THEFT AWARE 2.

00
for Symbian

USER GUIDE
http://www.itagents.at http://www.theftaware.com

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

Table of Contents
Theft Aware Executive Summary .................................................................................................................. 5 WHATS NEW IN VERSION 2.00.................................................................................................................. 5 THEFT AWARE BASICS ............................................................................................................................... 5 Unveil the Thiefs Identity ..................................................................................................................... 5 Send SMS Commands to the Phone ..................................................................................................... 5 Stealth Mode......................................................................................................................................... 6 Get Theft Aware 2.00 .................................................................................................................................... 7 DOWNLOAD AND/OR PURCHASE THEFT AWARE ..................................................................................... 7 Theft Aware Trial................................................................................................................................... 7 INSTALLATION PROCESS ........................................................................................................................... 7 Important Hint ...................................................................................................................................... 7 Use Theft Aware 2.00.................................................................................................................................... 8 NAVIGATE THE INTERFACES ...................................................................................................................... 8 SETTINGS INTERFACE ................................................................................................................................ 8 System ................................................................................................................................................... 8 Owner.................................................................................................................................................... 8 Access Code .......................................................................................................................................... 8 Notification 1 ........................................................................................................................................ 8 ADVANCED SETTINGS................................................................................................................................ 8 Notification 2 ........................................................................................................................................ 9 Allow SMS Commands .......................................................................................................................... 9 Phone Lock Behaviour........................................................................................................................... 9 Custom Lock Text .................................................................................................................................. 9 Siren When Locked ............................................................................................................................... 9 Siren Sound ........................................................................................................................................... 9 Send Contacts As................................................................................................................................... 9 SMS Map Type .................................................................................................................................... 10 Gps Query Timeout ............................................................................................................................. 10 SMS on Low Battery ............................................................................................................................ 10 HELP INTERFACE...................................................................................................................................... 11
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

SAVE THE SETTINGS ................................................................................................................................ 11 Stealth Mode....................................................................................................................................... 11 Visible Mode ....................................................................................................................................... 12 Access Configuration in Stealth Mode ................................................................................................ 12 Accept Another SIM Card.................................................................................................................... 13 LICENSING THEFT AWARE ....................................................................................................................... 13 Purchase License ................................................................................................................................. 14 Activate License .................................................................................................................................. 14 Consume Coupon ................................................................................................................................ 14 THEFT AWARE 2.00 SMS COMMANDS.................................................................................................... 15 Remote Command Authorization ....................................................................................................... 15 Lock the Mobile Phone ....................................................................................................................... 16 Unlock the Mobile Phone ................................................................................................................... 16 Turn Siren on Mobile Phone On.......................................................................................................... 16 Turn Siren on Mobile Phone Off ......................................................................................................... 16 Update Mobile Phone Information (One-Time) ................................................................................. 16 Initiate a Call ....................................................................................................................................... 17 Wipe the Phone .................................................................................................................................. 17 Back Up Important SMS ...................................................................................................................... 17 Back Up Contacts ................................................................................................................................ 18 Get Recent Log Entries ........................................................................................................................ 18 Change Theft Aware Configuration..................................................................................................... 19 Launch and Shut Down Configuration Interface ................................................................................. 20 Implement Own Remote Commands ................................................................................................. 21 USE THEFT AWARE ADVANCED OPTIONS ............................................................................................... 22 Disable and Enable Autostart.............................................................................................................. 22 Send Test SMS ..................................................................................................................................... 22 Simulate Theft Event ........................................................................................................................... 22 Simulate Lock ...................................................................................................................................... 22 Open or Delete Server Log File ........................................................................................................... 22 Open or Delete Client Log File ............................................................................................................ 22 Appendix A - Supported Phones ................................................................................................................. 23
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com 3

Appendix B - Languages .............................................................................................................................. 23 Appendix C - Technical Support .................................................................................................................. 23 Appendix D Affiliate Program .................................................................................................................. 23

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

Theft Aware Executive Summary


Theft Aware provides data protection and theft recovery for smartphones. It enables you to control and find your device in the event of loss or theft. "A mobile phone gets stolen in the UK every 45 seconds. Thats nearly 800,000 handsets a year." (uknetguide.co.uk) "If your phone is stolen and a thief changes the SIM card, it usually is gone forever as the phone changes its identity... Theft Aware enables you to stay in contact with your phone even after that event." (Reinhard
Holzner, CEO ITAgents)

WHATS NEW IN VERSION 2.00


Please find the news about Theft Aware 2.00 at http://www.theftaware.com/?step=whats_new.

THEFT AWARE BASICS


Unveil the Thiefs Identity To enable communication to your phone you will register up to two notification numbers with Theft Aware (i.e. friends of yours, or your second phone). Those friends will then receive all Theft Aware messages for you. Now, if the thief changes the SIM card of the phone, Theft Aware will invisibly send the phone number of the thief to those recipient numbers. By using the phone number of the thief you can stay in contact with your phone.

The notification SMS contains: Phone number of the thief Network specific information GPS coordinates if available Link to online map service

Figure 1: Example of Notification SMS

Contact the police to get your phone back or remote control the phone to protect your data.

Send SMS Commands to the Phone Get the current location of your phone: If the phone has GPS built in and GPS data is available it will send you its GPS coordinates. The updates also can be configured to be sent continuously.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

Lock the phone: The device will not be usable by the thief anymore as the screen will be blocked by Theft Aware. This option can also be set to be enabled automatically upon SIM card change. Activate a loud siren sound: The phone will start to emit a loud siren sound that can only be turned off again by an authorized user. You are even able to customize the siren sound by specifying own sound files or by recording a customized siren sound. Wipe the phone and erase all private data stored on it: Format the phone AND all memory cards to keep your private data confidential. Back up all your contacts: Before you wipe the phone you can backup your contacts, they will be transmitted via SMS to the other device. Back up SMS that are important to you: Just tell Theft Aware which SMS you want to rescue, they will be forwarded to the other device. Let the phone call you or other phone numbers: Your phone is able to phone independently upon SMS command. The calls will be hidden as good as possible. This enables you to listen to what happens at the other side of the line without anybody recognizing it. Query Call or SMS protocol data: By sending a simple SMS command you can query call or SMS protocols on the target phone. Change Theft Aware settings: most of the settings of Theft Aware can be changed by SMS. Remote command plugin interface: Implement your own SMS commands. Stealth Mode After theft, thiefs usually check the mobile phone for applications that could unveil their identity. Thiefs will look for application icons, and will check the application manager as well as the application log. If the thief is able to find suspicious traces it is very likely that the phone will be turned off and will be subject to disposal. This usually results in the phone being lost forever. All of the anti theft solution providers tried to solve this problem. But with their solutions it is either not possible to change the tools configuration (e.g. uninstall is not possible) or the tool provides visible traces to a thief causing all the consequences lined out above. We cooperated with the device manufacturers and managed to create the perfect solution. Theft Aware is also the only solution in the marketplace that will be completely invisible on the phone, in order to give you the best chances to either catch the thief or get your device back.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

Get Theft Aware 2.00


DOWNLOAD AND/OR PURCHASE THEFT AWARE
Theft Aware is available either via our website http://www.theftaware.com or via Nokias OVI store. Theft Aware Trial Note that at our website we also offer a trial version of Theft Aware that is not available at OVI store.

INSTALLATION PROCESS
After launching the installer process, it is straight forward to install Theft Aware. Please carefully read all the texts provided during the installer process as they contain important information. Important Hint Once installed, Theft Aware will create two entries in the installed application list, one entry is called Theft Aware and one is called Theft Aware Launcher.

Figure 2: Application List Entries

Always deinstall Theft Aware by deinstalling the Theft Aware package. This will automatically also deinstall the Theft Aware Launcher package.

LAUNCH THEFT AWARE


Congratulations! At this point in time you got Theft Aware 2.00 successfully installed on your mobile phone. Now, launch the Theft Aware program from within the application menu of your phone.

Figure 3: Theft Aware Icon

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

Use Theft Aware 2.00


NAVIGATE THE INTERFACES
To switch to the different Theft Aware interfaces, use the left and right keys. On touch phones tap the tab arrows visible in the upper part of the screen. You can also use the Options Go to menu to access the different interfaces that Theft Aware offers.

SETTINGS INTERFACE
When starting Theft Aware, the Settings Interface will be the first thing youll see. In order to setup Theft Aware for active use you will have to specify the Theft Aware settings. System By using this option you can enable or disable the Theft Aware protection system. Note that no SMS commands nor any theft protection will work if the system is disabled. Once the Theft Aware protection is enabled, Theft Aware will be put to Stealth Mode automatically. In Stealth Mode Theft Aware is completely invisible to any thief. If you disable the system Theft Aware will be switched to Visible Mode again. Then Theft Aware can also be removed from the phone as usual.

BASIC SETTINGS
To setup Theft Aware for active use you HAVE TO specify the Theft Aware basic settings: Owner Please enter your name here. Access Code Enter your access code here. This access code is used to authorize access to the Theft Aware configuration interface. Please do NOT forget your access code. You will not be able to reconfigure Theft Aware without the access code. The standard access code is 0000. You have to change the access code before you are allowed to activate the Theft Aware system. Notification 1 Please enter an international phone number here. This could be the mobile number of one of your friends. Any Theft Aware SMS will be sent to that phone number.

ADVANCED SETTINGS
The advanced settings are already optimally preconfigured and MAY be changed on demand:

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

Notification 2 You may enter a second phone number here. Copies of all Theft Aware SMS will be sent to that phone number for safety. Allow SMS Commands Theft Aware enables you to remotely control the phone by using SMS commands. You can disable the feature here. If you set the value to From Notification Numbers, SMS commands will only be accepted if they are sent from one of the notification numbers given above. The option From All Numbers lifts that restriction. Phone Lock Behaviour If this option is set to SIM Change, SMS Command the phone will be locked automatically upon SIM card change or by SMS command. If the option is set to Only upon SMS Command, the phone can only be locked by SMS command. The phone can also be unlocked by entering a valid access code in the lock screen. The phone can ALWAYS be unlocked by restarting the phone using the original SIM card again and entering a valid PIN code. You can also unlock the phone by entering the valid access code when the lock screen is active. Custom Lock Text You may enter a custom text here, that will be shown on the screen if the phone is locked. If you give no text here, a standard text will be shown. Siren When Locked If this option is enabled, every time the phone is locked a loud siren alarm sound will be played. The siren sound will only stop if the phone is unlocked again. There is also a SMS command to start/stop the siren. Siren Sound Theft Aware enables you to customize your siren sound. The option Select Sound File lets you select a sound file from your phone. Also you can record a new sound sample by using the option Record Siren Sound. Use the Play Siren Sound option to listen to the currently active siren. Use the Reset To Default option to reset the siren sound to the original one delivered with Theft Aware. Send Contacts As Theft Aware enables you to send contacts from your phone to another one. Theft Aware is able to send those contacts as Business Card or as standard text SMS. However, not all phones are able to handle the Business Card format, thus they will not be able to receive the message. If your notification partner's phone is not able to receive Business Card messages, set this option to Text SMS.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

SMS Map Type The Theft Aware notification SMS contains a link to view the location of your phone by using online map services. This option lets you choose which online map service you want to use (Theft Aware, Google Maps, Yahoo! Maps, Microsoft Bing Maps). Theft Aware Maps is new in 2.0 those maps links will forward you to our servers for advanced mapping functionality (e.g. the link will also work on mobile phones and provide cell ID position tracking if no GPS data was available). Gps Query Timeout Here you can set the timeout in minutes after which GPS location requests will be cancelled automatically. Be careful when giving an unlimited timeout as then Theft Aware would potentially try to get GPS location data forever. Tracking on SIM Change Continuous GPS tracking can be activated automatically once an unauthorized SIM is used in the phone. Set the time interval for the updates here. SMS on Low Battery Set this option to Always to always receive notification SMS once the battery state of the phone is low. Use Upon SIM Card Change to get those SMS only if an unknown SIM is present in the phone. A notification means that the phone probably will go offline soon.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

10

HELP INTERFACE
The help system also contains information about the system state: Property Net Available Network Cell ID Country Country Code Area Code IMSI IMEI Tracking Internet Remoting Description Indicates if a telephone network is available (Yes / No) If a telephone network is available, gives the name of the telephone network If a telephone network is available, gives the phone network cell identifier or the network the phone is currently connected to If a telephone network is available, this gives you the name of the country the phone is currently located in If a telephone network is available, this gives you a numeric representation of the country the phone is currently located in If a telephone network is available, gives the current area code The IMSI (International Mobile Subscriber Identity) number is the world-wide unique identifier of the SIM card inserted to your phone The IMEI (International Mobile Equipment Identity) number (or serial number) is the world-wide unique identifier of your mobile phone hardware Indicates if location tracking data is available Indicates if Internet Remote Control was configured correctly. For more details on that check https://internet.theftaware.com

SAVE THE SETTINGS


Once you configured all the settings you need to save them. When quitting the program you will be asked if you want to save the settings. You can also use the Options Save command to perform the save action without quitting the application. When saving the settings, Theft Aware will check if the Theft Aware protection system was disabled or enabled. If it was enabled, Theft Aware will switch itself to Stealth Mode, if it was disabled, Theft Aware will switch itself to Visible Mode. Note that the switch between the modes can take up to 30 seconds. Stealth Mode Stealth Mode is for sure the coolest feature in Theft Aware. No other company in the world is able to provide this feature to you at this point in time.
Why is Stealth Mode Necessary?

After theft, thiefs usually check the mobile phone for applications that could unveil their identity. Thiefs will look for application icons, and will check the application manager as well as the application log. If the thief is able to find suspicious traces it is very likely that the phone will be turned off and will be subject to disposal. This usually results in the phone being lost forever.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

11

We cooperated with the device manufacturers and managed to create the perfect solution. Theft Aware is also the only solution in the marketplace that will be completely invisible on the phone, in order to give you the best chances to either catch the thief or get your device back.

Figure 4: Invisible In Application Menu

Figure 5: Invisible In Installed Applications List

Figure 6: Invisible In Installation Protocol

Visible Mode
Why is Visible Mode Necessary?

We already described why Stealth Mode is necessary. But why the heck do we think you would need the Visible Mode as well? As you see above, there is no installed application entry visible on the phone in Stealth Mode. This prevents you from uninstalling Theft Aware when you want to do that. This is the reason why Theft Aware switches itself back to Visible Mode if you disable the theft protection. Then you can simply uninstall the product again.

Figure 7: Visible In Application Menu

Figure 8: Visible In Installed Applications List

Access Configuration in Stealth Mode In Stealth Mode it is not possible to start Theft Aware in the usual way because Theft Aware is invisible. This brings up the next innovation that Theft Aware offer: the Theft Aware configuration interface can
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

12

be started by CALLING the ACCESS CODE. If your access code is set to 2222, just make a CALL to 2222. The call will be cancelled immediately without any cost to you and the Theft Aware configuration interface will start up within a few seconds.

Figure 9: Typing 2222

Figure 10: The Phone Is Calling

Theft Aware also takes care that no trace of the dialed access code is left in the phones call logs by removing that call log entries immediately after the dialing process. Accept Another SIM Card By default, Theft Aware sends theft notification SMS as soon as your trusted SIM card is removed from the phone and another one is inserted instead. However, from version 2.0 on you can trust more than one SIM card. The currently inserted SIM card will be accepted every time you access and quit your Theft Aware configuration interface. To adjust Theft Aware to trust new SIM cards perform the following: turn off the Theft Aware auto-lock feature if it is activated turn off the phone remove the old SIM card insert the new SIM card turn the phone on again start the Theft Aware user interface quit the Theft Aware user interface

At this point in time on Theft Aware will add the currently inserted SIM card to the trusted SIM card list.

LICENSING THEFT AWARE


If you install Theft Aware in the first place youll install the trial version. This trial version offers full functionality but will disable itself after a certain time period. To continue using Theft Aware after your trial period is over youll have to purchase a full license.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

13

You can do that by surfing our website http://www.theftaware.com or by using the menu Licenses / Coupons on the Theft Aware main settings menu. It offers you three options: Purchase License This option will forward you to our website for license purchase. Youll need this if you did not yet purchase a license. You will be able to pay for your license by using PayPal or bank transfer. Once you completed the license purchase, you will continue using the option Activate License from the same menu (see below). Activate License This option will check our servers for your purchased license and will convert your trial version into the unlimited version of Theft Aware. You can also use this option if you had to re-setup your phone and you want to activate another copy of Theft Aware using a license purchased before. Note that this process needs internet access on the phone. If you have NO internet access, please contact support@theftaware.com and well help you activating the license without internet access. Consume Coupon If you purchased or received a coupon code granting you a free license for Theft Aware, youll not have to purchase and activate the license as described above. Just select this option and enter your coupon code and your email address. After consuming the coupon youre all set and Theft Aware will be converted to a full version automatically.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

14

THEFT AWARE 2.00 SMS COMMANDS


Theft Aware can be remotely controlled by using simple SMS commands. For this, the System and Allow SMS Commands properties in the Settings Interface need to be enabled. Please refer to chapter Settings Interface for details on that. If the option Allow SMS Commands is set to From Notification Numbers, SMS commands are only accepted if their sender phone number that matches one of the notification numbers configured. All SMS commands sent from other numbers are ignored. Please refer to chapter Settings Interface for details on that. An properly authorized remote SMS command will not cause any ring tone, signal, ambient light activation or other indication of SMS arrival on the target phone. Also the SMS will not be visible in the SMS inbox of the target phone. SMS replies sent back to you by Theft Aware also will not cause any attention when being sent and are not stored in the SMS outbox of the target phone. Remote Command Authorization All SMS commands must begin with your Theft Aware access code. For example, if the access code is set to 2222, a lock command should look like this:

Figure 11: All SMS Start With The Access Code

If the access code does not match, the command is ignored and the SMS will be forwarded to the normal SMS inbox on the phone, triggering all SMS arrival notifications.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

15

Lock the Mobile Phone This command will lock the mobile phone. It then will not be possible to perform any actions on the phone anymore. Note that this will drag attention of the thief upon Theft Aware. The phone can be unlocked by a) sending the UNLOCK SMS command, b) entering the valid access code while the lock screen is active or c) restarting the phone using the TRUSTED SIM card and entering a valid PIN code. While the lock screen is active, it is possible to dial emergency calls to the numbers 112, 991 and 999. SMS command: LOCK Sample: 2222 LOCK Unlock the Mobile Phone This command will unlock the mobile phone again. SMS command: UNLOCK Sample: 2222 UNLOCK Turn Siren on Mobile Phone On This command will activate the phone siren. Note that this will drag attention of the thief upon Theft Aware. SMS command: SIREN ON Sample: 2222 SIREN ON You can stop the siren by sending the SIREN OFF command. The siren can also ALWAYS be stopped by disabling the Theft Aware system or by restarting the phone using the original SIM card again and entering a valid PIN code. Turn Siren on Mobile Phone Off This command will deactivate the phone siren. SMS command: SIREN OFF Sample: 2222 SIREN OFF Update Mobile Phone Information (One-Time) This command will cause Theft Aware to send a theft notification SMS to the sender number of the remote command SMS, containing up-to-date data about your mobile phone. SMS command: UPDATE Sample: 2222 UPDATE
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

16

Update Mobile Phone Information (Continuous) A special version of the UPDATE command lets you get continuous notification updates. SMS command: UPDATE <interval duration in minutes> Sample: 2222 UPDATE 60 Description: Will send you phone notification data every <interval> minutes You can stop the updates by sending the UPDATE STOP command. Updates can also ALWAYS be stopped by disabling the Theft Aware system. Initiate a Call This command will cause the mobile phone to initiate a a phone call. By using this command you can listen to what happens on the other side of the line. The call will be hidden as much as possible. SMS command: CALL [phone number] Sample: 2222 CALL, 2222 CALL +4355003938833 If [phone number] is not specified, the target phone will call back the sender number of the remote control SMS. If [phone number] is specified, the target phone will call the given phone number. Wipe the Phone This command will cause removal of all data on the target phone. It will also erase all data from memory cards1. Consequently, also the Theft Aware application will be removed by this command and will not be available anymore after the wipe process. The data can NOT be restored! SMS command: WIPE Sample: 2222 WIPE Back Up Important SMS This command will cause Theft Aware to forward SMS messages stored on the target phone to you. By using this command you can rescue SMS that are important to you, even when the phone is lost or stolen. SMS command: GET <query limit> SMS Sample: 2222 GET 5 SMS Description: Will forward the newest SMS stored in the Inbox and Sent Folders. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted. SMS command: GET <query limit> INBOX SMS Sample: 2222 GET 5 INBOX SMS Description: Will forward the newest SMS stored in the Inbox Folder. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted.
1

Memory card formatting is not supported on Nokia N-Series devices due to hardware restrictions

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

17

SMS command: GET <query limit> SENT SMS Sample: 2222 GET 5 SENT SMS Description: Will forward the newest SMS stored in the Sent Folder. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted. SMS command: GET <query limit> SMS FOR xxxxxxxxxxx Sample: 2222 GET 5 SMS FOR 436502111555 Description: Will forward the newest SMS stored in the Inbox and Sent Folders which are related to the given phone number. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted. SMS command: GET <query limit> INBOX SMS FOR xxxxxxxxxxx Sample: 2222 GET 5 INBOX SMS FOR 436502111555, Description: Will forward the newest SMS stored in the Inbox Folder which are related to the given phone number. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted. SMS command: GET <query limit> SENT SMS FOR xxxxxxxxxxx Sample: 2222 GET 5 SENT SMS FOR 436502111555 Description: Will forward the newest SMS stored in the Sent Folder which are related to the given phone number. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted. Back Up Contacts This command will cause Theft Aware to forward all phone book contacts stored on the target phone to you. The contacts are forwarded as SMS one by one. Depending on the Send Contacts As setting the contacts will be forwarded in Business Card format or standard text format. Please refer to chapter Settings Interface for details on that setting. Please note that a Business Card-message contains more information than the standard text message. The text message only contains the name, the phone number and optionally the email address of the contact. SMS command: GET CONTACTS Samples: 2222 GET CONTACTS, 2222 get contacts Description: Will forward all contacts stored on the phone to you Get Recent Log Entries This command will allow you to query the call and SMS events that happened on your phone. SMS command: GET LOG <query limit> Sample: 2222 GET LOG 10 Description: Will forward the last <query limit> call and SMS log entries. The query limit is mandatory. Each call or SMS event will be forwarded as one SMS. Call events will be forwarded containing the related phone number and the call duration in seconds. SMS events will be forwarded containing the related phone number and a short version of the message text.
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com 18

Change Theft Aware Configuration This group of commands lets you change the Theft Aware configuration parameters. SMS command: SET OWNER <name of owner> Sample: 2222 SET OWNER Charles Chaplin Description: Will set the owner entry of Theft Aware to <name of owner> SMS command: SET CODE <access code> Sample: 2222 SET CODE 3333 Description: Will set the access code of Theft Aware to <access code>. You will need to provide a code of 4-6 digits. SMS command: SET NOTIFICATION 1 <notification 1> Sample: 2222 SET NOTIFICATION 1 +43660122220192 Description: Will set the first notification number of Theft Aware to <notification 1>. You will need to provide a valid mobile phone number. Both notification numbers are not allowed to be empty at the same time. SMS command: SET NOTIFICATION 2 <notification 2> Sample: 2222 SET NOTIFICATION 2 +43660122220192 Description: Will set the second notification number of Theft Aware to <notification 2>. You will need to provide a valid mobile phone number. Both notification numbers are not allowed to be empty at the same time. SMS command: SET LOCK <lock mode> Sample: 2222 SET LOCK 1 Description: Will set Theft Awares autolock mode. If <lock mode> is 0, the phone will only be locked upon SMS command. If <lock mode> is 1, the phone will be locked automatically upon SIM card change or by SMS command. SMS command: SET TEXT <lock text> Sample: 2222 SET TEXT Please call me back at +4313283483 Description: Will set the Theft Aware custom lock text. SMS command: SET SMS <SMS mode> Sample: 2222 SET SMS 1 Caution: By using this command you could disable SMS remote control completely and this will render the Theft Aware SMS remote control feature useless. Description: Will set Theft Awares SMS configuration. If <SMS mode> is 0, no SMS commands will be accepted by the phone anymore. If <SMS mode> is 1, only SMS commands coming from notification numbers will be processed. Set <SMS mode> to 2 to accept SMS commands from all phones. SMS command: SET SIREN <siren mode> Sample: 2222 SET SIREN 1 Description: Will set Theft Awares siren mode. If <siren mode> is 0, no siren will be started upon phone lock. If <siren mode> is 1, a siren will automatically be started if the phone gets locked.
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com 19

SMS command: SET VCARD <vcard mode> Sample: 2222 SET VCARD 1 Description: Will set Theft Awares VCard mode. If <vcard mode> is 0, Theft Aware will send contact SMS as standard text SMS. If <vcard mode> is 1, Theft Aware will use the proprietary VCard format to send contact SMS. SMS command: SET MAPTYPE <map type> Sample: 2222 SET MAPTYPE 2 Description: Will set Theft Awares map type setting. If <map type> is 0, map links will be sent working with the new advanced Theft Aware Maps. If <map type> is 1, map links will be sent working with Google Maps. If <map type> is 2, map links will be sent working with Yahoo! Maps. If <map type> is 3, map links will be sent working with Microsoft Bing Maps. SMS command: SET BATTERY <battery SMS mode> Sample: 2222 SET BATTERY 1 Description: Will set Theft Awares battery mode setting. If <battery SMS mode> is 0, no SMS will be sent on low battery state. If <battery SMS mode> is 1, Theft Aware will send notification SMS upon low battery state ALWAYS. If <battery SMS mode> is 2, the notification is only sent if an unknown SIM is present in the phone. SMS command: SET GPS TIMEOUT <GPS timeout> Sample: 2222 SET GPS TIMEOUT 1 Description: Will set Theft Awares GPS timeout setting. If <GPS timeout> is 0, no GPS timeout will be set. If <GPS timeout> is 1, a timeout of 1 minute will be set for GPS queries. If <GPS timeout> is 2, a timeout of 2 minutes will be set for GPS queries. If <GPS timeout> is 3, a timeout of 5 minutes will be set for GPS queries. If <GPS timeout> is 4, a timeout of 10 minutes will be set for GPS queries. SMS command: SET TRACKING <time interval> Sample: 2222 SET TRACKING 1 Description: Here you can set if you want to automatically receive continuous GPS updates whenever an untrusted SIM is inserted into the phone. Set <time interval> to 0 to disable the functionality. Set <time interval> to 1 to get an update every hour. Set <time interval> to 2 to get an update every 2 hours. Set <time interval> to 3 to get an update every 5 hours. Set <time interval> to 4 to get an update every 24 hours. SMS command: SET SYSTEM <System mode> Sample: 2222 SET SYSTEM 0 Caution: By using this command you will completely disable the Theft Aware system thus rendering the Theft Aware protection useless. Description: Will set Theft Awares system enabled setting. Set <System mode> to 0 to disable Theft Aware and make it visible again. Launch and Shut Down Configuration Interface SMS command: LAUNCH or SHUTDOWN Sample: 2222 LAUNCH Description: Will launch or shut down the Theft Aware configuration interface via SMS.
by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

20

Implement Own Remote Commands Theft Aware is able to launch any programs on the phone and pass arguments to the launched program via command line. The program file has to be located in the directory C:\sys\bin. SMS command: <NAME OF EXE FILE WITHOUT EXE EXTENSION> <ARGUMENTS> Sample: 2222 MY_FILE Test will start C:\sys\bin\MY_FILE.exe and pass the phone number of the caller plus Test as command line (eg. +436601222222 Test). There is also an SDK package available that enables you to use several data and service interfaces of Theft Aware. Apply for the SDK package by contacting reinhard@itagents.at. Have fun publishing apps based on this. Tell us and we will promote it for you! Suggestions for enhancing the interface go to reinhard@itagents.at.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

21

USE THEFT AWARE ADVANCED OPTIONS


The Theft Aware advanced options offer some special options to enable/disable the Theft Aware autostart feature and to do some diagnostic tests. You can access the Theft Aware advanced options menu at Options Advanced. Disable and Enable Autostart Only available in Visible Mode. Disabling the Theft Aware autostart feature is NOT RECOMMENDED. To disable or enable the Theft Aware autostart feature, use the Disable Autostart or Enable Autostart menu entry. If autostart is disabled, no theft protection is available at all. Send Test SMS This will test if the SMS sending facility on the phone is working correctly. It will send invisible test SMS to all given notification numbers. Simulate Theft Event This will simulate a theft event. This means that if everything works correctly, Theft Aware will send theft notifications to all given notification numbers. This can take some time as during that operation Theft Aware will also query GPS location data. Simulate Lock This will simulate the LOCK SMS command. Note: On success this will lock the phone for 10 seconds. Open or Delete Server Log File This option is used for support diagnostics. Here you can show or delete the current log messages of the Theft Aware server component. Open or Delete Client Log File This option is used for support diagnostics. Here you can show or delete the current log messages of the Theft Aware client component.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

22

Appendix A - Supported Phones


The Symbian version of Theft Aware currently supports all Nokia devices running on: S60 3rd Edition FP1 S60 3rd Edition FP2 S60 5th Edition Symbian^3

Theft Aware is also available for Android phones. Please visit http://www.theftaware.com for further details on this.

Appendix B - Languages
The Symbian version of Theft Aware is available in the following languages: English German Simplified Chinese

Appendix C - Technical Support


You can reach our technical support by sending an email to support@theftaware.com. We handle customer emails between 09:00 - 18:00 CET (GMT +1). We will try to take care of your problem and respond to you within one business day.

Appendix D Affiliate Program


Do you want to earn money by becoming an affiliate of ITAgents interactive software solutions? Then please visit http://partners.itagents.at or http://partners.theftaware.com and register yourself.

by ITAgents interactive software solutions 2010. All rights reserved. http://www.itagents.at; http://www.theftaware.com

23

Vous aimerez peut-être aussi