MacPhoneHome installs in minutes, operates at a very low level using almost no resources and is completely transparent to the user. Every time a MacPhoneHome protected computer connects to the Internet, a stealth email is sent to a pre-determined email address of the user's choice and to our worldwide control center.
In the event your computer is lost or stolen, you file a theft report with the local police and then notify us. Recovery agents at our Command and
- Mac OS X 10.5 or later