How the Anti-Theft Monitoring Software Works
RecoveryCop defines the latest in high-tech anti-theft security for Windows Mobile devices. This revolutionary software allows individuals to easily install software to their compatible device. Once the software is installed it remains hidden.
At any time after the software is installed, you can interact with the device no matter where it is and no matter which SIM card is being used. If your device is stolen, you can send an SMS from any other phone with a command to send you the GPS location of the device and the new SIM’sÂ phone number.
Commands can also be issued from any web browser inside the included online control panel. You can also monitor SMS messages, lock the device or listen to surroundings of the phone from anywhere. Many other commands are included as seen in the features list.
How It Works
Below you will find a summarized version of how the entire process works. In the next section you will find more details about purchasing and setting up RecoveryCop.
Customer purchases RecoveryCop and downloads software onto the device. Customer configures program according to their monitoring needs.
RecoveryCop constantly monitors for commands from the customer and can silently upload logs to the online account at any time.Customer logs into their online account from any web browser or sends commands via SMS. The customer can interact or listen in real time.
More Details About Purchase, Installation and Usage
Below you will find an outline of the three easy steps involved in purchasing and setting up RecoveryCop on your phone.
First Step: Make Purchase
In order to purchase this software you must first acknowledge and agree that you are the owner or authorized administrator of the device you wish to install the software onto. We DO NOT condone or promote the use of our software for illegal purposes.
If you qualify and are ready to purchase, go to the purchase page and complete all sections and agree to the RecoveryCop Legal Requirements. Click Next and then enter your billing information. Then complete the order and check your email.
Second Step: Download to Device and Adjust Settings
After the order is complete, you will be instantly emailed a receipt with your Username/Password. This email will also contain a link to download the program. You can install the application onto your phone easily using the included instructions which are also available in the user guide.
The software installs into full stealth mode. No icons or other mentions of the software will be shown on the device. Once the software is installed you are ready to adjust settings. First, select your mode. This can be SMS commands or Web Commands. Then create a PIN you can use to bring up the interface. Then click Hide and you are ready to use the program.
Third Step: Send SMS or Login to Interact With Device
After you have started the monitoring it will remain active from that point on. Even if the device is turned off and back on it will still remain active in the background. The software is now awaiting your command in case you ever need it.
More information on sending commands can be found in the user guide. Commands sent by SMS can be sent to the number of the phone and it will NOT show up in the SMS list. The software then silently performs the command. Commands issued using the online control panel work exactly the same. Nothing will appear on the phone (except the LOCK command). You can also view SMS and Call Information logs from within your online control panel.