It does n’t matter how measured you are , there is always a possibility that your telephone set will end up in the handwriting of a thief despite of all our efforts . Yes , you’re able to stay focused and extra heedful each clip you distribute with your phone but let ’s face it , staying completely focussed on your phone is not our master line . Is there a better choice to tackle this problem ?
Fortunately , there are anti - theft apps that can handle the problem and it only postulate the user to install a specific app and that ’s it . We test all the popular anti thieving apps and Cerberus app wins the crown , so let ’s discover out , what it can and can not do .
observe : Cerberus app is a paid app that offer 6 days innocent test .
accord to the developer , there are three ways to protect your equipment aka “ 3 heads ” of Cerberus :
– Remote ascendence through the web site https://www.cerberusapp.com – distant ascendancy via SMS ( text edition content ) from another phone – reflex alerts
Table of capacity
Cerberus Anti – Theft Application Review
Setup
The setup part is quite first step .
The user will receive an E - mail after successfully creating an accounting and it contains an overview of how Cerberus remote command work ( we suggest you read the complete email to understand the syntax of the commands).After successful registration , you will be welcome by the independent configuration window . The interface is chiefly divided into three class i.eMain Configuration , Automatic Photo captureandSIM Checker severally .
Main Configuration
Cerberus take that it does many coolheaded things like taking movie of an trespasser , remote rub , remote video gaining control etc . but how many of those claims are worth it , let ’s dig into each and every feature and find out .
Remote CommandsThe feature that Cerberus advertises is that it can remotely manipulate the machine using SMS command . It go something like this
We tested this distant controlling functionality and it works quite well , here ’s what we sent
[ cerberus][xxxxxxxx][find ] ( without bracket ) - > cerberus xxxxxxxx recover
( nonremittal keyword is ‘ cerberus ’ , password is set during registration , statement is ‘ find ’ )
We received the location of the phone as a reception .
The primary conformation windows have an selection to change the keyword into something which is know to you as it kind of deed like a 2d password .
Here is the list of remote commands that can be executed
As an anti theft app , it has the capacity to hide from the program menu . In such scenario , we can reach the coating by dialing some code from the phone dialer . The chief form password section allows us to commute that dialing code as well . We alter the telephone dial code to ‘ 123456789 ’ and tested it using default phone dialer and it work like a charm .
Under gimmick administration of main configuration category , we also have a master switch to enable or handicap the Cerberus functionality altogether which is ready to hand just in case if the user does n’t need to use the app in sure situations .
Protect Device Admin
There is one cool lineament that makes this app singular and that is ‘ Protect equipment Admin ’ . regard a situation where a thief hear to uninstall the Cerberus app program then the app ram the user to go to equipment administration setting and remove admin perquisite for Cerberus . This feature will ask for a password if the user wants to remove the privileges making it extremely hard for the stealer to uninstall the program .
Fake Shutdown
Cerberus has a conjuring trick up its arm using which we can kibosh the superpower menu when the gadget is locked . We tried to use this feature of speech but it did n’t work so this may figure out for some phones but not all . The latest update has added something call as ‘ Fake Shutdown ’ whichtricks the exploiter and mimics every activity of telephone set closing down ( like off screen and shut down vibration blueprint )
However , we found that even if it looks as if the speech sound is shutting down if you touch the fingermark sensing element the earpiece vibrates a small and make sound unlocking speech sound . A clever person can well conclude that only the screen is off and all the phone functionality in working in the background gain this new feature completely useless .
Block Status Bar
One more characteristic from this catchy category is ‘ Block Status Bar ’ . As the stealer can get to the quick toggle menu even if the headphone is locked , where the developer tries to block the quick stage setting menu by block any status bar link up functionality on a locked phone .
This feature works outstanding but not without a loophole . The loophole can be accessed like this , when the condition barroom is locked we should not be able to drop down quick setting computer menu but we can drop it if we receive a textual matter message . The text message notification provides a handle to drop the carte du jour down which makes locking the status bar useless ( try out on one plus 3 ) .
Remote Upload & Wipe
The next section of chief configuration screen hatful with remotely backing up the data or wiping it . We can upload the information to either Google Drive or Dropbox by linking these history with Cerberus in this carte du jour . In case of remotely wiping the data , we have switches that allow us to take between internal storage and SD visiting card .
Automatic Photo Capture
This is a great way of life to keep stealer as well as prowler away , here the Cerberus will capture a photo of a person who has entered a faulty password after sure enough run out attempts ( we can also configure the act of break attempt ) . A cool thing about this adroitness is that the captured exposure is immediately transport to the register mail ID make it super easy to find the soul from the photo .
SIM Checker
The first thing a canny thief will do after grab the phone is he will remove the SIM wit . The developer has found a more clever way to deal with this type of situation . The SIM number is stored as an authorized SIM number in the Cerberus app at the time of enrollment . SIM number of the scorecard in the sim slot is also checked . If authorized SIM identification number and current SIM slot Book of Numbers are same then everything is fine.if not then someone has changed the SIM and in this typesetter’s case , the software will send the information of this new SIM and machine localisation to the registered nomadic numbers .
Autotask Configuration
This department is like a mini tasker , we can set up certain events like a geofence ( certain arena from the map ) . We can also set up certain conditions like electric battery pct below 15 and in all these situates we can trigger some tasks . The tasks can be like taking a picture or use the back camera only etc . This plane section has no bound as the user can employ his own creativity to plan unlike events and their corresponding triggers .