• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • About
  • Contact
  • Subscribe
  • Advertise
methodshop

methodshop

tech news, reviews & how to's

  • Trending
  • Latest
  • Tech
    • Apps
    • Internet
    • Software
    • Security
    • Games
    • Advertising
  • Life
    • Entertainment
    • TV & Film
    • Music
    • Health & Science
    • Family
    • Social Media
    • Food
    • Style
  • Learn
    • Tutorials
    • Reviews
    • News
      • Business
      • Crime
      • Politics
  • Fun
    • Featured
    • Humor
    • Holiday

Home : Software : How to Catch Someone Trying to Hack Your Mac with Digital Sentry

How to Catch Someone Trying to Hack Your Mac with Digital Sentry

Was someone trying to hack your computer's password? The Macintosh app, Digital Sentry, can perform a vast array of anti-hacker actions in response.

April 4, 2016 by jayfrankwilson
FacebookTweetPinLinkedIn
Table of Contents[Hide][Show]
  • Monitors & Actions
  • Simulating a Self-Destruct Sequence
  • Keeping Friends & Family Away From Your Computer
  • Digital Sentry: Free Trial

Has someone been using your computer without your permission or attempting to guess your password? The Macintosh app, Digital Sentry, monitors your computer for specific events, like an incorrect password, and then can perform a vast array of unique actions in response.

Monitors & Actions

When Digital Sentry monitors a suspicious action, like a wrong password attempt or IP address change, then it can execute recipes of actions like sending a secret e-mail, shutting down your computer, pinging a URL, taking a photo or screenshot, playing a multimedia file, speaking some text, executing a shell script and much more.

In the screenshot below you can see examples of some of the possible monitors in Digital Sentry including the amount of time passes, power source changed, a key was pressed and IP address changes.

Digitalsentry-Monitors

And here are some examples of the actions you can perform:

  • send a text message
  • play a multimedia file
  • restart the computer
  • shut down the computer
  • take a webcam picture
  • take a screenshot

All of these actions enable you to get very creative. Combining them in unique ways can make for some fun pranks. And will also allow you to bust the person messing with your computer.

Digitalsentry-Actions

Simulating a Self-Destruct Sequence

You know in the movies when someone tries to access a hacker’s computer and then it initiates a self-destruct? For example, the movie Robot & Frank.

Digital Sentry can’t actually blow-up your computer. But you can combine a series of actions like playing a video like this Star Trek self-destruct sequence below, and then shut down your computer every time it monitors something like a wrong password being entered.

Keeping Friends & Family Away From Your Computer

I hate it when someone uses my computer. Use your own laptop damn it. I first found out about Digital Sentry after I busted my ex-girlfriend using my laptop. I saw some webcam photos of her with her girlfriend on my computer and confronted her about it. She took my laptop to her friend’s house. My laptop has all of my banking info and personal files on it. I don’t want it leaving my apartment without my permission.

Digital Sentry also helped me permanently stop my old roommate from touching my Mac. If someone knows that every action they perform, every keystroke and every moment is captured and logged, then they tend to stay away.

Digital Sentry: Free Trial

Minted MethodshopKoingo Software‘s Digital Sentry has a 15-day free trial and is definitely worth checking out. It’s an ideal solution for catching a thief in the event your laptop has been stolen. For only $19.95, it’s an incredible tool for performing covert surveillance and protecting your data during unauthorized access or theft.

The Best Portable Door Locks For Travel

The 10 Best Portable Door Locks For Hotels And Airbnbs

Read moreThe 10 Best Portable Door Locks For Hotels And Airbnbs
Usb Data Blockers Can Prevent Hackers From Juice Jacking Your Smartphone While It Charges

The 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files

Read moreThe 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files
Software Security

10 Scenarios Where You Really Should Be Using A VPN Service

Read more10 Scenarios Where You Really Should Be Using A VPN Service
Casino Security

5 Reasons Why Many Online Casinos Are Safer Than You Think

Read more5 Reasons Why Many Online Casinos Are Safer Than You Think
Couple On A Romantic Date

10 Tips On How To Make A Great Online Dating Website

Read more10 Tips On How To Make A Great Online Dating Website
Malware

StP-II Test Can Predict How Likely You Are to Fall for An Internet Scam

Read moreStP-II Test Can Predict How Likely You Are to Fall for An Internet Scam
Hacker - Credit Card Scammer

9 Ways You Can Secure Your Data from WiFi Hacking Attacks

Read more9 Ways You Can Secure Your Data from WiFi Hacking Attacks
How To Catch Someone Trying To Hack Your Mac With Digital Sentry - Https Security 1

How to Force HTTPS By Modifying Your .htaccess File

Read moreHow to Force HTTPS By Modifying Your .htaccess File
Data Security

4 Ways To Protect Yourself From Spam Emails and Scam Artists

Read more4 Ways To Protect Yourself From Spam Emails and Scam Artists
Map Of Dyn Ddos Attack

The Dyn DDoS Attack and New Security Needs for The Internet-of-Things

Read moreThe Dyn DDoS Attack and New Security Needs for The Internet-of-Things
How To Catch Someone Trying To Hack Your Mac With Digital Sentry - Firmware Password Screen 2

How To Set Your Firmware Password in Mac OS X

Read moreHow To Set Your Firmware Password in Mac OS X
How To Catch Someone Trying To Hack Your Mac With Digital Sentry - Digitalsentry Splash 3

How to Catch Someone Trying to Hack Your Mac with Digital Sentry

Read moreHow to Catch Someone Trying to Hack Your Mac with Digital Sentry


FacebookTweetPinLinkedIn
Category: Software, Reviews, Security, Technology Tag: automation, computer, Digital Sentry, IP address, laptop, Macintosh, password, Personal computer, screenshot, Security, Self-Destruct, stolen laptop, surveillance, theft, webcam
Previous Post:How To Uninstall Spyware and Adware from Mac OS XHow To Uninstall Spyware and Adware from Mac OS X
Next Post:Celebrate Atari Breakout’s 40th Anniversary With A Google Search Easter EggAtari Breakout Easter Egg

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Sidebar

Popular Posts

  • 18 Weird Facts About Sea-Monkeys You Won't Believe Are True, Including Their Connection To The Ku Klux Klan18 Weird Facts About Sea-Monkeys You Won’t Believe Are True, Including Their…
  • Top 200 Nielsen DMA Rankings (2023) – Full ListTop 200 Nielsen DMA Rankings (2023) – Full List
  • Job Automation Using ChatGPT Could Make These Jobs Obsolete - Is Your Job On This List?Job Automation Using ChatGPT Could Make These Jobs Obsolete – Is Your Job On…
  • 7 Pictures Of Naked People Captured By Google's Cameras7 Pictures Of Naked People Captured By Google’s Cameras
  • 20 Famous People Who Are Members Of The Sleepless Elite20 Famous People Who Are Members Of The Sleepless Elite
  • How To Change The Default LG TV Home Screen To Live TVHow To Change The Default LG TV Home Screen To Live TV
  • The 30 Best Caddyshack Quotes That'll Make You LaughThe 30 Best Caddyshack Quotes That’ll Make You Laugh
  • How To Play The Original Oregon Trail Game Online For FreeHow To Play The Original Oregon Trail Game Online For Free
  • Is Your Hatch Restore Already Registered? Here's How To Fix It And Unregister A Hatch Restore.Is Your Hatch Restore Already Registered? Here’s How To Fix It And…
  • Top 25 Better Off Dead Movie Quotes - How Many Better Off Dead Quotes Do You Remember?Top 25 Better Off Dead Movie Quotes – How Many Better Off Dead Quotes Do You…

Categories

ChatGPT Flaws

The 11 Biggest ChatGPT Flaws And Why You Should Never Completely Trust Online Chatbots

Chatbots can be fun and productive tools, but they are dumber than you might think. They can also be dangerous. Here are the biggest ChatGPT flaws and why online chatbots shouldn’t be trusted.

Job Automation - Robot Reporter

Job Automation Using ChatGPT Could Make These Jobs Obsolete – Is Your Job On This List?

ChatGPT’s advanced language processing capabilities could revolutionize the workforce by automating jobs, but it also poses a threat of widespread job loss. Are you ready for the future of an AI-based workforce and job automation?

Recent Posts

  • Job Automation Using ChatGPT Could Make These Jobs Obsolete – Is Your Job On This List?
  • Unleash the Power Of AI-Generated Music With Riffusion – The Free Web App That Creates Original Tracks From Your Text Prompts
  • The 11 Biggest ChatGPT Flaws And Why You Should Never Completely Trust Online Chatbots
  • Discover The Surprising Items Left Behind By Astronauts On The Lunar Surface – What Was Left On The Moon And Why
  • 6 Tips On How To Deal With Trolls For News Organizations

Jump to comments

About

MethodShop’s mission is to entertain, inform, and sometimes gross you out. MethodShop has affiliate relationships, so we may get a small share of the revenue from your purchases. Items are sold by the retailer, not by us. All prices are subject to change.

Latest

Job Automation - Robot Reporter

Job Automation Using ChatGPT Could Make These Jobs Obsolete – Is Your Job On This List?

Unleash the Power of AI-Generated Music with Riffusion - The Free Web App that Creates Original Tracks from Your Text Prompts

Unleash the Power Of AI-Generated Music With Riffusion – The Free Web App That Creates Original Tracks From Your Text Prompts

Follow

  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Pinterest
MethodShop Animated Zoom Icon
  • About
  • Submit
  • Disclaimer
  • Privacy Policy
  • Contact
  • Subscribe
  • Store

Copyright © 2023 MethodShop · All Rights Reserved · Powered by BizBudding Inc.