forked from prey/prey-bash-client
-
Notifications
You must be signed in to change notification settings - Fork 1
/
config.default
executable file
·93 lines (73 loc) · 3.32 KB
/
config.default
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
#!/bin/bash
####################################################################
# PREY Configuration File - by Tomas Pollak (bootlog.org)
# URL: http://preyproject.com
# License: GPLv3
####################################################################
# language, en (English), es (Espanol), fr (French)
lang='en'
# autoconnect feature, disabled by default until we are 200% sure it
# works flawlessly in all platforms. feel free to try it out though.
auto_connect='n'
# verification URL, if left empty Prey will always activate and run,
# which is certainly *not* recommended.
check_url='http://control.preyproject.com'
# IMPORTANT: on what HTTP response code will Prey be activated (200 or 404)
# control panel users don't touch this! standalone users may want to
# change it back to 200 (previous setting), if you wish to wake Prey up by
# creating the URL (as before) instead of removing an existing one
missing_status_code='404'
# you can use send the report via email or to the web service
# valid values: http, email, scp or sftp
post_method='http'
####################################################################
# http posting configuration
####################################################################
# you can get both of these from Prey's web service
api_key=''
device_key=''
####################################################################
# SMTP settings, for email posting
####################################################################
# mailbox to send the report
mail_to='[email protected]'
# the password is now stored base64 encrypted
# if you wish to generate it by hand, run
# $ echo -n "password" | openssl enc -base64
smtp_server='smtp.gmail.com:587'
smtp_username='[email protected]'
smtp_password='password'
# you dont need to change this
mail_from='Prey <[email protected]>'
mail_subject='[Prey] Status Report'
####################################################################
# additional http options
####################################################################
# if you're having trouble getting requests across your firewall or proxy,
# you can try adding '-0' to make curl perform HTTP 1.0 requests
curl_options='--compress'
# this option prepends a random number as a subdomain to the check URL on http mode
# makes it harder for other programs to block Prey so its a good idea to be on
randomize_check_host='n'
# whether to send your device's LAN and gateway IP address as headers when
# checking its status. currently only for testing purposes, but maybe in the
# future it may prove useful. :)
extended_headers='n'
####################################################################
# scp/sftp posting configuration -- EXPERIMENTAL!
# we dont use user/pass but RSA keys
# for more info check http://tinyurl.com/sshtip
####################################################################
# this applies both to scp and sftp posting methods
ssh_options='-oStrictHostKeyChecking=no'
# remember you should have write access to the folder
scp_user='username'
scp_server='my.server.com'
scp_path='~'
# same as above, make sure you have write access
sftp_user='username'
sftp_server='my.server.com'
sftp_path='.'
####################################################################
# if you have any questions please visit preyproject.com
####################################################################