Skip to main content
  1. Home
  2. Computing
  3. Legacy Archives

Google fights Chromebook thieves with Chrome OS remote disable function

Add as a preferred source on Google

Though deemed a poor man’s Windows alternative upon launch, with restricted functionality and an excessive reliance on the web, Chrome OS has vastly progressed in a relatively narrow window of time.

Chromebooks are still not worthy PC rivals in the software department, but in the past week alone, they’ve upped the productivity ante with two exciting new capabilities. And while the execution behind the Android Smart Lock clearly needs further fine-tuning, the just-introduced Disable feature works like a charm.

Recommended Videos

Ever had a gadget stolen from you? A daily driver, maybe? It can be a harrowing experience, and not only because you’re forced to splash the cash on a replacement. If you notice or report the theft too late and are not cautious enough to encrypt your passwords, the financial losses can hit tragic peaks. Even if you’re quick, you have to deal with the hassle of getting in touch with your bank, or changing passkeys before the new illicit owner wreaks too much havoc. In short, it’s a nightmare.

But instead of calling 911, you may want to turn to Google PD. Rightful Chromebook proprietors with Chrome OS version 40 and up are now able to block access to their machines at the flick of a switch.

Unfortunately, though, locking lost or stolen Chromebooks from a distance is for the time being an option available exclusively to Enterprise or Education users. These will contact their organization admins in need, and give them the green-light to hit “disable” in their control console.

Once that’s done, a custom message will appear on the now blocked computer, urging its return to the original owner by directing whoever’s seeing the text to an address of choice. The stolen or lost Chromebook won’t be able to access any app or display anything else until the device is re-enabled by following the instructions detailed here.

Adrian Diaconescu
Former Digital Trends Contributor
Adrian is a mobile aficionado since the days of the Nokia 3310, and a PC enthusiast since Windows 98. Later, he discovered…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more