[90736] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Tracing network procedure for stolen computers

daemon@ATHENA.MIT.EDU (Mike Callahan)
Tue Jun 13 07:53:57 2006

Date: Tue, 13 Jun 2006 07:53:28 -0400
From: "Mike Callahan" <mcallahan@bullseyetelecom.net>
To: <Michael.Dillon@btradianz.com>, <nanog@nanog.org>
Errors-To: owner-nanog@merit.edu


Actually, it seems this his how you get stolen items back in the =
internet age ;-).

http://www.evanwashere.com/StolenSidekick/



-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu]On Behalf Of
Michael.Dillon@btradianz.com
Sent: Tuesday, June 13, 2006 5:32 AM
To: nanog@nanog.org
Subject: Re: Tracing network procedure for stolen computers



> Earlier this month my daughters Ibook was stolen, oh well that is life =
I
> guess.
> Anyway updated mail server software for full debug and IP log since=20
noticed
> that mail account was accessed yesterday.

It's a UNIX machine. You own it. You know
the password. If you had only set up an=20
SSH server on it, you would now be able to
log in and collect additional information
about the current user.

Interesting things can happen when intelligent
devices find themselves stolen...
http://www.evanwashere.com/StolenSidekick/

--Michael Dillon


home help back first fref pref prev next nref lref last post