Mac Thief Caught Thanks To Applescript & Timbuktu 367
el.cerrito.slasher sent in an amusing bit found on MacSlash. This story
is a tale of a stolen iMac that just happened to be running Timbuktu (a remote
control program like VNC I believe). Well the stolen box kept getting
used, and the owner was able to track it down through
a variety of amusing Timbuktu Fu. Funny story.
applescript strikes back (Score:4, Interesting)
Re:applescript strikes back (Score:2, Offtopic)
Re:applescript strikes back (Score:5, Funny)
Yikes! That is some urglee code. I mean come on, since when has code used a possessive apostrophe? It's just......wrong.
I'll grant it's wonderfully readable, but in people's experience, is it actually easy to write? I can imagine having difficulty remembering all of the exact 'easy-to-use' identifiers. Also, in some cases it seemed to match good grammar, whereas in other cases parts of verbs, plurals etc. were not used correctly. Is there a set of special cases you have to remember or what?
Re:applescript strikes back (Score:5, Insightful)
Re:applescript strikes back (Score:5, Informative)
"Computer, update website" (computer executes the 'update website' applescript, which would probably be very similar to the parent post's Applescript"
Since Applescript is easy, powerful, and voice-activated like this, you can do some amazing stuff on the mac with very little effort. It impresses the hell out of other people, too.
(FWIW, the PC emulator VirtualPC is Applescriptable - you can have a LOT of fun with that: imagine the above Applescript, but add the part where the script fires up VirtualPC and loads your webpage in IE for Windows to make sure it looks good on that platform too. All this while you're playing Oni)
Re:applescript strikes back (Score:2)
Just like every computer programming language I've ever heard of. You can overload operators all you want, you still code left-to-right.
Re:applescript strikes back (Score:5, Interesting)
Since AppleScript was invented, obviously. (90-91?)
IIRC, set text item delimiters of AppleScript to {":"} works just as well. It's the versatility and its way of knowing where to put parentheses that makes AppleScript easy.
Re:applescript strikes back (Score:2, Flamebait)
The scary thing is I'm not sure if I'm being sarcastic or not at this point.
Re:applescript strikes back (Score:3, Informative)
> Of course no self-respecting programmer would ever code in
> applscript, not even to see what it was like. Why anyone would like to
> code like this when they can use more cryptic languages like perl or
> haskall is beyond me.
>
> The scary thing is I'm not sure if I'm being sarcastic or not at this
> point.
Well, in case you are not being sarcastic, and for the benefit of those who seriously believe the above quote: AppleScript is not a programming language for serious applications. It is a macro language, for everybody to use. The thing that AppleScript does (and what computers were designed for) is to automate repetitive tasks. It isn't just for coding either. You can push the old record button, and record your actions as AppleScript. You can then use the recorded script as the start of your own script, customizing it easily, because it is easy to understand. AppleScript is there so graphics professionals, video professionals, scientists, etc. can automate their work and make their jobs easier and more productive.
Apple has released AppleScript Studio for OS X, which allows one to create real applications with the Aqua GUI in AppleScript. While this is nice for entering data for and controlling your AppleScript, you are still not going to see a lot of software on the store shelves written in AppleScript. AppleScript Studio is to AppleScript what Perl/Tk is to Perl.
Though it would be nice if we had a Cocoa/Perl wrapper thingie to let us write Perl apps for Aqua.
OS X: the Apple of Mothra's Aqua eye.
Re:applescript strikes back (Score:5, Insightful)
Uh, no, it just makes sense. Possessive apostrophes are awesome for programming languages.
c++/java:
foo->bar()
AppleScript:
foo's bar()
bar() of foo
It's a hell of a lot easier to type.
PHP:
$myArray[3]
WebSiphon:
myArray'3
It's not wrong, it makes sense. Just try typing those lines of code there. I wish more programming languages used it.
And ya, it's very easy to write. That is, once you understand that it is a programming language which has its own way of forming meaningful statements, so that something that makes sense in English doesn't necessarily mean it will make sense to AppleScript :)
AS is best for making objects from different programs work together. It's a solution to the interoperability problem. Each program can describe itself with verbs and nouns, and AppleScript's syntax is very good at mashing those things from different programs together.
It's not so great for coding intense algorithms, as it tends to be verbose.
set foo to 5
foo = 5
When you do have to make programs talk to each other, AS makes wonderful glue. AS is intended to exploit logic in other code, so rather than running awk/sed to munge my text, or use the language's text manipulation expressions (as you would in Perl), I'll get BBEdit to open the text file, and use all it's insanely powerful multi-file regex features. Apps in OS X are supposed to support opening files and doing operations on them without presenting a user interface specifically for this purpose.
No need for CORBA to solve those problems :P
Re:applescript strikes back (Score:3, Interesting)
In fact, although it seems a little 'ungodly' I can see the appeal of the apostrophe to refer to a member variable. Of course, this would likely not work in C++ as the -> and . operator mean different things, so could not just be replaced. I can see how it would work nicely in Java however (*slap* Java uses . not -> there is no need for a pointer dereferencing operator in Java because of its pointer model)
Not too sure about using it to reference array elements though, it loses some of its English semantics, and there is a lot to be said for having one operator to do one thing.
I guess the most enlightening part of the response was about using it for interoperability. I guess you're right, it makes perfect sense for that; after spending the last week doing efficiency hacking, I was looking at the code from the wrong viewpoint
tell application "Finder"
Nice way to bring apps into context.
Anyway, enough rambling, but thanks for the info.
NB. I'll stick with bash for now...
Re:applescript strikes back (Score:2)
Actually, that example was from WebSiphon, not AppleScript. I was trying to show its use in another language.
In AppleScript, you'd use 'item 3 of myArray', which again, is verbose. "myArray's item 3' would probably work as well, which isn't as bad. I actually find it easier to type English words than to hit odd keys on the keyboard. It wasn't always that way, and I remember back then I'd type English very slowly :P
It'd be great if programmers had their own keyboards with their own key layout :)
Re:applescript strikes back (Score:3, Interesting)
It takes some getting used to, but AppleScript is extremely powerful. Scriptable applications written by competent authors/companies include a dictionary of all the scriptable terms/objects/etc so you have a ready reference.
I few months ago I wrote an AppleScript CGI that duplicated the functionality of Outlook Web Access, but pulled the mail from the copy of Microsoft Entourage [microsoft.com] (not the OS X version) on my Mac at home.
I did this mostly just because I was bored one day at work. It worked very well during testing with a copy of Entourage with only a few dummy messages scattered around, but unfortunately any decent amount of mail (like that contained on my Mac at home) would bring timeouts galore because it took too long to parse the mail folders and generate the pages. I dropped the project, but kept the code because it had a lot of useful functions I might need again someday. It was also pretty portable-- in less than two hours, I made two more versions of the CGI that worked with Claris Emailer and Outlook Express to see if things would work better, but they didn't.
~Philly
Re:applescript strikes back (Score:2)
However, you are certainly doing nothing to change anyone's perception one way or the other.
Can I do this with my laptop? (Score:5, Interesting)
Personally, I'm slightly security paranoid, but I don't believe that anyone who steals my machine is going to care what's on it, but more likely swap drives. Ok, that's what I'd do, at least.
But, looking at this, I'd love to have something like this running. Are they any current security programs that do things like this? I would need it for Windows and Linux.
Now if only I could have it run in the BIOS. Imagine if on the bios level, without a proper key or password or whatever, if the hard drive was removed and replaced, it would then call a panic number whenever connected. That'd be neat.
Re:Can I do this with my laptop? (Score:5, Funny)
Re:Can I do this with my laptop? (Score:3, Funny)
Poor guy.
Re:Can I do this with my laptop? (Score:3, Funny)
Re:Can I do this with my laptop? (Score:2)
A few problems with this? Firewalls could easily stop it, although sending out the data on a common port like 80 would probably solve that. Also, just like a modem, a network card can be unplugged.
Ugh, this is starting to sound like an Outlook virus ;)
Re:Can I do this with my laptop? ... Yes, In theor (Score:5, Funny)
The boot sector is replaced with a BSD style boot selector, set to boot from the "stolen" partition by default (ie if you are using the machine yourself, you select BSD or Windows - thief has 5 secs to figure out what is wrong, and cant, so gets default behaviour.
After the initial boot sector process, control passes to a next stage, "Stolen" ... This displays a message "Unable to start Windows ... perhaps modem cable is not connected to the phone? ... Please connect cable to phone, and press return"
The average thief will understand this, and connect the phone cable. The real owner would press CTL-ALT-DEL.
When the thief connects the cable and presses "enter" the phone dials the owner, his mates, his mobile, his dog, cat, ma, pa, and the 911, 999 (in case its in Europe), FPI's private number, SWAT, the US Marines, Bin Laden, the Mafia hit-man hot line, and that number the Gas Company reserves for reporting leaking gas mains.
Not only that, the boot sequence will auto-hack so this is the ONLY boot option, and disable CTL-ALT-DEL. The dialling sequence will repeat till the battery runs out.
Someone will be pissed enough to find out who owns the unlisted number and send the boys with big sticks round for a visit.
Re:Can I do this with my laptop? ... Yes, In theor (Score:3, Funny)
Re:Can I do this with my laptop? ... Yes, In theor (Score:2, Interesting)
Re:Can I do this with my laptop? ... Yes, In theor (Score:2)
Naturally, a local number is useless, unless you are willing to have your computer try to make a long distance call to your local PD.
It would be nice if there were a common set of geographically-independent numbers that mapped to common services (fire, police, general emergency, medical, etc.)
Re:Can I do this with my laptop? (Score:5, Insightful)
You would be smart enough to swap hard drives to evade detection, but you'd also be smart enough to not steal a computer...
Re:Can I do this with my laptop? (Score:3, Insightful)
Except for the basic problem that punishment doesn't work as a deterrant if it's not consistent.
Take speeding for example - which we can all relate to. You do ten miles an hour over and get a ticket for $75 one time in a thousand. You're still going to speed.
If you got a $1000 fine for speeding one time in a thousand, you'd still do it because you'll never be that unlucky. If you do get caught, you'll just complain about how unfair it was that the other 999 guys get away and why should you be punished so disproportionately.
With most 'criminal' actions, the belief is that you won't get caught. You need to up the frequency of the consequences, not the amount. The down side of that is that's a near impossible thing to do.
Re:Can I do this with my laptop? (Score:5, Insightful)
An apt insight. If you were to take a look at the mind of a developing criminal, you will often find someone who, after one or two several nervous crimes, discovers that getting caught is actually indeed quite rare. After this discovery, they become increasingly brazen, disregarding basic precaution. This is how most criminals actually get caught.
C//
Re:Can I do this with my laptop? (Score:2)
Not 100% true, some start large companies [enron.com]..
Re:Can I do this with my laptop? (Score:3, Interesting)
Well I'm sure plenty of people would want my massive pr0n collection
Are they any current security programs that do things like this?
Well I looked into this last year when I was flatting with 5 new people. It's not that I didn't trust my roommates but when flatting with so many people they're bound to at least have a couple of pretty dodgy friends amoung them.
Linux is pretty straightforward, I mean if your using a dial out you can just use pppup to launch a script to mail you when they're online or whatever.
Problem is most theives aren't likely to be able to pring up ppp on my box, oh well.
For windows I don't know. But it shouldn't be too hard to set something up like this, even modify back-oriface 2k or something to give you the functionality you need.
In the end I decided the best way to do this was to get a prepaid cellphone with GPS (charged by the 5v line with a regulator), have it send an SMS message every day or so. The benefit is it doesn't matter if the machine is dial up/lan, or even if it's not used by the theives. Of course the problem with this system is a GPS cell phone isn't cheap.
Re:Can I do this with my laptop? (Score:5, Informative)
Actually you can most likely do that on a Mac. All of the Macs in the past 5 - 8 years use a BIOS-like system called called Open Firmware. Open Firmware basically sets up the machine to load up the operating system and it does other initialization tasks. It is also used by some other computer manufacturers as it is an open standard.
The neat thing about Open Firmware is that it is programmable. It is written in Forth and you can write additions to it and install them. These additions are persistent across power-downs and can be password protected. So it is possible that you can write some sort of network notification into Open Firmware, I do know that it is aware of TCP and such because you can remotely operate the machine if it crashes in open firmware and you can also use Open Firmware to network boot the machine.
The other cool thing about Open Firmware is that you can set it to require a password at boot. If the password is not entered then the machine will not load ANY drive. This password is much harder to disable than an operating system password or hard drive password lock, although there are a few obscure and involved ways of bypassing it if you are extremely familiar with the system.
This page [openfirmware.org] has some good links on Open Firmware. This site [sun.com] is hosted by Sun and has a ton of very specific and detailed information on Open Firmware. And lastly, Open Firmware is the only firmware standard in existence to have its own song [sun.com]!
Re:Can I do this with my laptop? (Score:2)
That procedure will not change the Open Firmware. Obviously it is more obscure than you think!
I can think of about 3 different ways to bypass the modified Open Firmware. The point I'm trying to make is that even a power user would have to do some digging to figure out that the Open Firmware has been changed to log the computers location over the internet, or similar security modifications. It would probably be the last item on a list of things to try.
While security-through-obscurity is not true security, it can raise the bar high enough that most people would simply give up before they find out how to access the computer. Every little bit helps...
Re:Can I do this with my laptop? (Score:2)
Well, if this works if will be method number four that I know. Regardless, most people will not think of resetting the Open Firmware. Again, every little block you can put in their way is good even if it's not perfect.
Re:Can I do this with my laptop? (Score:3, Interesting)
But your average guy who stole the computer to make a quick buck won't.. and neither will the schmuck who bought it from him.
Several companies sell packages for the PC that are theft-detection packages. Very low-level virus-like things that are internet aware, etc.
Re:Can I do this with my laptop? (Score:2)
But there are a lot of ways to catch someone like this if you can simply upload and execute scripts. Many FTP servers allow this even (with the right account and directory location...)
Some ideas on catching the crook...
If you know the telco test #s in your area you could have the stolen computer call you, hook-flash, dial that number, and hook-flash back, three-way calling you with the "Your # is
Or it could call you, then call an operator. You (pretending to be the calling party) say "Excuse me, I'm working on a junction box here with ten lines, can you please tell me which # I'm calling from." Identify yourself as telco staff if necessary.
And if you need to get the house searched, do the same thing with 911... Call the offenders earlier that day in the guise of doing a survey and find out a bit about them. (Almost anyone will stay on for a survey if you offer rewards.) Then call 911 and say "I'm (son/roommate), my (father/roommate/lover) has a gun and is threatening to shoot me because I (...)" and they'll send a few cops over to kick the door in and potentially see illegal stuff going on.
If you don't want this traced back to you, have the script call either a disposable cell phone or a pay-phone at a predetermined time. (Be sure to check that their system time is correct, maybe with AtomTime or something...)
But once you get the computer back, continue torturing these people, finally a target who deserves anything you can do to them.
Re:Can I do this with my laptop? (Score:2)
Re:Can I do this with my laptop? (Score:2)
I know a few people who installed these on their own computers (with nonstandard ports and passwords) for these types of features. Partially the remote access, but partially the "freak the roommate" stuff.
Re:Can I do this with my laptop? (Score:2)
Reminds me of Cuckoo's Egg (Score:4, Informative)
Reminds me of Distributed.net (Score:5, Interesting)
Wired Article [wired.com] on how d.net helped someone track down their stolen computer.
Re:Reminds me of Cuckoo's Egg (Score:2)
http://www.ocf.berkeley.edu/~stoll/
Here you'll find reference not only to Cuckoo's Egg, but also his later work Silicon Snake Oil, which I also highly recommend.
Slashdot did a story on his klein bottles a couple of years ago. I've got the coffee mug myself.
It's, like, totally cool, but a bitch to clean.
KFG
Neat! But . . . (Score:5, Interesting)
With a Windows box, on the other hand, you could easily write a program to verify the computer's IP address at boot time, and if it doesn't match, send an email to you reporting the unusual IP address and any other useful info you can think of. At each boot thereafter (common with Windows, of course) it checks a particular file on a particular server for instructions on what else to do, such as activating auto-destruct. That way you never auto-destruct your own computer by accident, since it requires permission first.
If you were particularly ambitious, you could have it activate a keystroke logger and email the recorded info to you each time it boots.
Re:Neat! But . . . (Score:3, Interesting)
LILO boot: linux -s
To be precise, that should be whatever the name of the image is, followed by '-s'. You can hit TAB to view a list of images.
Now, if whoever installed Linux locked down lilo as well (with the restricted keyword in
Re:Neat! But . . . (Score:2, Funny)
Re:Neat! But . . . (Score:3, Insightful)
NEEDED: new feature for Timbuktu (Score:3, Funny)
Re:NEEDED: new feature for Timbuktu (Score:2, Funny)
Mail filters could be really effective.
Or maybe that needs an embedded nuclear weapon.
Re:NEEDED: new feature for Timbuktu (Score:2)
You could also make it explode... See for example this article in New Scientist:
http://www.newscientist.com/news/news.jsp?id=ns999 91795 [newscientist.com]
That article was mentioned in Risks Digest 21.87 (see the newsgroup comp.risks). Exploding chips are a dangerous idea. You would not like them to be triggered by accident...
Re:NEEDED: new feature for Timbuktu (Score:2)
Google Groups Archive (Score:3, Informative)
http://groups.google.com/groups?q=Bridges+myers+a
Cliff Stoll flashback|easy tagging scritps forunix (Score:5, Informative)
Honestly, I'm not -too- surprised that this happened. My machine runs:
/bin/date | mail
/sbin/ifconfig -a | mail
(Running dyndns would be interesting also.)
on bootup. I originally did this so that I could keep track of my box and identify when it went down and what the current IP was so I could ssh in and look around more comprehensively, although it has crossed my mind that if my machine were to get stolen it might report back to me where it was. I'd happy to see that it's worked out at least once for someone.
Most ISPS keep logs of usernames and passwords on certain ips (especially if they're static/near static as in a cable modem or dsl connection). From there, it's fairly easy for the ISP for connect that back to a real name.
I'd be very intrested to see if this is enough information to get a search warrent.
Re:Cliff Stoll flashback|easy tagging scritps foru (Score:3, Insightful)
No, the thief wasn't caught. (Score:5, Informative)
Possession of stolen property is very different to theft. She claims to have bought the imac from "some guy". Ok, she might be complicit, but we won't ever know.
Re:No, the thief wasn't caught. (Score:3, Insightful)
Re:Exactly (Score:2)
A Friendly Face for Magic Lantern (Score:2, Funny)
<SARCASM>
In related news, the FBI has announced that its stealthy "Magic Lantern" program is officially being launched under the name "fbiJack."
"This guy got lucky, but how 'bout you, Slick?" taunted Special Agent Kay. "Wouldn't you feel better knowing that fbiJack is running on your machine? You can pick up an installer disk at any U.S. Post Office or download it from Microsoft.com."
</SARCASM>
Mac Thief (Score:3, Funny)
Oh THAT kind of Mac.
Very nice... (Score:2, Interesting)
The problem with doing something like this under a system requiring user accounts is that once the person discovers that they can't just turn it on and get a point-and-drool interface, they'll erase it and start from scratch. Perhaps if you wanted something like this (and had a bit of technical skill) you could have it boot from a small partition (I mean, how many users know much about that?) that checks to see if what its booting into is what it should be (ie has windows been installed where linux should be), and if so alters something on that OS to make it phone home (obviously, something different for every OS that may be installed would have to be done, but this is hypothetical), and then proceeds to boot the new OS normally.
In the case of many Linux machines on dialups with a dedicated phone line, they are told to dialup on boot anyway, so that would give you some oppertunity to trace it, by checking the number that it is calling from. However, that is assuming that someone sets everything up, including the modem cable, before turning it on the first time.
On another note, how come erasing everything didn't remove Timbuktu? Does it live in the System Folder only?
Now I understand... (Score:2, Funny)
praise osx (Score:4, Interesting)
sudo rm -rf /
Applescript is my least favorite part of Macs. (shudder). it's nice to be able to integrate shell scripts as AppleScript now; just wrap the entire shell script in a single line of Applescript.
Re:praise osx (Score:2)
lamers (Score:5, Funny)
If you were really serious about inflicting pain, how about:
setting up one of those $125 per call phone lines in the bahamas and then having the imac call it every 2 minutes...
repeatedly call 911 and play recorded message: "help! I've fallen and I can't get up!" over and over again
install a keylogger so you can post their most intimate conversations on your website.
those are just a few ideas that have popped in my head.. Hell, you could do that with VB email virii and make a mint with the first one...
Re:lamers (Score:5, Funny)
I'm thinking that you need to turn off the speakers, turn off the modem sound and if there has been no activity for a few hours, at 4am have the system call that $125 number about 20 times in just a few hours.
With this scheme you could sell reconditioned iMacs setup with this software out of the back of a van for about $100 apeice and just sit back and rake in the cash. The people who bought what they thought was stollen property will never say a word as long as you only ripped them off for a couple of thousand dollars.
So, people, if you buy computers from the back of a van, don't complain when you get ripped off.
Re:lamers (Score:5, Funny)
Re:lamers (Score:3, Funny)
Re:lamers (Score:2)
If someone steals my computer and runs up their phone bill as a result, is this really my problem?
In one case, its an attempt to preemptively defraud someone who defrauded you, but on the other hand, its someone illegally using your property in such a way that happens to benefit you.
Its certainly an interesting twist on an insurance policy. If stolen, the thief will automatically reimburse you for the computer.
And set it so the effect is negligible, say $15-20 a month, and you could probably milk it for a LONG time.
Now, selling computers with the implication they're stolen with intent to defraud in this manner would NOT be legal, so I don't recommend it.
-Restil
Record 'em! (Score:5, Interesting)
The lack of a prosecution for the theft is disappointing. (As someone who has had their place robbed twice in the past two years, I find the low capture/prosecution rates depressing; it just doesn't seem to be a priority with law enforcement. Sigh. Oh well, if anyone tries to hit me again, they'll be on candid camera
What might also have been cool, would be to use AppleScript to flip on the microphone, record the sound in the room, and send the recordings now and then, when connected. (Or use AppleScript to download a program that does the same; I don't know AppleScript.) That would potentially allow more "evidence" to be collected. If the lady didn't steal it, there's a chance you'd record something that would be useful. (Her thanking her brother-in-law for the Mac, or the like.) Having the Mac copy you on all incoming and outgoing mail may also be useful. (Not sure if the Mac could do it; Outlook almost does this by itself, with all the viruses it accepts
Probably not admissible in court, I guess. Although using a stolen device for surveillance really *should* be a legal means of admissible evidence, in a perfect world
-me
Re:Record 'em! (Score:4, Informative)
I'm not so sure it wouldn't be admissable in court. Unauthorized taps are illegal in some, but not all jurisdictions. Also, illegaly obtained evidence is admissible under some conditions; in particular when the illegal evidence is obtained by someone who is NOT a police officer, etc.
Finally, consider this: if you use the phone or use the bathroom, this is an illegal tap. Phones are not recorders and bathrooms are not cameras, there is an expectation of privacy. But a computer can be and is an audio and video recording device, as well as a network data collector. Many computers have built-in microphones and network devices; no reasonable person should assume they don't work. In other words, there is no expectation of privacy; especially if the lawful owner has configured it to act as a remote device.
I'm sure the laywers will eventually hash this out, but I can assure you the evidence would be admissible in my jursdiction; legal or not, because I am not a cop.
Re:Record 'em! (Score:2)
Make sure and start recording as your suicide script runs, so you can entertain yourself and your other BOFH friends again and again by listening to the thief's exclamations of surprise, disbelief, and outrage, as file start disappearing...
The script could also monitor files in the pr0n collection and to record while any are opened. You can then post these recordings on the internet: "Thief wanks to stolen pr0n on my stolen Mac!" I'd suggest that you use a webcam, too, if available, but the chances are better that you'd wish you hadn't recorded video.
Re:Record 'em! (Score:2)
I currently have winamp broadcasting from the mic on my computer at 24kbps to an icecast server on a fixed ip. Granted, this is intentional, and its also rather obvious, but if something like this was more covert, it would probably run safely in the background and nobody using the computer would ever know. The upstream would be a bit slow if they're on a modem, but I don't see any other downsides. I can easily record the stream at the server side and have a 24/7 (as long as the computer is on) audio stream of whats going on there.
Now if only I can get them to steal the webcam too... hmmmmmm
-Restil
This reminds me.... (Score:3, Interesting)
Not the first Mac thief to be caught (Score:4, Funny)
So he called up all the places in town that sold Macs (all two or three of them) and waited. Sure enough the idiot kid shows up at a store asking about an HD-20 boot disk. Snagged!
The difference now is that the internet is everywhere, and it's now possible to have the computer "phone home".
Powerbook... Phone home! (Score:2, Interesting)
So I placed a Lost and Found ad with a Reward, and sure enough a couple days later this kind person calls me to say they found the laptop.
The people who found it said they watched it fall off my car on the highway and stopped to pick it up. The amazing thing was that the only damage to the Powerbook was the floppy drive and a scuffed case (battle scars.)
Unfortunately, the people who rescued my mac weren't mac users. Actually I don't think they were computer users at all as it seemed the only thing they were capable of was changing the names of all the files on the desktop to variations of :aaasjkdfl;jjj, including the hard disk:fhhdks;jasdfjjh. And that's what really would've been nice, a form of nag-ware that ran when powered up saying: to whom it belonged, and how a reward for return would be paid, etc. And maybe an applescript to auto-dial the modem to my home phone. Then at least I'd have a chance of caller-id picking up!
-
Windows-based mailer (Score:4, Informative)
1. I wrote a one-line
ipconfig > c:\windows\system32\ip_ADDR_resolv.sys
to make it look like a system file. All it is really is an output of my local IP address.
2. I used the free StealthMailer program at: http://www.amecisco.com/stealthmail.htm to mail my
3. For added cool, you can use low-level key-logging software [amecisco.com] and mail out everything that use types and mail it to yourself. Cost is about $79/license.
You can't beat that for peace of mind.
Very Sad (Score:4, Interesting)
Why is that? Is it because traffic citations are easy and gain them money? Is it because they can bust someone for possession of a "controlled" substance and also get forfeiture of property? Is it because law enforcement is just lazy when it comes to going after real criminals who leave behind real victims because it's not economically viable?
I'll let you decide.
Right (not) (Score:3, Insightful)
More likely it is because ticket revenue makes up a large portion of most department's annual budget, so it's more like, "If you want a new bullet proof vest you better get out there and write daddy some tickets like a good little bitch." It is inconceivable to me that these guys actually have ticket quotas. Does that mean we aren't doing our job as a citizen if we don't occasionally get caught speeding so we can pay our "supplemental taxes"?
Don't hate the cops-- hate the administration that wastes all your tax money and police resources on the "war on drugs", and forces officers to whore in the streets for money to shore up budget holes that are left behind as a result.
Hate the "police state" if you want, but try to remember that cops are people too, and a lot of them hate their jobs and bosses as much as you hate yours, only they are hating theirs for less money with a much greater risk of injury or death in most cases.
My dad was a police officer for a while, and he used to tell me, "Cops are people, just like everyone else. The problem is that for what they are paying, you tend to get two kinds of candidates: starry-eyed idealists naieve enough to think they can "make a difference", and people who couldn't find a job doing anything else." Unfortunately there is a shortage of the first kind. Feel free to sign up if you would like to offer your intelligence and talents to serving the community for little or no compensation.
When I told him I was thinking about becoming a police officer he told me, "Son, if you have any involvement with law enforcement it better be from the other side. You will make a hell of a lot more money, and people will respect you more. If that doesn't help you make up your mind know that I would rather shoot you myself than hear someone else shot you."
I think most of what is wrong with police services today comes from the top down more than the bottom up. Even granted that you aren't working with the best and brightest most of the time, if the administration pointed them in the right direction and focused on the right things we would al be happier, officers included.
Re:Right (not) (Score:2)
My beef is not with cops. It's with the mindset of police administrations who think they need to run their district like a corporation. We don't need that kind of mentality. Law enforcement should not be a profitable organization. There shouldn't be little charts everywhere saying how many criminals they busted each year. And they should be preventive. DARE is a good initiative, I don't agree with some of what they teach and I feel they should be much more objective, but it's a step in a good direction.
Motorcycle cops should be abolished, plain and simple. Their only justification for existence is to make money from tickets and that's just plain wrong. If they really wanted to stop speeding, they would put photo-radar at ever mile marker. The current form of selective enforcement does little more than solidify the belief that they are doing it for the money rather than for my safety.
I'll stop this rant now because it doesn't solve anything. I'm much better off voting these fuckers out of office and putting some ethical people with common sense in there.
Re:Right (not) [OT] (Score:2, Funny)
$50K and I get to carry a GUN?
Screw system administration. I never get to wave a gun at anyone here...
I'm going to sign up.
I wonder what my odds of passing the psych eval are...
Re:Very Sad (Score:2)
I call you up and say "somebody robbed me"
you have to take on face value that
a)I was robbed
b)I was robbed of the things I report
You get caught with stolen material, espcially small thing under 3000 dollars where this is a large "grey" market it become next to impossible to do something, even if you had all the man power to do so.
Sure, there are a lot of problems with law enforcement administration, but there are other issue as well.
Amazing that nobody has thought of... (Score:3, Insightful)
Re:Amazing that nobody has thought of... (Score:2)
Wow, it's a kill-all script for Windows. The only problem, like always, it getting it to the user.
The good thing about mine is that it won't be caught by a virus scanner. It's stealthed!
here's how da penguin does it (Score:3, Informative)
If they get past that, and boot, they'll be confronted with a password prompt to mount your
So they will have to remove somehow repartition the drive and install another operating system. Can a thief do that too? This causes the thief precious time and effort... more and more the machine becomes a less interesting proposition.
Between boot and trying to mount your sensitive crap in
BTW, I can't spel.
Privacy? (Score:4, Insightful)
The Timbuktu extension that's installed on it posts a unique identifier to Netopia's IP Locator server (findme.netopia.com) whenever it connects to the internet.
What about the privacy aspects of this? Sure, in this instance it worked out to be a good thing, but do you really want someone else to know where you are using their license? How is this different than Windows XP phone home? What -other- information is being transmitted to Netopia?
You need the callerid, not just an IP (Score:2, Interesting)
Moral of the story: Have it call home to a CallerID box- having just the IP won't get you anywhere.
Erase the HD... (Score:4, Informative)
But most thieves are dumb, or at least cheap; do you think they are going to erase PhotoShop, etc and go out and buy a copy, and then do that 20 or 50 more times? It isn't much use without apps.
If you don't leave your SW about in an obvious place, they won't have an OS install CD (to boot an iMac or any Mac made since about 1996. A boot floppy is useless; most won't boot with System 7.1, which did fit on a floppy. And if your floppy collection is anything like most people's, there won't be a decent label on it anyway. x86 is, of course, different; boot floppies are pretty easy to come by and they work).
Auto-dial 911 is A Bad Idea; they have enough trouble with users who can't figure out why the cellphone called 911 from a football game cuz the guy sat on it and it auto-dialed with "quick 911" enabled.
A periodic eMail to your own account sounds good; there is plenty of evidence there and, properly done, it doesn't compromise your own security (or risk your own life w/electric keyboards... YIKES! -I don't trust any computer that far).
Re:Erase the HD... (Score:2, Insightful)
Issues with potentially stolen computers. (Score:3, Informative)
If you buy from a store, or from an auction, you're probably safe. But if you buy from an individual, especially from someone you don't know, you might want to do some sanity checks. First, check for serial numbers. If there aren't any, DON'T BUY IT. This can be tough if the computer was self assembled as some clone cases don't have serial numbers on them, but practically all OEM computers will.
After purchasing it, WIPE IT. Reinstall the operating system from scratch at the very least. If you're a good samaritan, you might want do back up the system, especially if there seems to be any personal information on it. But you want the system itself to be clean.
Take the serial number on the computer and any other equipment you bought, and report it to the police. Pawn shops do this all the time. First of all, if any equipment you report comes back stolen, you can't be prosecuted for possession of stolen property, even if you had a pretty good idea it was stolen. Secondly, I'm not sure about every state, but in Texas even if it IS reported stolen, you're still the rightful owner of it and its the responsibility of the original owner to prove in court that they are the rightful owner before being able to reclaim it. Pawn shops usually get around this by offering to return the equipment for the price they paid for it (which is generally a small fraction of what the equipment is really worth). In many cases the equipment is insured and the original owner would easier collect on the insurance rather than spend a couple years in court trying to get a computer back that by the time they finally get it would need to be replaced anyways.
As for the lady in the article, it was probably one of those "look the other way" things. I'll get a good deal on a computer and I just won't pay attention to how I got it. If there was even the slight bit of legitimacy to her purchase she wouldn't have been so eagar to take a plea agreement.
-Restil
Make it undesirable!! (Score:4, Interesting)
Another Solution - user-flashable startup screens (Score:2)
When I turn my Thinkpad on, it gives me a nice big IBM logo. What if one could replace that logo with a bitmap of some sort, that was password protected like BIOS passwords are? It could say "property of, gimme the thing back, etc etc" and would be completely impenetrable.
The whole phone-home thing seems logical, but for those of us who use OS's that can't be accessed without a password (ie XP/WinNT/Win2k, assuming it's set up properly) the machine is going to NEED a reformat/reinstall before it's been swiped anyways. By the time someone got into my OS (so that a dialer could work) they would need my user pwd, which hopefully they wouldn't have.
It would also be nice to see a machine *properly* support secure smartcards so that the machine would be useless (except for parts, no way around that) without it.
Of course, I like the mini-tower-case-on-the-porch-stuffed-with-C4-and-
-
Re:Suggestions are crap (Score:2)
Re:Suggestions are crap (Score:2, Funny)
-dair
Re:Suggestions are crap (Score:2)
You have the phone number. Doesn't anyone have any clever social engineering skills anymore? Get the damn user to tell you their address....
Re:Good Idea (Score:3, Insightful)
Re:Good Idea (Score:2)
Re:Good Idea (Score:2)
Woof! (Score:3, Funny)
Send it to obedience school? Teach it to heel?
Watch out if your thief is Korean.
Re:The scary thing is, it works.... (Score:2, Informative)
Ummm... every Mac now comes with cron and sshd already installed. What more do you need?
Re:The scary thing is, it works.... (Score:2)
While its not hidden from sight, check out tight vnc [tightvnc.com] if you want remote access to your box. Nifty little program for those of us who need to do something with a remote box - like my mom's....
Re:Illegal hacking? (Score:3, Insightful)
Re:Illegal hacking? (Score:2)
Re:Illegal hacking? (Score:2)
I have a server that I co-administer with a friend. Well, guess what? He updgraded sshd and stupidly did a STOP on it, not a restart. The server is some 19 hours from and 2 hours from him. I had to exploit the box to get back in. Should that be illegal? NO. BECAUSE IT IS MINE. Same as the iMac. It was the guy's sister's, she gave him permission to do it, and that's all that matters.
Re:Proving theft? (Score:2)