nanog mailing list archives
RE: Tracing network procedure for stolen computers
From: "Mike Callahan" <mcallahan () bullseyetelecom net>
Date: Tue, 13 Jun 2006 07:53:28 -0400
Actually, it seems this his how you get stolen items back in the internet age ;-). http://www.evanwashere.com/StolenSidekick/ -----Original Message----- From: owner-nanog () merit edu [mailto:owner-nanog () merit edu]On Behalf Of Michael.Dillon () btradianz com Sent: Tuesday, June 13, 2006 5:32 AM To: nanog () nanog org Subject: Re: Tracing network procedure for stolen computers
Earlier this month my daughters Ibook was stolen, oh well that is life I guess. Anyway updated mail server software for full debug and IP log since
noticed
that mail account was accessed yesterday.
It's a UNIX machine. You own it. You know the password. If you had only set up an SSH server on it, you would now be able to log in and collect additional information about the current user. Interesting things can happen when intelligent devices find themselves stolen... http://www.evanwashere.com/StolenSidekick/ --Michael Dillon
Current thread:
- Tracing network procedure for stolen computers Colin Johnston (Jun 12)
- Re: Tracing network procedure for stolen computers Peter Dambier (Jun 12)
- Re: Tracing network procedure for stolen computers Michael . Dillon (Jun 13)
- <Possible follow-ups>
- RE: Tracing network procedure for stolen computers Mike Callahan (Jun 13)