Full Disclosure mailing list archives

Re: Breaking LoJack for Laptops


From: Bob Hacker <bob.hacker () gmail com>
Date: Sun, 25 Dec 2005 20:05:42 -0600

sorry i misplaced your post with your reality, I replied simply with...   Bob
Hacker    to Stan
 More options   Dec 24 (1 day ago)  Its outstanding, I was being sarcastic
just out of context. Happy New Year List !

=)
!Z

I replied to stan not the list. Guess I should Have.


On Sun, 25 Dec 2005 13:38:15 -0800 Bob Hacker
<bob.hacker () gmail com> wrote:

Let me clarify this this to you and others who don't understand the
slightest about much.

Allowing 192* to be called from is absurd. And its not that hard
to whois
the ip, contact the isp who now these days hand over information
to almost*
anyone with a nice fancy letterhead from a lawyers office. Saying

In case you didn't realize it, the 192.168 range is private. Go
whois yourself silly trying to find out. Better yet go ask around
who is 192.168.x.x for kicks.

Dear Mr
ISP bad person using this IP has stolen laptop that sold on ebay
for 50
bucks, please give us his address so we may take him to court and
charge him
with possession of stolen property, a misdemenor in most states.

For your information you seem to know little about how things work.
Go ask any provider for information with any kind of letterhead
you'd like. See what they will tell you. You seem to be stuck on
stupid assuming a bonafide provider is going to budge simply
because some letterhead. Without a court order you'd be wasting a
piece of paper.

Yes its
logical. But in theory I think the whole thing is like the MS key
validate,
disable it in windows add-ons and move on. Its like that one time
at
bandcamp when i was on a lan and didnt know my ip so i went to
steve gibsons
site.

Wow you are so 31337 to run over to Gibson's site. Case in point no
need to further clarify anything on my original post. Don't make an
ass out of yourself responding when you have one half of one half
of a smidgen of a clue.

Note. I am sure anyone who has a purchased a stolen laptop ,
it had a
password on it. So the OS was already installed. just my .02

Instead of wasting time making yourself look more clueless you
should take some time and actually run along and learn something
productive. The message had nothing to do with a stolen laptop, it
had to do with defeating its protection. Whether or not it had/has
a password is irrelevant. And your last comment made no sense so
take your two cents and buy yourself a clue.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkOvRFYACgkQo8cxM8/cskrwrwCfc5wIUtYDj1vt5e5A62IKSeNj8UEA
n0t1uEQ6cJfU51iu24hKwzaZRQpi
=gxB0
-----END PGP SIGNATURE-----




Concerned about your privacy? Instantly send FREE secure email, no account
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: