Date sent:              Thu, 25 Feb 2010 11:09:06 -0500
From:                   Rich Kulawiec <[email protected]>

> 1. Surely any competent thief, on bagging one of these laptops, would
> begin by making sure the computer was disconnected from all networks
> (perhaps turning off the wireless via a hardware switch, if available)
> and then reloading the software, starting with the operating system.

Once did some work for a company that made laptop tracking software.

One of the salescritters, a person who knew all about the software, what it 
did, and 
responsible for presenting all this information to potential purchasers, stole 
one 
of the company laptops.

And got caught.

Fortunately, most thieves are thieves because they are incompetent.

======================  (quote inserted randomly by Pegasus Mailer)
[email protected]     [email protected]     [email protected]
To get the medium's magic to work for one's aims rather than
against them is to attain literacy.
    - Alan Kay, `Computer Software', Scientific American, Sept. 1984
victoria.tc.ca/techrev/rms.htm blog.isc2.org/isc2_blog/slade/index.html
http://blogs.securiteam.com/index.php/archives/author/p1/
http://twitter.com/NoticeBored http://twitter.com/rslade
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to