A couple low-cost options to aid in recovery of future lost equipment:

 

http://adeona.cs.washington.edu/

 

http://iconico.com/locatePC/

 

I have both on my personal laptop and LocatePC on my home desktop
machines.

 

If nothing else, these tools may increase the likelihood of
identification and location.

 

   

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

_____  

 

From: John Hornbuckle [mailto:[email protected]] 
Sent: Monday, February 02, 2009 3:27 PM
To: NT System Admin Issues
Subject: RE: Stolen PC

 

We have audio receivers in some of our classrooms. The receivers are
blue and say "Front Row" on them (the brand of the receiver).

 

Last week, a technician noticed that the receiver was missing from a
room. In its place was a cardboard box, covered with blue construction
paper, with "Front Row" written on it with a Sharpie.

 

We're not sure how long ago it happened; the teacher(s) in the room
never noticed.

 

Anyhow... As to the stolen computer... One thing we do is to lock them
down so that anyone who get them will have to reset the BIOS password
(generally involving opening the unit and messing with a jumper, which
can be tricky because some of our units have locks to keep them closed)
in order to boot from a CD/flash drive/whatever in order to wipe the
hard drive (which they would need to do, because the OS is locked down
and would be unusable to them off our network).

 

Not that this helps you get yours back.  J

 

 

 

John Hornbuckle

MIS Department

Taylor County School District

318 North Clark Street

Perry, FL 32347

 

www.taylor.k12.fl.us

 

 

 

 

 

 

From: Vue, Za [mailto:[email protected]] 
Sent: Monday, February 02, 2009 2:58 PM
To: NT System Admin Issues
Subject: Stolen PC

 

Man I am piss off. Lab manager came early to open the lab and found a
Dell Optiplex 755 gone from a classroom. The good thing is we have
security cameras throughout the building. Has anyone ever reported these
issues to Dell so they can flag the machine for stolen and what has come
out of it?

 

-Z.V.

 

________________________________

This e-mail message (including any attachments) is for the sole use of
the intended recipient(s) and may contain confidential and privileged
information. If the reader of this message is not the intended
recipient, you are hereby notified that any dissemination, distribution
or copying of this message (including any attachments) is strictly
prohibited.

If you have received this message in error, please contact
the sender by reply e-mail message and destroy all copies of the
original message (including attachments).

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to