A couple low-cost options to aid in recovery of future lost equipment:
http://adeona.cs.washington.edu/ http://iconico.com/locatePC/ I have both on my personal laptop and LocatePC on my home desktop machines. If nothing else, these tools may increase the likelihood of identification and location. Roger Wright Network Administrator Evatone, Inc. 727.572.7076 x388 _____ From: John Hornbuckle [mailto:[email protected]] Sent: Monday, February 02, 2009 3:27 PM To: NT System Admin Issues Subject: RE: Stolen PC We have audio receivers in some of our classrooms. The receivers are blue and say "Front Row" on them (the brand of the receiver). Last week, a technician noticed that the receiver was missing from a room. In its place was a cardboard box, covered with blue construction paper, with "Front Row" written on it with a Sharpie. We're not sure how long ago it happened; the teacher(s) in the room never noticed. Anyhow... As to the stolen computer... One thing we do is to lock them down so that anyone who get them will have to reset the BIOS password (generally involving opening the unit and messing with a jumper, which can be tricky because some of our units have locks to keep them closed) in order to boot from a CD/flash drive/whatever in order to wipe the hard drive (which they would need to do, because the OS is locked down and would be unusable to them off our network). Not that this helps you get yours back. J John Hornbuckle MIS Department Taylor County School District 318 North Clark Street Perry, FL 32347 www.taylor.k12.fl.us From: Vue, Za [mailto:[email protected]] Sent: Monday, February 02, 2009 2:58 PM To: NT System Admin Issues Subject: Stolen PC Man I am piss off. Lab manager came early to open the lab and found a Dell Optiplex 755 gone from a classroom. The good thing is we have security cameras throughout the building. Has anyone ever reported these issues to Dell so they can flag the machine for stolen and what has come out of it? -Z.V. ________________________________ This e-mail message (including any attachments) is for the sole use of the intended recipient(s) and may contain confidential and privileged information. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this message (including any attachments) is strictly prohibited. If you have received this message in error, please contact the sender by reply e-mail message and destroy all copies of the original message (including attachments). ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
