Hi John I thought about this some time ago. What is needed I think is something that runs as a service like a virus, then checks to see if it can communicate with the device of choice, if not it emails you with enough detail to do a trace, next time it connects to the internet. It could ping your network to see if it was still connected or Communicate with a Bluetooth, infra red or wireless device. You could have three devices one in the house, one on your person and one in the car. I came to a standstill trying to get enough information to email. The Laptop would be able to find out what DNS server was being used, but you really want to know the static or dynamic Ip it is connected by. Maybe I am missing something there.
Of course it will get known that this sort of protection is available and the thief will just format an install an operating system. This is pertinent because I have been working at an office in a nearby City all weekend, someone smashed my car window hoping to get my Sat Nav which I had with me. My Laptop was hidden in the boot so they didn't see it. Cheers Peter Hart Peter Hart Computers. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Sent: 27 August 2008 20:45 To: 'ProFox Email List' Subject: RE: Theft Retrieval software I'm toying with the idea of writing a small app that will run as a service after installation. I think I want the app to do the following: The service will have a program interface/form surface at least once a week, and prompt the user to enter a "keyword". If the keyword is entered incorrectly, give the user three more attempts. If the user fails, the program will do a http post to a webpage which will allow me to capture their external ipaddress. I'm thinking I'll use some wmi code to capture the serial number, computer name, etc and send that in the post. I'm thinking of writing this and giving it to users of my CyberWatch program, as a free download from the MPD. This all came to mind because of a CyberWatch tip I received last weekend. I got an email tip from a guy who receives the CyberWatch reports, saying he had been burglarized, but since he is an IT kinda guy, he was able to log in to his stolen computer. He got a couple of names and email addresses while he was in there, and I logged in and got the external ip address. I was able to get the address from our city schools based on the user names, and also sent the detectives the ISP, so they could get a subpoena. The victim had his stolen stuff back on Tuesday morning, and the detectives are interviewing suspects. Anyone have any ideas about this? My thoughts are to write it quickly in VFP and post it for Windows users. I guess I could rewrite it in python or perl for MAC users. John [excessive quoting removed by server] _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

