You sent it to me instead of john.

************************************************************************
Right Wing Mike

http://www.cafepress.com/rightwingmike

Bigfoot Hates Obama

http://www.cafepress.com/rightwingmike/5690856

I Wish Hillary had married OJ

http://www.cafepress.com/rightwingmike/4236924


--- On Wed, 8/27/08, Mike yearwood <[EMAIL PROTECTED]> wrote:

> From: Mike yearwood <[EMAIL PROTECTED]>
> Subject: RE: Theft Retrieval software
> To: [EMAIL PROTECTED]
> Date: Wednesday, August 27, 2008, 4:16 PM
> Hi John
> 
> I recently saw a news story about a girl whose apartment
> was robbed.
> She connected to her laptop somehow and used its webcam to
> photograph
> the user. It turned out to be a friend of a friend that had
> attended a
> party at her place the previous weekend.
> 
> With the photo of him in possession of the goods, there was
> no
> apparently need for interviewing subjects.
> 
> Mike Yearwood
> 
> > Message: 3
> > Date: Wed, 27 Aug 2008 14:42:37 -0500
> > From: "John"
> <[EMAIL PROTECTED]>
> > Subject: RE:  Theft Retrieval software
> > To: [EMAIL PROTECTED]
> > Message-ID:
> <[EMAIL PROTECTED]@shelbynet.com>
> > Content-Type: text/plain; charset="us-ascii"
> >
> > I'm toying with the idea of writing a small app
> that will run as a service
> > after installation. I think I want the app to do the
> following:
> >
> > The service will have a program interface/form surface
> at least once a week,
> > and prompt the user to enter a "keyword". If
> the keyword is entered
> > incorrectly, give the user three more attempts. If the
> user fails, the
> > program will do a http post to a webpage which will
> allow me to capture
> > their external  ipaddress. I'm thinking I'll
> use some wmi code to capture
> > the serial number, computer name, etc and send that in
> the post.
> >
> > I'm thinking of writing this and giving it to
> users of my CyberWatch
> > program, as a free download from the MPD. This all
> came to mind because of a
> > CyberWatch tip I received last weekend. I got an email
> tip from a guy who
> > receives the CyberWatch reports, saying he had been
> burglarized, but since
> > he is an IT kinda guy, he was able to log in to his
> stolen computer. He got
> > a couple of names and email addresses while he was in
> there, and I logged in
> > and got the external ip address. I was able to get the
> address from our city
> > schools based on the user names, and also sent the
> detectives the ISP, so
> > they could get a subpoena. The victim had his stolen
> stuff back on Tuesday
> > morning, and the detectives are interviewing suspects.
> >
> > Anyone have any ideas about this? My thoughts are to
> write it quickly in VFP
> > and post it for Windows users. I guess I could rewrite
> it in python or perl
> > for MAC users.
> >
> > John
> 
> 
> _______________________________________________
> Post Messages to: [email protected]
> Subscription Maintenance:
> http://leafe.com/mailman/listinfo/profox
> OT-free version of this list:
> http://leafe.com/mailman/listinfo/profoxtech
> Searchable Archive: http://leafe.com/archives/search/profox
> This message:
> http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED]
> ** All postings, unless explicitly stated otherwise, are
> the opinions of the author, and do not constitute legal or
> medical advice. This statement is added to the messages for
> those lawyers who are too stupid to see the obvious.


_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to