On 6/17/05, Lindsay Holmwood <[EMAIL PROTECTED]> wrote: > Now that I think of it, in the fall 2004 edition of the 2600 there was a > really good article about laptop security.
I think this what you are after http://www.rufy.com/laptop.pdf The netcat backchannel is always fun to play with ;-) > It focused on putting together a 'phone home' programme that would send > a heartbeat to a remote server every 15 minutes when plugged into a > network. There might have been something in the article about getting > data off it remotely too. Mind you if the theif has half a brain he would stick the box on a private network and run snort/ethereal et al.. and have a look at what the laptop does. Not too mention if you are sitting behind a proxy this won't work unless the http_proxy env variable is set and your app has the ability to use the proxy. This goes for those magic programs that sit in "unaccessible" disk sectors. Then again your usual lowlifer will just dash straight to the nearest pub and hock it the first gullible/"sideways looking" bloke he can find he will duly plug it on the net and you can nail him at least. -- James -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
