On 6/17/05, Lindsay Holmwood <[EMAIL PROTECTED]> wrote:
> Now that I think of it, in the fall 2004 edition of the 2600 there was a
> really good article about laptop security.

I think this what you are after
http://www.rufy.com/laptop.pdf

The netcat backchannel is always fun to play with ;-)
 
> It focused on putting together a 'phone home' programme that would send
> a heartbeat to a remote server every 15 minutes when plugged into a
> network. There might have been something in the article about getting
> data off it remotely too.

Mind you if the theif has half a brain he would stick the box on a private
network and run snort/ethereal et al.. and have a look at what the laptop does.

Not too mention if you are sitting behind a proxy this won't work
unless the http_proxy env
variable is set and your app has the ability to use the proxy.

This goes for those magic programs that sit in "unaccessible" disk sectors.  

Then again your usual lowlifer will just dash straight to the nearest
pub and hock it
the first gullible/"sideways looking" bloke he can find he will duly
plug it on the
net and you can nail him at least.

-- 
James
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to