In the late 70's and 80's a way to "Fix" a thief was to immediatly
after purchase, open up the electronics item and switch polarity. The
thief would steal  for example a car radio, hook it up (red to red,
Black to Black) and because polarity the was reversed the device would
blow a fuse or fry making a resale or use unlikely and unprofitable.
It worked. Of course you had to remember that you had done this.

This is the good that I found. I'll return with the questionable
findings later. While doing research for privacy issues, "net
neutrality" and the computer OS I am using, I came across this service.

http://orbicule.com/undercover/works.html
Description:
In case of theft
As soon as your Mac is stolen, you send us the Undercover ID you
received upon registration. We will add this code to our database of
stolen Macs.

The first phase
The next time your stolen Mac goes online (using dial-up, WiFi,
ethernet, Bluetooth, ...) it will notice that its Undercover ID is
included in our database of stolen Macs. This will initiate the first
phase, in which Undercover will send both network information and
screenshots of your stolen Mac. The network information enables us to
work with the network administrators of the ISP the thief is connected
to. Since ISPs consider computer theft as network abuse, they will
uncover the thief's identity. Together with law enforcement, we work
to recover the Mac. If your Mac has a built-in iSight, or if the thief
attached an external iSight, Undercover will send iSight pictures of
the thief. Think of it as running Photo Booth in the background.

Plan B
If law enforcement fails to recover the stolen Mac, Undercover
switches to plan B. In this mode, Undercover will simulate a screen
failure, slowly making the Mac's screen unusable. At this point, we
think the thief has two options: to send the computer to a reseller
for repair, or to get rid of it by selling it on the Net. In either
case, Undercover will show a full-screen message alerting the reseller
or someone who bought the Mac from the thief that the Mac has been
stolen, that it has become unusable and that it needs to be returned
as soon as possible. Our contact information and a promise for a
finder's fee (which will be covered by us) will be displayed as well.
This message can be fully customized by the user and when dismissed,
this message will instantly reappear. Additionally, your Mac will
start shouting at the highest volume level, using its built-in
text-to-speech capabilities. You can decide when Undercover switches
to plan B and what message is displayed. Note that this message is NOT
displayed to the thief.






SPONSORED LINKS
Fireant Individual Typepad
Use Explains


YAHOO! GROUPS LINKS




Reply via email to