Tracing network procedure for stolen computers
Mike Callahan
mcallahan at bullseyetelecom.net
Tue Jun 13 11:53:28 UTC 2006
Actually, it seems this his how you get stolen items back in the internet age ;-).
http://www.evanwashere.com/StolenSidekick/
-----Original Message-----
From: owner-nanog at merit.edu [mailto:owner-nanog at merit.edu]On Behalf Of
Michael.Dillon at btradianz.com
Sent: Tuesday, June 13, 2006 5:32 AM
To: nanog at nanog.org
Subject: Re: Tracing network procedure for stolen computers
> Earlier this month my daughters Ibook was stolen, oh well that is life I
> guess.
> Anyway updated mail server software for full debug and IP log since
noticed
> that mail account was accessed yesterday.
It's a UNIX machine. You own it. You know
the password. If you had only set up an
SSH server on it, you would now be able to
log in and collect additional information
about the current user.
Interesting things can happen when intelligent
devices find themselves stolen...
http://www.evanwashere.com/StolenSidekick/
--Michael Dillon
More information about the NANOG
mailing list