Re: Stolen laptop
On Sun, Jun 22, 2003 at 08:22:43PM -0400, Joseph Barillari wrote:
>>>>>> "SM" == Steve McIntyre <email@example.com> writes:
> SM> I've been using the following for a while, which does just
> SM> what you suggested. Run it out of /etc/ppp/ip-up.d and
> SM> /etc/cron.daily and redirect the output to mail. This approach
> SM> does need mail to work, which is another problem entirely. If
> SM> you're on a foreign network or whatever, then mail may be
> SM> awkward. I've set up the mail system on my laptop to batch
> SM> things and send via home over ssh when available, which
> SM> probably has a good chance of working in most places.
>Does it require the thief to know how to bring up a PPP connection? I
>would assume that most of the time, the laptop might be booted once
>--- to see if it worked --- and then the hard disk would probably be
>wiped, to make it harder to trace.
Good point, yes. Any suggestions on how to improve it?
Steve McIntyre, Cambridge, UK. firstname.lastname@example.org
"It's actually quite entertaining to watch ag129 prop his foot up on
the desk so he can get a better aim." [ seen in ucam.chat ]