Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Tracing network procedure for stolen computers

  • From: Michael.Dillon
  • Date: Tue Jun 13 05:31:40 2006

> Earlier this month my daughters Ibook was stolen, oh well that is life I
> guess.
> Anyway updated mail server software for full debug and IP log since 
noticed
> that mail account was accessed yesterday.

It's a UNIX machine. You own it. You know
the password. If you had only set up an 
SSH server on it, you would now be able to
log in and collect additional information
about the current user.

Interesting things can happen when intelligent
devices find themselves stolen...
http://www.evanwashere.com/StolenSidekick/

--Michael Dillon





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.