From owner-freebsd-questions@FreeBSD.ORG Wed Sep 26 17:20:50 2007 Return-Path: Delivered-To: questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4A70C16A421 for ; Wed, 26 Sep 2007 17:20:50 +0000 (UTC) (envelope-from pauls@utdallas.edu) Received: from smtp3.utdallas.edu (smtp3.utdallas.edu [129.110.10.49]) by mx1.freebsd.org (Postfix) with ESMTP id 3F85E13C48D for ; Wed, 26 Sep 2007 17:20:49 +0000 (UTC) (envelope-from pauls@utdallas.edu) Received: from utd59514.utdallas.edu (utd59514.utdallas.edu [129.110.3.28]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp3.utdallas.edu (Postfix) with ESMTP id CD43765504 for ; Wed, 26 Sep 2007 12:00:50 -0500 (CDT) Date: Wed, 26 Sep 2007 12:00:50 -0500 From: Paul Schmehl To: questions@freebsd.org Message-ID: <35B933029536D67867457E06@utd59514.utdallas.edu> In-Reply-To: <20070926163415.GB43362@gizmo.acns.msu.edu> References: <20070924223330.GA33787@gizmo.acns.msu.edu> <20070925161256.GA84763@slackbox.xs4all.nl> <20070926163415.GB43362@gizmo.acns.msu.edu> X-Mailer: Mulberry/4.0.6 (Linux/x86) MIME-Version: 1.0 Content-Type: multipart/signed; micalg=sha1; protocol="application/pkcs7-signature"; boundary="==========385B5701A3E93193720D==========" X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: Re: Software Lojack X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Sep 2007 17:20:50 -0000 --==========385B5701A3E93193720D========== Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: quoted-printable Content-Disposition: inline --On Wednesday, September 26, 2007 12:34:15 -0400 Jerry McAllister=20 wrote: > On Tue, Sep 25, 2007 at 06:12:56PM +0200, Roland Smith wrote: > > > I know all about various precautions to be taken. > > I also know I could write something. I just wanted > to know if something like that is already written. > Dell offers this in a hardware solution. I'm sure they're buying it from=20 someone, so you might be able to find out who. Doesn't matter if the=20 thieves wipe the drive. The device phones home anyway. (Bet it only works = in Windows, though, but it might spark an idea or two.) --=20 Paul Schmehl (pauls@utdallas.edu) Senior Information Security Analyst The University of Texas at Dallas http://www.utdallas.edu/ir/security/ --==========385B5701A3E93193720D==========--