Скачать Бесплатно Игры Для Xbox360 - Статьи
Spying on a stolen laptop CNET News Imagine your laptop gets stolen. He looked at porn and made pirate copies of DVDs, including "Harry Potter and the Half-Blood Prince." Every time the laptop went online, typically on weekend nights and never on Tuesday, Fleener and others got paged. Benjamin Lavalley, a senior engineer at Kaseya, figured out that by looking at the nearby Wi-Fi access points and doing an online map search, they could try to find out the exact location of the laptop. The list of Wi-Fi access points indicated that an AT&T store, a Burger King, and a Cubbies restaurant were all nearby. Within a short time, he learned the name, address, and other sensitive information about the man using the laptop. Lavalley searched Google Earth for a location with those merchants in close proximity and narrowed the location down to a spot about 20 miles away from where the laptop was stolen. Someone broke into the car of an employee working for an InertLogic customer and stole the laptop, which had work and personal information on it. Months went by before anyone realized that technology InertLogic uses to help manage equipment remotely was sitting on the laptop and could be flipped on to monitor it. Wouldn't it be great to remotely spy on the machine and get it back? Clair Fleener, chief executive of IT outsourcer InertLogic , got that chance after a laptop belonging to a customer was stolen. Fleener was instrumental in the investigation that led to the recovery of the laptop, monitoring the activities of the laptop user for two weeks using remote software and sharing the information with law enforcement in Omaha, Neb. The story starts back in mid-May, right around Mother's Day, Fleener recounted this week. The technology, from Kaseya , captures screenshots from remote machines and can be used to install keyloggers, as well as record audio and images from a Webcam. Fleener relied only on the screenshots that were taken captured every 5 or 10 seconds to see what the user of the laptop was up to. He used Google to search for auto parts and did queries on how to remove security tags from merchandise. (Fleener is careful not to accuse the individual of being the thief because there is no proof of that.) The man visited Facebook, MySpace, and other social networks, according to Fleener. A drive-by confirmed it--the laptop appeared to be in an automotive shop and gas station where the man using it happened to work.
|