Click here to Skip to main content
13,053,994 members (70,834 online)
Rate this:
Please Sign up or sign in to vote.
See more:
How to lock the stolen laptop if its IP address is traced ?or How to Encrypt or remote wipe the private data on stolen laptop ?I want to develop my own application so need ideas ....
I know about some cleaning agents like absolute and prey.
Posted 19-Feb-13 17:49pm

1 solution

Rate this: bad
Please Sign up or sign in to vote.

Solution 1

In general, a computer does not accept request from outside. but if you already have installed a server, which is there and will do harm(!!!!!!) as you suggested then it might. Otherwise, no option.
You are technically right, but...
Are you serious? You think that the people stole the computer and are going to plug it in Internet, having no password to it (it could be broken though, by loading from other media, but why?) and will wait until the owner wipes the context remotely? A bit naive, I would say...
Mohibur Rashid 20-Feb-13 2:28am
I didn't go thorough all the detail. The truth is when someone ask a question like this, it tells a lot about the knowledge of the user of how computer works. the thief can simply can re-install the os(with expert help or being expert by himself). there is lots of tools that will help you to retrieve password.
Sergey Alexandrovich Kryukov 20-Feb-13 11:38am
Exactly. That's my point: due to all that, OP's hope to do something with the stolen computer via Internet looks quite naive. Even if the computer is equipped with some "anti-theft" service...
Member 8620759 20-Feb-13 3:39am
How to lock the stolen laptop if its IP address is traced ?or How to Encrypt or remote wipe the private data on stolen laptop ?
and is connected to internet.....
Mohibur Rashid 20-Feb-13 4:55am
Sorry buddy, it may not be possible.
Sergey Alexandrovich Kryukov 20-Feb-13 11:40am
Agree. My question is: is the computer already stolen, or you just want to prepare for it?
If it is stolen, it has nothing to reveal its identity...
enhzflep 20-Feb-13 5:02am
By (1) installing software _before_ it is stolen that will respond to commands sent to it, that wipe/encrypt and (2) having it stolen by a fool that connects to the web without first nuking the data. You need both. The software that responds to (1) is reasonably trivial.

See here: Defcon 18 Pwned By the owner - What happens when you steal a hackers computer
Mohibur Rashid 20-Feb-13 5:06am
well, this reply should go to the OP, he is not getting :)
Mohibur Rashid 20-Feb-13 5:06am
my bad, it went
enhzflep 20-Feb-13 5:15am
Yeah, I know. No harm done. :) If you've got 22 mins, the video is hilarious.
Mohibur Rashid 20-Feb-13 8:55am
it is hilarious :)))))
Sergey Alexandrovich Kryukov 20-Feb-13 11:53am
By the way, thank you for sharing this link, I'll take a look, too...
enhzflep 20-Feb-13 12:07pm
You're most welcome.
It was so funny and left such an impression, I only hoped I could share the giggle with other like-minded individuals.
Sergey Alexandrovich Kryukov 20-Feb-13 14:09pm
Yes, that's funny, perhaps not or one who actually got a computer stolen. :-(
Sergey Alexandrovich Kryukov 20-Feb-13 11:41am
Sure, but in practice it's hard to hope that the theft would expose the stolen computer to Internet and wait until it is detected or content is altered...
enhzflep 20-Feb-13 11:45am
Please view the Defcon video I linked to in an earlier comment. Anything that can happen, will happen, as that funny fellow Aussie showed.. Thieves aren't typically known for their technical nous..

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

  Print Answers RSS
Top Experts
Last 24hrsThis month

Advertise | Privacy | Mobile
Web02 | 2.8.170713.1 | Last Updated 20 Feb 2013
Copyright © CodeProject, 1999-2017
All Rights Reserved. Terms of Service
Layout: fixed | fluid

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100