• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Mac theft 'protection'"

Collapse

  • Pondlife
    replied
    Done

    create a plist file to run this script from start up using lingon.
    if it's not you sat in front of the screen it takes a piccy, a screenshot and if connected to tinternet, your IP, then ftps to a server. it then checks if dropbox is running and if not, starts it.

    It mutes the volume when screen grabbing so you can't here the click - although the green light does come on briefly.

    Happy if someone who knows what they are doing picks holes in it as this is more n exercise in technical than anything else. For some reason Dropbox doesn't seem to sync when started this way.

    Code:
    #!/bin/bash
    myuser="pondy"
    mydir=/Users/$myuser/Dropbox/stolen
    myarc=/Users/$myuser/Documents/archive
    mydate=$(date +"%d-%b-%y-%H-%M")
    
    #  Find out console User
    localuser=`who | grep console`
    consoleusr=${localuser%% *}
    
    if [[ -n $consoleusr ]]
     then
     echo $consoleusr-is-here
     	if [[ $consoleusr != $myuser ]]
     	 then
    	 echo "User not $myuser"
    	 
     	 # Mute, take snapshot and screengrap then put vol back
     	 curvol=`osascript -e "output volume of (get volume settings)"`
     	 osascript -e "set volume output volume 0"
      	 /Users/$myuser/Dropbox/Imagesnap/imagesnap $mydir/$mydate.img.jpg
      	 Screencapture -S $mydir/$mydate.scrn.jpg
    	 osascript -e "set volume output volume $curvol"
    	
     	 # Check for WAN connection
     	 myip=`curl -s 'http://checkip.dyndns.org' | sed 's/.*Current IP Address: \([0-9\.\.]*\).*/\1/g'`
         echo "checking IP"
      		 if [ $myip ]
       		  #  Write external IP add
       		  then echo $myip-at-$mydate-by-$consoleusr+$dropcheck >> $mydir/myip.txt
       		  echo $myip
       		  
       		  #ftp files to home
     		  su $myuser -c "/Users/$myuser/scripts/mysftp.sh $mydir"
                      mv $mydir/*.jpg $myarc/
              
       		  # Check if Dropbox is running
       		  dropcheck=`ps -A | grep Dropbox.app`
       		  grepdropcheck=`echo $dropcheck | grep MacOS` 
    
    		 # Start Dropb box if not running
        		if [[ $grepdropcheck ]]
         		 then 
         		 echo "Dropbox is running"
         		else
         		 echo "No dropbox found... Starting Dropbox..."
         		 su $myuser -c "/Applications/Dropbox.app/Contents/MacOS/Dropbox &"
        		fi
       
       		else 
       		 echo "no ip"
        	 echo NoIP-at-$mydate-by+$consoleusr >> $mydir/myip.txt
      		fi
     	fi
    
    else
      echo "Noone at console"
    fi

    Leave a comment:


  • DaveB
    replied
    If it's a desk top I'm told this works quite well.

    PC Security | phildowd.com

    Leave a comment:


  • SimonMac
    replied
    This Guy Has My MeerKat

    Leave a comment:


  • davetza
    replied
    This is pretty good and is free for up to 3 devices

    Open source anti-theft solution for Mac, PCs & Phones – Prey

    Leave a comment:


  • Pondlife
    replied
    Little update (not that anyone cares )

    Seems most of what hidden does can be done manually for free using the following;
    Code:
    MYIP=`curl -s 'http://checkip.dyndns.org' | sed 's/.*Current IP Address: \([0-9\.\.]*\).*/\1/g'`
    echo $MYIP
    to get your public IP add

    download a little app called imagesnap to take a camera shot using the command line

    and finally screencapture -S for a full screenshot.

    Now I need to script it for guest logins and whack all the outputs into a dropbox directory

    Simples

    Leave a comment:


  • Pondlife
    replied
    Thanks all.

    Leave a comment:


  • NickFitz
    replied
    Success story for Hidden: This Guy Has My MacBook

    Leave a comment:


  • SimonB
    replied
    Pondlife,

    I run Check Point Full Disc encryption - EAL 4 approved full disc encryption with AES 256. no notable performance degradation or time machine backups. Provides a nice fuzzy feeling that data is safe when Mac book is in transit.

    Full Disk Encryption | Check Point Software

    Regards

    Simon.

    Leave a comment:


  • SimonMac
    replied
    There's a few story's of people using the tracking software, but yet the federales won't do anything about it

    Leave a comment:


  • DaveB
    replied
    Originally posted by stek View Post
    I'm thinking of taking up thievery as a career then!

    Come on, who lives where and what have you got?
    I live in Donacaster and I have a time machine.

    Threaded.

    Leave a comment:


  • stek
    replied
    Originally posted by Pondlife View Post
    WRHS
    I'm thinking of taking up thievery as a career then!

    Come on, who lives where and what have you got?

    Leave a comment:


  • Pondlife
    replied
    Originally posted by stek View Post
    I think the old change/replace a DIMM and Cmd-Opt-P-R and wait for the chimes three times will zap it - could be wrong though, certainly it worked on PPC Macs...
    Originally posted by realityhack View Post
    Stek - it's highly unlikely most opportunistic thieves would have the wherewithall to do that, given the general IT literacy amongst the population. Otherwise, they wouldn't have to be thieves, shirley.

    WRHS

    Leave a comment:


  • stek
    replied
    Originally posted by Pondlife View Post
    Doesn't the firmware passwd sort/stop this?
    I think the old change/replace a DIMM and Cmd-Opt-P-R and wait for the chimes three times will zap it - could be wrong though, certainly it worked on PPC Macs...

    Leave a comment:


  • Pondlife
    replied
    Originally posted by stek View Post
    Nice, but if I was gonna nick a Mac, I'd not boot it off it's hard disk - I'd boot DVD and blat the hard drive and not connect to the outside world until I was sure. But - if it's logged as stolen somewhere the serial number is always there to implicate you.

    Quick Google however shows you can change the serial!

    Right - who's got a Mac and when are you out/on holiday? Oh, and where do you live....
    Doesn't the firmware passwd sort/stop this?

    Leave a comment:


  • realityhack
    replied
    Stek - it's highly unlikely most opportunistic thieves would have the wherewithall to do that, given the general IT literacy amongst the population. Otherwise, they wouldn't have to be thieves, shirley.

    Leave a comment:

Working...
X