Recovering a Lost or Stolen Gadget 94
gurps_npc writes "The explosion of portable electronic devices, can really weigh you down. Carrying a pager, phone, iPod, camera, and game is quite a lot. Worse, it gives you many more such things to misplace or get stolen.
This CNN story discusses some of the retrieval services that help you keep what belongs to you. I particularly like the first one, about a new Singapore-based software that when you download it to your phone, messages everyone in your phone's database whenever a new chip with a new phone number is installed in the phone. This makes it very hard for someone to steal your phone as all your friends get their new phone number."
So... (Score:3, Interesting)
Re: (Score:2)
However, not all people store contacts to the SIM card. I know I've always stored contacts on the phone itself, mostly so I can assign home/work/cell icons to classify people AND use the phone's speed dial w/o needing to press 4 digits. Pressing #1 is a lot easier than #6122. A
Re: (Score:2)
I'd like a means to deactivate the device (Score:5, Interesting)
Re:I'd like a means to deactivate the device (Score:5, Funny)
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2, Informative)
Re: (Score:2)
1. The IMEI can be changed with the right software.
2. Many (most?) stolen phones are immediately sent to third world countries, and it's not in the interest of the local operators to disable them - their business plan rests on the availability of cheap (stolen) phones.
Re: (Score:2)
Plus, there's always that famous case in which the judge filed in favor of the burglar who'd hurt himself while robbing a house. Do you really want that?
Either don't do it at all or do the job correctly and put the thieves out of their misery. (yes, it's a joke)
Re: (Score:2)
Well, apparently you thought I was being serious about putting bombs in cell phones to begin with, so I guess I can take your post seriously too if I want, so there.
Re: (Score:2)
I'm sure you'd have gotten the humor, disclaimer or not. But in this age, I prefer to make myself extremely clear that I'm joking and not in fact advocating murder. You never know which dumbass is going to trawl google or
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Bluetooth (Score:4, Interesting)
Remote disable software...for Treos (Score:2)
I run a commercial add-on program for the Treo called Butler (http://www.hobbyistsoftware.com/butler-more.php). It performs a wide array of tasks including one special one - lock the phone and destroy the phone's data.
How it works - I can send one of four different SMS messages to the phone containing a preselected (by me) password and an instruction, directing the phone to perform one of the following actions:
- Lock & Turn off
- Wipe Ram , lock and turn off
- Wipe S
Re: (Score:2)
Software solutions won't do it (Score:4, Insightful)
Re:Software solutions won't do it (Score:4, Insightful)
Eh no (Score:5, Insightful)
Re: (Score:2)
Re:Eh no (Score:4, Funny)
Dumb thieves (Score:2)
XIx.
Re: (Score:2, Insightful)
I consider myself lucky i
Re:Software solutions won't do it (Score:4, Interesting)
A "respectable thief" would boot with a Live CD to collect my personal information before formatting the drive, but a typical thief would more likely just boot it up.
Like I say, I keep my laptop close, and lock it up when I can't, but I feel a bit more secure knowing my laptop phones home.
Re: (Score:2)
Re: (Score:3, Informative)
Too secure? (Score:2)
Take into account the fact that a dumb person can't override the power-on password, it means that they'll probably pass the computer to someone who has the skills to remove/reset it, and the brains to understand that the safest thing to do is to wipe the system. I have never seen a person who connects a computer to the internet, this being the first
Re: (Score:2)
Agreed. Most thieves are lazy, opportunistic, and not particularly bright. If you completely lock down your laptop to keep anyone from using it, then your data will be safe, but you'll never get the laptop back. The thief will be forced to sell it to someone
Re: (Score:2)
In college, there were a couple of idiots that got busted for stealing lab computers, because they were dumb enough hooked up the computers up to the LAN in their dorm room. Since the school tracks access to the network through MAC addresses, and knows the physical location of each port in the dorms, they busted the theives within minutes of them hooking up the computers. You ca
Re: (Score:2)
Re: (Score:2)
If you build your own ROMs for your phone you can install some interesting software that persists. For example, you can install a text-sending application on MS phones that will send the SIM details to a predefined number whenever it changes from a pre-approved sim number. As this is in the base ROM it survives a hard-reset. Sure, you could reflash it, but unless the thief knows the platform well and has software development experience then that isn't going to hap
Re: (Score:1)
This would mean that if your phone is lost, it can not be used without you knowing
The only flaw in the system is that if the thief dismantles the phone and sells the parts for spares/r
StuffBak (Score:3, Informative)
Re: (Score:1)
Re: (Score:2)
Ooops (Score:5, Funny)
Ack.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
I have a great solution that works perfectly. (Score:3, Interesting)
If someone steals my PDA, they wont get the data as it's safe, and I get a brand new PDA. works great.
I just wish the security in PDA's were decent so that after 3 attempts it locks the PDA and will not unlock until it is resynched in the cradle of the mated PC. Palm and Windows pocket devices can be reset and sold. Phones are 100% useless on the black market (you do report and have your esn blacklisted with your cellphone company right?) PDA's should have the same kind of protection available.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
If one of those isn't true, you'd be better off skipping the insurance, and just replacing the stuff yourself, occasionally.
A much simpler solution... (Score:2)
I'm sorry but.... (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
1. Boring. Check!
2. Unsexy. Check!
3. Technophile. BZZT!! You lose. Now go back to Digg!
Car alarm for your MacBook (Score:4, Interesting)
iAlertU is definitely the coolest way to keep your MacBook (Pro) from being stolen. You can turn it on with your remote control like you do with your car keys. It even features the familiar car locking and unlocking sound. When someone grabs your notebook the fall sensor normally used to shut down your hard disk when a fall is detected activates, the screen starts flashing and an alarm siren goes off. It even snaps a photo of the thief with the built-in iSight webcam and emails it to a predefined address.
Be sure to check out the YouTube video of the software in action [youtube.com]. It really made me laugh just because of the sounds. Can't wait to try that out in my university library :-)
Re: (Score:2)
Sorry.
Re: (Score:2)
For someone worried about a someone grabbing their laptop when they are getting a refill on their coffee, the motion sensor alarm should work pret
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
flawed thinking (Score:3, Interesting)
I believe most theives steal goods to sell them on, rather than to use them themselves.
In that case, so long as they can get ca$h for your goodies, they won't care who has the number after they've flogged it off. It's not as if they will offer a guarantee, or after-sales service.
The only real solutions are to prevent items being stolen, or to make it blindingly obvious to a potential buyer that the item is non-functional
Oh well (Score:1)
I think FlexiSPY [flexispy.com] is a whole lot cooler, though.
This is a stickup ! (Score:5, Funny)
Are thieves really that stupid? (Score:1)
Re: (Score:2)
Interesting idea indeed (Score:2, Funny)
Some good still out there... (Score:2)
Then again, it's good to always assume your mobile device will be lost and treat the data on it as publicly accessible - always.
*Encrypt the files with sensitive info.
*Enable password protection - using a real password, not a nancy-boy pin number.
*Keep cellphone service numbers on a card in your wallet so you can ca
Simpler solution (Score:2)
When I do carry expensive gadgetry about (usually only when geocaching) I do as I was taught as a kid - the gadget is either in use, or it's where it belongs. (I.E. in the appropriate belt pouch with the closure fastened.) I never lay stuff down for 'just a moment'.
Doesn't always work (Score:2)
* 02 March 1991
* BARRY FOX
* Magazine issue 1758
The British police could catch many more car thieves than they do now by using the cellular phone networks to trace cellphones installed in stolen cars. But the police rarely take advantage of this and most officers seem unaware that the facility even exists - even though more than a million people in Britain now have cellular p
Re: (Score:1)
...This problem was highlighted recently when the novelist Margaret Drabble had her car stolen from outside her home in Hampstead, North London. Her husband, historian Michael Holroyd, tried phoning the mobile phone in the car. A man answered, and said to Holroyd: 'I'm the thief who has stolen your car. Piss off!'...
Well! He should have said, "I saw your ad in the paper; is your car still for sale?" Most thieves are too greedy to resist that.
My wife... will never recover from her stolen... (Score:1)
God may revenge her pain!
Apple did the work for me (Score:2)
Re: (Score:2, Funny)
Security vs. physics 101 (Score:1)
I particularly like the first one, about a new Singapore-based software that when you download it to your phone, messages everyone in your phone's database whenever a new chip with a new phone number is installed in the phone. This makes it very hard for someone to steal your phone as all your friends get their new phone number."
It might appear hard to get around this security feature, but it is quite easy if the thief knows just a bit about phones and/or physics. Here is the two most obvious ones, besides removing the software while the phone is still turned on.
- Use a SIM test card, that will at most allow the phone to dial an emergency service, but still allowing full access to the phone and the removal of the software.
- Stuff the phone into a Faraday cage (an antistatic bag is enough for this) and then remove the security soft
Re: (Score:1)
What about REALLY lost stuff? (Score:1)
Alternatively, we could just wait until Google is so all-knowing that we could just type "my keys" into it, a
Darwin.....? (Score:1)
There is a gadget for everything a person could possibly need, except one to take a shit for them.
I don't have a cell phone, don't have in-dash navigation, GPS, digital camera, digital video camera, webcam, a PDA, a PSP/Nintendo DS, an IPod/MP3 player, portable DVD player, push-free vaccuum, hands-free telephone, etc., yet I can still function just as well as anybody else, if not better,
Re: (Score:2)
What about the iPoo?
There's a cell phone in Okinawa (Score:1)