View Single Post
Old 09-25-2007, 02:27 PM   #5
Flint
Snowflake
 
Join Date: Mar 2006
Location: Dystopia
Posts: 13,136
Apparently, someone has already thought to provide something like this, as an anti-theft measure:

Quote:

Transmission of network information

Undercover transmits network information of the stolen Mac. This information includes both internal and external IP addresses and the router address, enabling our recovery center to accurately trace the Mac's physical location, in collaboration with the ISP and the police.


See what happens on your stolen Mac

Undercover is the world's first theft-recovery software that will send screenshots of your stolen Mac at regular intervals. These screenshots will sooner or later reveal the thief's identity (e.g. when chatting, reading and writing emails,...) making it much easier to work with law enforcement in order to recover your Mac.


See who's using your Mac
Undercover introduces another world first: if your Mac has a built-in or external iSight, Undercover will transmit pictures of the thief and his surroundings every 6 minutes, making it even easier to identify the current user. It's like having a private detective working for you.
__________________
******************
There's a level of facility that everyone needs to accomplish, and from there
it's a matter of deciding for yourself how important ultra-facility is to your
expression. ... I found, like Joseph Campbell said, if you just follow whatever
gives you a little joy or excitement or awe, then you're on the right track.

. . . . . . . . . . . . . . . . . . . . . . . . . . Terry Bozzio
Flint is offline   Reply With Quote