Maker Pro
Maker Pro

Stolen ipods, laptops etc.

W

Will

Jan 1, 1970
0
Boston Police homepage
http://www.cityofboston.gov/police/

Database
http://www.juststolen.net/index.htm

PCWORLD article
http://blogs.pcworld.com/tipsandtweaks/archives/003279.html


Imagine this: On a dreary Monday morning you board the train into work
with your laptop for the start of yet another long work week. As the
train pulls into your station you sleepily stand up and dash out the
door for the platform along with dozens of other commuters. But wait!
You're missing something. You forgot your laptop on the train! You
rush back inside the train before the doors close and look frantically
under your seat. But your briefcase with your laptop is nowhere to be
found!

This situation is more prevalent than you may think. In 2003 there were
more than 600,000 laptops stolen (Safeware Insurance, 2003 report).
That's more than 1,640 laptops stolen every single day.And to
compound the problem, even if the police were to find the thief and
recover your laptop, they have almost no idea who owns it or how to get
it back to you! Why? Because you never wrote down the serial numbers
and the paperwork accompanying it is long gone. You filed a police
report, but with no serial number to report, your laptop could be
stored away in some police evidence room with thousands of others just
like it across the state or across the country, never to be returned to
you again.

That's where JustStolen.net comes in. Our website was established by
Police Officers to assist consumers, college students and business
owners retrieve lost or stolen valuables. The website is a powerful
database that members can use to register their personal property. Any
descriptive information can be entered into the database including
make, model, color, serial number and any thing else you can think of.
You can even upload photographs of your items.

But along with the other great advantages of being a member, there are
two fantastic features about JustStolen.net:
· Once your items are registered, if they are ever stolen or lost you
have all the information you need to give to police. Your descriptive
information about the item has been stored in our secure database.
· But here is the best part: When your item is recovered by police
across the state or across the globe, they only have to log onto one
simple-to-use website to search for its owner. They just enter the
serial number or description of your laptop, iPod, DVD player or other
valuable, and the item's description and the email address that you
entered when you first registered is there for them to contact you!

Your valuable item won't be sitting in some far away evidence room,
because the police now know who the owner is, and they have an easy way
to get in touch with you. It's as simple as that! Your property is
returned and there's no need to spend hundreds or thousands of
dollars to replace it.

And best of all, JustStolen.net is FREE to use; free for consumers,
college students and business owners, and free for all law enforcement
personnel. There is never any charge to use our service.

What are some of the other benefits of how JustStolen.net gets your
valuables back to you?
· There's no need to spend your hard earned money to replace lost
or stolen valuables
· There's no need to fill out time-consuming insurance claim forms
· No insurance claim means lower premiums
· Your irreplaceable items (data in your laptop, photographs in your
digital camera) have a better chance of being returned to you
· You, the victim of a crime, can now assist the police in a
successful prosecution of the thief
· Police won't waste precious time trying to find the owner of
recovered merchandise, freeing up time for crime fighting
· Your member information can be accessed by you from any
internet-accessible computer across the globe
· Police only have to search one powerful database for owner
information when they recover lost or stolen goods
· No contracts to sign
· No minimum commitment
Sign up today!
 
Will said:
Boston Police homepage
http://www.cityofboston.gov/police/

Database
http://www.juststolen.net/index.htm

PCWORLD article
http://blogs.pcworld.com/tipsandtweaks/archives/003279.html


Imagine this: On a dreary Monday morning you board the train into work
with your laptop for the start of yet another long work week. As the
train pulls into your station you sleepily stand up and dash out the
door for the platform along with dozens of other commuters. But wait!
You're missing something. You forgot your laptop on the train! You
rush back inside the train before the doors close and look frantically
under your seat. But your briefcase with your laptop is nowhere to be
found!

This situation is more prevalent than you may think. In 2003 there were
more than 600,000 laptops stolen (Safeware Insurance, 2003 report).
That's more than 1,640 laptops stolen every single day.And to
compound the problem, even if the police were to find the thief and
recover your laptop, they have almost no idea who owns it or how to get
it back to you! Why? Because you never wrote down the serial numbers
and the paperwork accompanying it is long gone. You filed a police
report, but with no serial number to report, your laptop could be
stored away in some police evidence room with thousands of others just
like it across the state or across the country, never to be returned to
you again.

That's where JustStolen.net comes in. Our website was established by
Police Officers to assist consumers, college students and business
owners retrieve lost or stolen valuables. The website is a powerful
database that members can use to register their personal property. Any
descriptive information can be entered into the database including
make, model, color, serial number and any thing else you can think of.
You can even upload photographs of your items.

But along with the other great advantages of being a member, there are
two fantastic features about JustStolen.net:
· Once your items are registered, if they are ever stolen or lost you
have all the information you need to give to police. Your descriptive
information about the item has been stored in our secure database.
· But here is the best part: When your item is recovered by police
across the state or across the globe, they only have to log onto one
simple-to-use website to search for its owner. They just enter the
serial number or description of your laptop, iPod, DVD player or other
valuable, and the item's description and the email address that you
entered when you first registered is there for them to contact you!

Your valuable item won't be sitting in some far away evidence room,
because the police now know who the owner is, and they have an easy way
to get in touch with you. It's as simple as that! Your property is
returned and there's no need to spend hundreds or thousands of
dollars to replace it.

And best of all, JustStolen.net is FREE to use; free for consumers,
college students and business owners, and free for all law enforcement
personnel. There is never any charge to use our service.

What are some of the other benefits of how JustStolen.net gets your
valuables back to you?
· There's no need to spend your hard earned money to replace lost
or stolen valuables
· There's no need to fill out time-consuming insurance claim forms
· No insurance claim means lower premiums
· Your irreplaceable items (data in your laptop, photographs in your
digital camera) have a better chance of being returned to you
· You, the victim of a crime, can now assist the police in a
successful prosecution of the thief
· Police won't waste precious time trying to find the owner of
recovered merchandise, freeing up time for crime fighting
· Your member information can be accessed by you from any
internet-accessible computer across the globe
· Police only have to search one powerful database for owner
information when they recover lost or stolen goods
· No contracts to sign
· No minimum commitment
Sign up today!

Has anyone ever considered registering test equipment?
It would be nice if someone came up with a lojack for expensive test
equipment.

 
M

MassiveProng

Jan 1, 1970
0
Sign up today!


Goddamned SPAMTard! Spam is illegal in Usenet fuckhead.
So don't clutter our group with your CRAP.

Any idiot that doesn't know how to manage his purchases, or keep
track of them after getting them, learns from their mistakes. Short
of that, they'll always be forgetful. They deserve what they get for
taking things too casually.
 
M

Michael A. Terrell

Jan 1, 1970
0
Frank said:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
M

MassiveProng

Jan 1, 1970
0
It was posted from a Comcast cable modem with a fixed address.

[email protected]


It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.
 
P

Paul E. Schoen

Jan 1, 1970
0
M

Michael A. Terrell

Jan 1, 1970
0
MassiveProng said:
Frank said:
[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.


--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
K

krw

Jan 1, 1970
0
MassiveProng said:
Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.
It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.
 
M

Michael A. Terrell

Jan 1, 1970
0
krw said:
MassiveProng said:
Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.
It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


I didn't want to give away ALL the secrets!


--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
R

Rich Grise

Jan 1, 1970
0
Imagine this: On a dreary Monday morning you board the train into work
with your laptop for the start of yet another long work week. As the train
pulls into your station you sleepily stand up and dash out the door for
the platform along with dozens of other commuters. But wait! You're
missing something. You forgot your laptop on the train! You rush back
inside the train before the doors close and look frantically under your
seat. But your briefcase with your laptop is nowhere to be found!

Congratulations! You've just been Darwinned! ;-)

Cheers!
Rich
 
M

MassiveProng

Jan 1, 1970
0
MassiveProng said:
Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.
It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


Now, if only we could get the ADSL and Cable access providers to
instruct their customers of such practices before, during and after
each install.
 
M

MassiveProng

Jan 1, 1970
0
krw said:
MassiveProng wrote:

Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.
It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


I didn't want to give away ALL the secrets!


It's SOP for those in the know.
 
M

Michael A. Terrell

Jan 1, 1970
0
MassiveProng said:
It's SOP for those in the know.


Most people looking for a free connection don't know anything more
than to click onto an available wireless network to see if they can
connect. It has to be one of my neighbors, I live a half mile from the
nearest main road, and I only have neighbors on two sides with nothing
but miles of trees in the other two directions. There is a free network
a half mile away, on the main highway but I can't pick it up.


--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
K

krw

Jan 1, 1970
0
MassiveProng wrote:

Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.
It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


Now, if only we could get the ADSL and Cable access providers to
instruct their customers of such practices before, during and after
each install.
Too difficult. I set up a friends laptop (Acer) and wireless
network. It took far too long to figure out what they (ComCast)
were doing with that box and I couldn't figure out how to convince
the software how to search for the proper network, so left it open.
When I get time I'll have to go back over and figure out what the
hell the Acer network software is doing. My ThinkPad was a piece
of cake to set up. It just knows where it is and how it's
connected (though the dialer is constantly popping up).
 
M

Michael A. Terrell

Jan 1, 1970
0
krw said:
Too difficult. I set up a friends laptop (Acer) and wireless
network. It took far too long to figure out what they (ComCast)
were doing with that box and I couldn't figure out how to convince
the software how to search for the proper network, so left it open.
When I get time I'll have to go back over and figure out what the
hell the Acer network software is doing. My ThinkPad was a piece
of cake to set up. It just knows where it is and how it's
connected (though the dialer is constantly popping up).


What kind of router? I have tried a lot of different brands and
models lately, and my favorite so far is my Linksys WRT54G. The worst
was a Belkin F5D7230-4. Even the hardwired ports were below 100 Kb/s
data rate, while the cable modem was delivering over 7 MB/s data rate.


--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
M

MassiveProng

Jan 1, 1970
0
MassiveProng wrote:

Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.

It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


Now, if only we could get the ADSL and Cable access providers to
instruct their customers of such practices before, during and after
each install.
Too difficult. I set up a friends laptop (Acer) and wireless
network. It took far too long to figure out what they (ComCast)
were doing with that box and I couldn't figure out how to convince
the software how to search for the proper network, so left it open.
When I get time I'll have to go back over and figure out what the
hell the Acer network software is doing. My ThinkPad was a piece
of cake to set up. It just knows where it is and how it's
connected (though the dialer is constantly popping up).


Boot his laptop with a recent Knoppix Live CD (or DVD), and I'd bet
that it brings up the wireless connection dialogs right after it
enters the desktop
gui.
 
M

MassiveProng

Jan 1, 1970
0
What kind of router? I have tried a lot of different brands and
models lately, and my favorite so far is my Linksys WRT54G.

You can actually run Linux on that (it already does), and set its RF
Power higher, among other things.

There was an article on it in one of the Linux mags about four years
(3.5?) ago when it was at the end of it MFG run and Cisco had just
bought them. Great router.
 
K

krw

Jan 1, 1970
0
What kind of router? I have tried a lot of different brands and
models lately, and my favorite so far is my Linksys WRT54G. The worst
was a Belkin F5D7230-4. Even the hardwired ports were below 100 Kb/s
data rate, while the cable modem was delivering over 7 MB/s data rate.
The Linksys. I bought him one identical to mine so I didn't have
to learn anything. ;-)
 
Top