Copyright ©1997-2011 Glenn Fleishman except as noted otherwise. All rights reserved. For permission to reprint, contact Glenn Fleishman at glenn at glennf.com. Photo © 2008 Laurence Chen; used with permission.
Turning technology from mumbo-jumbo into rich tasty gumbo
A friend gave me a suggestion on how to combine all the various RSS feeds for everything I do into one monstrous MegaGlenn feed. Here it is. This is a combo of this blog, Wi-Fi Networking News, TidBITS, Ars Technica, and Macworld.
Here’s the Yahoo! Pipes embedded scrolling list for your enjoyment.
Posted by Glennf at 12:31 PM
I produce some bon mots about empty Seattle P-I newspaper boxes since the end of the print edition.
I’m actually quite saddened to see the empty boxes. The P-I was a great paper with a unique voice. It persists online but with so many fewer staffers that it can never be quite what it was. I hope it thrives online. We need a new model.
Posted by Glennf at 10:06 AM
A couple of brazen laptops thefts in Seattle prompt this post. If your laptop is stolen, it will likely never be recovered unless you have already installed software that “phones home” when it’s reported missing.
Laptop recovery software is designed to be active constantly in the background, and not be removable by a thief unless he or she entirely erases the laptop and does so quickly. (It’s called laptop recovery, but you can install it on desktop machines for the same purpose.)
The best time to install this software is right now! Right this instant! The second best time is one minute before your computer is stolen. The worst time to think about installing? Right after your laptop is snatched.
This kind of software scans regularly for a network connection, and sends a very small amount of data to a central server operated by the recovery software maker. If your laptop is stolen or goes missing, you go to the software maker’s Web site, and enter a special code the firm gives you when you register the software that’s unique to the laptop.
The next time your laptop checks in, which could be when a thief powers up the computer to see what’s on it and connects intentionally or accidentally to a Wi-Fi network, a recovery mode is activated.
Regardless of the software, the recovery mode starts sending information about the current state of the computer to either the software maker’s server (that’s typical) or to a site or email you specify.
Some software will start snapping pictures (without any audible sound) if there’s a built-in camera, such as on Apple’s series of laptops. Most will send network information. A few packages now use Wi-Fi networks to create a rough position using a national location database that’s also used by Apple and other companies for phone positioning (to augment GPS when GPS is available).
Depending on the company, you might be provided with this information and need to take it to authorities, or the company will call your local law enforcement for you and make arrangements to transfer the data.
Many companies advertise a 90 to 99 percent recovery rate for laptops or desktop computers with their software installed in cases where a user has marked it as stolen. This is less unlikely than it may seem because of how easy it is for a computer to join a Wi-Fi network and how rapidly the software can send enough identifying information—such a picture of the thief!
Authorities apparently pay close attention to these reports from laptop-recovery software firms, because if they find one laptop, they may find a dozen or 100.
Some software requires an annual subscription fee that includes the software and monitoring. Others charge just a one-time fee, but you have to pay for upgrades in the future if you want newer features.
Some prominent software includes (one-year price shown, multi-year discounts typically available):
Computrace LoJack for Laptops ($40 or $60 per year). This software works as a black box, communicating directly with Computrace’s monitoring center. Many Windows computers (see list) have an extra capability that the $60 version can activate: The software is partly stored in the BIOS, a part of a computer that can’t be removed just by a thief erasing a hard drive. The $60 version can also let you remotely erase your hard drive to protect data, and comes with a limited $1,000 recovery guarantee. The $40 version is available for Mac OS X or Windows.
GadgetTrak believes only you should get tracking data; this allows them to avoid having central storage systems for your data (it believes this could jeopardize your privacy), although the firm does work with law enforcement. The company offers several different packages for Windows and Mac OS X. Its Mac software, MacTrak ($25 per year), uses Wi-Fi positioning to provide a good location in a city or town, and sends email and uploads photos snapped via the built-in camera to a Flickr photo-sharing account (you can set up a basic account at no cost). Windows Standard Edition ($30) sends basic network infomration, while Search & Destroy ($65) can remotely destroy data on the laptop, too.
Undercover 3 from Orbicule is what I use myself ($49 one-time fee). It’s a Mac OS X only package that takes pictures of the active screen, snaps photos through the built-in camera, and uses Wi-Fi positioning data to obtain a location. The software also has a neat option that if the computer isn’t recovered within a period of time after it’s marked as stolen, it activates a mode that simulates slow screen failure. If the computer is then brought into a known repair location, like an Apple Store, a speech program is used to scream out that the computer is stolen and display a recover message on its screen.
There are other options available, too; ask for recommendations from friends or computer-store staff if none of the above meets your needs.
October 2011 | August 2011 | June 2011 | May 2011 | February 2011 | December 2010 | November 2010 | October 2010 | September 2010 | August 2010 | July 2010 | June 2010 | May 2010 | April 2010 | January 2010 | December 2009 | November 2009 | October 2009 | September 2009 | August 2009 | July 2009 | May 2009 | April 2009 | March 2009 | February 2009 | January 2009 | December 2008 | November 2008 | October 2008 | September 2008 | August 2008 | July 2008 | June 2008 | May 2008 | April 2008 | March 2008 | February 2008 | January 2008 | December 2007 | November 2007 | October 2007 | September 2007 | August 2007 | July 2007 | June 2007 | May 2007 | April 2007 | March 2007 | February 2007 | January 2007 | December 2006 | November 2006 | October 2006 | September 2006 | August 2006 | July 2006 | June 2006 | May 2006 | April 2006 | March 2006 | February 2006 | January 2006 | December 2005 | November 2005 | October 2005 | September 2005 | August 2005 | July 2005 | June 2005 | May 2005 | April 2005 | March 2005 | February 2005 | January 2005 | December 2004 | November 2004 | October 2004 | September 2004 | August 2004 | July 2004 | June 2004 | May 2004 | April 2004 | March 2004 | February 2004 | January 2004 | December 2003 | November 2003 | October 2003 | September 2003 | August 2003 | July 2003 | June 2003 | May 2003 | April 2003 | March 2003 | February 2003 | January 2003 | December 2002 | November 2002 | October 2002 | September 2002 | August 2002 | July 2002 | June 2002 | May 2002 | April 2002 | March 2002 | February 2002 | January 2002 | December 2001 | November 2001 | October 2001 |