Computrace LoJack for Laptops
I have dual boot OS, windows XP and Ubuntu. I really like Ubuntu, but once my fried computer stolen. This got me thinking regarding this, and I acquired Computrace LoJack for Laptops. Little thing I know that the software would stop me from contain my Ubuntu partition installed, and so in the interest of safety I was obligatory to discontinue utilizing Linux. So here I require some help what to do. Please if anyone knows anything about this, and then please reply.
Re: Computrace LoJack for Laptops
Just tell me one thing, what does LoJack act accurately? Does it rely on networking? Or do you contain a few kind of GPS transmitter in your laptop? I have seen scripts where people have made this for gratis. Mind you, you would have to have a server at home or a server someplace to send files to, but you could contain a script which sftps/http/ftp and so on a file recording the place (IP) of your laptop each time it is hooked online. On the other hand this may not effort if the attacker is annoying to connect to a wireless network.
Re: Computrace LoJack for Laptops
I comprise a Dell D830 that contains Computrace in the BIOS. On their site they advertize it as being unrelenting, even while the Operating system is reinstalled. I think that this sounds too easy; they must presume that everybody is utilizing Windows. Now, you can as well set a password on SATA drives which makes them unfeasible to access devoid of it, even if they place it into one more machine. Does this assist you convalesce a laptop? Not except they only get unhappy and turn it in to the nearest station.
Re: Computrace LoJack for Laptops
I would be contented to write a request which Computrace maintain Ubuntu. Our organization has an agreement with them for the Data removal service on a few of our additional well-traveled laptops. Recovery is just supported in some countries, but Data removal extends universal. If the PC is compromise, an official Data removal administrator in our organization logs in to the Computrace site, and with the extra substantiation of an RSA token, starts a Data remove request. The subsequent time the PC attach to the Internet and "calls home", it gets the command to start removing files to the extent demanded up to killing the entire operating system.