Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Ask Slashdot: Good Tracking Solutions For Linux Laptop? 253

First time accepted submitter WillHPower writes "So I have ordered a new Ubuntu-powered laptop. I spent some extra bucks on lots of RAM and a good sized solid state drive. After putting money into it, I'd like to find a way to track this laptop in case it's ever stolen. Are there any good tracking software/services the run on Linux laptops? Also, are there any other techniques besides tracking for dealing with a lost or stolen laptop that I should consider?"
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Good Tracking Solutions For Linux Laptop?

Comments Filter:
  • No (Score:5, Insightful)

    by Anonymous Coward on Monday July 08, 2013 @10:13AM (#44216021)

    No, there's no good Linux HW tracking software. Why? Cause there's no good software for other platforms either. It's all "make-you-feel-good-software" which doesn't survive a simple OS reinstallation...

    • Re:No (Score:4, Informative)

      by fuzzyfuzzyfungus ( 1223518 ) on Monday July 08, 2013 @10:21AM (#44216097) Journal

      No, there's no good Linux HW tracking software. Why? Cause there's no good software for other platforms either. It's all "make-you-feel-good-software" which doesn't survive a simple OS reinstallation...

      It doesn't exactly give you the warm-and-fuzzies to know that this is possible; but some models have it baked right into the firmware. A suitably provisioned AMT 6+ device can do entertaining things like phone home and provide 'home' with an IP KVM, regardless of OS state.

      • Can you point out a free OR open-source implementation of a phone-home BIOS on a laptop? No. No one can, as there ain't one. And a closed-cource security feature is a scam, plain and simple. I'd stay away from laptops that HAVE that feature, even if "deactivated" (how would you know?) by default.
        • Well, I guess it comes down to trust and if you trust the vendor.

        • Re:No (Score:5, Interesting)

          by egamma ( 572162 ) <(egamma) (at) (gmail.com)> on Monday July 08, 2013 @11:39AM (#44216819)

          Can you point out a free OR open-source implementation of a phone-home BIOS on a laptop? No. No one can, as there ain't one. And a closed-cource security feature is a scam, plain and simple. I'd stay away from laptops that HAVE that feature, even if "deactivated" (how would you know?) by default.

          WillHPower did not make FOSS a requirement; why are you making it a requirement? Can you explain why a closed-source security feature must by a scam?

          WillHPower wants to get his laptop back if it is stolen. He's not asking for ideological purity. He knows that if his laptop has a tracking device that the tracking data could be used by law enforcement against him. That's what tracking software does; it tracks. That is not a bug, that's a feature, and is actually the feature he wants to have. Apparently he doesn't wear tinfoil; he's not required to. It is his right as a thinking person to choose to be paranoid, or not be paranoid.

          The best solution is some form of hardware lo-jack. Maybe a GPS transmitter that can fit in one of the external ports on his laptop, if that isn't built in already.

        • by tibit ( 1762298 )

          I'm pretty sure it could be done using coreboot [coreboot.org] (formerly linuxbios). I don't think the code for it is written yet, of course, so yeah, there ain't one - yet.

        • Did you see the part where I mentioned it not exactly giving you the warm and fuzzies? There are basically no FOSS x86s BIOSes at all(yeah, coreboot runs on a few things, most of them old and few/none of them laptops, or you could get an OLPC from before their switch to ARM; but that's about it). As it happens, the 'AMT' stuff isn't really part of the BIOS(I'm sure there are points of integration; but they are distinct systems). It's a separate CPU, with its own firmware(never fear, it's cryptographicially

      • PREY (Score:5, Informative)

        by Jeremiah Cornelius ( 137 ) on Monday July 08, 2013 @11:05AM (#44216453) Homepage Journal

        Prey is great. It is more effective than "Find My Mac" and runs on may platforms, including most Linuces. :-) Android, MacOS and iOS - besides teh usual vanilla from Redmond.

        http://preyproject.com/ [preyproject.com]

        From the FAQ:

        Can Prey be removed by a thief?

        Not unless he has your administrative password.

        And what if he formats the computer?

        That's a different story. We encourage you to add a BIOS password and disable booting from removable devices on your PC, so that the thief will be forced to boot into the previous installation and thus, not be able to format your hard disk easily.

        If you have a Mac, there's a firmware password utility on your Tiger/Leopard Mac OS installation DVD (look for it in in Applications/Utilities). On OSX Lion you'll find the utility by booting from the recovery partition.

        • LOL. At first, I misread your post. I thought you said "PRAY is great. It is more effective and runs on most Linuces.". I wouldn't resort to prayer, myself.
          • You never know....

            Prayer should be effective and properly employed when petitioning for a change in ourselves, rather than in material circumstance or disposition. ;-)

        • We encourage you to add a BIOS password and disable booting from removable devices on your PC

          So that the thief must take the disk out of the computer for formating it? It requires a screwdriver, flawless security.

      • How about...try to establish communications with known terrorists using it. Claim you want to start your own cell. Then the NSA will track your laptop for you, for free.

        A simple lawsuit will get them to tell you its location if its lost or stolen.

        • by Zordak ( 123132 )

          How about...try to establish communications with known terrorists using it. Claim you want to start your own cell. Then the NSA will track your laptop for you, for free.

          A simple lawsuit will get them to tell you its location if its lost or stolen.

          You included some unnecessary steps in there. The correct procedure is:

          1. Operate a computer.
          2. NSA tracks the computer.
          3. Computer gets stolen.
          4. File FOIA request to find your stolen laptop.
          5. ???
          6. Don't lose as much money! (Sorry, I don't see any profit, unless you make a business model out of filing FOIA requests for other people to help them locate stolen laptops.)

          Oh, and backup with Carbonite. Unless this is a trivial gaming machine, your data are more valuable than your hardware.

    • Re:No (Score:5, Funny)

      by schnell ( 163007 ) <me@schne[ ]net ['ll.' in gap]> on Monday July 08, 2013 @10:36AM (#44216205) Homepage

      No, there's no good Linux HW tracking software

      Of course there is. You just need to tape a note to the laptop asking the thief to compile and install it after doing a code review to make sure it's trusted, and submitting any code patches necessary back to the developers.

    • Re:No (Score:5, Informative)

      by gothzilla ( 676407 ) on Monday July 08, 2013 @10:43AM (#44216249)
      Sure there is. http://www1.euro.dell.com/content/topics/global.aspx/services/prosupport/computrace?c=uk&l=en&cs=ukbsdr3 [dell.com] Computer will ship with the Laptop Tracking and Recovery software agent and a persistence module embedded in the BIOS. The software agent can survive operating system re-installations, hard drive reformats and even hard drive replacements. When a lost or stolen computer connects to the Internet, the software agent contacts the monitoring center to report the computer’s location. For systems with GPS technology included, Laptop Tracking and Recovery has the ability to capture and report more detailed location information. It also provides the ability to track your laptops as they change hands or move around the organization.
      • by kav2k ( 1545689 )

        Note it's a hardware solution, while the question as about a software solution for existing hardware.

    • Some laptops actually has this built into UEFI. So it can survive a reinstall.

    • by tlhIngan ( 30335 )

      It's all "make-you-feel-good-software" which doesn't survive a simple OS reinstallation...

      False. Computrace (LoJack) actually survives OS reinstallation, provided the new OS is compatible (i.e., WIndows).

      It does it by relying on a BIOS component that checks for it to be installed and if not, patches itself back in on the hard drive.

      Of course, it lacks a lot of authentication and can easily be hijacked if you modifiy the BIOS...

      • by TheCarp ( 96830 )

        This is an interesting solution, and may even be the best one for a Linux laptop.

        Simple, have windows and computrace on there...run linux. The software does nothing until someone steals it and tries to run or reinstall windows, at which point it activates and starts doing its thing. In the mean time, it doesn't really track you.

        The only real problem comes if the thief decides to keep it running linux or some other non-windows flavor (encrypt the whole hard drive with LUKS and that should at least make it us

        • Of course, a Windows license is around $100, plus any other software costs.

          Call it a hunch, but I'd bet that someone who doesn't have any qualms about stealing a laptop is not going to shy away from grabbing a windows All-in-one ISO from Piratebay...

    • by gmuslera ( 3436 )

      And maybe more important: even if there is a hardware tracking software, you don't want it. Not only is sharing your location to others without your consent, maybe is sharing more than that.

      In any case, a cron script that send you just a mail every N minutes (and if having some supporting hardware, your gps coordinates, a picture of the front camera, etc) will be enough to give a hint of what happened with it before the OS gets reinstalled.

    • weld one end to your desk, and the other end to... oh... a wimpy little Kensington clip. hmm. just like software tools. looks tough, acts muff.

    • by mlts ( 1038732 ) *

      On Dell and HP boxes, there are hooks for it to auto-load/install LoJack for Laptops the second a Windows OS is put on the machine. That might be an idea. It won't help when Linux is running, but if a thief decides to install Windows, the BIOS will automatically install the tracing program.

      Of course, the best thing is to have the laptop insured, and the HDD encrypted.

      I like using multiple layers of encryption, mainly for compartmentalization. One layer for everything on the HDD, preferably using a TPM (t

    • by tibit ( 1762298 )

      If the thief is that technically literate, then, arguably, you've been had, get over it. Use insurance or just buy a new machine and enjoy the fresh smell :)

      Alas, in most cases, a BIOS/firmware password and a password-less guest account on the OS are enough the ensure that you'll hear back from your machine. Thiefs are mostly silly.

      Here's a solution that will work on any Unix system [slashdot.org] (less Orbicule, of course).

    • by v1 ( 525388 )

      It's all "make-you-feel-good-software" which doesn't survive a simple OS reinstallation...

      Macintosh, use the command line for your linux needs (since it's linux based)

      Enable firmware password and full disk encryption, both included free.

      Current model macs cannot be overridden by any tech without your apple id. So as long as that stays secure, it's a brick if stolen. There are no back doors.

      The tracking software is up to you. There are several commercially available, and I personally rolled my own. They

  • Give yourself full remote administrative control over it from your home system. At that point you can use all the standard "Where's my IP" tools to track down where it is; can use the webcam etc.
  • by xxxJonBoyxxx ( 565205 ) on Monday July 08, 2013 @10:14AM (#44216027)

    You're probably better off going with theft protection. Your best bet might be to label it a "Linux Laptop" in big bold letters.

    • This is actually not a terrible idea. Kinda along the lines of how people joke that the best anti-theft an American car can have is a clutch.
      • by TheCarp ( 96830 )

        ROTFL I have never heard that one but.... I used to live in a house (condo conversion) where 8 people in two apartments had 6 cars with 1 driveway (worst case, number of both cars and people changed over time). During most of that time, I had the only manual transmission (I find it amusing they are still called "standard" by many).

        Generally speaking, nobody could move my car but me. Eventually someone moved in downstairs who could move it, but, for the most part, I had to do it, which meant I couldn't just

    • You're probably better off going with theft protection. Your best bet might be to label it a "Linux Laptop" in big bold letters.

      It works even better if you buy a pink one.

  • Prey (Score:5, Informative)

    by Anonymous Coward on Monday July 08, 2013 @10:14AM (#44216029)

    http://preyproject.com/

  • by Deathspawner ( 1037894 ) on Monday July 08, 2013 @10:15AM (#44216039) Homepage
    Writing a bash script that automatically sends the laptop's current outbound IP address to a remote file is one idea. That would at least help you figure out to some degree there the laptop has been used from. It'd require law enforcement to go further than that, though...
    • That, and live the ssh server listening (passwords disabled), so that you can shred the disk if you want. There is not much more anyone can do...

      Or maybe, buy one of those USB computers, plug it somewhere inside the laptop, and put a back door in it.

  • Disk encryption (Score:4, Informative)

    by bradley13 ( 1118935 ) on Monday July 08, 2013 @10:16AM (#44216053) Homepage

    Assuming you have valuable and/or personal data on the machine, don't forget disk encryption. Either encrypt the entire disk, or perhaps just the data partition. Truecrypt is a good solution for this.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Exactly.

      In fact, just forget tracking, and encrypt the whole disk---if it gets stolen, shrug it off, and buy another one (again, do full disk encryption).

      There's not much you can do about crime (sure, you *might* be one of those few folks who locates their laptop, and then breaks the law in some stupid way trying to retrieve it---or infinitely less likely, gets the thief slapped on the wrist by the cops).

      Password protect bios, encrypt disk, etc., make it a hassle for someone who ends up with it, but that's

    • Re:Disk encryption (Score:5, Insightful)

      by greg1104 ( 461138 ) <gsmith@gregsmith.com> on Monday July 08, 2013 @10:32AM (#44216177) Homepage

      If you encrypt the boot drive properly, it won't boot to anywhere useful without a password. That means you can't use any of the OS-level tracking solutions, because the thief won't be able to boot into the regular OS. If you've let a criminal boot far enough to track them properly, you've really let them get too close to your data.

      It sucks in a way that a locked down system can't also phone home easily to find the thief, but realistically that's the trade-off here. I'm willing to write off the cost of a laptop if it's stolen, as long as the thief doesn't also get access to any personal data I have on the drive. Recovering from a case of identity theft costs a lot more than any single device.

      • Re: (Score:2, Informative)

        by Anonymous Coward
        You have to use the bios (firmware) level tracking stuff. This is especially important when using a Linux based machine as anyone who takes it is simply going to format it or replace the drive and install Windows. Any scripts or crap you setup in the OS are gone.
    • by rvw ( 755107 )

      Assuming you have valuable and/or personal data on the machine, don't forget disk encryption. Either encrypt the entire disk, or perhaps just the data partition. Truecrypt is a good solution for this.

      Plus provide autologin, so the user won't feel the need to reinstall immediately.

  • PREY (Score:2, Insightful)

    by kcmastrpc ( 2818817 )
  • Prey Project (Score:2, Informative)

    by carlhaagen ( 1021273 )
    http://preyproject.com/ [preyproject.com]
  • Stop Theft Plates (Score:5, Informative)

    by kullnd ( 760403 ) on Monday July 08, 2013 @10:18AM (#44216071)
    I'm a big fan of these - - They deter the actual theft before it happens.

    http://www.stoptheft.com/ [stoptheft.com]
    • I'm a big fan of these - - They deter the actual theft before it happens. http://www.stoptheft.com/ [stoptheft.com]

      It seems to me that if this works, and you can't get it off, it will probably just get your laptop thrown in a trash bin, or chopped for parts. Mildly satisfying in terms of pissing off your thief, but rather questionable with regard to helping you get your stuff back.

      • by kullnd ( 760403 )
        Nothing is perfect - I feel that these, combined with a very clear label that states the system drive is fully encrypted (which it is), dramatically decrease the value of the system to a would-be thief whether they are looking to make a quick buck at the pawn shop or mine the system for information. They also allow for return of your equipment if you leave it somewhere or loose it outside of theft. The idea is simply that my systems are a less desirable target than most others.

        Never had a system st
  • by stewsters ( 1406737 ) on Monday July 08, 2013 @10:19AM (#44216077)
    Get internal gps. Dual boot with a no-password windows xp account. The thief will have a much higher chance to log into that. Make it spam a home server with its coordinates every second its on and has access to the internet. Encrypt your linux partition. The key is you want the thief not to just wipe it and sell it, they need to power it on.
    • by CanHasDIY ( 1672858 ) on Monday July 08, 2013 @10:38AM (#44216219) Homepage Journal

      The key is you want the thief not to just wipe it and sell it, they need to power it on.

      Depends on the style of thief; your typical, garden-variety tweeker looking for something to sell to the pawn shop probably won't even crack the top, let alone try and boot the thing... a pro or semi-pro identity thief, on the other hand...

      Then there's the ever-present bored-teenage-vandal types (especially prevalent this time of year)... those kids are likely going to break into the machine to see what kind of "cool" (read: pornographic) stuff you've got on there, shortly before they completely trash the hardware.

  • Insurance (Score:5, Informative)

    by L4t3r4lu5 ( 1216702 ) on Monday July 08, 2013 @10:21AM (#44216099)
    Encrypt the hard drive. Insure against theft. Forget about it if it's stolen.
    • Re:Insurance (Score:4, Informative)

      by auric_dude ( 610172 ) on Monday July 08, 2013 @10:26AM (#44216127)
      Please don't forget to make and test backups every now and then otherwise you may well have your insurance payout but no data.
      • Please don't forget to make and test backups every now and then otherwise you may well have your insurance payout but no data.

        I keep my data on my server at home, I put stuff on my laptop if/when I need to use it when I am out & about. Nothing of real value would be lost if I were to lose my laptop.

    • Re:Insurance (Score:5, Interesting)

      by bill_mcgonigle ( 4333 ) * on Monday July 08, 2013 @11:20AM (#44216589) Homepage Journal

      Encrypt the hard drive. Insure against theft. Forget about it if it's stolen.

      Right, your data integrity is almost always worth more than the hardware itself. In order to install a tracker, you have to permit the attacker access to your filesystem. Don't do that.

      If my laptop is stolen, they'll see a grub screen, and then dracut asking them for a password. I'm SoL on ever seeing it again but I don't have to go explain to clients how their security may have been compromised.

      I guess ... you could try to bait them with a Windows boot option in grub. Maybe even make it the default if you think it's really likely that your laptop will be stolen. Install the tracker there, perhaps. One could continue along that train of thought with silent grub options and delays to make a deadman's switch of sorts, that would automatically bring up wireless, connect to any routable AP and send a help packet. Hey, there's an opportunity for the next guy who wants to make a new micro linux distro that does something unique - the more silent, slim, and faster the better. Maybe even a fake Windows splash screen while it's doing its business.

  • by Anonymous Coward

    ...the problem seems to be that just knowing the IP of your stolen computer is not enough for the police to get it back for you. It seems they also want a photo of the thief taken while using the computer, which complicated matters a lot. At least that's what other users have reported.

    • protect yourself against the tracking by the Illuminati.

    • ...the problem seems to be that just knowing the IP of your stolen computer is not enough for the police to get it back for you. It seems they also want a photo of the thief taken while using the computer, which complicated matters a lot. At least that's what other users have reported.

      Not to mention the police will want to talk to you about all that Indonesian plant porn the thieves downloaded onto your laptop after they stole it. Denying that you did it just won't work with them, but might work with a jury if you have a good enough l*wy*r.

  • by Anonymous Coward on Monday July 08, 2013 @10:24AM (#44216117)

    You'll have to try harder than that to get me to help you track people.

  • Prey! (Score:2, Informative)

    by Anonymous Coward

    I would recommend Prey: http://preyproject.com/blog/2011/04/its-official-prey-is-now-on-ubuntu

    I have used it and it seems to work well. It's free for up to 3 machines too.

  • by advid.net ( 595837 ) <slashdot @ a d vid.net> on Monday July 08, 2013 @10:27AM (#44216133) Journal

    The first thing the theft will do: an offline OS installation.

    I bet the stolen Linux laptop will have its OS erased to either to run MS Windows or an other Linux distro.

  • by Jane Q. Public ( 1010737 ) on Monday July 08, 2013 @10:33AM (#44216179)
    I tertiary the others on this.

    While it is true none of the solutions will survive an OS re-install, in most cases that's not terribly relevant. You want to track it down before they re-install the OS anyway.

    Prey is very unobtrusive; I often forget it's even there. It can give you screen shots, access location information, and even snap pictures with the webcam if your laptop is so equipped.

    Great product and service.
  • Comment removed (Score:5, Interesting)

    by account_deleted ( 4530225 ) on Monday July 08, 2013 @10:34AM (#44216187)
    Comment removed based on user account deletion
    • Looked into this once before for a big rollout.. Very hard to get actual info on. All the BIOS chip does, is re-install the software automatically and silently in windows. (they have some sort of special encryption key or something)..

      if you ever feel the need to steal a laptop, install linux, freeBSD, or make it a hackintosh, and the computrace is worthless..

  • Prey (Score:3, Insightful)

    by readingaccount ( 2909349 ) on Monday July 08, 2013 @10:44AM (#44216253)

    Apologies if this sounds like I'm some sort of shill, but I'm not. Just a happy customer:

    http://preyproject.com/ [preyproject.com]

    * Free and open source
    * Completely passive
    * If the laptop is reported missing (and has net access to know this), Prey will report its geo-location via Google Maps, take passive captures of the user with the laptop's webcam, take screenshots of their activity, and if necessary completely lock down the computer (though you'd normally do this manually and as a last resort - once locked, the thief will probably ditch it very quickly). Does other things as well.
    * Works on Win/OSX/Linux/iOS/Android

    * Allows you to run it in two ways:
    1. Make an account on the website, install the software and link it to your account, so that should your laptop go missing you can report its absence via the site and it'll do its thing once the laptop goes online elsewhere. Free accounts all you to link up to 3 devices, pro accounts allow more in addition to more features, but you'll easily be fine with a free account.
    2. If you want to be completely independent, you can run Prey stand-alone. No account needed - it works by monitoring for the existence of a URL when online, and if said URL reports a 404 error, it triggers and sends reports via email. Hence, you set up some free hosting with a dummy file, point Prey to the full URL of said file, then if laptop goes walkies, remove the file from the host to trigger Prey. No reliance on accounts or anything. Bit much for a regular user but easy enough for advanced users and not dependent on a company for the software to keep working.

  • by MacTO ( 1161105 ) on Monday July 08, 2013 @10:45AM (#44216259)

    Since you're running Linux, you will probably discover that any thief will reformat the hard drive to install Windows. This leaves two options:

    1) Look into software that may already be baked into the firmware.

    2) Have it automatically, and preferably transparently, boot into Windows then follow some of the other advice found here.

    Neither route will help you recover a laptop once it has passed through the hands of professionals.

    Overall, you'd probably be better off detering theft in the first place: don't use it in overly public places, never leave it alone in public places, invest in a good lock, and make it look undesirable. (One thing that I like about my ThinkPad is that it looks 10 years older than it actually is. Stickers, especially "non-removable" ones, make more identifiable and harder to resell without a cleanup effort. Scratches and dings will reduces its apparent value. Heck, smashing the slot for the lock will probably deter most thieves since it would be harder to sell.) Remember, the best way to avoid being a target is to avoid looking like a target.

    Oh, and write down every serial number on the system.

  • It's called buy a cheap laptop, encrypt it, back it up regularly, and buy another when it's lost or stolen. Works for other operating systems too. Even with computrace, you can't get police to act on the location a lot of times. Tracking software saves money on insurance, that's it.
  • DDoS (Score:5, Insightful)

    by Doug Otto ( 2821601 ) on Monday July 08, 2013 @10:50AM (#44216327)
    Configure it to launch a DDoS against the NSA and FBI if your password isn't entered within 30 seconds of booting.
  • by sl4shd0rk ( 755837 ) on Monday July 08, 2013 @10:56AM (#44216371)

    This will get you an IP address every 15 mins in your apache log so you can login or trace it.

          */15 * * * * /usr/bin/curl https://mywebserver.org/checkin [mywebserver.org]

    Also, if you don't want to run a full apache stack, boa [boa.org] is a nice light webserver which will do the same. Also, many options for perl/python servers which could be lighter yet but you would need to implement your own logging. Another cool option is have your laptop open a reverse ssh tunnel right to your server when it boots.

          @reboot /usr/bin/ssh -R 43811:localhost:22 mywebserver.org

  • by Anonymous Coward on Monday July 08, 2013 @11:01AM (#44216415)

    You're a slashdot guy, so you must be pretty talented. Open the thing up and find some unused GPIO (or serial port) that you can tap into and hook a small block of C4 and a detonator up to it [1]. Then, create a cron job that runs daily to check that you've been logged in at least once, and if it doesn't it should assume the laptop was stolen and trigger the detonator. No. Wait. Better make the cron job run every 12 hours. You can never be too careful. Just make sure you never sleep in on weekends or leave your house without your laptop.

    Next, to be extra safe, you'll want to somehow monitor failed login attempts and trigger the C4 whenever too many happen. Not sure how to do this as I'm a hardware guy myself, but I'm sure you can figure things out on your own or with your frienemy Google. I'd say that allowing one failed login attempt should be a safe threshold, but I'd recommend against allowing any more than that, as you're just asking for trouble. In fact, unless you're some kind of pussy that can't type, you can probably get away without any grace login attempts.

    If you were really paranoid, you could try to implement some sort of retina scan or proximity sensor using the built-in webcam, but that's an advanced topic probably better left for some future "Ask Slashdot" post.

    [1] If you have sort sort of issue with using C4, maybe you should consider somehow using a thermite charge instead. Less "bang", yes, but definitively more colourful, and would give new meaning to the term "toasted skin syndrome".

    • by isorox ( 205688 )

      You're a slashdot guy, so you must be pretty talented.

      LOL!

      That assertion turned false way before Hemos left, let alone Taco.

  • Unless you set it to automatically login with no password, the thief will never be able to boot it up to allow your tracking software to work.

  • by PPH ( 736903 ) on Monday July 08, 2013 @11:05AM (#44216447)

    Put a Windows 8 sticker on it. Nobody will touch it.

  • Truth is, law enforcement isn't going to take you seriously if you say you have tracked down your laptop. Rather just get it insured and have your files backed up somewhere else.

  • Clearly identify it as a Ubuntu laptop. Your average, low-level thief is notoriously unwilling to steal things that are rare and unpopular.

  • This only works if you can act quickly after it's been stolen.
    First, open the case. Place a block of C4 in some free area, with a detonator attached to the internal USB bus. Close the case. Remember to write down the secret code for the detonator as well as your machine's IPaddress.
    When machine is stolen, send the code. Great hilarity ensues.

  • Chances are you'll need the police to actually recover anything, if all you have is an IP the ISP won't give you the time of day. If they're just using it from the wifi at the local coffee shop it'll be a dead end. Even a GPS location isn't all that good if it leads to an apartment building. For every case in the media I hear about anyone making a successful recovery it's probably ten where they just can't be arsed or it just fizzles. I'd say this is a case where an ounce of prevention is worth a pound of c

  • Don't have data that needs contant backup and protection on the laptop, but edit the files on your home/office computer via ssh or even better a remote Linux desktop server which is quite handy and it works fine if you're just writing text remotely and have 2Mbit Internet speed. ThinLinc and No Machine for example; they aren't open source, but free for small users.
    • by JustNiz ( 692889 )

      He's asking about how he can protect his exisitng equipment that represents a significant invenstment, not what he coulda/shoulda done before he made it.

  • by capebretonsux ( 758684 ) on Monday July 08, 2013 @12:54PM (#44217473)
    Just set up your laptop to post crap about bombs, etc, if you don't reset a timer after a period of time. The NSA will find it for you right quick!

An adequate bootstrap is a contradiction in terms.

Working...