GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
My friend bought a brand new ibook laptop last Tuesday. Yesterday someone broke into her apartment and took the laptop and a flute (which is not worth very much). Cops came and wrote a halfassed report but, as anyone who had experience with this knows, they seemed completely useless. Didn't even dust for fingerprints. (I seriously wonder what is the money limit above which they would conduct a serious investigation?)
To make things really frustrating, she knows exactly who did it: her neighbor, known as a tweaker and drug dealer in her apartment complex, who accidentaly saw the thing sitting on the table couple of days before.
Maybe not him in person but his buddies. Of course, nothing can be proved.
My question is: is it possible to somehow track this computer when these as*holes connect online?
Last edited by frankie_DJ; 05-10-2005 at 09:03 PM.
Only if the person had some sort of software intended to facilitate traffic (which could be as simple as some sort of http request) would this be possible, as far as I know. Sorry. Unfortunately, this is one of those things you need to think of before you need it.
If she was on the internet before it was stolen, perhaps her NIC card's MAC address is on record with the internet provider. If someone has connected with the same provider, they may be able to locate it that way. If the computer is found in his possesion, the mac address may serve as proof that it is the stolen computer. Also, does the ibook have a unique serial number ( such as for the software or the CPU ) that could identify it when when the thief connects for an upgrade with apple?
A former co-working of mine had his apartment broken into. The person was still inside when he came home. (The thief jumped you the window to escape). The cops weren't very interested. He had his CD collecton stolen. Since he had such eclectic taste in music, he went to the record stores that purchased used cd's with a list of what was stolen. He go a call shortly after from one of the stores. He went back to the police, and they wouldn't do anything about it.