Distributed.net Captures Laptop Thieves. 102
Octal writes "According to this story, there is a little-known advantage to running a distributed.net client from your start-up script. On two separate occasions, laptops have been stolen, and then returned, by tracing the IPs of rc5des clients that criminals forgot to remove."
Similar story (Score:2)
Microsoft GPS Computer Locater v2.xx . . .
Initializing GPS . .
Connecting . .
Transmitting computer location . . . .
Location transmitted to database.
The dots were timed out randomly, and for the version info I just copied something from a real Microsxxx driver, so it looked pretty real to those who didn't know better (like most of the people in my office). Obviously this would never get back a stolen computer, but thinking of the reaction of anyone who stole the computer and saw this when they turned it on was enough.
M
Not a privacy issue, because they knew what it did (Score:2)
Choosing to do something it totally different then software that does something you're not even aware of without your consent. THAT is a privacy violation.
Verifying work done (Score:1)
There is no way you can "verify" that latter answer without actually redoing the entire work yourself, in which case there would be no point in asking others to lend you their CPU time in the first place. Even though you know the key yourself, you can only detect the liar if he claims having searched the part of the keyspace it is in and still not found it. All the other sections of the keyspace would remain in doubt, and the challenge would be useless as a measure of how hard it is to search the entire keyspace.
Now, could someone come up with a way to verify by looking at the data submitted that the computer is still safely in the hands of the owner, then we would get another benefit from the d.net project (as well as getting this thread barely back on topic).
Re:Just use a better protocol (d.net please read : (Score:1)
Relying on the fact that the bad guys have used only a single ID works only as long as the risk of getting caught this way is minimal. As soon as you start labelling all reports by the same submitter as faked, they will start obtaining multiple ID's to the point where your attempts at detecting them will be meaningless, much like you can't eliminate spam by listing the e-mail addresses of all the spammers.
There will simply be more rogue keyspace searchers than keyspace blocks per searcher (or more spammers than spams per spammer), and your 0.1% sample will detect only about 0.1% of the rogue keyspace blocks submitted. This will still leave the integrity of 99.9% of the submitted blocks in doubt.
However, if you are somehow able to check a randomly chosen piece of data in each keyblock submitted, then you stand a pretty good chance of detecting blocks where more than half the data has been faked. Is that good enough for the application at hand?
You won't save any money by having someone search your premises for that missing $100 bill, and then hire someone for $100 to follow him around and make sure he doesn't sneak the money away and pretend not having found it.
Re:Privacy? (Score:1)
Distributed.net stuff is installed by choice, and any users of the clients are fully aware WHAT and HOW OFTEN personal data is transferred over the net.
Comare that to softwares and P-IIIs that blindly report who you are, and what you're doing back to their masters. This is done without users' knowledge, and without giving users the option to opt-out of the data transfer. hardly fair, and hardly the same thing.
Re:No (Score:1)
Very useful... (Score:1)
Re:rc5/notebook/caralarm? (Score:2)
>boot floppy,
Maybe on yours, but mine is configured to boot only from the hard drive, and changing *this* requires a password stored in flash memory (or whatever it is). Eliminating *that* can be done, but iirc, it's going to take special equipment (remove chip from board & flash) or a dealer.
Assuming they don't format the hard drive (Score:1)
Re:Great Idea! (Score:1)
--
Great Idea! (Score:2)
Gosh, if everyone had one of those on their computer, computer crime would be greatly reduced! And if it was built into the OS or even the firmware, it would be hard for thieves to remove.
So, let's petition Intel and AMD and MS to get together so that all new computers report in a unique ID to a central body over the network whenever they have a live net connection.
Yeah! That'd be great..
giggle
Re:Just use a better protocol (d.net please read : (Score:2)
Now would you honestly prefer that D.net progress be *halved* as a result of them turning to the Good Side of the Force? C'mon..
I completely agree with D.net's reasoning and their decision to remain closed for now.
Re:Just use a better protocol (Score:2)
And yes, performance will be *drastically* reduced. Perhaps not halved, but at least on the order of 20% or more.
All of these calculations have been optimized to an obscene degree. It's all done down to the assembly code level. Taking and storing mid-calculation data and performing a checksum/cryptographic hash/whatever on it will be an *enormous* performance hit, relative to the highly optimized calculation loop that's being performed on the data.
Now I have no actual numbers to base this on, but I believe the D.net crew said almost as much (with a number in the same range) on their web site, or in some message someplace. Check out their FAQ or something for details. They explain why they remain OpenSource, and I think their explanation is perfectly adequate.
Re:No (Score:3)
Who cares if we have to make all of our software cryptographically secure if we want to be able to trust their output? Who cares if this security HALVES the performance of CPU-critical tasks like D.net? OpenSource is always good, and if making programs cryptographically secure is the only way for OpenSource programs to give us trustable, reliable results, then by golly that's the way it must be done, because OpenSource is the True Path. OpenSource is the Light. Programming to pay bills is the path of the Dark. Fear the Dark. Oppress the Dark. Closed-source programming is the path of Evil. All evil must be destroyed.
Just use a better protocol (d.net please read :) (Score:1)
Not necessarily. It should work this way: when the client checks all the keys in a block, it saves the results of the intermediate calculations, and hashes all of them via a semi-secure hash function (md5, sha1). You just have to be careful that these intermediate values are hard or impossible to get without the real computations; for example let them be the last bit of the supposedly decrypted text (which then looks invalid).
Then, occasionally, you check some of these values by hand (or, the horror, by sending the same task to another individual :) and if there's a mismatch, you know one of them is lying about his performance.
You need to check only a small percent (i.e. probably less than 0.1%) of these values anyway, since anyone trying to fake his keyblocks will want to do crank out much more false keyblocks like those pranks before.
The only question is where to store these additional values, as it might take a significant amount of storage to administrate the keyspace anyway, but I think it even sufficient to store a few bits (at most 32) of this hash to be able to catch the bad guys.
Now I can only hope the distributed.net guys read this :)
Re:Just use a better protocol (Score:1)
Who said halved??? I just devised a method which provides a way to prove that a given block is incorrectly submitted as done. Inexpensive even in the storage point of view (just a few more bits for each block to store, where the submitter ID is already stored); and there's no need to check all of the results, just the suspicious ones. Done correctly, just slows the progress down possibly even microscopically. The "cryptographic" method to compute these bits is actually very fast too, MD5 doesn't take too long for a few bits per N blocks at the clients. And might be even unneeded as the final bits of computations are probably hard to get anyway...
Oh, and let me ignore your opensource bashing.. Why do you think people can't abuse the closed source version too? This simply seems to be a way where you can be safer than that, even with open source clients...
Re:Just use a better protocol (d.net please read : (Score:1)
Well, I think the only "reasonable" (ehrm) incentive to "fake" results is having a large keys/sec value, and if you have multiple id's, you won't have that :)
I think by carefully looking at log results they would be able to get most of the bad guys anyway. IP address, submitter id, submitter team; some of them must repeat frequently if you use a fake client...
But having just sending a few bits of result (i.e. 32 bits for each keyblocks, each meaning the xor of the last bits of the particular cleartexts from the 1/32 of the keyblock) is basically what you and I am saying too, I like "my" way because by storing less bits you can store more proofs to check later if someone looks suspicious, whereas for a random check it's more wise to send more bits (the more to chose from, the more sure you can be faster by checking it).
Re:RC5 (Score:1)
imabug
Re:RC5 (Score:1)
Calculating how fast a keyspace can be searched is easy. The d.net effort is *showing* how fast it can be done. I think when DES III fell, everyone involved was shocked at just how fast it took, even though they could calculate the top keyrate, how fast it would take to ramp up to that keyrate, how many participants it would take, etc. it turned out to be a very graphic presentation on how weak DES is now. That's what the contest is about I think.
But d.net is about more than just cracking encryption. it's about the power of distributed computing. cracking just happens to be a good illustration of DC.
Re:No (Score:1)
i don't recall d.net ever having claimed to be open source, so how can it insult something it isn't?
imabug
Why this is _not_ a privacy concern (Score:2)
The distributed.net client takes active effort to set up. The Microsoft tracker is enabled by default, and takes active effort to disable. That distinction makes all the difference in the world.
SGI did that (?) (Score:1)
It could be a nice feature to have in firmware. Connect to the vendors' ``bootup registration'' server, send a unique id of the hardware along with some information (like IP/subnet/routing).
The story I heard about the SGIs was, that it was an anti-theft measure.
However, I wouldn't count on having Award or any of the other PC bioses hold an IP stack anytime soon though...
If someone wrote a daemon (regd) that was run right after the network came up, which did this registration, there could be a good chance that any asshole thief would at least boot the machine once before he wiped the drives.
Do I smell a project here ?
No (Score:1)
BTW: 1) d.net client source is still closed. d.net is an insult to the Open Source community and we should have nothing to do with it. 2) I think running something like this on a laptop is dumb -- save your battery instead.
--
Re:No (Score:1)
What d.net obscurity-apologists are saying is that this problem can't be solved openly, and THAT is an insult to open source. If you believe them, you'd better run out and buy a proprietary encryption package because pgp isn't safely closed like the d.net client.
I don't understand how so many of the people who champion for open source and see the benefits in all other areas can turn around and root for security through obscurity just because it's d.net.
--
You mean 'captures stupid thieves' (Score:1)
Serves them right, of course. It just goes to show that good wins because evil is generally stupid.
---------------------
the SlashDot spellchecker:
Re:ICQ, too. (Score:1)
tried helping someone do this exact thing. They
said their computer was stolen but a friend
had seen the account logged in after it was stolen and even had a copy of her contact file
that contained that last IP.
I didn't know if that IP was accurate. But I
explained about locating the ISP and contacting
them. I detailed what had to be done, whether it
was to traceroute by themselves, or ask Mirabilis to help them trace the logins of that account. Actually, I think I had asked Mirabilis for login
information but the answer was that they did not
have any logging in place so they couldn't help.
I didn't hear anything for a couple of weeks and
by then I had stopped following those newsgroups.
I had forgotten all about this till now.
At least this is how I remember it...it was around first quarter 1998 I think.
Andy
Re:Slashdot Tech Support Question: autologin? (Score:1)
You just want to start the client up as a specific user on bootup, right? That doesn't necessarily imply a login.
Probably what you want to do is stick something like su -c "rc5clientthingy --option blah" rc5user < /dev/null 2>&1 > /dev/null & in one of your init scripts. Bonus points if you set up a full-blown SYSV script for it (a la /etc/rc.d/init.d).
You probably want this to start in runlevel 2, 3 or 4, as those are the "network-enabled" ones. (if you're using standard runlevel configurations)
Berlin-- http://www.berlin-consortium.org [berlin-consoritum.org]
Re:rc5/notebook/caralarm? (Score:2)
As for getting into Linux, how do you boot? LILO probably, most people running Linux use it. At the prompt just type "linux single" sometime and see what it does.
Or I could just take out the HD and put another one in. Most systems are set to autodetect the HDs on bootup, and will change the config automaticly without needing BIOS config.
Of course, the point of this message is that nothing is secure if the attacker has physical access to it. Crackers have broken hardware security many times in the past, and probably will continue to. Most dongles are crackable, Playstation, DVD Region codes, Computers, Networks, and probably a ton of other stuff I haven't thought of.
Just a thought. (Score:2)
You know, tracking computers after they've been stolen is really simple. You don't even need a internet connection. There are companies out there selling anti-cartheft chips that are basically minature transmitters. When the vehicle is stolen, you call up the company, and they activate the chip via a satellite downlink, and then it's a simple matter of tracking down the signal.
Similar technology could easily be implemented for computers without all the privacy hoopla surrounding software or the "UID" stuff intel would have you believe is really there for your own good.
--
Re:Your own nice firmware identifier -- network ca (Score:2)
--
Slashdot Tech Support Question: autologin? (Score:1)
I've been wondering about how to get my rc5des client logged in automatically on bootup for a while, and this seemed like the perfect opportunity to ask.
I searched all the HOWTO's for similar information (how to log in a user on bootup) but evidently I did not find the information I needed.
My girlfriend often uses my laptop and can't be bothered to remember to switch to a virtual console and log in rc5. So how can I make rc5 login and begin work on bootup?
Security isn't *much* of an issue here, I've got a separate rc5 user, running in a restricted bash environment.
Any pointers to documentation? Or free clues?
Muchos Gracias!
This is why. (Score:2)
- You install distributed.net expressly to send stuff back. Distributed.net tells you explicitly that it is doing so.
- Distributed.net only sends things back that are related to its mission.
- You install Microsoft Office to do word processing, create spreadsheets or run a database. None of these missions require an ongoing information exchange with Microsoft.
- Microsoft includes this information in their
- Microsoft is a large company that many people distrust becuase of similar fiascos in the past. As a result, our comfort level with giving them information is likely to be lower than with distributed.
D
----
Re:rc5/notebook/caralarm? (Score:1)
Re:D.net isn't the last link in the chain here! (Score:1)
That's not a solitary incident either. I've requested this type of info, for legitimate reasons, several times in the past and I've never had an ISP tell me no. The closest thing I've ever had to "verification" was an ISP that asked for my telephone number, and called me back. Identifying people is easy if you know how to ask properly..
Re:Privacy? (Score:2)
Re:No (Score:2)
Re:rc5/notebook/caralarm? (Score:2)
rc5/notebook/caralarm? (Score:1)
Hmm.. I'm thinking I should put rc5 back on my notebook
Time to implant the homing beacon.
-- dc.
Re:rc5/notebook/caralarm? (Score:2)
I personally use a BIOS password, but then I'm sure there's a jumper I could short inside the damn thing to get rid of it. What we need is encrypted file systems, non-overidable BIOS passwords and the like, (but then what do we do when we really forget the password???)
Re:rc5/notebook/caralarm? (Score:1)
Kind of like... (Score:2)
When someone steals your cell phone, and then they answer the phone before the number is changed.
Anyway, this could be a good way to sell distributed.net to companies. I know big corps would trade their extra cpu cycles for the safety of their most expensive machines. Oh, well. Just a thought
geach
Re:Slashdot Tech Support Question: autologin? (Score:1)
log in as root (of course), goto
add this line at the end:
/PATH/rc5des -quiet
where
this script (rc.local) is run after the system boots up, but before logging in, that way any programs here will run regardless of whether you logged in to the machine or not..
hope this helps.
Re:rc5/notebook/caralarm? (Score:1)
I actually did that to my computer by accident.
I had been locked out because my little sister had set the BIOS password and forgot about it. However, I didn't have a PROM programmer in hand. What I DID have was an incompatible BIOS.
So, I took the other BIOS, plugged it in and turned it on. Needless to say, it didn't like my CMOS settings, so it rewrote them. I plugged in my original BIOS, it didn't like my CMOS settings either and it rewrote them. Then, I had a clean default BIOS.
Warning: I'm not responsible if you fry your system doing this.
Re:No (Score:1)
Stupid, Stupid, Stupid! (Score:1)
With the way that most websites use cookies, I'm sure there are any number of websites that the thieves could have visited that would have been able to give the owners the same data. Then there are programs likes netscape which can send all your information back to netscape with every click of the mouse if your not careful.
Bottom line, they were very stupid thieves.
I wonder what OS these laptops where running? Must have been Win9x...
Quack
Re:Privacy? - thought off. (Score:2)
Re:Slashdot Tech Support Question: autologin? (Score:1)
however my problem is when i try to start redir this way it doesnt take... and i have to do it manually. however i rarely reboot so no biggie
-fixe
DHIS client (Score:1)
Re:No (Score:1)
By opening the source, people like those Russian guys can fiddle with it and skew results.
We know people can't be trusted to do whats right, so why do something that is inviting attack?
Before you attack d.net and say it's an insult to open source, pause to think. Everything in the world shouldn't be open source. Some things need to be closed to protect people from themselves. (and other, more stupid people).
Re:Stupid, Stupid, Stupid! (Score:1)
You are also presuming that the buyer of a hot computer would know how to install the Operating System.
You are also presuming that the person has the install media.
Non techie types don't think of this stuff. The thief usually sells it for cash quickly either to a fence who resells or to a waiting customer.
In the past, I've seen laptops come into the shop for upgrades or to replace that ubiquitous lost battery charger that are obviously stolen or to wipe and reinstall.
When I steal a computers... (Score:1)
;-)
Re:SGI did that (?) (Score:1)
It could be easily added in when we have something workable. Unfortunately, that won't be for a while yet.
Re:Slashdot Tech Support Question: autologin? (Score:1)
Re:You mean 'captures stupid thieves' (Score:1)
ICQ, too. (Score:2)
Can anyone find a link to that story?
---
Re:Similar story (Score:1)
And then I leave it switched on when I'm away. I'm relying on burglars' ignorance, since I don't leave my modem plugged in, but it's worked so far
Re:Just use a better protocol (d.net please read : (Score:1)
> is having a large keys/sec value, and if you have multiple id's, you
> won't have that
You guys are lacking imagination. If I were to hack the d.net
client, I'd keep the key rate the same. I'd just make sure that if
I found The Key, it'd tell me first, not distributed. Then I get
all the prize money and I can donate money to charities
that I think do more good than, say, ones de facto dedicated to
ensuring rich people don't have to pay for their software.
Re: Pentium III F.U.D. (Score:1)
In other words, trusting your software not to send your hardware ID code is no different than trusting your software not to send a crytographically uniquie ID that was generated for your machine. Having a PIII doesn't make your machine any less (or more) private than having any other microprocessor-based machine.
The only valid issues I've ever seen raised about the PIII's ID code were concerns over some ill-conceived applications that did not properly consider security and/or privacy. However, such issues should be dealt with separately from the existance of the ID (which is not in and of itself a bad thing), since it is possible to do these same bad things without resorting to the use a microprocessor's ID code.
It really surprises me how much FUD is still floating about on this topic, most of which does not appear to have any basis in reality.
Re: Pentium III F.U.D. (Score:1)
Thus, your comments on the easy foiling of software methods also applies to the sending of a hardware ID since it requires software to do the sending.
cool! (Score:1)
If you have it, email me at my address.. and thanks!
Re:rc5/notebook/caralarm? (Score:1)
Re:Privacy? (Score:1)
That's not changing code, that's replacing hardware. Why should I have to go through the expense and effort to change out hardware to avoid invasion of my privacy?
Its easier than that. You can change the ID on your Ethernet card without removing it. But why should you HAVE to?
MAC addresses exist to facillitate various aspects of networking. You give up annonymity in return for working technology. Why does the PIII ID exist? What bennefit does it offer to users/consumers?
You do bring up an interesting point, however. Why should advertisers count on cookies to trace eyeballs? Why not snag the MAC address? Granted... this can be changed, but Joe User is unlikely to be aware of it or how to do it.
Re: Pentium III F.U.D. (Score:1)
I'm unaware of ANYONE claiming the PIII ID broadcasts itself.
The three points I brought up still stand: what is the function of the ID? The ID can not be removed by the user (unlike so ftware ID methods) and CAN be activated without user concent. And finally, the ID was to be shipped activated by default.
I would argue that the two issues have a much closer relationship. The fact that this identification technology was being announced in the same breath of ill-conceived applications is very telling. The whole idea behind the ID was to provide those very types of services! Ill-conceived indeed.
Software identification concepts have also been tried. Cookies. Some users are accepting of them. Many are not - features to disable cookies went from third-party add-ons to rolled in features on major browsers. Once again, a software based technology is easy to foil once it is identified. The hard-coded ID number is impossible to remove.
I do agree on one point. The fear over the PIII ID was overly hyped. The media seemed to harp on it for an overly extended period of time. I'm sure the general populous ended up fearing the PIII ID without any real clear idea of WHY they should.
Re: Pentium III F.U.D. (Score:1)
Hmmm. That's actually a good possibility. Though, I'm not sure how big of an issue that actually is.
Though, I'm of the opinion that the big problem for Intel is counterfeit chips; processors that have been remarked as higher speed chips. While they've put some hardware in place to make overclocking much more difficult - I think embedding a model number would have been better. Of course... this leads to the big "Is there really a difference between X MHz and Y MHz chips" question/conspiracy theory.
OK. I can see where you misunderstood my own understanding of the issue concerning how that ID can be used. And, indeed, a solely software based scheme could effectively do the same thing. And in both cases, it would require the interaction of a user to disable. But allow me to point out two distinctions between a hardware and software ID.
The ability to remove the ID is important. If I find a software ID and delete it - its gone. For that software to work again, it will have to generate another ID. It makes it harder to continue to identify me. With a hard-coded ID, once the identifying process is running again, I can be linked with the same identity as before.
A second point is how to set up the identification scheme. A software based scheme would require access to more resources. Not only will you have to get the person to execute the code, but you'll need to store that ID somewhere on the host machine. Of course, a minor point is also having to generate more complex (and larger) code to not only read the ID, but generate and store (possibly hide) the ID. With a hardware ID, its a simple matter of reading a register. I would suspect java-enabled marketing banners could do that with ease. Since there's no writing or control of additional resources, the code will be small and unlikely to attract notice... or leave evidence of its actions.
Re:Privacy? (Score:2)
On the surface, this might appear to be the same kind of thing. But there's a pretty big difference on serveral points.
First, the intent of d.net software is not to indentify and track an individual. Logging IP addresses, and consequently being able to convince an ISP to identify that address to a customer account, is a byproduct of system logs. Its a common convention to the net. I'm accepting of this since, generally, such logs are used for administrative purposes and discarded after a period of time. A smart business will have a policy to ensure these logs are dropped as soon as they become obsolete to avoid legal hassles ("Sure, we'd like to provide you that information and get caught up in your litigation... but we have a long-standing policy to delete logs after X days."). Less-intelligent [amazon.com] companies use them as gimmicks [slashdot.org]. In this case, everyone was able to act fast enough on a good enough reason to track down a theif. Its a byproduct, not the origional intent.
Secondly, it is a software mechanism and not non-removable firmware. If, today, you decide you're just too uncomfortable with the whole idea of being able to be tracked via your d.net client... you can remove it. Delete it. It's gone. The PIII ID code could not be removed. And, furthermore, it could be activated without the user's knowlege.
Finally, as stated by other people... d.net software is an "opt in" system. The PIII ID origionally shipped activated; you had to run specialized code to deactivate it. The implication is that it required prior knowlege as well as additional effort to NOT report your identity and invade your privacy. The d.net client requires prior knowledge and additional effort to activate - by default it will never report your existance.
The whole idea of invasion of privacy is NOT the ability to be identified. The distinction is whether you consent to that identification.
Re:Similar story (Score:1)
[some system brand name]
For technical support call Xxxxxxx and Associates, [phone number]
Then on to the DOS prompt. Apparently the idea was to get anyone who had trouble with a stolen system to call that number.. which happened to be its then-owner. Just a couple lines in the autoexec.bat. Dunno if any crook was ever fool enough to do it, but this dated back to the days when its 20mb of programs would have cost a few thousand to replace off the shelf, so maybe a thief wouldn't have wiped the drive.
Re:RC5 (Score:1)
RC5: We know that there's an answer, and a probability theorist could even tell you how long it will take to find.
SETI: Even if you believe in E.T. (I don't), the particular data being examined by SETI seems of minimal real value in finding him.
GIMPS: We have every reason to believe that huge Mersenne primes exist beyond those already known, but we don't know. The only way to find them is by a brute force.
In this sense, I consider, the GIMPS project to be somewhat more serendipitous research -- more interesting. (Ok, "serendipitous" is the wrong word, since we are, in fact, looking for huge primes. But it's 3:45AM and I can't think of the right word.)
[By the way, there are only 38 known Mersenne primes and the most recently discovered is over 2 million digits long. If you like huge numbers, GIMPS is the project for you.]
Re:rc5/notebook/caralarm? (Score:2)
Restore from backups?
Ale
RC5 (Score:1)
Here goes...
What's the point of rc5? I can see d.net wanting to participate (because of the money and to test distributed computing), but why is the money being given away at all??
Everyone _knows_ that if you search long enough, you'll find the key. It's not a question of 'if' it's a question of 'when'... so what's the point?
*shrug*... Maybe I just don't understand.
Re:RC5 (Score:1)
Now I have two problems with this:
1. Couldn't you just calculate about how much time it would take to search through all those keys?
2. With d.net finding the keys, how useful will the time be? "The rc5 project took 5 years to crack by millions of computers that worked on it when they felt like it." It's not a controlled environment, so won't the time be meaningless?
Re:Privacy? (Score:1)
Remember? Reputations. Reputations. Reputations.
Identical actions can be interpreted as either good or evil depending on the overall context.
Re:rc5/notebook/caralarm? (Score:1)
BTW, y are we so worryed about securety anyway?
D.net isn't the last link in the chain here! (Score:1)
Re:Why this is _not_ a privacy concern (Score:1)
Re:Your own nice firmware identifier -- network ca (Score:1)
This is a very useful feature; it allows me to have a Windoze machine at home to connect to my cable modem when I have a problem with MediaOne and they refuse to admit to the existence of other than Windoze and MacOS. At other times, my Linux machine, normally connected to the net, uses that Windoze box's MAC address, (the one that MediaOne associates with my connection), rather than the one programmed into its NIC. This means I don't have to swap NICs between the two machines to humor MediaOne.
Re:Your own nice firmware identifier -- network ca (Score:1)
My e-mail address is petersonp@genrad.com. I have no reason to hide behind anonymous postings.
Seti or RC5? (Score:1)
Re:Hot laptops (Score:1)
As for your hardware blowing out... perhaps it was ratshit anyway. Edge gear is crap worldwide.
Re:Privacy? (Score:1)
Extra-terrestrial tracking? (Score:1)
"P.C. phone home..."