WHITE PLAINS, N.Y. (AP) -- A Westchester woman who had her laptop stolen was able to connect to the computer, photograph two suspects and give the photos to police.
http://www.1010wins.com/Mac-Savvy-Woman-Helps-Cops-Nab-Laptop-Thieves/2157543
WHITE PLAINS, N.Y. (AP) -- A Westchester woman who had her laptop stolen was able to connect to the computer, photograph two suspects and give the photos to police.
http://www.1010wins.com/Mac-Savvy-Woman-Helps-Cops-Nab-Laptop-Thieves/2157543
Memo to self: When stealing someone's computer, make sure I cover over the camera.
More important memo to self: when using own computer not fully dressed, make SURE no one can remote control my camera!
Memo to self: When stealing someone's computer, make sure I cover over the camera.
More important memo to self: when using own computer not fully dressed, make SURE no one can remote control my camera!
...
There have been stories about "l33t" script kiddies who take control of Windows PCs and watch the web camera, going so far as to open up chat windows and taunting the victims.
That's how this teenager first realized a hacker had taken over.
"I was talking to one of my friends and I looked up to what I was typing, and I wasn't typing. Someone else was, and it was perverted stuff," the hacker victim said.
The hacker made sure the girl knew he was in charge with annoying tricks like opening her computer's disc drive.
The noise and the movement were a startling invasion of the teenager's private computer room.
"He'd write words in the middle of my screen, like 'I'm in your computer.' And he'd make my screen go completely black," the teenager said.
Then, a chilling reality sunk in. The stranger was also controlling the web camera. It was normally used to send live pictures to someone the teen was messaging online, but he was using it for something else.
"He was like, 'I like your shirt.' Or something like that," she said. "It felt like he was standing right next to me, watching my every move."
http://www.click2houston.com/technology/3324710/detail.html
That was very impressive of that end user. She can't be a mac user by trade....no way they'd know how to remotely access a computer without help from the Apple Store or something
She worked at an iStore, but is not a tech. Just a geek.That was very impressive of that end user. She can't be a mac user by trade....no way they'd know how to remotely access a computer without help from the Apple Store or something
I don't have administrative access to vBulletin. I just run the server that the site runs on. That is a setting that only Chuck can change unless I manually give myself admin access via the database..which isn't exactly right.
tooshort Jesse, puhleeezzeeeeee kill this check
I don't have administrative access to vBulletin. I just run the server that the site runs on. That is a setting that only Chuck can change unless I manually give myself admin access via the database..which isn't exactly hard.
I don't have administrative access to vBulletin. I just run the server that the site runs on. That is a setting that only Chuck can change unless I manually give myself admin access via the database..which isn't exactly right.
Haha.
Actually, the "Back to my Mac" feature is supposed to be super-duper easy, when it works (ya gotta make sure the remote machine doesn't go to sleep while you're gone unless it's got "wake on network" checked, etc.)
Hell, this would make a good Mac ad! It'd also make a good story for Jay Leno about stupid criminals...
The two men charged in the burglary were arrested with the equipment in their apartment, and are reportedly friends of a friend of the roommates who had their stuff stolen.
Fortunately for Duplaga, the alleged malefactors had a router with UPnP (Universal Plug and Play) or NAT-PMP (Network Address Translation-Port Mapping Protocol) turned on, without which Back to My Mac rarely works. And they left the victim's laptop signed into .Mac.
...
A commenter on this story at BoingBoing wondered if the Back to My Mac access goes both ways - and that's a supremely valid and freaky concern. Back to My Mac assumes that you control the .Mac account in question and any computers on which you've logged into .Mac. The alleged thieves could just have easily have monitored Duplaga, had she logged in to .Mac and enabled Back to My Mac on another Mac, just as she monitored them.
http://db.tidbits.com/article/9608?rss
Chuck has access to automated backups. Jason (FlyNE) could figure out the rest.What if something happens to Jesse?
Chuck has access to automated backups. Jason (FlyNE) could figure out the rest.