[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <604583180512251805u2b4d8ac1m4ecf654f080114b4@mail.gmail.com>
Date: Mon Dec 26 02:05:51 2005
From: bob.hacker at gmail.com (Bob Hacker)
Subject: Breaking LoJack for Laptops
sorry i misplaced your post with your reality, I replied simply with... Bob
Hacker to Stan
More options Dec 24 (1 day ago) Its outstanding, I was being sarcastic
just out of context. Happy New Year List !
=)
!Z
I replied to stan not the list. Guess I should Have.
On Sun, 25 Dec 2005 13:38:15 -0800 Bob Hacker
<bob.hacker@...il.com> wrote:
Let me clarify this this to you and others who don't understand the
slightest about much.
>Allowing 192* to be called from is absurd. And its not that hard
>to whois
>the ip, contact the isp who now these days hand over information
>to almost*
>anyone with a nice fancy letterhead from a lawyers office. Saying
In case you didn't realize it, the 192.168 range is private. Go
whois yourself silly trying to find out. Better yet go ask around
who is 192.168.x.x for kicks.
>Dear Mr
>ISP bad person using this IP has stolen laptop that sold on ebay
>for 50
>bucks, please give us his address so we may take him to court and
>charge him
>with possession of stolen property, a misdemenor in most states.
For your information you seem to know little about how things work.
Go ask any provider for information with any kind of letterhead
you'd like. See what they will tell you. You seem to be stuck on
stupid assuming a bonafide provider is going to budge simply
because some letterhead. Without a court order you'd be wasting a
piece of paper.
>Yes its
>logical. But in theory I think the whole thing is like the MS key
>validate,
>disable it in windows add-ons and move on. Its like that one time
>at
>bandcamp when i was on a lan and didnt know my ip so i went to
>steve gibsons
>site.
Wow you are so 31337 to run over to Gibson's site. Case in point no
need to further clarify anything on my original post. Don't make an
ass out of yourself responding when you have one half of one half
of a smidgen of a clue.
> Note. I am sure anyone who has a purchased a stolen laptop ,
> it had a
>password on it. So the OS was already installed. just my .02
Instead of wasting time making yourself look more clueless you
should take some time and actually run along and learn something
productive. The message had nothing to do with a stolen laptop, it
had to do with defeating its protection. Whether or not it had/has
a password is irrelevant. And your last comment made no sense so
take your two cents and buy yourself a clue.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4
wkYEARECAAYFAkOvRFYACgkQo8cxM8/cskrwrwCfc5wIUtYDj1vt5e5A62IKSeNj8UEA
n0t1uEQ6cJfU51iu24hKwzaZRQpi
=gxB0
-----END PGP SIGNATURE-----
Concerned about your privacy? Instantly send FREE secure email, no account
required
http://www.hushmail.com/send?l=480
Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051225/69aa3557/attachment.html
Powered by blists - more mailing lists