{"id":1341,"date":"2011-05-26T09:37:18","date_gmt":"2011-05-26T15:37:18","guid":{"rendered":"http:\/\/thepizzy.net\/blog\/?p=1341"},"modified":"2011-05-26T09:37:18","modified_gmt":"2011-05-26T15:37:18","slug":"idea-location-announcing-security-system-for-computers","status":"publish","type":"post","link":"https:\/\/thepizzy.net\/blog\/2011\/05\/idea-location-announcing-security-system-for-computers\/","title":{"rendered":"IDEA: Location Announcing Security System for Computers"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1342\" data-permalink=\"https:\/\/thepizzy.net\/blog\/2011\/05\/idea-location-announcing-security-system-for-computers\/map_location1\/\" data-orig-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1.jpg?fit=500%2C332&amp;ssl=1\" data-orig-size=\"500,332\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"map_location1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1.jpg?fit=500%2C332&amp;ssl=1\" class=\"alignright size-medium wp-image-1342\" src=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1-300x199.jpg?resize=300%2C199\" alt=\"Source: visionmobile.com\" width=\"300\" height=\"199\" srcset=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>I know there are ideas like this, but this is just another way to approach the issue.<\/p>\n<p>I want to create a &#8220;Security Virus&#8221; (a virus, in that it can&#8217;t easily be removed\/disabled) that when the computer is turned on tries to ping a known locally-hosted IP and verify the MAC address of the target. If it can&#8217;t verify\/ping the target, it disables any usage of the UI, sends location data through Google Chrome, Firefox, or IE9&#8217;s location sharing capability to the owner&#8217;s email, and then turns itself off.<\/p>\n<p>It would be even better on laptops with a 3G\/Mobile data plan that it could automatically connect to in order to send the location data.<\/p>\n<p>The purpose would be to help recover stolen computers. I know there are location-aware services for mobile devices and creative people have been able to recover stolen computers that have stupidly been put on the network. I&#8217;m also sure there are some pitfalls to this idea&#8230;what do you think?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taking another approach to location-announcing computer security systems using features of modern browsers.<\/p>\n","protected":false},"author":1,"featured_media":1342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,15],"tags":[887,888,886,889,200],"class_list":["post-1341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","category-thought_experiments","tag-computer-security","tag-location-announcing","tag-location-awareness","tag-modern-browsers","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/05\/map_location1.jpg?fit=500%2C332&ssl=1","jetpack_likes_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/prOO4-lD","jetpack-related-posts":[{"id":2070,"url":"https:\/\/thepizzy.net\/blog\/2015\/07\/skywarn-storm-spotter-status-v2\/","url_meta":{"origin":1341,"position":0},"title":"SKYWARN &#8211; Storm Spotter Status &#8211; v2","author":"[[Neo]]","date":"July 5, 2015","format":false,"excerpt":"In a section of this site called the \"PizzyLabs,\" you'll find a link to a service I created called \"SKYWARN Storm Spotter Status\". A little over a year ago,\u00c2\u00a0I wrote about my creation of a service to check Hazardous Weather Outlooks (HWOs) that were posted to the National Weather Service\u2026","rel":"","context":"In &quot;Labs&quot;","block_context":{"text":"Labs","link":"https:\/\/thepizzy.net\/blog\/category\/labs\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2014\/05\/2015-07-05_1318.png?fit=1200%2C745&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2014\/05\/2015-07-05_1318.png?fit=1200%2C745&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2014\/05\/2015-07-05_1318.png?fit=1200%2C745&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2014\/05\/2015-07-05_1318.png?fit=1200%2C745&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2014\/05\/2015-07-05_1318.png?fit=1200%2C745&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":227,"url":"https:\/\/thepizzy.net\/blog\/2009\/03\/how-to-use-live-mesh-to-sync-your-programs\/","url_meta":{"origin":1341,"position":1},"title":"How to sync your program\u00e2\u20ac\u2122s plugins using Live Mesh","author":"[[Neo]]","date":"March 14, 2009","format":false,"excerpt":"I'm sure you've been at work, thinking \"Crap, I don't want to go home and do this, because I don't have the software there.\" Or maybe you do have the software, but you don't have some certain set of plugins (i.e. Photoshop Brushes for a graphic designer), and you need\u2026","rel":"","context":"In &quot;Cloud Computing&quot;","block_context":{"text":"Cloud Computing","link":"https:\/\/thepizzy.net\/blog\/category\/cloud-computing-concepts\/"},"img":{"alt_text":"Welcome to Mesh.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2009\/03\/2009-03-14_1329-150x150.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1227,"url":"https:\/\/thepizzy.net\/blog\/2011\/03\/att-begins-service-to-text-users-in-certain-locations-nytimes-com\/","url_meta":{"origin":1341,"position":2},"title":"AT&#038;T Begins Service to Text Users in Certain Locations","author":"[[Neo]]","date":"March 1, 2011","format":false,"excerpt":"According to the New York Times,\u00c2\u00a0AT&T is going to launch a text-message service to send SMS messages to customers in certain locations. Um, hell no! It's called \"ShopAlerts\" and is designed to allow \"brand-partners\" (i.e. HP, Kmart, JetBlue, S.C. Johnson, etc.) to send advertisements and coupons to customers who happen\u2026","rel":"","context":"In &quot;Privacy's a Joke&quot;","block_context":{"text":"Privacy's a Joke","link":"https:\/\/thepizzy.net\/blog\/category\/security-tech\/privacys-a-joke\/"},"img":{"alt_text":"Source: nytimes.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/03\/28Ads-blog4801.jpg?fit=480%2C304&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":580,"url":"https:\/\/thepizzy.net\/blog\/2010\/06\/how-to-program-a-human-part-3-communication\/","url_meta":{"origin":1341,"position":3},"title":"How to Program a Human &#8211; Part 3: Communication","author":"[[Neo]]","date":"June 9, 2010","format":false,"excerpt":"I was talking with my girlfriend who mentioned that in her Speech class they were discussing the forms of Communication and what exactly is taking place. Inflection, body language, verbal sounds - the whole adage \"Communication is 10% what you say and 90% what you don't say\". I view these\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/thepizzy.net\/blog\/category\/tech\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/06\/neural-network1.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":977,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-plug-your-personal-information-leaks\/","url_meta":{"origin":1341,"position":4},"title":"How to plug your personal information leaks","author":"[[Neo]]","date":"January 17, 2011","format":false,"excerpt":"If you don't know where your personal information could be leaked, you'll never know where to plug it. Here's some of the common holes.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/4199131336_63c0e1d1621-225x300.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1309,"url":"https:\/\/thepizzy.net\/blog\/2011\/04\/4-steps-to-lock-safesearch-on-google-search-results\/","url_meta":{"origin":1341,"position":5},"title":"4 Steps to Lock SafeSearch on Google search results","author":"[[Neo]]","date":"April 18, 2011","format":false,"excerpt":"4 simple steps to Lock the Google SafeSearch settings to Strict using your Google Account, so explicit material never shows up in your results.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/04\/Google-s-SafeSearch-Setting-Can-Now-Be-Locked-21.jpg?fit=350%2C350&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/1341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/comments?post=1341"}],"version-history":[{"count":4,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/1341\/revisions"}],"predecessor-version":[{"id":1346,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/1341\/revisions\/1346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media\/1342"}],"wp:attachment":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media?parent=1341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/categories?post=1341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/tags?post=1341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}