From: "Dustin" <bughunter.dustin@gmail.com>

> "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in
> news:j47jmm01ben@news4.newsguy.com:
>
>> From: "Dustin" <bughunter.dustin@gmail.com>
>>
>>> "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in
>>> news:j46lig02i2d@news3.newsguy.com:
>>>
>>>> It may be used w/o Internet access.
>>>
>>> For a period of time. You paid for the software and the monitoring
>>> service which comes with it. You are understanding that you will
>>> provide it a way to check in every so often, or it will, for your
>>> protection, bios lock the boot process.
>>>
>>>> It may be used on a closed network.
>>>
>>> Actually, the dropped exe brags about being able to call home
>>> regardless of firewall presence and network configuration.
>>>
>>>> It may be used as a tool or lab device.
>>>
>>> A tool for what?
>>>

>>
>> You aren't getting it. When I say a closed network I mean a "closed
>> network" as in a closed loop without any Internet access at all. A
>> private network. Two come to mind.
>>
>> There are times when a notebook will be used as an instrument or
>> toolo to setup other equipment such as programming radios. The
>> notebook has specialty software and via USB hooks up to the
>> equipment and the notebook's software is used to setup and programme
>> the device.

>
> I gotcha. In those cases, Lojack probably wouldn't fit the bill. It has
> to be able to call home every so often. To ehh, check in.
>
>


Right and those cases can be "exploited" (so to speak) to prevent LE from using LoJack
recovery successfully.

Lets say that the ROM code is able to communicate directly to the NIC. It isn't far
fetched. The ROM code would be hard coded for the embedded NIC and use Crynwar Packet
Drivers or NDIS2 stack. Disable the embedded NIC and install your own NIC. Thus the ROM
code for the embedded NIC would fail and wouldn't be able to use the installed NIC (e.g.,
PCMCIA, USB, etc). Install Linux and drivers for the new NIC and the whole process is
thwarted. Of course the thief has to be tech savvy to use thwarting techniques which,
initially, would low incidence occurrence.

--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp