Bio professor owns one student!

Page 10 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

sxr7171

Diamond Member
Jun 21, 2002
5,079
40
91
Originally posted by: jamesbond007
In regards to the possible transponder in the laptop, doesn't IBM have some kind of BIOS/tool in their laptops these days that report where it is online, no matter if you change NICs or dialup? I thought that was a feature I saw in a commercial a while ago. It was an anti-theft utility.

Could this be what the professor was talking about? If so, he has some legitmacy there.

JustAnAverageGuy, thanks for another mirror!

Only on newer T42s: Here
 

Dave332

Member
Jun 24, 2004
78
0
0
This prof is full of S|-|1t. If Redmond called every time the same cd key was used on multiple IP's, everyone would have to have a static IP address assigned per person and it would have to follow them if they owned a laptop *cough* Like the Professor *cough*. If any of the organizations listed genuinely cared about this at all, this guy would be getting sodomized in federal prison right now. These "transponders" do actually exist, but as far as I know they provide less security for the original owner than the wireless card, as they will only be logged by whoever is specifically looking for them, whereas the MAC from the wireless card would show up in the DHCP logs of every network the guy entered. If there was a legitimate partial image and two eyewitnesses, this guy would not have any laptop. Blue collar criminals are often brought in on less. Lastly, if this student is concered about his wellbeing, I have one word for him: THERMITE
 

sxr7171

Diamond Member
Jun 21, 2002
5,079
40
91
Originally posted by: 0roo0roo
its a shame ibm sold off to lenvo..grr. thats a nice feature.

Who cares, the laptops and then teams that design them are the same. Do you think they'd alienate a customer base like Thinkpad owners?
 

sxr7171

Diamond Member
Jun 21, 2002
5,079
40
91
Originally posted by: Dave332
Also, why is Berkely using windows? Didn't they write BSD?

So they have to exclusively run BSD on all their machines including individual laptops?
 

Dave332

Member
Jun 24, 2004
78
0
0
Originally posted by: sxr7171
Originally posted by: Dave332
Also, why is Berkely using windows? Didn't they write BSD?

So they have to exclusively run BSD on all their machines including individual laptops?


No, but I would certainly try to push my own invention(s) at my own school. I guess it really doesn't matter. Also, I don't attend berkely (what with my living in Colorado), so I don't really know how prevalent BSD is there.

PS: I'm not a BSD whore, I promise.
 
Nov 7, 2000
16,403
3
81
Originally posted by: sxr7171
Originally posted by: HardcoreRobot
i would actually venture to say the student that stole the laptop pwned the prof

Somehow I don't buy the whole story him getting a call from Redmond over the same copy of Windows on two machines. I do believe that the MAC address was logged somewhere on campus but, he just told him how to avoid that in the future.
This is what a was referring to. The prof is so full of shlt, this is just his last desperate attempt because he really has no other option. If he had military grade secrets, the laptop sure as hell is going to be protected with biometrics or bios-level hdd encryption or some other protection that most people wouldn't bother trying to crack just to get some test answers. GG prof
 

Armitage

Banned
Feb 23, 2001
8,086
0
0
Originally posted by: HardcoreRobot
Originally posted by: sxr7171
Originally posted by: HardcoreRobot
i would actually venture to say the student that stole the laptop pwned the prof

Somehow I don't buy the whole story him getting a call from Redmond over the same copy of Windows on two machines. I do believe that the MAC address was logged somewhere on campus but, he just told him how to avoid that in the future.
This is what a was referring to. The prof is so full of shlt, this is just his last desperate attempt because he really has no other option. If he had military grade secrets, the laptop sure as hell is going to be protected with biometrics or bios-level hdd encryption or some other protection that most people wouldn't bother trying to crack just to get some test answers. GG prof

Erm ... nope.
But then you sure as hell don't leave laptops with classified information just laying around, or it's your ass.
 

brxndxn

Diamond Member
Apr 3, 2001
8,475
0
76
The prof's full of shit.. LOL @ Microsoft checking the same key every time Windows is installed. LOL @ 'wireless transponder'.. LOL @ 'omg uber secret trade secrets'

All I saw in that was desperation. Poor prof.

 

Phoenix86

Lifer
May 21, 2003
14,644
10
81
LMAO, the only ownage I see is the prof. being owned by the firms he's consulting for.

He's obviously scared sh!tless about the fact HIS ass is on the line for anything that got stolen.

"I am the only person in the world who can verify the integrity of the data and prove it hasn't been copied"

LMAO. OK, whatever. What' a moron.
 

Thegonagle

Diamond Member
Jun 8, 2000
9,773
0
71
Originally posted by: tami
Originally posted by: Thegonagle
Installation instructions for RP Panzies: In order to instal RP, download the free version from www.real.com, choose custom install (if you don't do this for every single program you install anyway, you're a dummy who deserves what you get), and make sure that only Real Media formats are checked. Doing this will cause the installation to (gasp!) leave all your other media players alone.

After the install, the only extra process it runs at bootup is a program called realsched.exe, which auto-checks for program and "content" updates, and messages from Real Networks. Disabling this (or, "all that extra crap that takes over your computer," as I've occasionally heard it called) is as easy as it gets: delete the exe. RP does not complain, does not error, and the exe won't reinstall itself.

why download RP when you can use real alternative? :confused:

Because Real Alternative is not working for many people.

It doesn't matter anymore for this thread because it's been converted to other formats, but I don't mind Real Player because compared to WMA streams, Real Audio just sounds a lot better for the same bandwidth, and a lot of good/interesting streams out there use Real Media exclusively.
 

sxr7171

Diamond Member
Jun 21, 2002
5,079
40
91
Originally posted by: Thegonagle
Originally posted by: tami
Originally posted by: Thegonagle
Installation instructions for RP Panzies: In order to instal RP, download the free version from www.real.com, choose custom install (if you don't do this for every single program you install anyway, you're a dummy who deserves what you get), and make sure that only Real Media formats are checked. Doing this will cause the installation to (gasp!) leave all your other media players alone.

After the install, the only extra process it runs at bootup is a program called realsched.exe, which auto-checks for program and "content" updates, and messages from Real Networks. Disabling this (or, "all that extra crap that takes over your computer," as I've occasionally heard it called) is as easy as it gets: delete the exe. RP does not complain, does not error, and the exe won't reinstall itself.

why download RP when you can use real alternative? :confused:

Because Real Alternative is not working for many people.

It doesn't matter anymore for this thread because it's been converted to other formats, but I don't mind Real Player because compared to WMA streams, Real Audio just sounds a lot better for the same bandwidth, and a lot of good/interesting streams out there use Real Media exclusively.

Yeah I used to do the custom install of Real Player and the pain in the a$$ it involves + look at that g_d-awful interface and other bull$hit, until I found Real Altenative. It works. It basically installs the actual Real codecs and lets you watch it WMV classic. How perfect.
 

sxr7171

Diamond Member
Jun 21, 2002
5,079
40
91
Originally posted by: deejayshakur
maybe a bluff, but it was a good speech

The second time you watch it, you can actually see the nervousness that the guy has in making his bluff. Which it is looking like more and more. I guess sometimes the bad guys win.

Transponder, yeah right. He wasn't bothered enough to backup/encrypt/secure his data. Obviously he didn't have the foresight to install a transponder in there.

He also tried to get the guy to act in the heat of the moment by making it seem like he had to act immediately to avoid getting into far deeper trouble. Many a person without steel nerves would have caved because of the immediate fear after hearing that announcement. People usually don't make sound decisions when they are scared $hitless. If he can hold off until the fear subsides, odds are he'll have the sense to call the prof's bluff.
 

sxr7171

Diamond Member
Jun 21, 2002
5,079
40
91

PcktRcktsAA

Senior member
Dec 5, 2003
283
0
0
if you follow the original link, they cut off the 'threat' at the end. guess they are catching on. bummer.
 

sparkyclarky

Platinum Member
May 3, 2002
2,389
0
0
Originally posted by: vood0g
i am bored at work. so for those who cant see it, this is what was said:

Thanks. That prof is full of it. Microsoft almost never investigates single instances of piracy. Rather they focus their attention on businesses pirating and pirates selling copies (e.g. anybody making money off of their intellectual property).

Triangulating the laptop via wifi is a joke. The most they could do would be narrow down which access point the thief was connecting to, and if they are like the UW is, who the thief is based upon login identification. Of course this all assumes that the prof wrote down the mac addy of the laptop, which seems somewhat unlikely unless it was university property and thus in some inventory somewhere.

The companies being royalled ticked off about IP being taken seems reasonable, but given the BS spouted in his first two points, I have reason to doubt the third.

However, many thiefs, especially those willing to rip off a laptop for an easy test grade, aren't all that bright. So they just might fall for such obvious scare tactics.

 

tyim

Senior member
Jan 1, 2002
807
0
0
90% chance his MAC was registered to get on Berkeley's network. (I'm a student and work in Berkeley's IT). For wifi, access point tracking is all probably. For a NIC access, if the ips are set statically...it could theoretically be possible to have a map of the location of ips (though quite unlikely).
 

Rudee

Lifer
Apr 23, 2000
11,218
2
76
Far from "pwned" as you kiddies say. I suppose if I was a young person this might possibly scare me, but I found his empty threats laughable. It would of been "pwned" if after the speech the prof walked right up to the suspect and said or did something, but he didn't. These are nothing but empty threats and the prof has no clue who has it. It's a bluf.
 

ViciouS

Golden Member
Apr 1, 2001
1,257
0
0
Pwned my a$$, id steal the info reformat and sell it before that douche bag professor is done banging the cabana boy on his vacation. All that sh1t he was talking was so that he could get his computer back and no one would see the bestiality porn he downloads. Total B.S. he is desperate and that?s what that whole 5 minute speech was about, total 100% bluff.

Professor - Laptop + Bluffing + Scare tactics = 1 Professor PWNED

Federal Marshals LOLOLOLOLOLOLOLOL!


*Edit. OP change subject to Professor Pwned please.