Alright I think with everyone's help, I have a sound plan that will raise the chances of recovering any laptops or even desktop should one every disappear.
1) I setup a personal proxy in the office that all systems connect to for blocks. This means I don't have to setup each one to leave the proxy because it's all handled by the pproxy. Password changes will not cause wandering cows.
2) Dnet client is installed as a service on all systems.
3) 500 blocks are buffered on each system. Small notebooks that get very hot crack 100 blocks per session and then stop (of course I could forget that feature for people I am not partial to 🙂). Larger notebooks and desktops will crack 100% of the time.
4) If the PC is in the office, the blocks get flushed to the pproxy.
5) If one road and use connects via secure dialin, blocks get flushed through the VPN and back to the proxy
6) Should the system get stolen, the pproxy will not be found. I have setup the client to passively look for a dialup connection and fallback to a dnet server. Should the thief connect, any cracked blocks should be flushed to Dnet.
I'm also hoping to "dupe" any potential thief into dialing up. I may load a some sort of dialup connection (NetZero etc...) and have a nice text file on the desktop called, "My Passwords" of something like that. Hopefully some theif will try to pry a little and dialup.
It is impossible for a thief to use our crypto token because it requires a personal PIN to turn on and a very exact dialin procedure.
How does this all sound.
Windogg
1) I setup a personal proxy in the office that all systems connect to for blocks. This means I don't have to setup each one to leave the proxy because it's all handled by the pproxy. Password changes will not cause wandering cows.
2) Dnet client is installed as a service on all systems.
3) 500 blocks are buffered on each system. Small notebooks that get very hot crack 100 blocks per session and then stop (of course I could forget that feature for people I am not partial to 🙂). Larger notebooks and desktops will crack 100% of the time.
4) If the PC is in the office, the blocks get flushed to the pproxy.
5) If one road and use connects via secure dialin, blocks get flushed through the VPN and back to the proxy
6) Should the system get stolen, the pproxy will not be found. I have setup the client to passively look for a dialup connection and fallback to a dnet server. Should the thief connect, any cracked blocks should be flushed to Dnet.
I'm also hoping to "dupe" any potential thief into dialing up. I may load a some sort of dialup connection (NetZero etc...) and have a nice text file on the desktop called, "My Passwords" of something like that. Hopefully some theif will try to pry a little and dialup.
It is impossible for a thief to use our crypto token because it requires a personal PIN to turn on and a very exact dialin procedure.
How does this all sound.
Windogg