first commit: readme, template, gnupg and prey
This commit is contained in:
commit
c2fb7deaa7
48 changed files with 6304 additions and 0 deletions
17
prey/images/.svn/all-wcprops
Normal file
17
prey/images/.svn/all-wcprops
Normal file
|
|
@ -0,0 +1,17 @@
|
|||
K 25
|
||||
svn:wc:ra_dav:version-url
|
||||
V 37
|
||||
/svn/!svn/ver/3/trunk/template/images
|
||||
END
|
||||
example-cat.jpg
|
||||
K 25
|
||||
svn:wc:ra_dav:version-url
|
||||
V 53
|
||||
/svn/!svn/ver/3/trunk/template/images/example-cat.jpg
|
||||
END
|
||||
example-graph.png
|
||||
K 25
|
||||
svn:wc:ra_dav:version-url
|
||||
V 55
|
||||
/svn/!svn/ver/3/trunk/template/images/example-graph.png
|
||||
END
|
||||
96
prey/images/.svn/entries
Normal file
96
prey/images/.svn/entries
Normal file
|
|
@ -0,0 +1,96 @@
|
|||
10
|
||||
|
||||
dir
|
||||
20
|
||||
http://html5slides.googlecode.com/svn/trunk/template/images
|
||||
http://html5slides.googlecode.com/svn
|
||||
|
||||
|
||||
|
||||
2011-05-20T16:49:11.026922Z
|
||||
3
|
||||
mwichary@google.com
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
5963eb91-a1a4-c111-6e9c-cdd99a89fa83
|
||||
|
||||
example-cat.jpg
|
||||
file
|
||||
|
||||
|
||||
|
||||
|
||||
2012-02-27T12:18:26.660134Z
|
||||
4f303579dca2d32b0426ddfa8df386e5
|
||||
2011-05-20T16:49:11.026922Z
|
||||
3
|
||||
mwichary@google.com
|
||||
has-props
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
386632
|
||||
|
||||
example-graph.png
|
||||
file
|
||||
|
||||
|
||||
|
||||
|
||||
2012-02-27T12:18:26.661134Z
|
||||
c1eacfa2b20a7d1000f1c463c2d4bc84
|
||||
2011-05-20T16:49:11.026922Z
|
||||
3
|
||||
mwichary@google.com
|
||||
has-props
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
26957
|
||||
|
||||
5
prey/images/.svn/prop-base/example-cat.jpg.svn-base
Normal file
5
prey/images/.svn/prop-base/example-cat.jpg.svn-base
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
K 13
|
||||
svn:mime-type
|
||||
V 24
|
||||
application/octet-stream
|
||||
END
|
||||
5
prey/images/.svn/prop-base/example-graph.png.svn-base
Normal file
5
prey/images/.svn/prop-base/example-graph.png.svn-base
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
K 13
|
||||
svn:mime-type
|
||||
V 24
|
||||
application/octet-stream
|
||||
END
|
||||
BIN
prey/images/.svn/text-base/example-cat.jpg.svn-base
Normal file
BIN
prey/images/.svn/text-base/example-cat.jpg.svn-base
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 378 KiB |
BIN
prey/images/.svn/text-base/example-graph.png.svn-base
Normal file
BIN
prey/images/.svn/text-base/example-graph.png.svn-base
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 26 KiB |
BIN
prey/images/location.png
Normal file
BIN
prey/images/location.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 156 KiB |
BIN
prey/images/logs.png
Normal file
BIN
prey/images/logs.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 34 KiB |
BIN
prey/images/picture.png
Normal file
BIN
prey/images/picture.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 131 KiB |
BIN
prey/images/screenshot.png
Normal file
BIN
prey/images/screenshot.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 118 KiB |
168
prey/index.html
Executable file
168
prey/index.html
Executable file
|
|
@ -0,0 +1,168 @@
|
|||
<!DOCTYPE html>
|
||||
|
||||
<!--
|
||||
Google HTML5 slide template
|
||||
|
||||
Authors: Luke Mahé (code)
|
||||
Marcin Wichary (code and design)
|
||||
|
||||
Dominic Mazzoni (browser compatibility)
|
||||
Charles Chen (ChromeVox support)
|
||||
|
||||
URL: http://code.google.com/p/html5slides/
|
||||
-->
|
||||
|
||||
<html>
|
||||
<head>
|
||||
<title>Mobilegräte verfolgen mit Prey</title>
|
||||
|
||||
<meta charset='utf-8'>
|
||||
<script src='../template/slides.js'></script>
|
||||
</head>
|
||||
|
||||
<body style='display: none'>
|
||||
<link rel="stylesheet" type="text/css" href="../template/mediacluster.css">
|
||||
|
||||
<section class='slides layout-regular template-default template-mediacluster'>
|
||||
|
||||
<article class='biglogo'>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h1>
|
||||
Mobilgeräte verfolgen
|
||||
<br>
|
||||
mit Prey (Entwurf)
|
||||
</h1>
|
||||
<p>
|
||||
Marco Ziesing
|
||||
<br>
|
||||
1. März 2012
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Zahlen und Fakten
|
||||
</h3>
|
||||
<ul>
|
||||
<li>Statistiken zufolge "verschwindet" jede Minute ein Notebook.</li>
|
||||
<li>alleine an US-Flughäfen wöchentlich ca. 12 000 Notebooks</li>
|
||||
<li>Handy-Diebstahl macht 85% aller Diebstahl-Meldungen auf Protexxo.de aus</li>
|
||||
<li>2 / 3 davon sind Smartphones</li>
|
||||
</ul>
|
||||
<ul>
|
||||
<li>IMEI und MAC-Adresse sind nicht hilfreich da veränderbar</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Mögliche Schäden durch verschwundene Geräte
|
||||
</h3>
|
||||
|
||||
<ul>
|
||||
<li>je nach Art des Verschwindens zahlt die Versicherung<br>... oder auch nicht</li>
|
||||
<li>Firmeninterna und private Daten fallen in fremde Hände</li>
|
||||
<li>gespeicherte Zugangsdaten können ausgelesen werden</li>
|
||||
<li>Apps mit hinterlegten Zugangsdaten können missbraucht werden</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Was ist Prey?
|
||||
</h3>
|
||||
<ul>
|
||||
<li>Open Source Computer Tracking Software</li>
|
||||
<li>verfügbar für Android, Linux, MacOS X und Windows</li>
|
||||
<li>iOS-Version ist derzeit noch im "Review"</li>
|
||||
<li>einzige „Eine für Alle“-Lösung am Markt</li>
|
||||
<li>bis zu 3 Geräte pro Nutzer kostenlos</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Was kann Prey?
|
||||
</h3>
|
||||
<ul>
|
||||
<li>Aktivierung per Push, SMS oder Webseite</li>
|
||||
<li>Geolokalisierung über GSP oder WLAN-Triangulation</li>
|
||||
<li>Sperren des Geräts bis zur Eingabe des Passworts</li>
|
||||
<li>E-Mails verstecken, Cookies und gespeicherte<br>Passwörter löschen</li>
|
||||
<li>Lautstarker Alarm</li>
|
||||
<li>Nachricht auf dem Display anzeigen</li>
|
||||
<li>SIM-Lock, automatische Aktivierung bei Tausch</li>
|
||||
<li>Berichte senden (IP-Adressen, Position, Kamerabild, Screenshot, Protokolle der geänderten Dateien und laufenden Prozesse)</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Position
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' src='images/location.png'>
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Kamerabild
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' src='images/picture.png'>
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Screenshot
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' src='images/screenshot.png'>
|
||||
</p>
|
||||
<div class="build" style="margin: 30px 0 0 0;">
|
||||
<p>
|
||||
Sehr geschickt, wenn die Person z.B. auf Facebook ist. ;-)
|
||||
</p>
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Screenshot
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' style='height: 550px;' src='images/logs.png'>
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Präventionstipps
|
||||
</h3>
|
||||
<ul style="margin: 20px 0 0 0.75em">
|
||||
<li>Laptop & Smartphone möglichst nicht aus den Augen lassen</li>
|
||||
<li>Keine auffällige, als solche erkennbare, Laptop-Tasche</li>
|
||||
<li>empfindliche Daten nicht oder nur verschlüsselt speichern</li>
|
||||
<li>Seriennummern notieren, um sie nach einem Diebstahl der Polizei mitteilen zu können</li>
|
||||
</ul>
|
||||
<h3 style='margin: 30px 0 0 0;'>
|
||||
Links
|
||||
</h3>
|
||||
<ul style="margin: 20px 0 0 0.75em">
|
||||
<li><a href="http://preyproject.com/">Projektseite</a></li>
|
||||
<li><a href="http://preyproject.com/blog/cat/recoveries">Erfolgsberichte</a></li>
|
||||
</ul>
|
||||
<ul style="margin: 20px 0 0 0.75em">
|
||||
<li><a style="font-size: 70%;" href="http://www.youtube.com/watch?v=U4oB28ksiIo">Pwned by the owner:<br>What happens when you steal a hackers computer</a></li>
|
||||
</ul>
|
||||
|
||||
</article>
|
||||
|
||||
</section>
|
||||
|
||||
</body>
|
||||
</html>
|
||||
181
prey/index.html~
Executable file
181
prey/index.html~
Executable file
|
|
@ -0,0 +1,181 @@
|
|||
<!DOCTYPE html>
|
||||
|
||||
<!--
|
||||
Google HTML5 slide template
|
||||
|
||||
Authors: Luke Mahé (code)
|
||||
Marcin Wichary (code and design)
|
||||
|
||||
Dominic Mazzoni (browser compatibility)
|
||||
Charles Chen (ChromeVox support)
|
||||
|
||||
URL: http://code.google.com/p/html5slides/
|
||||
-->
|
||||
|
||||
<html>
|
||||
<head>
|
||||
<title>Mobilegräte verfolgen mit Prey</title>
|
||||
|
||||
<meta charset='utf-8'>
|
||||
<script src='../template/slides.js'></script>
|
||||
</head>
|
||||
|
||||
<body style='display: none'>
|
||||
<link rel="stylesheet" type="text/css" href="../template/mediacluster.css">
|
||||
|
||||
<section class='slides layout-regular template-default template-mediacluster'>
|
||||
|
||||
<article class='biglogo'>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h1>
|
||||
Mobilgeräte verfolgen
|
||||
<br>
|
||||
mit Prey (Entwurf)
|
||||
</h1>
|
||||
<p>
|
||||
Marco Ziesing
|
||||
<br>
|
||||
1. März 2012
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Zahlen und Fakten
|
||||
</h3>
|
||||
<ul>
|
||||
<li>Statistiken zufolge "verschwindet" jede Minute ein Notebook.</li>
|
||||
<li>alleine an US-Flughäfen wöchentlich ca. 12 000 Notebooks</li>
|
||||
<li>Handy-Diebstahl macht 85% aller Diebstahl-Meldungen auf Protexxo.de aus</li>
|
||||
<li>2 / 3 davon sind Smartphones</li>
|
||||
</ul>
|
||||
<ul>
|
||||
<li>IMEI und MAC-Adresse sind nicht hilfreich da veränderbar</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Mögliche Schäden durch verschwundene Geräte
|
||||
</h3>
|
||||
|
||||
<ul>
|
||||
<li>je nach Art des Verschwindens zahlt die Versicherung<br>... oder auch nicht</li>
|
||||
<li>Firmeninterna und private Daten fallen in fremde Hände</li>
|
||||
<li>gespeicherte Zugangsdaten können ausgelesen werden</li>
|
||||
<li>Apps mit hinterlegten Zugangsdaten können missbraucht werden</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Was ist Prey?
|
||||
</h3>
|
||||
<ul>
|
||||
<li>Open Source Computer Tracking Software</li>
|
||||
<li>verfügbar für Android, Linux, MacOS X und Windows</li>
|
||||
<li>iOS-Version ist derzeit noch im "Review"</li>
|
||||
<li>einzige „Eine für Alle“-Lösung am Markt</li>
|
||||
<li>bis zu 3 Geräte pro Nutzer kostenlos</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Was kann Prey?
|
||||
</h3>
|
||||
<ul>
|
||||
<li>Aktivierung per Push, SMS oder Webseite</li>
|
||||
<li>Geolokalisierung über GSP oder WLAN-Triangulation</li>
|
||||
<li>Sperren des Geräts bis zur Eingabe des Passworts</li>
|
||||
<li>E-Mails verstecken, Cookies und gespeicherte<br>Passwörter löschen</li>
|
||||
<li>Lautstarker Alarm</li>
|
||||
<li>Nachricht auf dem Display anzeigen</li>
|
||||
<li>SIM-Lock, automatische Aktivierung bei Tausch</li>
|
||||
<li>Berichte senden (IP-Adressen, Position, Kamerabild, Screenshot, Protokolle der geänderten Dateien und laufenden Prozesse)</li>
|
||||
</ul>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Position
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' src='images/location.png'>
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Kamerabild
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' src='images/picture.png'>
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Screenshot
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' src='images/screenshot.png'>
|
||||
</p>
|
||||
<div class="build" style="margin: 30px 0 0 0;">
|
||||
<p>
|
||||
Sehr geschickt, wenn die Person z.B. auf Facebook ist. ;-)
|
||||
</p>
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Beispielbericht: Screenshot
|
||||
</h3>
|
||||
<p>
|
||||
<img class='centered' style='height: 550px;' src='images/logs.png'>
|
||||
</p>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<h3>
|
||||
Präventionstipps
|
||||
</h3>
|
||||
<ul style="margin: 20px 0 0 0.75em">
|
||||
<li>Laptop & Smartphone möglichst nicht aus den Augen lassen</li>
|
||||
<li>Keine auffällige, als solche erkennbare, Laptop-Tasche</li>
|
||||
<li>empfindliche Daten nicht oder nur verschlüsselt speichern</li>
|
||||
<li>Seriennummern notieren, um sie nach einem Diebstahl der Polizei mitteilen zu können</li>
|
||||
</ul>
|
||||
<h3 style='margin: 30px 0 0 0;'>
|
||||
Links
|
||||
</h3>
|
||||
<ul style="margin: 20px 0 0 0.75em">
|
||||
<li><a href="http://preyproject.com/">Projektseite</a></li>
|
||||
<li><a href="http://preyproject.com/blog/cat/recoveries">Erfolgsberichte</a></li>
|
||||
</ul>
|
||||
<ul style="margin: 20px 0 0 0.75em">
|
||||
<li><a style="font-size: 70%;" href="http://www.youtube.com/watch?v=U4oB28ksiIo">Pwned by the owner:<br>What happens when you steal a hackers computer</a></li>
|
||||
</ul>
|
||||
|
||||
</article>
|
||||
|
||||
</section>
|
||||
|
||||
<!-- Piwik -->
|
||||
<script type="text/javascript">
|
||||
var pkBaseURL = (("https:" == document.location.protocol) ? "https://stats.mediacluster.de/" : "http://stats.mediacluster.de/");
|
||||
document.write(unescape("%3Cscript src='" + pkBaseURL + "piwik.js' type='text/javascript'%3E%3C/script%3E"));
|
||||
</script><script type="text/javascript">
|
||||
try {
|
||||
var piwikTracker = Piwik.getTracker(pkBaseURL + "piwik.php", 67);
|
||||
piwikTracker.setDocumentTitle(document.title);
|
||||
piwikTracker.trackPageView();
|
||||
piwikTracker.enableLinkTracking();
|
||||
} catch( err ) {}
|
||||
</script><noscript><p><img src="http://stats.mediacluster.de/piwik.php?idsite=67" style="border:0" alt="" /></p></noscript>
|
||||
<!-- End Piwik Tracking Code -->
|
||||
</body>
|
||||
</html>
|
||||
Loading…
Add table
Add a link
Reference in a new issue