![]() |
Twitter Used to Retrieve Stolen Laptop
http://news.yahoo.com/s/yblog_nyobserver/dont-steal-computer-from-people-who-know-how-to-use-computers-part-deux
First it was cell phone cameras used to identify crooks, now it's social networking sites... |
Quote:
|
Software is called "Prey"...
Only the crooks should panic...kind of like the old song: "Nowhere, to run, nwhere to hide..." |
All times are GMT -5. The time now is 04:29 PM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.