Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida.

Slides:



Advertisements
Similar presentations
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Teamviewer Developed By: Rene Nodarse & Joseph Hernandez Advisor : Dr.
Advertisements

Cloud Computing at GES DISC Presented by: Long Pham Contributors: Aijun Chen, Bruce Vollmer, Ed Esfandiari and Mike Theobald GES DISC UWG May 11, 2011.
SECAM Systems Product Presentation SECAM Systems © 2010.
System Optimization Agent Procedures using Kaseya Developed By: Jason Aparcana Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Microsoft's Windows Azure. Microsoft's Windows Azure Platform is a cloud platform offering, that "provides a wide range of Internet services that can.
1 Rhode Island Transportation Information System. (RITIS) Spring, 2000.
AD Maintenance via PowerShell Developed By: Mario Eirea Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to ManageEngine’s Msp Center Plus Developed By: & Advisor : Dr. S. Masoud.
WHAT IS A COMPUTER? BY JACK SUMMERS. WHAT IS A COMPUTER? A computer basically a set of different components that when put together in the correct way.
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and.
SCRIPTS INDEPENDENT STUDY CHELSEA W. THE IDEA Study how to adapt a story into different types of scripts with correct formatting Different scripts included:
RTFDDA/CFDDA/E-RTFDDA Resources. Repositories –CVS –Data Sources Documentation & Useful Information –Internal –External –Mailing lists/aliases –Misc Web.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
 At the end of this class, students are able to  Describe definition of input devices clearly  List out the examples of input devices  Describe.
MIT Libraries’ FileMaker Use Policy as an example local DLC policy.
Setting IE Home Page and Starting IE after User Logins Using Kaseya Developed By: Paola Nunez Advisor : Dr. S. Masoud Sadjadi School of Computing and Information.
Introduction CSE 1310 – Introduction to Computers and Programming
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Checking Network/Port Connectivity using Kaseya Agent Procedures Developed By: Emmanuel Giboyeaux Advisor : Dr. S. Masoud Sadjadi School of Computing and.
Jeremy Hamman & Greg Wemer Wright State University Managing a Mac Dual Deployment.
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Customization.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Homeland Security System Danny Butler EKU, Dept. of Technology.
NYS Forum IT Greening Workgroup Thin Client Devices DHCR Experience with Virtual Desktops June 12, 2010.
AtGentive – CELN role. CELN Tasks Project web page (WP6) Pilot project at schools (WP5) Assessment & Consolidation (WP6) Exploitation plan (WP6)
CEN th Lecture CEN 4021 Software Engineering II Instructor: Masoud Sadjadi Software Project Planning.
Se Over the past decade, there has been an increased interest in providing new environments for teaching children about computer programming. This has.
Antivirus Decommission and Deployment using Kaseya Developed By: Celia McFadden Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
VIRTUAL SYSTEM ADMINISTRATION
A Feature-Based of IT Automation using Kaseya Developed By: Gregory Hayes Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Final Demonstration of the AgentCubes Web API Scott Keller Erin Rowland Stuart Reed Michael Wally George McCabe dy· na· mo: (n.) A generator 1Erin Rowland.
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement A Competitive Analysis of.
A Feature-Based of IT Automation using Kaseya andAuslogics Registry Cleaner Developed By: Krystle Crawford Advisor : Dr. S. Masoud Sadjadi School of Computing.
School of Computing & Information Sciences IT AUTOMATION Developed by Dr. Masoud Sadjadi Powered by Kaseya & IT Scholars Last updated on August 20, 2012.
Kill and Uninstall Multiple Running Anti-Virus Programs using Kaseya Developed By: Jasmine English Advisor : Dr. S. Masoud Sadjadi School of Computing.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Chapter 14 The User View of Operating Systems The Architecture of Computer Hardware and Systems Software: An Information Technology Approach 3rd Edition,
Types of Technology Used in Today’s Business World Blake Boykin.
Lighting Design aided by Activity Zones and Context-Aware Computing Andy Perelson Advisor: Kimberle Koile.
Joint Housing and potential internship. Expanding Scarlett commons Two families of one or two parents in a room and one or two children in a room for.
An Overview of the AgentCubes Web API Scott Keller Erin Rowland Stuart Reed Michael Wally George McCabe dy· na· mo: (n.) A generator 1Erin Rowland.
A Feature-Based of IT Automation using Remote Control on Safe Mode Developed By: Fernando Perez Advisor : Dr. S. Masoud Sadjadi School of Computing and.
A Feature-Based of IT Automation using Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.
Today in CS161 Week #1 The Science of Computing What does it mean to write a program How is game programming different? Consider using Computer Graphics.
Business Communications Paradigm Shift telephone web conferencing teleconferencing two-party video multi-party video tools.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
A web based tool for estimation of Gage R&R and Measurement Uncertainty Siva Venkatachalam & Dr. Jay Raja Center for Precision Metrology The University.
Introduction.  This training session aims to;  Familiarise you with what a visualiser is and how you can use one to aid your teaching.
IT Automation: The Technology Behind Managed Services Wes Powell, Information Technology Consultant.
How to Recover Data from SanDisk Memory Card ?. 2 Sources:
1 Thinking What are the top three ways that you use your computer? What type of programs do you use for these functions? 2 Web Search What is.
Happy Endings: Reengineering Wesleyan’s Software Deployment to Labs and Classrooms Kyle Tousignant 03/22/2016.
Web Browsing Policy Compliance Monitoring Using Keylogging
Why Won’t My Arduino Work?
G&W Chapter 5: Starting Points Software Specification Lecture 12
Software Chapter 11.
How to Create Mac OS X Recovery Partition?
HOW TO FIX MACOS INSTALLATION PROBLEM ON YOUR COMPUTER?
I.III Implementation I. Introduction III. Layers I.II Approach
Disable/Enable CD-ROM devices using Kaseya-Agent Procedures
Data-driven Depth Inference from a Single Still Image
More than just a cool Toy
Moving Your Customizations to the cloud
FEniCS = Finite Element - ni - Computational Software
Senior Project 2018, Spring Problem Solution Current System
System Design and Implementation
Nagios with The Decision Engine Implementing Passive Checks
Presentation transcript:

Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International University Your

Agenda Problem and Motivation Solution Behind the Scene Customizing the Solution Disclaimer Progress Report

Problem and Motivation: Laptop theft is a very common problem. Specifically we will focus on the FIU environment where the school has experienced a rash of laptop thefts particularly Mac.

Fig 1.1

Solution We will use the following agent procedures Camera Picture Capture and a few additional procedures to aid in an effort to recover stolen laptops.

Fig 2.1

Behind the Scene Capture camera uses the port “isightcapture” to turn the web camera on silently behind the scenes and take pictures of the user and stores the pictures in the Kserver.

Fig life/computers/sprung-by-facebook-geek-justice-for- pornsurfing-laptop-thief ehpa.html life/computers/sprung-by-facebook-geek-justice-for- pornsurfing-laptop-thief ehpa.html

Customizing the Solution There is a lot of room for customization with this project and ideas such as expanding our range…. Include PCs in recovery Running a script to check to see what platform the computer is before implementing any script. Running a script to check if the computer has a webcam.

Disclaimer The agents procedures are attended to work with Mac and requires the computer already have Kaseya already installed If the computer does not have OS X or a webcamera some of the procedure will not work.

Progress Report We understand how the solution works in the environment but we are still researching and brain storming the best way to implement these procedures into the current environment. We have tested a few of the procedures but not all of the procedures have been tested so not all of them can be guaranteed to work.