tag:blogger.com,1999:blog-18997313.post113715367590832950..comments2023-07-24T09:41:44.204+02:00Comments on Orbicule: Post #1Winnie Trekkerhttp://www.blogger.com/profile/11931536047890155184noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-18997313.post-1138454064571319402006-01-28T14:14:00.000+01:002006-01-28T14:14:00.000+01:00Thanks for the great feedback on our website (we f...Thanks for the great feedback on our website (we fixed the typo, thanks). <BR/><BR/>Regarding the FileVault comments: Undercover runs as a root process and therefore it works continuously, regardless from the user that's currently logged in. It even works when no one is logged in. However, we do recommend our users to create a dummy guest account without admin privileges and with a blank password. That will enable the thief to play around with the Mac and connect to the net.Peter Scholshttps://www.blogger.com/profile/17133945680457086098noreply@blogger.comtag:blogger.com,1999:blog-18997313.post-1137922796977760742006-01-22T10:39:00.000+01:002006-01-22T10:39:00.000+01:00Thanks for taking the time to create what looks li...Thanks for taking the time to create what looks like a great app - I look forward to getting it as soon as I upgrade to Tiger.<BR/><BR/>In responce to an earlier comment regarding FileVault lockdown - interesting point - to make this a successful product you almost need to "encourage" the thief to use the computer as is, perhaps you need to set up a guest user account with no password required<BR/><BR/>Which brings up the question - does the app install itself in the user library, or the system library?<BR/><BR/>Wishlist - I think a great feature would be the ability to execute applescripts. This way a user can write an applescript to delete sensitive/personal files, which could be executed by Undercover in the event of the computer being stolen.<BR/><BR/>Best of luck with the new businessAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-18997313.post-1137642061119977982006-01-19T04:41:00.000+01:002006-01-19T04:41:00.000+01:00How does Undercover handle the following situation...How does Undercover handle the following situation: an owner is using FileVault or requires a password to wake from sleep and the thief has to reformat the harddrive to use the PB. Does Undercover escape the reformatting?<BR/>What if the thief connects to the internet but cannot wake the PB, will it still communicate to the server?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18997313.post-1137620118077294082006-01-18T22:35:00.000+01:002006-01-18T22:35:00.000+01:00Guys, If you made this for the ipod you would make...Guys, <BR/>If you made this for the ipod you would make millions. I think everyone knows atleast two poeple who had their Ipods stolen. Mine was stolen from my car while I was at work. <BR/><BR/>I would GLADLY pay $20 to 30 a year just for the peace of mind knowing that if someone were to take it this time with the software installed that they would get caught. <BR/><BR/>- JuanAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-18997313.post-1137611075587804072006-01-18T20:04:00.000+01:002006-01-18T20:04:00.000+01:00Hey Peter-This is very cool. Once I upgrade to Ti...Hey Peter-<BR/><BR/>This is very cool. Once I upgrade to Tiger, this will be on top of my list for software purchases.<BR/><BR/>Good luck in your new venture.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18997313.post-1137608011418694002006-01-18T19:13:00.000+01:002006-01-18T19:13:00.000+01:00This looks like a great product and a really elega...This looks like a great product and a really elegantly designed site.<BR/><BR/>However, you may want to correct the typo for the word 'instead' which occurs a few times as 'in stead'<BR/><BR/>It was the only mistake I noticed and not bad for a non-native English speaker!Anonymousnoreply@blogger.com