home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.sys.next.misc:21810 comp.sys.next.marketplace:1165 comp.sys.next.sysadmin:6376
- Path: sparky!uunet!ukma!usenet.ins.cwru.edu!agate!nweaver
- From: nweaver@ocf.berkeley.edu (Nicholas Weaver)
- Newsgroups: comp.sys.next.misc,comp.sys.next.marketplace,comp.sys.next.sysadmin
- Subject: Re: Stolen NeXT Station Color
- Date: 9 Nov 1992 23:37:42 GMT
- Organization: U.C. Berkeley Open Computing Facility
- Lines: 30
- Message-ID: <1dmso6INNa8q@agate.berkeley.edu>
- References: <1992Nov9.122504.13562@wam.umd.edu> <1dm329INNrgl@agate.berkeley.edu> <kezgWWD0BwyOMEi048@transarc.com>
- NNTP-Posting-Host: tsunami.berkeley.edu
-
- In article <kezgWWD0BwyOMEi048@transarc.com> Ward_Travis@transarc.com writes:
- >Impressive -- somebody steals a NeXT, everybody assumes that the thief
- >doesn't know how to get into the system, and so for a full day the net
- >is abuzz with free, primo advice for the crook. The wheels are really
- >spinning today. Doesn't anyone have any advice for changing the serial
- >number? How about the ethernet address?
-
- Please. Such information is reely available on the net. IWHere i
- got the information about eliminating hardware password (remove the battery
- and let sit for a day), was posted in response to a ligitimate question
- involving a messup on the hardware password. Similary, I am quite certain
- that "how do I recover my root password" has been asked and answered more
- then once, when someone who lacks the ability to RTFM makes a mistake. For
- god's sake, the sysadmin manuals are on-line in the extended release, with
- th e proedure clearly sppelled out. It also spells out how to set a
- hardware password, and to change other things, such as print manager etc.
-
- And, if the theif in question knew what he/she was doing, it is
- certain that he/she would have snagged the sound-box and keyboard/mouse as
- well, as these things are very hard to get outside of an official dealer if
- he/she was going to use it him/her/itself. And if it is for resale, then
- any knowledgable thief will take a more common computer, such as a Mac or a
- Clone, which would be much easier to fence, and much harder to trace.
-
- _Nicholas C. Weaver
- --
- Nicholas C. Weaver
- nweaver@ocf.berkeley.edu|weeniehead@ocf.berkeley.edu|nweaver@soda.berkeley.edu
- It is a tale, told by an idiot, full of sound and fury, .signifying nothing.
- #include <stdwittydisclaimer.h>
-