Search results

Jump to: navigation, search

Page title matches

  • There are brief discussions of the theft problem here: :[[Case design#The Theft Problem]],
    16 KB (2,710 words) - 20:32, 28 February 2014
  • [[The Theft Problem|english]] | [[The Theft Problem/lang-ko|한국어]]
    71 bytes (8 words) - 19:45, 13 July 2007
  • :[[Case design#The Theft Problem]], There is a serious theft problem that must be addressed if this laptop is to be made available in de
    12 KB (1,810 words) - 01:38, 31 January 2008
  • ...ocol at a later date, with the benefit of some experience with the upgrade/theft deterrence system. At various points in the discussion below, we will flag ==Theft-deterrence client request==
    11 KB (1,781 words) - 16:13, 1 June 2012
  • #REDIRECT [[Theft deterrence protocol]]
    39 bytes (4 words) - 13:53, 12 June 2008
  • #REDIRECT [[Theft deterrence protocol]]
    39 bytes (4 words) - 08:54, 16 July 2008
  • #REDIRECT [[Theft deterrence protocol]]
    39 bytes (4 words) - 08:54, 16 July 2008
  • |Name=Theft reporting
    1 KB (164 words) - 08:16, 9 December 2008

Page text matches

  • ...tt> se ejecuta cada 15 minutos por cron. Este programa es un cliente del [[Theft deterrence protocol]] (OATS), para:
    5 KB (836 words) - 11:29, 26 March 2010
  • ...they're thick, in which case the valuable copper may need securing against theft for scrap metal!
    56 KB (9,200 words) - 17:30, 17 June 2016
  • ...eachers, or getting software into local languages, or preventing wholesale theft and resale of the machines, or a host of other things that we clearly shoul
    36 KB (5,905 words) - 23:20, 20 January 2014
  • ...out vandalism and Graffiti and a lack of community spirit when it comes to theft, well here is a chance to create some real community relations, permanently
    43 KB (7,490 words) - 20:04, 5 August 2013
  • ...ttention paid to the infrared. Now, you want the whole "kid look" for anti-theft... how about a fluorescent retro-reflective paint on the parts that are not ===[[The Theft Problem]]===
    21 KB (3,463 words) - 14:27, 17 September 2009
  • ...me of these educational failures stem from security threats such as laptop theft, software interference, or socially malicious pranks. Therefore, we have cr ; [[Theft-deterrence protocol|Theft deterrence]]
    5 KB (668 words) - 10:02, 8 October 2010
  • There are brief discussions of the theft problem here: :[[Case design#The Theft Problem]],
    16 KB (2,710 words) - 20:32, 28 February 2014
  • :People have used these sensors for anti-theft motion alarms. [[User:AlbertCahalan|AlbertCahalan]] 14:18, 24 February 2007
    23 KB (3,739 words) - 10:43, 30 April 2009
  • ...ty. In a country deployment, this may make your laptop more vulnerable to theft — but it's assumed that if you're running a unstable build you're a d
    9 KB (1,472 words) - 02:11, 3 January 2014
  • ...by the brothers/sisters in the meantime would also be a safeguard against theft, e.g. when the other child is working on the family´s crop grounds. That w
    25 KB (4,038 words) - 08:48, 3 August 2013
  • ...es and local laws. However, we have gone to great lengths to build an anti-theft system (See [[Bitfrost]] for details).
    26 KB (4,327 words) - 10:51, 4 March 2014
  • The firmware and system security and anti-theft system is covered in the [http://dev.laptop.org/git?p=security;a=blob;hb=HE ...sions both to protect the systems from viruses and worms, but also an anti-theft system, to protect the systems during transportation and later if desired.
    41 KB (6,720 words) - 18:43, 7 November 2014
  • ...(Uruguay demonstrated a very nice database application tracking kids, XOs, theft reports, and repair history, but they had it developed under contract and t
    9 KB (1,327 words) - 14:15, 28 May 2013
  • ...ard version and language locale. There are also flag indicating the anti-theft "status" of the laptop (activated, developer).
    64 KB (13,369 words) - 04:46, 17 April 2019
  • === Ownership and theft === I think the participant countries can reduce the possibility of OLPC theft and illegal resale by:
    24 KB (4,083 words) - 17:01, 16 November 2012
  • ...k Attached storage off-site may be a good choice concerning prevention of theft and natural disaster destruction, war conflict, etc. ...ave obvious advantages: power source, clutch or gas pedal brake pedal anti theft device; evacuation in case a natural disaster warning is received.
    14 KB (2,155 words) - 08:46, 2 April 2008
  • * [[Theft]] and [[gray market]]
    9 KB (1,450 words) - 08:27, 2 January 2014
  • It is important to include anti-theft measures and common mechanisms for objectionable-content filtering.
    11 KB (1,789 words) - 13:28, 6 April 2010
  • |   || colspan=4 align=left | [{{fullurl:The Theft Problem}} The Theft Problem] | align=left | {{:The Theft Problem/translations}}
    175 KB (20,632 words) - 07:01, 14 March 2011
  • ...for less than a dollar. They provide perfect time. They could enable anti-theft without leases, with the firmware simply requiring a visit to the school ev
    37 KB (6,326 words) - 05:53, 8 March 2010
  • * Server location would be an additional theft deterrent
    5 KB (853 words) - 01:56, 7 January 2012
  • [[category:theft]]
    4 KB (592 words) - 13:01, 10 July 2008
  • ...ce the number of victims. How much reduction would it achieve? Can the $1M theft prediction be made false?
    13 KB (2,095 words) - 01:53, 17 December 2008
  • It is important to include anti-theft measures and common mechanisms for objectionable-content filtering.
    24 KB (3,835 words) - 14:04, 30 June 2011
  • ...rost security, activity isolation, 'Rainbow' (our security subsystem), and theft deterrence measures.''
    12 KB (1,813 words) - 21:11, 2 January 2014
  • ...ector for an enterprising thief. The activation requirement makes delivery theft highly unappealing, requiring hardware intervention to disable on each stol ...ser's identity is maintained by the country or regional authority for anti-theft purposes, but never reaches OLPC.
    130 KB (21,703 words) - 03:54, 17 December 2008
  • ...efforts can be acquired by postponing development of the centralized "anti-theft" user identification system and the centralized backup system until a later ...most likely, namely, theft not by the mafia or random burglars, but rather theft by high-ranking government officials. How robust is this scheme if the Depu
    43 KB (7,027 words) - 04:14, 7 March 2008
  • ...ector for an enterprising thief. The activation requirement makes delivery theft highly unappealing, requiring hardware intervention to disable on each stol ...ser's identity is maintained by the country or regional authority for anti-theft purposes, but never reaches OLPC.
    63 KB (10,328 words) - 19:04, 28 February 2014
  • ...y address this situation, but some countries have requested a general anti-theft system where the laptop stops working if it goes for a length of time witho In the third world, donations can become the local currency. Theft is more common. No one even has a car radio. In the third world, a laptop
    135 KB (23,022 words) - 13:48, 6 October 2012
  • The firmware and system security and anti-theft system is covered in the [http://dev.laptop.org/git.do?p=security;a=blob;hb ...sions both to protect the systems from viruses and worms, but also an anti-theft system, to protect the systems during transportation and later if desired.
    80 KB (13,085 words) - 17:46, 7 June 2007
  • Wifi adapter as an anti-theft device? ...also think it would be useful to turn the built-in wifi adapter as an anti-theft device. The adapter should be made to start mandatorily at boot up and not
    125 KB (20,048 words) - 11:24, 1 June 2012
  • ...twork, there will always be some degree of theft. That said, we've seen no theft in our pilot projects in places such as rural Cambodia.
    10 KB (945 words) - 12:02, 14 April 2007
  • ...eachers, or getting software into local languages, or preventing wholesale theft and resale of the machines, or a host of other things that we clearly shoul
    35 KB (5,008 words) - 14:45, 10 January 2008
  • ...ttention paid to the infrared. Now, you want the whole "kid look" for anti-theft... how about a fluorescent retro-reflective paint on the parts that are not ===[[The Theft Problem|도난 문제]]===
    18 KB (2,928 words) - 13:11, 15 April 2007
  • ...dad bitfrost , activity isolation, 'rainbow' (our security subsystem), and theft deterrence measures.''
    12 KB (1,820 words) - 21:12, 2 January 2014
  • ...n the anti-spam movement (also anti-phishing, anti-pharming, anti-identity theft).
    10 KB (1,647 words) - 19:55, 30 January 2009
  • |Name=Theft reporting
    74 KB (11,829 words) - 06:40, 12 December 2008
  • ...s'', there also should be various kinds of containers; sizes, water proof, theft proof, and heat proof etc.
    17 KB (2,685 words) - 12:58, 18 May 2012
  • ...r intended purpose. Students run the risk of losing the XO laptops through theft or economic need, or may abuse the laptop for non-academic purposes if they
    37 KB (5,846 words) - 03:09, 14 April 2009
  • ...safety/92121700 Security systems services/92121703 Store or business anti theft services
    3 KB (296 words) - 00:53, 14 July 2007
  • OLPC anti-theft servers. During that interaction, the laptop will post anti-theft service will optionally contain a relative URL of a more
    14 KB (2,315 words) - 13:58, 6 October 2012
  • OLPC anti-theft servers. During that interaction, the laptop will post anti-theft service will optionally contain a relative URL of a more
    26 KB (4,229 words) - 20:18, 9 September 2007
  • Cuando Terminas El Juego Aparece Carl Johnson "CJ" De La Saga Grand Theft Auto "GTA" :1) Impide Que La Crisis De La Comida Lo Mate 2) Manejalo Y Llev
    13 KB (1,982 words) - 19:00, 9 April 2013
  • # Antitheft server (aka OATS) keys - tag name t0 .. t9 (t for theft, see [[Theft deterrence protocol]])
    19 KB (3,201 words) - 00:31, 12 May 2016
  • [[The Theft Problem|english]] | [[The Theft Problem/lang-ko|한국어]]
    71 bytes (8 words) - 19:45, 13 July 2007
  • :[[Case design#The Theft Problem]], There is a serious theft problem that must be addressed if this laptop is to be made available in de
    12 KB (1,810 words) - 01:38, 31 January 2008
  • ...safety/92121700 Security systems services/92121703 Store or business anti theft services
    3 KB (296 words) - 00:54, 14 July 2007
  • ...tp://dev.laptop.org/ticket/9288 Implement client-side lease update] from [[Theft deterrence protocol]] to allow for automatic, internet-based lease updates
    5 KB (689 words) - 09:39, 9 August 2016
  • * Anti-theft activation on installation * Anti-theft leases
    29 KB (4,683 words) - 14:04, 6 October 2012
  • ...eachers, or getting software into local languages, or preventing wholesale theft and resale of the machines, or a host of other things that we clearly shoul
    37 KB (2,621 words) - 04:56, 11 September 2007
  • # /init executes the [[Theft deterrence protocol|theft deterrence protocol]], checking its 'am I stolen?' flag and looking for a v
    8 KB (1,236 words) - 18:31, 27 August 2009
  • ...ector for an enterprising thief. The activation requirement makes delivery theft highly unappealing, requiring hardware intervention to disable on each stol ...ser's identity is maintained by the country or regional authority for anti-theft purposes, but never reaches OLPC.
    95 KB (10,729 words) - 15:10, 13 December 2007
  • The firmware and system security and anti-theft system is covered in the [http://dev.laptop.org/git.do?p=security;a=blob;hb ...sions both to protect the systems from viruses and worms, but also an anti-theft system, to protect the systems during transportation and later if desired.
    40 KB (6,526 words) - 09:41, 22 September 2011
  • ...g an Activity/lang-ko] (12444), [{{fullurl:The Theft Problem/lang-ko}} The Theft Problem/lang-ko] (11795), [{{fullurl:Creating a content bundle}} Creating a
    36 KB (4,203 words) - 18:08, 25 August 2007
  • ...ocol at a later date, with the benefit of some experience with the upgrade/theft deterrence system. At various points in the discussion below, we will flag ==Theft-deterrence client request==
    11 KB (1,781 words) - 16:13, 1 June 2012
  • ...atanye budashingiye ku bikorwa remezo cyangwa se kuba hari internet); anti-theft activation on installation; and registration with and backup to a school se
    7 KB (961 words) - 14:09, 17 August 2010
  • ...} Talk:The Theft Problem] <span style="font-size:80%">([{{fullurl:Talk:The Theft Problem|action=history}} history])</span>
    4 KB (563 words) - 02:19, 8 December 2009
  • ...} Talk:The Theft Problem] <span style="font-size:80%">([{{fullurl:Talk:The Theft Problem|action=history}} history])</span> || [{{fullurl:TamTam:Development
    5 KB (608 words) - 02:19, 8 December 2009
  • Projects: Olpc-update, Firmware Security, Pippy, Olpcfs, Network Principles, Theft deterrence protocol, Customization key, Mini-conferences, Debian, Lease man
    5 KB (773 words) - 10:36, 7 October 2009
  • ...oration without any dependency on infrastructure or Internet access); anti-theft activation on installation; and registration with and backup to a school se
    8 KB (1,187 words) - 19:35, 25 May 2012
  • ...oration without any dependency on infrastructure or Internet access); anti-theft activation on installation; and registration with and backup to a school se
    8 KB (1,157 words) - 16:14, 9 October 2009
  • #REDIRECT [[Theft deterrence protocol]]
    39 bytes (4 words) - 08:55, 16 July 2008
  • == Theft of laptops from children == Wifi adapter as an anti-theft device?
    103 KB (17,276 words) - 06:04, 22 April 2013
  • ...ion server inside 21 days, or because it's been explicitly disabled due to theft.) This would allow a stray laptop to be reunited with its owner far easier, ..., and the specifics on [[OLPC Bitfrost#P THEFT: anti-theft protection|anti-theft protection]]. --[[User:Xavi|Xavi]] 10:29, 21 May 2007 (EDT)
    59 KB (9,999 words) - 12:02, 1 June 2012
  • * Anti-theft activation on installation
    33 KB (5,203 words) - 03:37, 6 August 2013
  • *Use this activity as another anti-theft tool by asking users to "check in" with a run of this activity every couple
    4 KB (627 words) - 23:43, 19 March 2008
  • ..._OS_key -- per [[Firmware security#Summary|Firmware security]], guards the theft-deterrence code-path through the kernel and initramfs ...d [[User:Mstone/Commentaries/Mass olpc-update|Mass olpc-update]], verifies theft-deterrence messages.
    6 KB (918 words) - 16:26, 5 January 2009
  • *Will the North American Laptops use the Anti-theft 'leasing' system?
    7 KB (1,015 words) - 23:24, 19 November 2007
  • Note Give1Get1 systems do not have the anti-theft system fully enabled.
    5 KB (775 words) - 23:08, 19 July 2013
  • * Security issue that threatens anti-theft or child safety; or a known exploit that threatens a large number of laptop
    16 KB (2,535 words) - 13:08, 8 February 2011
  • * Security issue that threatens anti-theft or child safety; or a known exploit that threatens a large number of laptop
    768 bytes (119 words) - 12:52, 2 January 2008
  • ...llaboration and easy updating, and any intended use of the Internet. Anti-theft security has to be enabled in deployments with school children. ...is limited to mesh-only or sneaker-net, via SD or USB flash memory. Anti-theft security schemes are hard to enforce at this stage, but possible in institu
    32 KB (4,981 words) - 15:33, 25 September 2010
  • ...relates individual laptops with individual schools is required by our anti-theft system. Someone on the country deployment team needs to be appointed by the
    5 KB (833 words) - 08:14, 20 June 2010
  • ...ive kill" -- the latter being a way for a central server to be notified of theft, tell individual laptops that they have been stolen and stop functioning, a ...recent discussions of potential use cases for using leases at all; and for theft or recovery scenarios. A major downside of lease use is its ability to ren
    1 KB (187 words) - 14:05, 6 March 2008
  • ...our anti-theft firmware implementation. G1G1 systems do not have the anti-theft system enabled.
    32 KB (5,315 words) - 09:55, 22 September 2011
  • ||[[Bitfrost]] firmware anti-theft system Anti-theft mechanism on trusted platform module (TPM)
    13 KB (1,711 words) - 12:06, 1 June 2012
  • oatslite is a server implementation of the [[Theft deterrence protocol]].
    1 KB (185 words) - 18:39, 31 January 2013
  • ...ed to hear that you had called my home and when my wife had concerns about theft during shipping, one of your volunteers became quite irritated. Now, I am ...the panel, but the case colors are the same across production. See [[The Theft Problem]] for why we are doing it this way. --[[User:Quozl|Quozl]] 04:47,
    40 KB (6,930 words) - 22:01, 21 September 2009
  • * Anti-theft activation on installation
    18 KB (2,908 words) - 03:37, 6 August 2013
  • OLPC anti-theft servers. During that interaction, the laptop will post anti-theft service will optionally contain a relative URL of a more
    15 KB (2,075 words) - 07:25, 22 May 2008
  • ...Uruguay intend to disable user access to the root account as part of their theft-deterrence plan.'' ; Theft Deterrence
    5 KB (803 words) - 16:57, 9 December 2008
  • ...t it relies on the firmware for the XO's special power management and anti-theft system.) --[[User:Gnu|Gnu]] 13:23, 19 May 2008 (EDT) *Does Windows XP for the XO take into account the Bitfrost anti-theft and secure upgrade features? How about Wi-Fi mesh (802.11s) and the special
    9 KB (1,463 words) - 12:22, 1 June 2012
  • ...(Uruguay demonstrated a very nice database application tracking kids, XOs, theft reports, and repair history, but they had it developed under contract and t
    3 KB (459 words) - 18:04, 23 December 2008
  • ...ence encircling school, this made us worry a little less about the risk of theft of power equipment and the School Server.
    97 KB (16,717 words) - 14:08, 9 November 2010
  • ...le the theft deterrence features. This way, a developer can test code with theft deterrence enabled when necessary. While this is also possible with 'enable
    6 KB (980 words) - 23:25, 19 February 2022
  • ...], [[Firmware Security]], [[Pippy]], [[Olpcfs]], [[Network Principles]], [[Theft deterrence protocol]], [[Customization key]], [[Presentations/April 2008 Te
    625 bytes (74 words) - 17:27, 4 August 2011
  • ; Theft Deterrence
    5 KB (758 words) - 16:50, 9 December 2008
  • ...Uruguay intend to disable user access to the root account as part of their theft-deterrence plan.'' ===== Theft Deterrence =====
    5 KB (797 words) - 22:29, 12 July 2013
  • #REDIRECT [[Theft deterrence protocol]]
    39 bytes (4 words) - 08:54, 16 July 2008
  • #REDIRECT [[Theft deterrence protocol]]
    39 bytes (4 words) - 08:54, 16 July 2008
  • ; Theft Deterrence
    6 KB (983 words) - 16:49, 9 December 2008
  • Theft is a concern in our area. How has the issue of theft been addressed in previous OLPC deployments? Is it acceptable to keep the l
    3 KB (493 words) - 10:26, 10 April 2009
  • #7397 Theft-deterrence Features <br>
    996 bytes (105 words) - 14:34, 8 July 2008
  • {{git-project-summary|users/mstone/oats | OLPC Anti-Theft Server | Michael Stone | 11 months ago}}
    38 KB (4,019 words) - 21:42, 31 July 2008
  • ...option; theirs arrive locked, though for inscrutable reasons, not for anti-theft reasons. As of October 2008, no stolen laptop has ever been successfully t
    4 KB (770 words) - 18:33, 5 August 2009
  • ...D, or the OLPC XO-1 mesh (rarely used). Those deployments which use OLPC's theft deterrence systems now have a new option: the activation code will now sear ...that deploying updated activation leases can be done hands-free. See the [[theft deterrence protocol]] page for technical information.
    9 KB (1,408 words) - 03:34, 6 August 2013
  • ** Lease management protocol - (to be continued in theft deterrence)
    33 KB (4,972 words) - 11:21, 30 December 2009
  • '''Replacement''': A laptop is replaced due to theft of breakage. From the point of view of the XS, the same laptop casing with
    3 KB (473 words) - 15:12, 2 April 2009
  • # Lease and theft management systems
    14 KB (2,171 words) - 12:05, 10 February 2011
  • |Name=Theft reporting
    1 KB (164 words) - 08:16, 9 December 2008
  • (generally no theft) but this doesn't apply in Nigeria :|
    106 KB (15,367 words) - 20:35, 29 January 2009
  • | Perception of theft
    36 KB (5,769 words) - 16:09, 1 April 2009
  • ...correlates individual laptops with individual schools is required by anti-theft system.
    22 KB (3,162 words) - 04:03, 30 September 2009
  • ...n they do not wish to bring it home or if they are worried about potential theft. The central location of the deployment will also enable the Peace Corps an
    15 KB (2,361 words) - 12:21, 21 May 2009
  • ...This will plant the seed for community involvement, as well as forestall theft.
    17 KB (2,559 words) - 23:51, 26 March 2009
  • ...the school. Our greatest concern would be making the students targets for theft or violence, and because of the economic and family situations of many stud ...ptops off school grounds could possibly make them targets for violence and theft; the safety of the student is our first and top priority. Once the laptops
    15 KB (2,468 words) - 18:55, 27 March 2009
  • .... They will then be redistributed to each child in the morning to prevent theft or damage. Laptops will be labeled with each child’s name to preserve a
    6 KB (966 words) - 21:38, 27 March 2009
  • ...the Kigali forum how best to address true child ownership as the threat of theft is a concern. One solution our team has come up with is to place the child
    11 KB (1,791 words) - 06:13, 8 April 2009
  • ...ployment key support]] to implement a fully automated and OLPC-independent theft deterrence system, integrated with ParaguayEduca's own inventory system. We
    8 KB (1,179 words) - 00:52, 30 December 2009
  • ...a little bit of a concern over here because of the possibility of mugging/theft.<br />
    40 KB (6,167 words) - 01:51, 24 July 2009
  • *Avoiding Theft
    8 KB (1,185 words) - 19:00, 29 September 2009
  • <Heyej> risk of theft is high. To counter we are setting up camp in military secured areas in ass
    40 KB (6,328 words) - 16:18, 5 February 2010
  • ...ave been stored in padlocked metal cages to protect them from vandalism or theft.
    12 KB (1,998 words) - 05:57, 12 March 2011
  • # Necessary for the anti-theft system # The UUID is a second serial number that is used for the anti-theft system. There is a separate interface to import that
    5 KB (875 words) - 19:25, 24 October 2010
  • <CanoeBerry> to distraction, improper use, theft, damage, viruses, etc.
    15 KB (2,059 words) - 17:06, 3 December 2010
  • ...cost hence reducing vulnerabilities due to human or natural hazards e.g. theft, fire, riots and strikes among others.</p>
    22 KB (3,321 words) - 18:12, 28 January 2011
  • target for theft, and security should be a primary concern in selecting a
    26 KB (4,006 words) - 10:15, 13 September 2011
  • ...Berry> mixed results and the same can be said of our efforts in solar. Theft
    43 KB (6,424 words) - 18:39, 18 May 2012
  • .... The XS provides XO machines with network connectivity for backups, anti-theft leases, web browsing, system, content updates, and asynchronous collaborati
    4 KB (599 words) - 23:27, 22 April 2012
  • #Measuring "theft ratio" #Measuring "theft ratio of XO's to the national average of other small portable items"
    10 KB (1,420 words) - 08:27, 3 August 2013
  • ...ard version and language locale. There are also flag indicating the anti-theft "status" of the laptop (activated, developer). ...ASH '''must''' be write protected, if the customer has requested that anti-theft be enabled.
    32 KB (5,630 words) - 21:11, 17 July 2017
  • | '''What anti-theft strategy do you have?''' None ... buy software to prevent and relocate lapt | '''What anti-theft strategy do you have?''' Theft has been taken into account from the concept. After all OLPC was meant for
    69 KB (11,497 words) - 19:21, 3 November 2015
  • ...developing world schools (to control operational costs, spaghetti wiring, theft of router, etc). Conversely if the laptop's internal Wi-Fi ''cannot'' be u ...norms within the country in question — and of course maintenance, price, theft patterns, etc. <!--Some [http://www.unleashkids.org/2014/02/21/off-the-gri
    172 KB (26,560 words) - 10:24, 18 July 2021