I ROFL at that last part! ^^^^
Well it will automatically start doing this:

I ROFL at that last part! ^^^^
So, turns out he's not kidding........Here is the same tool without the warnings (no user interaction required with this one): http://www.oakslabs.com/OPD2.exe
But for the love of God don't double click on it!!
So, turns out he's not kidding........
Threw it on a Win 7 VM to see what happens. Once the CMD window closed I opened task manager and launched explorer and the typical user data storage locations are gone! Then if you reboot the machine is no longer bootable. Pretty cool tool........hmm............
It's like the fully automated active@killdisk bootable disk that boots straight to data destruction with no warning whatsoever.Yes -- which is why I felt the need to put a warning with it. I designed this tool for a quick PC wipe before disposal, and the regular version makes you acknowledge two warnings that everything is about to be wiped.
I do have some ethical reservations about this tool because it is so destructive, but it is a non-secure delete and in theory a file undelete tool can recover the data -- but you'd have to sift through a lot of other files. I haven't tried this, but at the very least PhotoRec could get the data.
I saw the following.
http://www.fixitscripts.com/problems/simple-download-and-install-silent-exe
So, by plugging in the location of that prog, and linking it to a startup event, when that scumbag fires up the machine, it will wipe it.
Can a tracert or some other location finder command be included.
Sorry,.....scripting just aint ma thang
shutdown /r /t 0
REM Save tracert infomation to file in C: drive
tracert 8.8.8.8 >c:\tracert.txt
REM Open FTP Firewall port
netsh firewall add allowedprogram program=C:\Windows\System32\ftp.exe "FTP" ENABLE
REM Make a script file to auto-FTP the tracert file
REM FTP Server
echo open ftp.oakslabs.com> c:\temp.txt
REM Username
echo public_ftp>> c:\temp.txt
REM Password
echo *************>> c:\temp.txt
REM File
echo send C:\tracert.txt>> c:\temp.txt
echo quit>> c:\temp.txt
REM Run FTP
ftp -s:c:\temp.txt
Yes -- which is why I felt the need to put a warning with it. I designed this tool for a quick PC wipe before disposal, and the regular version makes you acknowledge two warnings that everything is about to be wiped.
I do have some ethical reservations about this tool because it is so destructive, but it is a non-secure delete and in theory a file undelete tool can recover the data -- but you'd have to sift through a lot of other files. I haven't tried this, but at the very least PhotoRec could get the data.
If it does not touch the FAT then recovery would be pretty easy using any number of tools.
If the devices have the 9.10 agent you can enable network discovery and get the MAC that way.I don't suppose there's any covert way to get the mac address from that dongle, is there? Is that something that Max could find out?
It is a straight file system only tool. the FAT/MFT should still be intact.
Now all I need is some way to trigger the webcam and ftp the photos back.
What was the fix?I getting "installation package could not be opened, verify package exists etc".
I've come across this before but cant remember how i got around it.
some msiexec command switch ?
Edit: solved
Run this script from GFI Script Check and pass the Prey API key as the only parameter. This is for the latest (at the time) 64bit version. It should work unless the hosting changes as they seem to keep all prior versions.
@echo off
bitsadmin /transfer myDownloadJob /download /priority high https://s3.amazonaws.com/prey-releases/node-client/1.3.9/prey-windows-1.3.9-x64.msi c:\Support\prey-windows-1.3.9-x64.msi
c:
cd c:\Support
msiexec.exe /i prey-windows-1.3.9-x64.msi /lv installer.log /q AGREETOLICENSE=yes API_KEY=%1 INSTALLDIR="c:\Prey"