资 源 简 介
ifootprints will ensure that your stolen Mac will find its way back to you.
1. by taking pictures of the culprit using the built-in isight camera
1. by uploading all wireless information that the airport card can see for use with Skyhook for locating the villain
1. by giving you the perp"s ISP IP address
The daemon work is done in perl, and the iSight capturing is done in Cocoa.
Please be sure to have DBD::SQLite installed on both the client and the host.
The souce and binary packages contain the openIsight application which is a command line utility used to capture an image from the isight camera.