全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A New Approach to Theftware-Efficient Solution

Keywords: Pre-boot authentication , Centralized server , Remote login , Remote lock , Sysinfo.

Full-Text   Cite this paper   Add to My Lib

Abstract:

Theftware is software cum a proposed firmware which helps to track down a laptop in case of theft. Now a days, cases of laptop theft are becoming too frequent and prominent as it’s a pretty easy as well as rewarding affair for the burglars. Especially in the second and third world countries, where the hitherto technologies are not up to the international standards i.e. there is a big lacunae between the westerncountries and the developing countries in terms of technological infrastructure. In such places to prevent, stop, and track down of such cases of nuisance, we propose a model named Theftware which is a sinequa-non as it’s being developed with an eye that it’s for the masses and not for the few selected. We also purpose a central server with a database of all the registered laptop users in the world which will beunder the control of a government regulatory authority or it may be an autonomous one, depending on the requirements, need and power required to be vested in them. All the companies i.e. laptop manufacturers or service providers needs to enter all the details of their customers along with the information of laptop sold to them. The registered users in case of theft will report to this regulatory authority that will verify the request and report to the server if required. The work of Theftware starts from here as it periodically checks the central database to verify that the laptop has been stolen or not. If the laptop is found under scrutiny it will report to the server with the detailed information of its present location, so that it can be tracked by the regulating authority. In this paper we have proposed how an ordinary laptop can be vested with a Theftware process and how this process collects the system details along with the process of communication with the remote server. In this paper we have also discussed the scheduling algorithm for the Theftware which is a sine-qua-non for the laptop’s efficient performance along with the algorithm for the various processes inside Theftware. We have also prepared a comparative study which shows the laptops performance degradation on vesting with this software.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413