ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

DonationCoder.com Software > N.A.N.Y. Challenge 2007

Phorp (Phone Home Robot Pro) - v1.00.01 - December 15th, 2006

(1/2) > >>

mouser:
Phorp (Phone Home Robot Pro)
Open source for Windows/Mac/*nix/etc. Comes with precompiled Windows binary.

v1.00.04 - December 31st, 2006

* Improved testapp.exe
* Fixed bug in hash checking
* Now includes a fun optional fake windows antivirus updater tray tool



WHAT IS PHORP?

Phone Home Robot Pro (phorp) is an open source program that runs on your pc or laptop, and periodically "phones home" to a server somewhere to check if it has been stolen, and gets instructions on what to do if it has been.

There are a lot of services you can buy that perform similarly to phorp, in that they connect regularly to a central server so that you can hopefully track them down when they are stolen.

In general, phorp is different from these services in that it attempts to be extremely lightweight and minimalistic, and in that there is
 no single service you need to subscribe to.

Instead, you can use your own web servers or ftp accounts as the home page for the program to phone home to and for you to leave instructions for.

It is extremely rare for a computer to actually be stolen or lost, so rather than installing a bloated program on your pc that tries to anticipate all the possible things you might need to be able to do if your pc is stolen, phorp works by checking a server for instructions from its master (you!).  Normally there will be nothing for it to do.

But, if your pc is stolen, you would upload some programs on your server for phorp to execute.  Assuming the instructions have been
 authenticated for security to prove that you uploaded them, they will be executed by phorp silently the next time it phones home.

What programs would you have phorp execute?  Well typically a good option might be to run a remote control program that would let you connect in and observe and control the pc.  Other choices might be to install a keylogger, or a program to erase all of your sensitive data.  The choice is up to you.


Download: Here.

Read:

* Overview: Here.
* Instructions: Here.
* ToDo: Here.

NOTE: I put the 'Pro' in the program name because you have to be am IT pro to figure out how to use this program currently :)  I plan to make a nice easier to use gui tray util for it later.  Right now it's a pure commandline tool you have to make sure runs automatically on your own.  Special thanks to Gothic for helping me get the Linux version working and helping organize the program.

Veign:
Sounds very interesting...

Arjen:
This is a very interesting concept. Unfortunately this program isn't as easy to test as most apps, but I will give it a try when I get the chance!

mouser:
The new download includes a fake windows program that runs in your tray and pretends to be an antivirus tool that runs periodic "updates" which are really phorp calls.

broken85:
pretends to be an antivirus tool that runs periodic "updates" which are really phorp calls.
-mouser (December 31, 2006, 10:49 AM)
--- End quote ---

That is so cool. Someone has been breaking in to my house and taking things for the past year or so, and the police haven't been able to do anything about it. When I leave for work, running this would not only help if it were stolen, but possibly help in locating the culprit behind it (or proving his guilt rather since I pretty much know who it is).

I had just heard about this type of program recently while visiting my mother, as she manages an online high school here in Wisconsin which recently spent a lot on a solution offering the same basic functionality (albeit that it's probably an enterprise-class solution which I believe includes 3rd party monitoring). They use it on all of the laptops they send to their students to help make sure they get them back after the class is over. I thought it sounded pretty cool, but put it out of my mind until I read about your app. Nice!

Navigation

[0] Message Index

[#] Next page

Go to full version