{"id":8664,"date":"2008-06-02T14:35:23","date_gmt":"2008-06-02T12:35:23","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=8664"},"modified":"2008-06-02T14:35:23","modified_gmt":"2008-06-02T12:35:23","slug":"le-service-bee-bip-pour-contrer-les-coyotes-du-web","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=8664","title":{"rendered":"Le service \u00ab Bee Bip ! \u00bb pour contrer les coyotes du WEB"},"content":{"rendered":"<p>Le service \u00ab Bee Bip ! \u00bb pour contrer les coyotes du WEB. Ce dernier permet de localiser un PC vol\u00e9.<\/p>\n<p>En cas de vol d&rsquo;un ordinateur portable ou fixe (fonctionnant sous Windows 2000, XP ou Vista), un simple appel aupr\u00e8s de la compagnie fait passer le mouchard pr\u00e9alablement install\u00e9 sur le PC en phase active.<\/p>\n<p>Si le voleur dispose d&rsquo;une connexion \u00e0 Internet, son adresse IP sera automatiquement transmise \u00e0 la soci\u00e9t\u00e9, puis aux forces de police.<\/p>\n<p>L&rsquo;utilisateur pourra alors, \u00e0 distance et sans \u00e9veiller les soup\u00e7ons du voleur, r\u00e9cup\u00e9rer les fichiers pr\u00e9sents sur son ordinateur, puis d\u00e9truire les donn\u00e9es sensibles.<\/p>\n<p>Il faut esp\u00e9rer que ce dernier ne fasse pas trop preuve d&rsquo;astuce, ou n&rsquo;osera pas r\u00e9installer le syst\u00e8me d&rsquo;exploitation de peur de perdre des applications.<\/p>\n<p>Vous pourrez cependant l&rsquo;essayer gratuitement pendant trente jours.<\/p>\n<p>Si cette solution est assez facile \u00e0 contourner (encore faut-il savoir qu&rsquo;elle est install\u00e9e sur le PC), elle a le m\u00e9rite d&rsquo;\u00eatre originale et pratique.<\/p>\n<p>Fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le service \u00ab Bee Bip ! \u00bb pour contrer les coyotes du WEB. Ce dernier permet de localiser un PC vol\u00e9. En cas de vol d&rsquo;un ordinateur portable ou fixe (fonctionnant sous Windows 2000, XP ou Vista), un simple appel aupr\u00e8s de la compagnie fait passer le mouchard pr\u00e9alablement install\u00e9 sur le PC en phase [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-8664","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/8664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8664"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/8664\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}