Abstract: The present disclosure relates generally to systems and methods for remotely re-imaging a computer system. In one example, a method is provided for executing a re-imaging process for replacing an original image on an active system of a remote computer system with a new image. The method includes receiving a command to initiate the re-imaging process from a remote location and downloading the new image onto the active system. The re-imaging process is performed to replace the original image with the active image and remote location may be informed of the reimaging process's success. The computer system is rebooted.
Abstract: The present disclosure relates generally to systems and methods for remotely re-imaging a computer system. In one example, a method is provided for executing a re-imaging process for replacing an original image on an active system of a remote computer system with a new image. The method includes receiving a command to initiate the re-imaging process from a remote location and downloading the new image onto the active system. The re-imaging process is performed to replace the original image with the active image and remote location may be informed of the re-imaging process's success. The computer system is rebooted.
Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the software, firmware, or hardware of a computer. This security system initiates the client computer to periodically and conditionally call a host system to provide unique identifying indicia and location information. In one embodiment, the security system calls the host through a public switched telephone network (PSTN) and transmits the indicia in encoded form. In an alternative embodiment, which may be incorporated concurrently with the PSTN application, the security system calls the host system through the Internet and provides the host with indicia encoded within the DNS query sent. The host system is able to identify the calling computer from the indicia and is able to physically locate the computer through either caller identification or by referencing the Internet links which were used to connect the calling computer with the host system.
Abstract: A method and apparatus with an integral security system. The apparatus includes an electronic device for sending signals to a remote station, such as a pre-determined telephone number, at spaced-apart intervals of time. The signals include identifying indicia for the apparatus. The identifying indicia may be a characteristic serial number. The apparatus may include a computer and software for providing the signals to a communication interface on the computer. Preferably the software is programmed on a memory device for the computer at a location not normally accessible to operating software for the computer such as a boot sector of a disk thereof. The system should contact the remote station without visual or audio signals apparent to the user. The remote station is able to determine the identification and location of the computer from the signals received including the identifying indicia and caller I.D. signals provided by a telephone company.