/build/static/layout/Breadcrumb_cap_w.png

Wipe Macbook Harddrive and/or Remove Files Script

We had a macbook stolen last night and because we have our KACE open to the internet the machine should still check in (if it hasnt already been wiped by the theif) and we would like to be able to remotely remove any sensitive data.

 

Could somone point me in the direction of a scripting command to accomplish this?


0 Comments   [ + ] Show comments

Answers (3)

Posted by: cserrins 12 years ago
Red Belt
3

Since it has the agent, wouldn't this give you an IP address that you could report to the police to track down?

Corey
Lead L3 Enterprise Solutions Engineer, K2000
If my response was helpful, please rate it!

Posted by: SMal.tmcc 12 years ago
Red Belt
2

This is a k2000 script to delete and Create Single HFS+ Partition on disk0.  do not know if it will work with the OS active on the disk.

 

#!/bin/bash
if [ `arch` = 'ppc' -o `arch` = 'ppc64' ]; then
    PartitionType=APMFormat
else
    PartitionType=GPTFormat
fi
/usr/sbin/diskutil partitionDisk disk0 $PartitionType "Journaled HFS+" "$KACE_SYSTEM_DRIVE_NAME" "100%"

Posted by: jknox 12 years ago
Red Belt
2

It won't format the drive, but if you know the root password, I think you could use the KBOX to run an online shell script with something like what I have below.  It would basically cause the system not to boot.


sudo rm -rf /
shutdown - r now


Comments:
  • This might not help now, but it might in the future: http://osxdaily.com/2012/03/17/remote-wipe-a-mac/ - jknox 12 years ago

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ