Brewery offers lifetime supply of beer in return for stolen laptop

A brewery in New Zealand is offering a lifetime supply of beer, in return for a laptop that was stolen from the Croucher Brewing Company in Rotorua New Zealand. Typically if something is stolen, the theft will usually use it or sell it. Everyone has been approached with an offer to buy a new laptop for cheap, and you know in the back of your head that its stolen. But in this case would you be seen as the bad guy for buying the stolen laptop, or the good guy for returning it for the free lifetime supply of beer?

A brewery in New Zealand is offering a lifetime supply of beer, in return for a laptop that was stolen from the Croucher Brewing Company in Rotorua New Zealand. Typically if something is stolen, the theft will usually use it or sell it. Everyone has been approached with an offer to buy a new laptop for cheap, and you know in the back of your head that its stolen. But in this case would you be seen as the bad guy for buying the stolen laptop, or the good guy for returning it for the free lifetime supply of beer?

Laptop theft is unfortunately common these days. It generally only makes the news when the laptop in question belongs to a company or government agency and contains enough personal data to make identity theft a very real possibility for hundreds—or even thousands—of people. In the case of a laptop stolen from the Croucher Brewing Company in Rotorua, New Zealand, the laptop contained financial records, contract details, and other proprietary information (maybe the recipe for its Belgian Blonde ale?).

Read the full story at arstechnica.com…

0 Shares:
You May Also Like

The Pirate Bay Launches Image Hosting

This is awesome. Hopefully this will show the competitors that their service is slow and sometimes over zealous with the deleting of some content. Go Pirate Bay!
The Pirate Bay Launches Image Hosting -

Us pirates know that The Pirate Bay team has been working on several new projects, with one of them becoming a competitor to YouTube. For now though, we’ve been blessed with BayImg, a unique image hosting service from TPB. Unlike sites like Photobucket and Imageshack, who will delete your photos if deemed “unfit”, BayImg lets you upload any image, uncensored, in over 100+ file formats.

So break out those photos of you shooting JFK and upload them without worry. BayImg takes no personal information from you and gives you a url for image deletion in case you got ahead of yourself. Tags are also available for easy browsing. Seems like a great service. So can it take on the big players? It’s quite possible.

The Pirate Bay Launches Uncensored Image Hosting [TorrentFreak]

[CrunchGear]

Microsoft changes mind, agrees to fix IE’s URI handler

Microsoft agrees to release a patch to fix some of the security issues but not all in Internet Explorers URI Handler. I don't understand why Microsoft has such a lazy stance on security, I want to use Internet Explorer just as securely as any other browser. One mis-typed url after a fresh install of Windows could cause malicious software to gain entry to me desktop.

Are Network Carriers To Blame For iPhone 3G Problems

I was recently having issues with my phone not being able to use 3G, and I thought it might have been a firmware or possibly hardware issue. But after troubleshooting for some time, I found that it was in fact applications crashing or firmware bugs. Hearing more and more reports of network issues with 3G and iPhones, Wired Magazine decided to do a survey of 3G coverage across america.

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]