-
-
Notifications
You must be signed in to change notification settings - Fork 22
/
pombo.conf
150 lines (127 loc) · 5.12 KB
/
pombo.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
; Pombo configuration file
[General]
;
; General parameters ---------------------------------------------------
;
; Public keyID.
; [NOT recommended] Set it to "i_dont_wanna_use_encryption_and_i_assume"
; to disable report encryption.
gpgkeyid=BAADF00D
; Password which must be the same as in pombo.php.
password=mysecret
; Server URL. If several servers, separate them with a "|".
; Example: http://myserver.com/pombo.php
; Example: http://myserver.com/pombo.php|http://myserver2.com/pombo.php
server_url=
; File to check on one server to tell pombo the computer was stolen.
; If file exists, pombo will send reports each 5 minutes.
; Must be the same as in pombo.php.
check_file=.stolen
; Time between each report (in minutes).
; When stolen, time between each report is this option divided by 3:
; if time_limit=15, when stolen it will be 15/3 = 5 min.
; On GNU/Linux, think to adapt /etc/cron/pombo.
; On Mac OSX, think to adapt /etc/crontab.
time_limit=15
; Email ID to send report as attached file.
; Leave it blank if you do not want to use this feature.
email_id=
; If True, pombo will check and send report only when IP is not
; the same as the first run.
; This option does not have effect for stolen computer.
; You could add several IP by using "add" option or use add-ip.bat
; on Windows.
only_on_ip_change=no
; Enable informations logging (not recommended, only for debug/dev purpose)
enable_log=no
; Authentification settings --------------------------------------------
; Proxy
use_proxy=no
; Prefer environment variables?
use_env=no
; Proxy URL
; Example: http://proxyurl:proxyport
; Example with auth: http://username:password@proxyurl:proxyport
http_proxy=
https_proxy=
; .htaccess authentification for one server
; For auth_server, only specify the domain, example:
; if serverurl=http://myserver.com/pombo.php, auth_server=myserver.com
auth_server=
auth_user=
auth_pswd=
[Commands]
;
; ####################################################################
; # #
; # /!\ For GNU/Linux & Mac OSX users /!\ #
; # #
; # Use the tool's full path #
; # You can try the 'which' command to know where they are situated. #
; # Example: which ifconfig #
; # #
; ####################################################################
;
; To disable a command, blank it (for example, camshot=).
;
; Examples are formated as:
; [OS] <command>
; W = Windows
; L = GNU/Linux
; M = Mac OSX
;
; Complete path of GnuPG binary. Not needed if encryption is not used.
; [W] C:\\pombo\\bin\\gpg.exe
; [L] /usr/bin/gpg
; [M] /usr/local/bin/gpg
gpg_binary=C:\\pombo\\bin\\gpg.exe
; Get the current TCP/IP network interfaces.
; [W] ipconfig /all
; [L] /sbin/ip a
; [L] /sbin/ifconfig -a (deprecated)
; [M] /sbin/ifconfig -a
network_config=ipconfig /all
; Get the list of Access Points and Ad-Hoc cells in range, and
; optionally a whole bunch of information about them (ESSID, Qual-
; ity, Frequency, Mode ...).
; [W] wlan-dump.bat (only for Windows XP, installed since Pombo 0.0.10)
; [W] netsh wlan show all (note available on Windows XP)
; [L] /sbin/iwlist scanning
; [M] /System/Library/PrivateFrameworks/Apple80211.framework/Versions/A/Resources/airport -s
wifi_access_points=netsh wlan show all
; Get the route over the network between two systems, listing all the
; intermediate routers a connection must pass through to get to its
; destination.
; [W] tracert -d www.example.org
; [L] /usr/bin/traceroute -q1 www.example.com
; [M] /usr/sbin/traceroute -q1 www.example.com
traceroute=tracert -d www.example.org
; Get network connections (both incoming and outgoing), routing tables,
; and a number of network interface statistics.
; [W] netstat -n
; [L] /bin/ss -putn
; [L] /bin/netstat -putn (deprecated)
; [M] /usr/sbin/netstat -utn
network_trafic=netstat -n
; Take screen shot?
; [M,L,W] yes or no
screenshot=yes
; Take webcam shot?
; <filepath> will be replaced by a filename, do not customize (required).
; [W] yes or no
; [L] /usr/bin/streamer -q -t 1 -r 2 -o <filepath>
; [L] /usr/bin/streamer -q -t 1 -r 2 -j 100 -s 640x480 -o <filepath>
; [L] /usr/bin/streamer -q -w 3 -o <filepath>
; [L] /usr/bin/streamer -q -j 100 -w 3 -s 640x480 -o <filepath>
; [L] /usr/bin/gst-launch -q v4l2src num_buffers=1 decimate=70 ! pngenc ! filesink location=<filepath>
; [M] /usr/local/bin/imagesnap -q -w 3.00 <filepath>
camshot=yes
; A try to fix most of webcam shot errors is to specify the picture
; extension to feet with your software/hardware.
; Try yourself into a console to find the good one.
; Few possible extensions are: png, jpeg, ppm, bmp, tiff.
; JPEG has the best ratio compression/quality.
; If PPM is chosen, it will be converted to JPEG using /usr/bin/convert.
; [W] not used
; [L,M] png, jpeg, ppm, bmp or tiff
camshot_filetype=jpeg