Skip to main content

标  题: 车被偷了,求大家给些建议和分析

http://gengwg.blogspot.com/发信人: cftnl (cftnl), 信区: Automobile
标  题: 车被偷了,求大家给些建议和分析
发信站: BBS 未名空间站 (Wed Apr 22 13:20:56 2015, 美东)

最近我的车借给朋友开,周一下午4:30(Apr.20)朋友去medford,MA的健身房,有人偷
了他放在locker room里面的车钥匙(在外套口袋里),等朋友出来后发现贼将车也开
走了,他立刻报案了,警察也做了一些记录,因为他的钱包等个人物品也在车上,之后
他的credit card被刷了12笔,贼去消费过的地方都在附近几个town,有在nike
factory ,kenneth cole买了一些衣服,女士皮包,香水,去t-mobile买了一部iphone6
+sim卡,去bestbuy买了一个1000+刀的物品但是被reject,去liquor store买了烟,由
于我的车也快没油了,他最后还去加了15刀的油(通常我的车加满需要28刀),之后还
去了BJ买了200刀的东西,再之后因为银行打给朋友了,所有朋友关了全部的银行卡,
并且把这些消费记录给了警察,但是警察也说他们比较忙,不可能100%投入精力到我们
的case,所以我们第二天去到这些商店希望能有所获得,大部分商家表示不能给我们看
监控视频,但有一些商家比如liquor store老板透露是一个male white young man,我
们最后在一个加油站那里获得了视频资料和照片,但是贼有戴一顶帽子,不是很clear
face,其他商家表示他们只能和警方合作,而且现在也没有收到来自警方的任何配合调
查的信息,我们现在不知道说是否可以自己进行一些调查提供给警方,因为至少gym和
BJ都是需要membership才可以进入,当然也有可能他是偷来的gym tag and membership
card 但是还是有一线希望,一些商家有说感觉他有在吸毒,因为看起来较亢奋,但不
知道是不是因为着急显得比较亢奋,大家能不能给分析分析,给一些建议,觉得我的车
能找回来吗?还有大家觉得贼到底是joyride or really want to destroy the car to
a chop shop? 我的车没有Lojack or Onstar track device,很惨是保险是without
comprehensive所以保险一分钱都不会赔,我该怎么做会比较积极一些呢?求各位大神
给支招!谢谢了,再一个,假如有可能,帮我注意下我的爱车:银灰色Dodge Dart
2015,麻州车牌653YP1,再次感谢!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec