Normally I'd let it go, but I just HAVE to answer this time.
First thing you should keep in mind is that the thief is dumb enough to fall for these cheap tricks, (s)he deserves to be caught.
Now then... the firewall WILL stop any attempts to send email (assuming the firewall is set up to block those specifically), so if the laptop is connected though one, the thief just has to remove this program or change the settings as said earlier, and then they can do whatever they want.
As for the speed remark, the firewall doesn't care how soon or how late you try to send email - it'll block it either way. At this point the settings are easily changed (duh)
As far as formatting, most utilities don't touch some parts of the hard disk - that's most likely where the stuff gets stored. However, if this software has the ability to access and install/deinstall itself, other pieces of software should be able to do the same - somebody would have to reverse-engineer this software and write some code, but it's doable (and has been done before).
First thing you should keep in mind is that the thief is dumb enough to fall for these cheap tricks, (s)he deserves to be caught.
Now then... the firewall WILL stop any attempts to send email (assuming the firewall is set up to block those specifically), so if the laptop is connected though one, the thief just has to remove this program or change the settings as said earlier, and then they can do whatever they want.
As for the speed remark, the firewall doesn't care how soon or how late you try to send email - it'll block it either way. At this point the settings are easily changed (duh)
As far as formatting, most utilities don't touch some parts of the hard disk - that's most likely where the stuff gets stored. However, if this software has the ability to access and install/deinstall itself, other pieces of software should be able to do the same - somebody would have to reverse-engineer this software and write some code, but it's doable (and has been done before).
Originally posted by: ALAVergas
From the review link above, posted so you could read it and learn about the product without asking redundant questions:
"PC PhoneHome is available in three versions. PC PhoneHome Lite is a free application that sends stealth e-mails, but unlike the paid versions, it can be removed from the hard drive by running simple format, low-level format or FDISK procedure disk-formatting utilities.
PC PhoneHome Pro, which we tested, is appropriate for individuals or small installations. Unlike the Lite version, it can withstand disk-formatting procedures."
So yes, it can survive low-level formats.
I'll leave the firewall question to someone who understands it better, I know it well enough to understand its not a problem but probably not well enough for a thurough explanation.
As for the SMTP, it sends a message within 30 seconds if an active net connection is present, faster than you could change it. SMTP is something only the most experienced computer tech would know about, and only a VERY bold one would go and manipulate manually. The registry is not something to toy with on your system just to see what happens. If there's a different way to manipulate SMTP outside of regedit I don't know of it.