Another idiot spewing tripe without having a single functioning brain cell.
Yes, *SOME* computers can be identified as being online. In a very few
cases they can be traced to a broad geographical location based upon the
results of a traceroute. Notice I said very few. Second of all, when
monitoring for terrorist activity online, specific computers are not
targeted. Traffic is monitored for content. Suspicious activity on a
certain ISP can then be monitored. If the computer is in the United States,
a court order must be acquired before that particular computer cam be
monitored, and even then it can be difficult to monitor a specific computer
unless it has a static IP address. MAC addresses are of no use...firewalls
that have NAT (and most do) hide the true MAC addresses of computers behind
it. And, MAC addresses can be spoofed.
So, Peter, before you go shooting your mouth off, at least get your facts
straight.
To answer the OP's question...there exists software which will in effect
"call home" when a computer is granted internet access. The software is not
foolproof, and of course if the thief wipes the drive then the software is
useless. It is no very likely, even with tracking software installed, that
the computer will ever be found. I sympathize with you. The best you can
do is to make sure that you have good insurance coverage on the unit.
Bobby