Actually, in the right hands, this could be useful software for computers containing sensitive information. Rig the computer to ping a server at the first detection of an internet connection. If the ping comes from an unauthorized location, or after the computer has been reported lost, then the server remotely executes this program, making the computer good for nothing but parts.