recovering devices which are connected to the Internet or to an Internet-connected computer network according to the present invention; and [0016]FIG. 3 is a flow diagram illustrating an exemplary preferred method according to the present invention for creating and updating the stolen hardware database of FIG. 1.