I believe some how some way my iPhone or appleID has been hacked into.  My iPhone sent 3 iMessages out that I did not type or send - 2 while I was sleeping and one while I was in mid imessage conversation.  Please help if you know anything about this!

I believe that my iPhone or apple ID has been hacked into.  Three imessages were sent from my phone that I did not type or send - two while I was asleep at 1:15am and in the morning during an iMessage conversation.  These messages were to my boyfriend about my boss.  Apple and AT&T have been somewhat helpful but both are pointing fingers at the others saying they cannot track the message or see if my personal information has been compromised.  I feel extremely violated because this hacker knows who my boyfriend is and who my boss is and I just started this job two weeks ago!  I am about to go to the police because this person is trying to taint my good reputation and destroy my relationships at work and in my personal life.  Does anyone have any incite on how this could be done and is there any way to trace where those three iMessages were generated from??

No I have my own iPhone iPad and MacBook  so everything is set up on devices that are mine and as far as I know I never connected to anyone else's device and logged with my apple ID.  But are you saying it is possible for someone to have obtained my apple ID and send an iMessage from their device with my contact information so it looks like it came directly from me?  It's crazy I looked down at my iPhone and saw this message had just been sent that I did not type or send

Similar Messages

  • The SIM card In my iPhone 5 has been giving me occasional messages that there has been a SIM Failure, there is NO SIM, or that there is an INVALID SIM.  Until today, I was able to restart it with no problem and the SIM card would start up.

    The SIM card In my iPhone 5 has been giving me occasional messages that there has been a SIM Failure, there is NO SIM, or that there is an INVALID SIM.  Until today, I was able to restart it with no problem and the SIM card would start up.  This afternoon the NO SIM message came up and I cannot fix it. What is my next step?  I am traveling in Canada now and it is not convenient to come back to the States just to get a SIM card.
    Thanks,
    Lou

    Hi,
    Thanks for getting back to me.  How can I initiate Verizon sending me a new SIM card?  I will be here  long enough to receive it if they can send it to me.
    I have been trying to call Verizon Wireless, but they won’t take my call from my Skype account and I don’t have my phone.
    Thanks again,
    Lou

  • How can i tell if my iphone 4 has been hacked into?

    Here is the situation.....a friend of mine is in a bad marriage. She found out her husband bugged her laptop and her phone and is finding out all of her conversations. The other day, we were all at a buffet restaurant and he was sitting at the table with us, without thinking anything of it, I left my purse with my phone at the table while all but him went up to the bar. Later on that night, I was in the car with another friend and we were talking in detail about our friends situation. The next day my friend whom I was talking to in the car, checked her answering machine, and our conversation was on her machine. I checked my call log AND detailed billing from AT&T  thinking I may have butt dialed her house, but there is no record of me calling her house. The same with her, she as no record of calling her house and her home phone does not have caller ID. This guy is very tech savy and is the manager of 4 AT&T stores. Is it possible for him to have hacked into my phone and put some sort of bug in it? If this is possible, is it also possible for my phone to be able to record our conversation without a call being placed? If it is possible, how can I tell if my phone has been hacked?
    Thanks

    It would be extremely difficult for someone to be able to grab your iPhone out of your purse and hack into it without having a laptop computer with him with which to jailbreak the iPhone and time to work on it. I can't say it would be impossible, though. I'd suggest as a precaution you perform a Restore on your iPhone; if it restores successfully that would clear any jailbreak and remove any hack.
    http://support.apple.com/kb/ht1212
    Regards.

  • My computer has had a new operating system put on Windows 7 but I did not de-authorise my old computer which was Windows Vista and now I cannot sync my Ipod Classic as it keeps saying I have exceeded my maximum of 5 computers being authorised.

    My computer has had a new operating system put on (Windows 7) but I did not de-authorise my old computer which was Windows Vista and now I cannot sync my Ipod Classic as it keeps saying I have exceeded my maximum of 5 computers being authororized.  I tried doing this via my account in the Itunes Store but it still won't allow me to do this.  Can anyone help?

    Contact Apple customer support, they can reset your authorizations.
    http://www.apple.com/contact

  • PLEASE HELP! How can I tell if my Imac has been hacked?

    PLEASE HELP! How can I tell if my Imac has been hacked? I see a few people have asked this question but the responses tended to be advice on what to do once you've been hacked, not what can done to find out if you have been hacked. I have a late 2012 model imac. My sharing was off and remote logging was off. I use an external router that send wireless to about 4 consoles in the flat. I don't think I have any firewalls up (now looking like a mistake). I think I'm possibly being hacked  due to abnormal behaviour and most recently my camera was turned off all day (no LED) then I went to record something on Photo Booth, the application popped up displaying an image of me getting dressed (nightmare!) which happened hours earlier when the camera was off. This image quickly then disappeared and the camera began working normally. Very strange and alarming. Please help me. Any advice would be very much appreciated. Thanks.

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. All it does is to collect information about the state of the computer. That information goes nowhere unless you choose to share it. However, you should be cautious about running any kind of program (not just a shell script) at the behest of a stranger. If you have doubts, search this site for other discussions in which this procedure has been followed without any report of ill effects. If you can't satisfy yourself that the instructions are safe, don't follow them. Ask for other options.
    Here's a summary of what you need to do, if you choose to proceed:
    Copy a line of text in this window to the Clipboard.
    Paste into the window of another application.
    Wait for the test to run. It usually takes a few minutes.
    Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    4. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    5. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    6. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts 51 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports 'com.autodesk.AutoCad com.evenflow.dropbox com.google.GoogleDrive' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */  /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;5p;6p;8p;12p;' ' {sub(/^ +/,"")};NR==6;NR==13&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/root/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1000) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/d;/(etc|Preferences)\//s/^\.\/[^/]+//p;' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| ","||kMDItem'${p[35]}'=");sub("^.."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[9]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/ { next;} /%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]" "$1;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n  "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n  [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n  ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' ' /^ +B/{ s/.+= |(-[0-9]+)?\.s.+//g;p;} ' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' 's/0/Off/p' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil PlistBuddy whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '-c Print /L*/P*/loginw*' '-c Print L*/P*/*loginit*' '-c Print L*/Saf*/*/E*.plist' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' '-c Print\ :'${p[35]}' 2>&1' '-c Print\ :Label 2>&1' '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,In,iTu,Keyb,Mail/B,P*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' -i4TCP:0-1023 com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' );N1=${#c2[@]};for j in {0..8};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;A2 0 $((N1+1)) 2;C0;A1 0 $N1 1;C0;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A1 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D23 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D22 4 4 50 0;D13 14 3 49 5;D12 26 48 59 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    7. Launch the built-in Terminal application in any of the following ways:
    Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    8. If you see an error message in the Terminal window such as "syntax error," enter
    exec bash
    and press return. Then paste the script again.
    9. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    10. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    11. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    12. When you post the results, you might see the message, "You have included content in your post that is not permitted." It means that the forum software has misidentified something in the post as a violation of the rules. If that happens, please post the test results on Pastebin, then post a link here to the page you created.
    Note: This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • When I'm on Facebook and I'm typing a post or comment, words seems to pop into my sentences that I did not type. Also certain words that I type ( ex: say I type the word begin, there will be the letter z in front of the letter b ).

    When I be on Facebook I always have a problem with my posting and comments. There is a tendency that when I'm typing two or three other words will pop into the sentence that I did not type. Also when there are words beginning with the letters I use for a word, the letter z pops in as the first ether. I experienced this problem with my original IPad and the same is going on with the replacement. Can someone here in the community tell me what is going on . It's driving me crazy. I. About to purchase some Holy Water for this possessed device.  Thank You

    Turn off autocorrect
    Settings>General>keyboard>autocorrect

  • Mail 5.3 I sent a message to a friend however, when viewing it I discovered several other past emails attached to it that I did not intend to send. I was wondering want I may of done wrong. Thanks for any replies.

    Mail 5.3 I sent a message to a friend however, when viewing it I discovered several other past emails attached to it that I did not intend to send. I was wondering want I may of done wrong. Thanks for any replies.

    I get several thousand emails a day and have no issues. Sounds like either the mail account in Mail is configured incorrectly or the Exchange Server (I'm assuming you meant Exchange Server and not Outlook Server) needs a software update or may have a setting that doesn't play well with other mail clients.

  • My hotmail email has been hacked into. I've changed my password and hope this fixes the problem. Does this mean my imac software is infected. If so what should I do? Everything appears to be working ok.

    My hotmail email account has been hacked into. I've changed my email password and hope this fixes the problem.  Will my iMac system software now be infected and if so what should I do about it?  Everything appears to be working ok.   Is there a free to use software package available on the web, totally secure and reliable, which can scan my iMac for viruses and fix them if any are found.

    Unless you have installed anything, you are fine.
    You may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful:
    https://discussions.apple.com/docs/DOC-2435
    Bear in mind that from April to December 2011 there were only 58 attempted security threats to the Mac - a mere fraction compared to Windows malware:
    http://www.f-secure.com/weblog/archives/00002300.html
    (I have ClamXav set to scan incoming emails, but nothing else.)

  • Hello - does anyone now how to place a complain for an over charged invoice over a in-purchase game? Apple is charging 10 times more the purchase we made and I cannot find anyplace in the App store to complain online or via email? Please help if you know

    Hello - does anyone now how to place a complain for an over charged invoice over a in-purchase game? Apple is charging 10 times more the purchase we made and I cannot find anyplace in the App store to complain online or via email? Please help if you know

    Use the Report a Problem link in the iTunes email receipt you received. Also in-app purchases can be made without the password if you bought the app within the last 15min. You should enable the in-app restriction in Settings.

  • I have updated to itunes 10.5 and now it doesn't recognize our iphones and says we need a driver installer but then throws a notice saying an error occured. Anyone know anything about this?  :)

    I have updated to itunes 10.5 on my Mac computer and now it doesn't recognize my iphones and says i need to install a device driver but when i try to install it it throws up a notification saying an error occured and to contact the makers of my device 's suppot website.  Anyone know?

    Have you tried repairing your application from within the Control Panel?

  • Aperture is asking me for a serial number when I log on. I do have one because I got it off the app store. Anyone know anything about this or had this problem?

    This problem has been getting at me for a while, I purchased Aperture 3 off the app store about a year ago without trouble, it was fine even when I had lion but after a few mserials deter that it stopped working and asked me for a serial number. It is also gone from my purchase history. I am not going mad and have forgotten hat I bought it in a box because I have written a review on the AppStore which you can only do if you have bought It there.

    If you bought this in the App Store and now the App Store is not showing it in your purchased history and you are using the same Apple Id to log in you have a big problem.
    I would contact the App Store right away and try to get this straightened out.  There is no way to correct this as you do not have a serial number to enter and no way of getting one.
    The only other possibility would be if you somehow have two copies of Aperture on your machine, did you ever load the trial version? You could search your HD to see if you have two copies of the application and if you do try running each to see what happens.
    But even if this turns out to be the case it wouldn't explain the App Store not having it in your history ad that still is a major problem.
    regards

  • How do I know if my computer has been hacked into?

    I am having two issues with my iMac. One is with my wireless -- in the past few days I've received a few times an IP address error, which seems to be solved by renewing the DHCP lease and restarting. Also, at the login screen when I restart, it takes two tries to log in -- on the first one, my password only partially registers and the screen "bounces", then the second try works. Could this mean that my computer has been compromised? We had some workmen alone in our flat while we were away recently, so there are a few people who've had access to the physical machine as well. Thanks for any help.

    You have not been hacked.  Something went wrong with Word and it crashed, and something must have reopened Word.  (The system will usually ask if you want to reopen a crashed app...  did you see such a message?)  Word must have simply reopened the docs you had open when it crashed.
    It's actually quite difficult to hack a Mac, and pretty much requires you to help out by opening it up for potential access by hackers.

  • Possible security problem with my iPhone4, it seems like it has been hacked into and my hotmail, facebook and university accounts (which all have different passwords) and proceed to change my passwords on me. This has happened twice.

    I seem to be having security problems with my iPhone4, it seems like someone has hacked into my hotmail, facebook and university accounts (which all have different passwords) and proceed to change my passwords on me. This has happened twice and I have not left my phone unattended at any time that I can recall nor have I accessed these accounts from another source (i.e. computer/laptop) since changing my passwords after the first hacking occurred. Please help.

    Anyone else at your university complaining about the same thing?  It is more likely someone is stealing passwords by sniffing traffic over the university wifi or with a man-in-the-middle attack or by other means external to your phone.  Try a Google search on "steal password" (without quotes) or "steal SSL password" and you'll learn more than you wanted to know about how passwords get stolen.
    Some related info:
    http://en.wikipedia.org/wiki/Session_hijacking
    http://en.wikipedia.org/wiki/Man-in-the-middle_attack

  • I keep getting a Warning that I'm running out of disk space. Even after I deleted all of my photos and e-mail I still show 0 available. Please help!

    I keep getting a Warning that I'm running out of disk space. Even after I deleted all of my photos and e-mail I still show 0 available space. Please help!

    Correct KiltedTim the iPhone does not have a disk drive, and it does give an error message about running out of disk space. I'm here searching for how to clear it and/or what causes it. A friends 8gb iphone 3G has started giving her that message. It is not jailbroken, has no videos, 400 songs, 20 apps. The system information says there is 0 bytes free. There is 4.6 Gb of "other" data taking up the remaining free space. None of the few apps on the phone I expect would take up that much space with data. Even her emails and saved text messages shouldn't fill 4GB. New iPhone coming in the next couple of days. Easiest to just reset the old one after the upgrade and redownload the apps to make sure not to mess things up.

  • I had downloaded a app and i hit a inapp purchase that i did not want to buy but it had purchased it and had charged me it did not ask me for my username or password or even to buy it had just gone straight through

    hello im new to this community and ive done in app purchases before however this inapp purchase was wrong and had charged me 109.99$
    it did not prompt me or ask for my username and password, it also never asked me if i wanted to cancel or buy the **** thing it had just gone straight through
    my question is how am i to get my money back please someone help me

    All purchases are considered final, but you can try contacting iTunes support and explain what happened and see if they will refund or credit you : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page, then Purchases, Billing & Redemption
    To try and stop it happening again, you should be able to turn off in-app purchases on your device via Settings > General > Restrictions > In-App Purchases 'off', and (depending upon what iOS version that you have on the device) you might also be able to set 'Require Password' to 'Immediately' on the Restrictions (the default is a 15 minute period during which it doesn't need to be re-entered)

Maybe you are looking for

  • IPhone 3G doesn't appear in iTunes 10.6.3

    After upgrading to Snow Leopard 10.6.8 a few weeks ago, I was unable to see my iPhone 3G in iTunes.  I downloaded the latest version of iTunes, which fixed the problem, and I've synced once or twice since then.  Today the device once again doesn't sh

  • FAQ: Why doesn't AVI appear as an export format in the Render Queue?

    [For information on rendering and exporting, see "Basics of rendering and exporting".] On Windows versions of After Effects, AVI appears listed with the more comprehensive name, "Video for Windows". In fact, it's the format specified by the default O

  • Coloring between the lines

    hello, i am having a problem figuring out something out in java. i have to write an app that has the outline of a human body that nurses will "color" certain areas. then i need to calculate what percent of what area was colored( left arm, right arm,

  • Saving metadata changes

    When making changes to the metadata only in PSE editor, does saving the changes to the original jpg file result in any image degradation? Is there a better program you can recommend to modify metadata information, especially to multiple files?

  • Hint and database settings

    Hi to all, I have an issue with my database (10g). In detail when I set an hint in a query the explain plain does not set it as the path? Why do I have this behavior in your opinion ? What tables or setting do I see to understand the resolution ? TIA