Malicious Adverts

Today I noticed a malicious advert on my skype homepage, reporting errors on my PC that I should get 'fixed'. Quite funny considering who owns skype these days. (Fyi, I am in France)
URL is:
http://www.mypcspeedm
aximizer.com/fr/tt/PCSM.cfm?tracking=AQ_FR_PP_MRM_​PCSM%20&campaignid=PLYS&mrmid=_xLRO3nybV1c0KYP1sTz​cMub_iugy-f12GXbLkw7J5ay2m-xuqTI9o-66Utaxk-gBIV_EU​Ehg_w6bBZ3kSiyLAKRXWOluE8xZK2YtnH-H961ZYK7ZA7qiGR8​Zeh8IpmjuIfDPwus_T3lQdMSHw8Q2MytAA6tyt7ijMo_UHWlf3​MtodQO7hUTM5BZzgjUeC9J0uRTWqddXHnxGlbSBD9GY0cHuiML​BMPQIRPK7BFVO1xU5i7m8H6hj3NZr3ojVzeq171CpoVYvFPrMM​4CLo9A7S8rbQ58Kw18JHzq5dw6I8hcEliPr9XIYmsROlldbnND​46TwYRaVsbKh8tr0rPu2O45WvoHOvQLlR3t1mV_bJftwK6gzjO​Q8xBg1tyOkzjEv-mZZPAaJmO4zVVmk6KxL0SIhlQvkDs00jnPt​KDZeyW28XEk&filter=55801348

Thanks for reporting. Where did you see this ad? in the Skype conversation window or in the Skype home screen?
Follow the latest Skype Community News
↓ Did my reply answer your question? Accept it as a solution to help others, Thanks. ↓

Similar Messages

  • Worried about a possible malicious ad-on Please Help!!!

    Hi,
    Some one please help I'm worried that flash video downloader is malicious, is it safe from the Mozilla ad-ons site "https://addons.mozilla.org/en-US/firefox/addon/flash-video-downloader/?src=cb-dl-featured" I have been using it for years but Ive found that the website "flashvideodownloader.org" on the threat databases of McAfee Norton and AVG. That there is a nasty trogen on there page this extremely worries me unless there in the adverts which I nether click on anyway "The name of the trogen is Artemis 1994F2879D1"
    My antivirus has not picked anything up so far but after I had removed the ad-on and looked round my PC for any traces of the ad-on I found a folder with a text document in, but I think to access these sites you would have to click on some of the other tools offered it the ad-on. please for your protection don't click on any of the links!!!!!!!
    "speed.pointroll.com" "ad-g.doubleclick.net" "naked.com" "exoclick.com" "pointroll.com" "edgesuite.com"
    "mtvnservices.com" "gfrevenge.com" "71i.de" "contentabc.com"
    "tekenetryverification.net" "nbcuni.com" "2mdn.net" "filesonic.com" "pop6.com" "daredorm.com" "adrocketmedia.com" "moviebox.com" "amateurmatch.com"
    Please help me and give me the correct needed advice
    Look forward from hearing from you,
    Thanks,
    Matthew Hayllar

    Mozilla inspects every add-on before allowing it to be hosted there, and inspects every update for currently hosted add-ons. Pretty safe bet that you aren't going to have a problem after installing that extension, and surely not a Trojan - that is the first thing which is screened for before AMO will allow an add-on to even be uploaded to their server for additional automated screening and then a manual code inspection.
    Just because the website for that add-on is in those threat databases, it doesn't mean their extension contains anything malicious.

  • Adverts open with every click of the mouse

    Every time I click my mouse to open any link or click anywhere on a safari page, it hasn't got to be a link, a new page opens with different adverts.   Any reason as to why this is happening?

    There is no need to download anything to solve this problem.
    You may have installed one of the common types of ad-injection malware. Follow the instructions on this Apple Support page to remove it.
    Back up all data before making any changes.
    One of the steps in the article is to remove malicious Safari extensions. Do the equivalent in the Chrome and Firefox browsers, if you use either of those. If Safari crashes on launch, skip that step and come back to it after you've done everything else.
    If you don't find any of the files or extensions listed, or if removing them doesn't stop the ad injection, ask for further instructions.
    Make sure you don't repeat the mistake that led you to install the malware. It may have come from an Internet cesspit such as "Softonic" or "CNET Download." Never visit either of those sites again. You might also have downloaded it from an ad in a page on some other site. The ad would probably have included a large green button labeled "Download" or "Download Now" in white letters. The button is designed to confuse people who intend to download something else on the same page. If you ever download a file that isn't obviously what you expected, delete it immediately.
    Malware is also found on websites that traffic in pirated content such as video. If you, or anyone else who uses the computer, visit such sites and follow prompts to install software, you can expect more of the same, and worse, to follow. Never install any software that you downloaded from a bittorrent, or that was downloaded by someone else from an unknown source.
    In the Security & Privacy pane of System Preferences, select the General tab. The radio button marked Anywhere  should not be selected. If it is, click the lock icon to unlock the settings, then select one of the other buttons. After that, don't ignore a warning that you are about to run or install an application from an unknown developer.
    Still in System Preferences, open the App Store or Software Update pane and check the box marked
              Install system data files and security updates
    if it's not already checked.

  • Malicious or not? Message popped up: Mozilla security found (something like too much, forget exact word) activity on your computer so it will do a fast scan of system file. With OK button.

    I was looking at youtube.com, which always tells me my browser is not supported and recommends I download Firefox, but that is what I was using, so I went to Firefox to check for updates. (I think I also had freecycle.org open.) Then this message popped up in a new page: Mozilla security found (something like "too much", forget exact word) activity on your computer so it will do a fast scan of system file. There was an OK button. The page address was: http://update17.stegner.ce.ms/index.php?Q7Lhl9ShbRxGJXpkM1VLSi4ZE8H4pTedoVPySgeppM3VpC+thEspcFG7qxHgn1pdsC2h5ygPGWI3t5hXqMzL9EQaZZ3J1e3CKXgCb0Qp. I did not click OK but copied the link and closed the window which closed the internet. I have never seen this before and would like to know if it is really Mozilla or possibly something malicious. Thank you.

    Good catch. That almost certainly is an invitation to download malware.
    There are a lot of infected web sites pushing "fake antivirus" software. If you have any doubts about whether your system might have become infected, you can supplement your regular security software with these two highly regarded scanners:
    Malwarebytes Anti-malware : http://www.malwarebytes.org/mbam.php
    SUPERAntiSpyware : http://www.superantispyware.com/

  • I opened the attachment on a malicious email in error on my IPad and have been informed by the genuine company that it will download malware software. Is this possible on my IPad or is there a way of running a security scan to see if it has been infected?

    I received an email that I now know to be malicious and inadvertently opened up the attachment on my IPad that I've been informed will download malware or a virus. Can my IPad be infected this way or does anyone know if there is a way of running a security scan to check if there is a problem? I do have the most up to date IOS software installed.

    There is no anti-malware for iOS, at least none that actually does anything useful. The odds of getting any malware infection via an email attachment on an iOS device is quite low - practically non-existent. Unless you are seeing any issues, there isn't much to do, other than deleting the email and being more cautious in the future.

  • My computer has been infected with a Trojan Horse.  It has completely taken over my Mac email account and was sending out malicious email to everyone in my address book.  At the same time it infected my iPhone---I am no longer able to receive or send emai

    My computer has been infected by a Trojan Horse.  It has taken over my Mac email account and began sending out malicious emails to everyone in my address book.  I cleared out my MAC address book and began using my AOL email account. It took a few days and then my AOL email account was infected and has now been send out malicious email to all my contacts for over a month.  It has also infected my iPhone--I am no longer able to send or receive emails on my iPhone.  Also, once the Trojan Horse began using my AOL email it completely blocked me from using my MAC account by sending never ending popups asking for my email password to access my MAC email account, but it never accepts my pass word.  The TH has also slowed down everything on my computer.  It's like I am working on an old PC with dial up connection instead of the high speed digital connection that I have.  The little color wheel spins constantly as I wait for sometimes over a minute for a page to pull up.  If it pulls up at all.  I have tried to use the 2 disks that came with my computer to completely remove everything on my computer and then reinstall all the programs, but I am not allowed to sweep my computer clean.  I thought maybe my disks that came with my computer were defective so I called Apple and they sent me 2 new disks.  I am not able able to clear my computer with the 2 new disks either.  I have done this before successfully so it's not something new to me.  I do remember when I believe my computer became infected:  I had googled an unusual sewing term, and I was opening what appeared to be legitimate sites, when all of a sudden a pop up appeared that said that my computer had been infected.  I immediately shut my computer off, but it was too late.  I downloaded a virus program for Mac, and it has never found a virus or problem at all.  I think it is part of this Trojan Horse, but I am unable to delete it from my computer.  It refuses to uninstall.  The Mac Trojan Horse is real and it is terrible.  If anyone has any suggestions for me I would be very appreciative,
    Beth
    vu

    Install ClamXav and run a scan with that. It should pick up any trojans.   
    17" 2.2GHz i7 Quad-Core MacBook Pro  8G RAM  750G HD + OCZ Vertex 3 SSD Boot HD 
    Got problems with your Apple iDevice-like iPhone, iPad or iPod touch? Try Troubleshooting 101

  • Firefox has completely crashed today on my computer. I tried to reload it, and my security application closed it as a "malicious threat" . What's going on?

    All applications I try to open from my desktop ,where I used FIREFOX to open them...crash when trying to open. I tried to re-install FIREFOX, but my security application shut it down as a 'malicious threat'.
    What's going on?

    Thanks, I deleted a bunch of apps and some other TV shows I had on there. All of the other movies have an active download button so there is room for other movies, just not that one for some reason...weird!

  • IMac either or has been remotely accessed, has malicious code, is hacked and/or all of the aforementioned or something that I have not yet researched. With my health issues, my Mac keeps me from thinking about the pain and disability I have. Thank you.

    Hello,
    I'm giving it one more chance and then Mac goes into trash. My iMac is either remotely accessed, perhaps malicious code, hacked and/or all of the aforementioned. I am not savvy in these areas. Please read some of the many symptoms and if you can assist me -- I am beyond grateful.  If you want to say it is my fault because I allowed somebody to use my computer or other nonsense please do not waste my time or yours. This is serious and has been going on for a period of time that is longer then I can remember!
    I have a neighbor, lives in my apartment building, 'had' physical access to my iMac.  Shortly after this I started to have problems that beyond any nightmare I have ever heard of - whether it be Windows or Apple!  Please feel free to ask me any question(s) that might help me rid my iMac of this malicious act as the police have been useless -- say they do not have equipment to check my Mac. FBI can't b bothered.
    It is more then clear that a person(s) has access and has messed up the OS, among other terrible things.  He took over my Facebook account months ago, posted as though he was me. He also prevented me from getting back into FB and Yahoo to close those connected accounts.  Went to an Apple store, under protection of their router and removed FB/Yahoo accounts.  The pages that were showing at home turned out to be fake pages controlled by him. (Think they are called "defaced").
    Anytime I did a 7X or zero out clean install -- he was there before I even hooked up the router!!!
    It came to a point that I can no longer even get to the erase/Utility/install from my apartment so I took it to Apple more then once. Besides erase/install, I turned off ALL Sys Preferences that could alert him to Mac. The last time I received a gray Install CD and was told to take it out of the building and do another erase/install.  There is no sense of going through this until I know if/how to get rid of him.
    Also when I first sign on I ALWAYS get a 192.168.100.11.  I do NOT have a router. I then go to System Preferences to Network and click "renew DHCP" several times before I get an IP addy!  I am not savvy in this area but do feel that this is a major clue.
    Passwords have been changed, master password is not something I can access which prevents me updating, etc., etc.
    I will not bombard you with every detail as that would take several pages. I am beyond desperate. Will be happy to provide further details to serious responders only.
    Thank you.
    'REQUIRE ASSISTANCE'
    Heartfelt sympathy to the many family members, friends, people who loved Steve Jobs even though they never met him -- RIP Steve. You are missed.

    If you really believe that your system has been compromised, here's what you do:
    Disconnect your Mac from your cable modem;
    Back up any documents on your system that are important to you;
    Boot your Mac from the system installation disks that came with it (insert the disk, restart your Mac, and hold down the "c" key until you get the "spinning gear" icon);
    Choose a language and click the arrow button to continue;
    From the Utilities menu, choose Disk Utility;
    In Disk Utility, select your computer's hard drive;
    Click the "Erase" tab;
    Click the "Security Options" button and select to have it overwrite all the data on the hard drive;
    Click the "Erase" button and allow it to process;
    Once the "erase process has completed (it will take a while), reinstall Mac OS X.
    Or, if this is too much for you to accomplish on your own, take your system to an Apple Store and have them help you perform these steps. If your system was indeed compromised, this will remove any such hack. You can then set up a new user account for the computer, reinstall your applications (reinstall only from original disks or downloads from the company making the software) and documents, and reconnect to the Internet.
    Note that when you reconnect to the cable modem, you may still get an IP address starting with 198. This is normal with some cable modems and probably not a cause for concern. It will not be an indication that your system is still compromised; that will not be possible if you perform all the above steps.
    Regards.

  • Iphone 3G Software Update Fixes security vulnerability associated with viewing malicious PDF files?

    Is there an Iphone 3G Software Update Fixes security vulnerability associated with viewing malicious PDF files?  Latest version I can download is 4.2.1
    I assume no fix is available, does anyone know if I'm still vulnerable to the security bug?

    No fix is needed since that vulnarability isn't in 4.2.1.

  • 100% CPU! HALP! w/ Win 8.1 Pro infected by malicious content that reoccurs even after a factory restart. I've tried near everything malwarebytes, win defender, I'm still too new to effectively use MMC, or GPEDIT.MSC,

    Some form of malicious content is assaulting my PC's registrys, drivers, along with portraying as other Users, and programs. It's a constant struggle to keep my property, authority, permission under my control over security ownership of my files etc. I
    have seen PUP and PUM files in scans, I'm still learning the different forms of malicious content, but I have a feeling there's male-ware, root-kit, and ad-ware that I haven't Identified. Even though my network is private, haven't even created a home-group,
    and all my remote access is turned off, but I haven't ruled out someone still being clever enough to access my system/network remotely. I've tried to keep my computer as secure as possible, multiple passwords, and two-step verification I thought I was going
    off the deep end when I started to suspect my SYSTEM profile had been compromised. I can't tell if it's a phony, or actually my system taking away everything until I literally cant do a thing on my computer.  I didn't want to remove any files that I shouldn't.
    When ever I feel that I'm about to lose complete control over my PC I restore it to factory condition, it's about all I can do. Even after 5 restarts it's persistent. I"ve stopped short of using the more extreme programs like Anti-maleware tool Adlice,
    RogueKiller, and Combofix. I've actually learned a lot about script, and IS no thanks to my computers new little friends. I've been dealing with this malicious content since december upgrading OS from 7 up to 8.1 has really been the only thing my computer
    and I from being completely run over. Some newer up to date advice would be great, I don't want to use out of date or ineffective programs the instructions I've been following are sometimes several years, to at least months old. No point in waisting my time
    if the information is irrelevant and out of date. I'll attach some of my reports, and the progams that I have/haven't used yet. I have several MS accounts, from XboX, college, and this old one I was contemplating on putting all three of them in an admin group,
    making it more difficult to challenge my authority, or maybe just joining a workgroup/domain would also work. Last night I did use GPEDIT.MSC to disable inheratance, followed by a taking global ownership, if it I actually managed to get GPEDIT.MSC to can't
    wait to get my hands I"m kind of enjoying myself though, it's been fun teaching myself IS I always wanted to learn how to use CMD script with proper syntax, I was starting the think that my only solution was to learn command prompt, but there may be a
    newer programm that just might work. I've been using reginout, drivertoolkit, MBAM/backup/chameleon, ncleaner, cclearner, and many others. I've scanned but haven't put combofix, roguekiller, or Adlice to the grind stone, I'd probably do more harm not being
    able to tell whats more benine for beneficial. Here is a link to the instructions that I was following https://forums.malwarebytes.org/index.php?/topic/149492-pcregserviceexe-infection-pup-infections/ the members description was also very close to what I was
    dealing with, he just had better luck with MBAM

    You will find appropriate Consumer-specific support by beginning your own, new thread in this forum =>
    http://answers.microsoft.com/en-us/protect/forum/protect_scanning
    ~Robear Dyer (PA Bear) MS MVP-Windows Client since 2002 Disclaimer: MS MVPs neither represent nor work for Microsoft

  • Is there a way to identify safe vs. malicious files on computer that was hacked?

    Our MacBook (OS X ver. 10.8.5) was monitored remotely without our knowledge for over a year. Actually, we had found things that were suspicious but we listened to various experts who told us not to worry. We found several pages of commands in the Terminal window including commands for remote access.  Also many files had incorrect creation dates.
    Our email and banking accounts were compromised.  A typical pattern began with our password being reset.  We’d change the password, and the new password would continue to work, but the hacker would know what that new password was.  She continued to know the password even after it was changed several times.  Computer security experts told us she installed a data logger on our computer.  We purchased a new computer and new hard disk for the old computer, and reinstalled all applications.  However, she was able to get into the email accounts on those as well.  We need to access some of our old files, but we do not know which are safe. 
    We have several suspicious files on our computer that may contain malicious code, but nothing shows up when scanned with various anti-malware software applications. However, some files are suspicious because they have inaccurate creation dates that reflect times when our computer was compromised.  Others are suspicious because they were called up in the Mac Terminal application as Unix executable files, and they have Unix icons, but they were originally MS Word  documents. The hacker remotely entered several pages of commands into our Terminal application but many of the commands were of a form: filename; exit;
    If anyone would be interested in examining the files, we would be happy to provide them.  We are seeking someone who can decompile Unix programs that might be associated with the MS Word files.  These files might report data to someone, or may be involved in spying through the iPhone or computer.  Any additional advice would be appreciated.

    Here is the Entresoft output
    EtreCheck version: 1.9.12 (48)
    Report generated June 22, 2014 at 8:54:52 PM EDT
    Hardware Information:
      MacBook Pro (Retina, 15-inch, Late 2013) (Verified)
      MacBook Pro - model: MacBookPro11,3
      1 2.3 GHz Intel Core i7 CPU: 4 cores
      16 GB RAM
    Video Information:
      Intel Iris Pro - VRAM: (null)
      NVIDIA GeForce GT 750M - VRAM: 2048 MB
      Color LCD 2880 x 1800
    System Software:
      OS X 10.9.3 (13D65) - Uptime: 5 days 12:37:21
    Disk Information:
      APPLE SSD SM0512F disk0 : (500.28 GB)
      EFI (disk0s1) <not mounted>: 209.7 MB
      disk0s2 (disk0s2) <not mounted>: 499.42 GB
      Recovery HD (disk0s3) <not mounted>: 650 MB
    USB Information:
      Apple Internal Memory Card Reader
      Apple Inc. BRCM20702 Hub
      Apple Inc. Bluetooth USB Host Controller
      Apple Inc. Apple Internal Keyboard / Trackpad
    Thunderbolt Information:
      Apple Inc. thunderbolt_bus
    Gatekeeper:
      Mac App Store and identified developers
    Kernel Extensions:
      [loaded] at.obdev.nke.LittleSnitch (4052 - SDK 10.8) Support
      [not loaded] com.cisco.kext.acsock (1.1.0 - SDK 10.6) Support
      [loaded] com.sophos.kext.sav (9.0.61 - SDK 10.7) Support
      [loaded] com.sophos.nke.swi (9.0.53 - SDK 10.8) Support
    Startup Items:
      ciscod: Path: /System/Library/StartupItems/ciscod
    Launch Daemons:
      [running] at.obdev.littlesnitchd.plist Support
      [loaded] com.adobe.fpsaud.plist Support
      [loaded] com.bombich.ccc.plist Support
      [failed] com.cisco.anyconnect.vpnagentd.plist Support
      [loaded] com.microsoft.office.licensing.helper.plist Support
      [loaded] com.oracle.java.Helper-Tool.plist Support
      [loaded] com.oracle.java.JavaUpdateHelper.plist Support
      [running] com.sophos.autoupdate.plist Support
      [running] com.sophos.configuration.plist Support
      [running] com.sophos.intercheck.plist Support
      [running] com.sophos.notification.plist Support
      [running] com.sophos.scan.plist Support
      [running] com.sophos.sxld.plist Support
      [running] com.sophos.webd.plist Support
    Launch Agents:
      [running] at.obdev.LittleSnitchUIAgent.plist Support
      [not loaded] com.adobe.AAM.Updater-1.0.plist Support
      [loaded] com.cisco.anyconnect.gui.plist Support
      [loaded] com.oracle.java.Java-Updater.plist Support
      [running] com.sophos.uiserver.plist Support
    User Launch Agents:
      [loaded] com.adobe.ARM.[...].plist Support
    User Login Items:
      None
    Internet Plug-ins:
      AdobeAAMDetect: Version: AdobeAAMDetect 1.0.0.0 - SDK 10.6 Support
      FlashPlayer-10.6: Version: 13.0.0.214 - SDK 10.6 Support
      Default Browser: Version: 537 - SDK 10.9
      AdobePDFViewerNPAPI: Version: 11.0.06 - SDK 10.6 Support
      AdobePDFViewer: Version: 11.0.06 - SDK 10.6 Support
      Flash Player: Version: 13.0.0.214 - SDK 10.6 Outdated! Update
      QuickTime Plugin: Version: 7.7.3
      SharePointBrowserPlugin: Version: 14.4.2 - SDK 10.6 Support
      JavaAppletPlugin: Version: Java 7 Update 60 Check version
    Audio Plug-ins:
      BluetoothAudioPlugIn: Version: 1.0 - SDK 10.9
      AirPlay: Version: 2.0 - SDK 10.9
      AppleAVBAudio: Version: 203.2 - SDK 10.9
      iSightAudio: Version: 7.7.3 - SDK 10.9
    iTunes Plug-ins:
      Quartz Composer Visualizer: Version: 1.4 - SDK 10.9
    3rd Party Preference Panes:
      Flash Player  Support
      Java  Support
    Time Machine:
      Mobile backups: OFF
      Auto backup: NO - Auto backup turned off
      Volumes being backed up:
      Destinations:
      Untitled [Local] (Last used)
      Total size: 464.96 GB
      Total number of backups: 3
      Oldest backup: 2014-04-09 00:38:02 +0000
      Last backup: 2014-06-08 16:09:58 +0000
      Size of backup disk: Excellent
      Backup size 464.96 GB > (Disk size 0 B X 3)
      Time Machine details may not be accurate.
      All volumes being backed up may not be listed.
    Top Processes by CPU:
          64% InterCheck
          7% WindowServer
          3% opendirectoryd
          1% coreservicesd
          1% hidd
    Top Processes by Memory:
      262 MB WindowServer
      180 MB Microsoft Word
      147 MB InterCheck
      147 MB SophosScanD
      98 MB Mail
    Virtual Memory Information:
      10.46 GB Free RAM
      2.65 GB Active RAM
      1.09 GB Inactive RAM
      1.38 GB Wired RAM
      1.63 GB Page-ins
      0 B Page-outs

  • How can I remove a malicious browser extention that doesn't show a "remove" button?

    I'm using Firefox 31.0 on Mac OSX and recently noticed a "JolleyWallet" popup and some suspect "Photo-Zoom V10 0.95.14" browser extension that I did not install myself.
    I would very much like to permanently be rid of the extension however there is no option to "Remove" it as there usually is for other extensions. Is there a way to manually delete a malicious extension like this?

    Extensions that do not have a remove button are installed globally.
    You can check the locations mentioned in this article.
    *https://developer.mozilla.org/en-US/Add-ons/Installing_extensions

  • How can I check for keylogger and other malicious software on a used Mac

    I purchased a used iMAC (Late 2012 21.5") and it has OSX 10.9.4.
    How can I ensure that it is clean and doesn't have any password or key logging or other malicious software installed in it ?
    I basically want to ensure I have a clean iMac at the start and not have to worry about security.
    Thanks

    The first thing to do with a second-hand computer is to erase the internal drive and install a clean copy of OS X. You—not the original owner—must do that. Changes made by Apple over the years have made this seemingly straightforward task very complex.
    How you go about it depends on the model, and on whether you already own another Mac. If you're not sure of the model, enter the serial number on this page. Then find the model on this page to see what OS version was originally installed.
    It's unsafe, and may be unlawful, to use a computer with software installed by a previous owner.
    1. If you don't own another Mac
    a. If the machine shipped with OS X 10.4 or 10.5, you need a boxed and shrink-wrapped retail Snow Leopard (OS X 10.6) installation disc from the Apple Store or a reputable reseller—not from eBay or anything of the kind. If the machine is very old and has less than 1 GB of memory, you'll need to add more in order to install 10.6. Preferably, install as much memory as it can take, according to the technical specifications.
    b. If the machine shipped with OS X 10.6, you need the installation media that came with it: gray installation discs, or a USB flash drive for a MacBook Air. You should have received those media from the original owner, but if you didn't, order replacements from Apple. A retail disc, or the gray discs from another model, will not work.
    To start up from an optical disc or a flash drive, insert it, then restart the computer and hold down the C key at the startup chime. Release the key when you see the gray Apple logo on the screen.
    c. If the machine shipped with OS X 10.7 or later, you don't need media. It should start up in Internet Recovery mode when you hold down the key combination option-command-R at the startup chime. Release the keys when you see a spinning globe.
    d. Some models shipped with OS X 10.6 and received a firmware update after 10.7 was released, enabling them to use Internet Recovery. If you have one of those models, you may not be able to reinstall 10.6 even from the original discs, and Internet Recovery may not work either without the original owner's Apple ID. In that case, contact Apple Support, or take the machine to an Apple Store or another authorized service provider to have the OS installed.
    2. If you do own another Mac
    If you already own another Mac that was upgraded in the App Store to the version of OS X that you want to install, and if the new Mac is compatible with it, then you can install it. Use Recovery Disk Assistant to prepare a USB device, then start up the new Mac from it by holding down the C key at the startup chime. Alternatively, if you have a Time Machine backup of OS X 10.7.3 or later on an external hard drive (not a Time Capsule or other network device), you can start from that by holding down the option key and selecting it from the row of icons that appears. Note that if your other Mac was never upgraded in the App Store, you can't use this method.
    3. Partition and install OS X
    a. If you see a lock screen when trying to start up from installation media or in Recovery mode, then a firmware password was set by the previous owner, or the machine was remotely locked via iCloud. You'll either have to contact the owner or take the machine to an Apple Store or another service provider to be unlocked. You may be asked for proof of ownership.
    b. Launch Disk Utility and select the icon of the internal drive—not any of the volume icons nested beneath it. In the  Partition tab, select the default options: a GUID partition table with one data volume in Mac OS Extended (Journaled) format. This operation will permanently remove all existing data on the drive.
    c. An unusual problem may arise if all the following conditions apply:
              OS X 10.7 or later was installed by the previous owner
              The startup volume was encrypted with FileVault
              You're booted in Recovery mode (that is, not from a 10.6 installation disc)
    In that case, you won't be able to unlock the volume or partition the drive without the FileVault password. Ask for guidance or see this discussion.
    d. After partitioning, quit Disk Utility and run the OS X Installer. If you're installing a version of OS X acquired from the App Store, you will need the Apple ID and password that you used. When the installation is done, the system will automatically restart into the Setup Assistant, which will prompt you to transfer the data from another Mac, its backups, or from a Windows computer. If you have any data to transfer, this is usually the best time to do it.
    e. Run Software Update and install all available system updates from Apple. To upgrade to a major version of OS X newer than 10.6, get it from the Mac App Store. Note that you can't keep an upgraded version that was installed by the original owner. He or she can't legally transfer it to you, and without the Apple ID you won't be able to update it in Software Update or reinstall, if that becomes necessary. The same goes for any App Store products that the previous owner installed—you have to repurchase them.
    4. Other issues
    a. If the original owner "accepted" the bundled iLife applications (iPhoto, iMovie, and Garage Band) in the App Store so that he or she could update them, then they're irrevocably linked to that Apple ID and you won't be able to download them without buying them. Reportedly, Mac App Store Customer Service has sometimes issued redemption codes for these apps to second owners who asked.
    b. If the previous owner didn't deauthorize the computer in the iTunes Store under his Apple ID, you wont be able to  authorize it immediately under your ID. In that case, you'll either have to wait up to 90 days or contact iTunes Support.
    c. When trying to create a new iCloud account, you might get a failure message: "Account limit reached." Apple imposes a lifetime limit of three iCloud account setups per device. Erasing the device does not reset the limit. You can still use an iCloud account that was created on another device, but you won't be able to create a new one. Contact iCloud Support for more information. The setup limit doesn't apply to Apple ID accounts used for other services, such as the iTunes and Mac App Stores, or iMessage. You can create as many of those accounts as you like.

  • How to locate Malicious or unwanted scripts in a Server 2008 R2 install?

    I am Managing two systems as part of a competition, Windows Server 2008 R2 and a Windows 7 Machine. The competition is the National Collegiate Cyber Defense Competition.
    Part of my issue is i normally am very good at research but it's like i am unable to find this bit of info.
    I need Answers to several issues.
    1. Where can i locate Scripts at in Server 2008 R2?
    2. Assuming scripts aren't in one specific directory... Is there a Freeware Tool i can use that can locate and identify what they do? Such as tot ell em if they are malicious or dangerous.
    3. Is there a way i can block execution of any scripts in the system not created by a valid source?
    Thank you very much for your assistance, regardless if my questions are answered it is nice if i can at least be proactive and actually ask instead of keeping silent. Perhaps future competitors will be helped by this so they don't have to spend months locating
    it.

    1. It is very hard task. Strictly speaking you need baseline and compare every next situation with baseline.
    2. There is a base of nice and useful tools in Sysinternals
    http://technet.microsoft.com/en-us/sysinternals/bb545021.aspx
    3. Basic study material is book written by Mark Russinovich - Windows Internals
    http://technet.microsoft.com/cs-cz/sysinternals/bb963901.aspx
    4. Expert hackers know how to hide script. Unless all files are digitally signed there is a non zero chance to get in (hypothesis).
    These are very special topics that are well behind the scope of this forum ( and my knowledge).
    Regards
    Milos

  • Am I the only one getting calls from 253-802-0308 about malicious file downloads after updating FIREFOX?

    After updating Firefox I start getting calls from 253-802-0308 (International Telcom in Auburn Washington, found using 411.com). The report that they are getting messages that my Windows PC is reporting the downloading of malicious files. I don't think that there is a connection with Mozilla but it only started after I ran the last 2 or 3 updates to Firefox. Searches on Google and other search engines don't show logical connections to the phone calls and the problem being reported to me. None of my anti-virus programs, Ccleaner, DEFENDER & AVG pickup and malicious files. I'm curious about who they may be because when I question them during the calls they end up hanging up on me. Just wondering if similar problems are being reported.

    That is a reported scammer set-up. Read some of the following from actual phone customers. It is not related to your Firefox updates. I have gotten a few of these types of calls on my '''''unlisted '''''home phone number over the past several years. They use a dialer, usually automatic and sequential number dialing. Get a loud whistle to blow into the phone mouth piece or one of those loud air horns from the hardware/sporting good store; this kind of trash deserves broken ear drums.
    *https://encrypted.google.com/search?q=253-802-0308&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a
    '''If this reply solves your problem, please click "Solved It" next to this reply when <u>signed-in</u> to the forum.'''
    Not related to your question, but...
    You need to update some plug-ins:
    *Plug-in check: https://www-trunk.stage.mozilla.com/en-US/plugincheck/
    *Adobe Shockwave for Director Netscape plug-in: [https://support.mozilla.com/en-US/kb/Using%20the%20Shockwave%20plugin%20with%20Firefox#w_installing-shockwave Installing ('''''or Updating''''') the Shockwave plugin with Firefox]

Maybe you are looking for

  • ALSA plays only one source at a time

    OK. I give up ... I'm posting. I've spent about 6 hours going back and forth and I'm about the same as I started. Long story short... This is a fresh install. Audio worked "out of the box" but I soon realized that if I'm playing music I cannot play a

  • Adobelm_Cleanup.001.dir.* folders in Temp folder?

    I was checking in my Temp folder at C:\Documents and Settings\My User Name\Local Settings and there are 83 folders named Adobelm_Cleanup.001.dir.*, with the * representing a 4-digit number starting with 0000 up to 0082, and Date Modified from 3/3/200

  • Error 6753 when printing with airport express

    Hi all- I'm trying to us my airport express to set up wireless printing from my PC laptop. Right now, I've got a netgear router and I -think- I've managed to con nect the airport express to join that network. My goal is simply to use the airport expr

  • IPRM0005 Customer Exit

    Hi  Experts, Who can help me with some Abap code for this exit? When we tried it and influenced the parameter SAP_OFFZE_EXP the plan package did not change. How do I get this exit working. (Yes it is active) how do you selesct the package? Any exampl

  • How to get Weblogic's ClassLoader

    Hello, I am having problems getting custom Handlers to load using the Java 1.4 Logging API. Apparently, the custom Handlers are loaded using the System classpath, not the applications classpath. So, I am trying to create a custom ClassLoader with Web