Anyone using Secure SMTP in SquirrelMail ?

Secure SMTP and Secure IMAP working fine with all Email clients. Secure IMAP works with SquirrelMail. But SMTP does not. I would like to know if anyone is using Secure SMTP in SquirrelMail. I get a message "Connection Refused" when I try to send an email from SquirrelMail. Appreciate any help.

You didn't mention if you modified the SM config with your server settings?
sudo /etc/squirrelmail/config/conf.pl
Make sure you change the SMTP server from localhost to the proper common name for the server or ssl won't work.
But......
There's no reason to use SSL if SM and the SMTP server are on the same machine. No point in encrypting traffic which never hits the network.
Jeff

Similar Messages

  • Difficulty sending mail to secure SMTP, SMTPAddressFailedException: 554

    I keep getting the following exception in my application:
    class com.sun.mail.smtp.SMTPAddressFailedException: 554 <[email protected]>: Recipient address rejected: Relay access denied
    My code is as follows:
    public class SMTPSender {
         private Session session;
         public SMTPSender() {
              Properties props = new Properties();
              props.setProperty("mail.smtp.host", AutomailingUtility.HOST);
              props.put("mail.smtps.auth", AutomailingUtility.AUTH);
              props.put("mail.smtp.port", "465");
              props.put("mail.smtp.socketFactory.port", "465");
              props.put("mail.smtp.socketFactory.class", "javax.net.ssl.SSLSocketFactory");
              props.put("mail.smtp.socketFactory.fallback", "false");
              Authenticator auth = new MyAuthenticator(AutomailingUtility.USERNAME, AutomailingUtility.PASSWORD);
              session = Session.getInstance(props, auth);
         public void sendMessage(String toUser, String message, String subject) {
              try {
                   Message msg = new MimeMessage(session);
                   msg.setSubject(subject);
                   msg.setSentDate(new Date());
                   InternetAddress ia = new InternetAddress(AutomailingUtility.FROM_ADDRESS);
                   msg.setFrom(ia);
                   msg.setRecipients(Message.RecipientType.TO, InternetAddress.parse(toUser + "@mail.gatech.edu"));
                   msg.setText(message);
                   Transport.send(msg);
              } catch (AddressException e) {
                   e.printStackTrace();
              } catch (MessagingException e) {
                   e.printStackTrace();
    }All the Automailing constants are strings.
    I'd appreciate the help

    The code? For regular SMTP with authentication I believe you needprops.put("mail.smtp.auth", "true");whereas you set up the mail.smtps.auth property instead. However I don't have any experience with secure SMTP, so I don't know what's right in that case. Are those other applications you mention using secure SMTP or just regular SMTP?

  • Is it secure to have the pulic open a resource guide in Adobe Reader?  Or is there a way to make sure anyone using the link to the guide is secure?

    Is it secure to have the public open a resource guide in an Adobe Reader PDF?  Or is there a way to make sure anyone using the link to the guide is protected?
    Not sure how to find an answer to this.
    Thanks, GM

    I am trying to post a 123 page resource guide online for the public to access through the website of a non profit.  The guide has a lot of web links for to use for more information.  But there have been clickability issues when using some browsers to download the PDF and so I would prefer to suggest that they try to download the resource into Adobe Reader before using.  I want to make sure that this would securely safe for readers and users.
    Sorry I was not clear in my original question and thank you for your kind attention.
    Thank you again,
    GM

  • Is anyone using the Calendar Server to send external invites?

    Is anyone using the Calendar Server to send external invites?
    We have a Mountain Lion server running DNS, Open Directory, File Sharing and VPN. We have recently stood up the Calendar server and it is working very well. Internal invites work fine and are instantaneous to computer, iPhone, iPad. We have the ports working so that calendar items created outside the network work fine as well. Only problem is we cannot invite anyone with an external e-mail address. Each time we do the Calendar Error Log populates with:
    2013-04-15 13:11:03-0500 [-] [mailgateway] 2013-04-15 13:11:03-0500 [Uninitialized] SMTP Client retrying server. Retry: 5 
    2013-04-15 13:11:03-0500 [-] [mailgateway] 2013-04-15 13:11:03-0500 [Uninitialized] SMTP Client retrying server. Retry: 4
    2013-04-15 13:11:03-0500 [-] [mailgateway] 2013-04-15 13:11:03-0500 [Uninitialized] SMTP Client retrying server. Retry: 3
    2013-04-15 13:11:03-0500 [-] [mailgateway] 2013-04-15 13:11:03-0500 [Uninitialized] SMTP Client retrying server. Retry: 2
    2013-04-15 13:11:03-0500 [-] [mailgateway] 2013-04-15 13:11:03-0500 [Uninitialized] SMTP Client retrying server. Retry: 1
    2013-04-15 13:11:03-0500 [-] [mailgateway] 2013-04-15 13:11:03-0500 [Uninitialized] [twistedcaldav.mail.MailHandler#error] Mail gateway failed to send message <[email protected]> from [email protected] to mailto:[email protected] (Reason: Failure with multiple causes.)
    We have set up an internal e-mail address. I have confined that it works fine. I have tried more than one internal account. I have also verified the settings through the command line by typing "sudo serveradmin settings calendar" The iMIP sending and receiving information is correct. There is no authentication type setting listed in the command line output even though there's a place to choose it in the Enable invitations by email - Edit button on the third screen. No matter what I choose it goes back to "login" and still doesn't work.
    The command line settings mention a port number 62310 as being the MailGatewayPort but opening that port on the network's firewall makes no difference. As I said external set up works fine from Mac/iPhone/iPad and push notification works fine as well.
    Is anyone using this functionality?

    I'm sorry. I forgot to add Mail to the list of services. I AM using mail on that server. Here's the iMIP portion of my settings output from Terminal.
    calendar:Scheduling:iMIP:Sending:Server = "boardwalkserver.kuhnwitt.com"
    calendar:Scheduling:iMIP:Sending:UseSSL = yes
    calendar:Scheduling:iMIP:Sending:Username = "calendarserver"
    calendar:Scheduling:iMIP:Sending:Address = "[email protected]"
    calendar:Scheduling:iMIP:Sending:Password = "password"
    calendar:Scheduling:iMIP:Sending:Port = 465
    calendar:Scheduling:iMIP:Enabled = yes
    calendar:Scheduling:iMIP:MailGatewayPort = 62310
    calendar:Scheduling:iMIP:Receiving:Server = "boardwalkserver.kuhnwitt.com"
    calendar:Scheduling:iMIP:Receiving:UseSSL = yes
    calendar:Scheduling:iMIP:Receiving:Username = "calendarserver"
    calendar:Scheduling:iMIP:Receiving:PollingSeconds = 30
    calendar:Scheduling:iMIP:Receiving:Type = "imap"
    calendar:Scheduling:iMIP:Receiving:Password = "password"
    calendar:Scheduling:iMIP:Receiving:Port = 993
    calendar:Scheduling:iMIP:AddressPatterns:_array_index:0 = "mailto:.*"
    calendar:Scheduling:iMIP:MailGatewayServer = "localhost"
    So Add mail to the services being used. Since Calendar is running on the mail server one would assume that it could communicate with it fairly easily.

  • Has anyone used JAAS with WebLogic?

    Has anyone used JAAS with Weblogic? I was looking at their example, and I have a bunch of questions about it. Here goes:
    Basically the problem is this: the plug-in LoginModule model of JAAS used in WebLogic (with EJB Servers) seems to allow clients to falsely authenticate.
    Let me give you a little background on what brought me to this. You can find the WebLogic JAAS example (to which I refer below) in the pdf: http://e-docs.bea.com/wls/docs61/pdf/security.pdf . (I believe you want pages 64-74) WebLogic, I believe goes about this all wrong. They allow the client to use their own LoginModules, as well as CallBackHandlers. This is dangerous, as it allows them to get a reference (in the module) to the LoginContext's Subject and authenticate themselves (i.e. associate a Principal with the subject). As we know from JAAS, the way AccessController checks permissions is by looking at the Principal in the Subject and seeing if that Principal is granted the permission in the "policy" file (or by checking with the Policy class). What it does NOT do, is see if that Subject
    has the right to hold that Principal. Rather, it assumes the Subject is authenticated.
    So a user who is allowed to use their own Module (as WebLogic's example shows) could do something like:
    //THEIR LOGIN MODULE (SOME CODE CUT-OUT FOR BREVITY)
    public class BasicModule implements LoginModule
    private NameCallback strName;
    private PasswordCallback strPass;
    private CallbackHandler myCB;
    private Subject subj;
             //INITIALIZE THIS MODULE
               public void initialize(Subject subject, CallbackHandler callbackHandler, Map sharedState, Map options)
                      try
                           //SET SUBJECT
                             subj = subject;  //NOTE: THIS GIVES YOU REFERENCE
    TO LOGIN CONTEXT'S SUBJECT
                                                     // AND ALLOWS YOU TO PASS
    IT BACK TO THE LOGIN CONTEXT
                           //SET CALLBACKHANDLERS
                             strName = new NameCallback("Your Name: ");
                             strPass = new PasswordCallback("Password:", false);
                             Callback[] cb = { strName, strPass };
                           //HANDLE THE CALLBACKS
                             callbackHandler.handle(cb);
                      } catch (Exception e) { System.out.println(e); }
         //LOG THE USER IN
           public boolean login() throws LoginException
              //TEST TO SEE IF SUBJECT HOLDS ANYTHING YET
              System.out.println( "PRIOR TO AUTHENTICATION, SUBJECT HOLDS: " +
    subj.getPrincipals().size() + " Principals");
              //SUBJECT AUTHENTICATED - BECAUSE SUBJECT NOW HOLDS THE PRINCIPAL
               MyPrincipal m = new MyPrincipal("Admin");
               subj.getPrincipals().add(m);
               return true;
             public boolean commit() throws LoginException
                   return true;
        }(Sorry for all that code)
    I tested the above code, and it fully associates the Subject (and its principal) with the LoginContext. So my question is, where in the process (and code) can we put the LoginContext and Modules so that a client cannot
    do this? With the above example, there is no Security. (a call to: myLoginContext.getSubject().doAs(...) will work)
    I think the key here is to understand JAAS's plug-in security model to mean:
    (Below are my words)
    The point of JAAS is to allow an application to use different ways of authenticating without changing the application's code, but NOT to allow the user to authenticate however they want.
    In WebLogic's example, they unfortunately seem to have used the latter understanding, i.e. "allow the user to authenticate however they want."
    That, as I think I've shown, is not security. So how do we solve this? We need to put JAAS on the server side (with no direct JAAS client-side), and that includes the LoginModules as well as LoginContext. So for an EJB Server this means that the same internal permission
    checking code can be used regardless of whether a client connects through
    RMI/RMI-IIOP/JEREMIE (etc). It does NOT mean that the client gets to choose
    how they authenticate (except by choosing YOUR set ways).
    Before we even deal with a serialized subject, we need to see how JAAS can
    even be used on the back-end of an RMI (RMI-IIOP/JEREMIE) application.
    I think what needs to be done, is the client needs to have the stubs for our
    LoginModule, LoginContext, CallBackHandler, CallBacks. Then they can put
    their info into those, and everything is handled server-side. So they may
    not even need to send a Subject across anyways (but they may want to as
    well).
    Please let me know if anyone sees this problem too, or if I am just completely
    off track with this one. I think figuring out how to do JAAS as though
    everything were local, and then putting RMI (or whatever) on top is the
    first thing to tackle.

    Send this to:
    newsgroups.bea.com / security-group.

  • How to bypass proxy when trying to send a mail using javamail smtp

    Hi,
    I am trying to make a servlet send a mail using javamail smtp protocol on port 25 but i m not able to send getting an exception, i suspect proxy is blocking, so any idea anyone how bypass a proxy.

    And if it does turn out that there's a proxy server blocking access to your target SMTP server, the best way to deal with that is to discuss the issue with the person responsible for your network configuration.

  • Unable to send mail via Secure SMTP

    Our email system allows users access to their accounts via secure IMAP and SMTP.
    I am able to connect and view my inbox via secure IMAP, using a number of different S60 devices - namely E72, E52 and 5800.
    However I am unable to connect to send via secure SMTP.
    By contrast, I am able to view and send mail with Apple and Android devices without any problems.
    On my comparable UAT configuration the S60 devices do not have this problem.
    On UAT, we use a self-signed certificate, as opposed to the Live system which uses a Verisign certificate.
    Help, please!
    I'd like to be able to send mail with my S60 devices.
    How can I resolve this apparent problem with the certificate?
    Echo

    An Update of sorts.
    On my E72 I removed all references to Verisign under: Ctrl. panel -> Settings -> General -> Security -> Certificate management -> Authority certificates. (There were about 6 entries)
    I tried to connect afresh, but the phone took two attempts to pick up my password for email.
    I now have a 'Trusted site certificate' for the email server.
    However, I still can't send.  A message pops up 'Unable to send message: <target address>'

  • Re: Interfaces in Forte - has anyone used them?

    We are making use of interfaces extensively and have never had the
    slightest problem. Interfaces do not cause any overhead, since they are
    mainly a means to support type checking by the compiler. At run-time the
    interface does not appear any more.
    Using Forte 3.0.F.2
    General wrote:
    >
    We are embarking on the analysis phase of a large pay/personnel project. =
    We have been advised to use interfaces wherever possible, because they =
    promote flexibility and reusability. I am fairly well convinced of the =
    benefits of using interfaces - they appear to have a lot of advantages, =
    and no drawbacks. However, I do wonder whether Forte's implementation of =
    interfaces is stable and usable (..it was only introduced in version 3). =
    If not, we may be better advised to use standard techniques.
    If you have used Forte interfaces I would be interested to hear how you =
    got on.
    regards,
    Tim Kimber--
    Dr. Thomas Kunst mailto:[email protected]
    sd&m GmbH & Co. KG http://www.sdm.de
    software design & management
    Thomas-Dehler-Str. 27, 81737 Muenchen, Germany
    Tel +49 89 63812-221 Fax -444
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/>

    Eric,
    You are correct, "manipulate anAIFace object" is not really the correct
    way of thinking about what is happening. We are really manipulating an
    instance of an object through an interface.
    In regards to your other statement: "if Project C needs visibility to B,
    it must have B as a supplier Plan." Forte does not force this to happen
    when you are using interfaces, which is what causes the problem. Let me
    expand on my initial example and add enough detail so that you can create
    the problem, which surfaces as a deserialization error:
    Project A (No Supplier Plans)
    Defines Interfaces: UnitIFace with method GetValue() which returns an
    integer
    Project B (Contains A as a Supplier Plan)
    Defines Class: Unit with attribute _Value as an integer and method  
    GetValue() which returns _Value.  Implements interface UnitIFace.
    Project C (Contains A as a Supplier Plan)
    Defines Class: Square with method Calculate which accepts an
    UnitIFace as an input parameter and returns an integer. This class needs
    to be setup as a distributed object so that I service object can be
    defined using this class.
    Defines Service Object: SqaureSO using the Square class.
    Project D (Contains B and C as Supplier Plans)
    Defines a class or uses a window that creates an instance of Class B
    and passes it to the SquareSO service object that sqaures the value and
    returns an integer.
    Once this is setup, use the running man to run everything locally. This
    will run fine because the dependencies for the local partition end up
    including Projects A, B, C and D. Next, run distributed and move the SO
    to a remote partition. Now when you execute you will receive a
    deserialization error. This happens because the dependencies for the
    remote partition only included project A and C. The partition did not
    have the necessary information to deserialize the underlying instance of
    Class Unit that is referenced through the inteface UnitIFace.
    The problem can be resolved by either adding Project B as a supplier plan
    to Project C or ensuring that the interface and class are declared in the
    same project as I suggested in my previous message. In either case, this
    must be resolved by the programmer since Forte is not yet smart enough to
    correctly resolve the project dependencies, even though all of the
    information needed to establish the correct dependency hierarchy is
    available.
    Bradley K Wells
    [email protected]
    Strong Capital Management, Inc
    http://www.strong-funds.com/
    From: Eric Pereira
    Sent: Friday, July 31, 1998 5:57 PM
    To: [email protected]
    Cc: [email protected]
    Subject: RE: Interfaces in Forte - has anyone used them?
    Bradley,
    Thanks for that descriptive note on interfaces.
    I do have a observation : in that example you gave us, if Project C
    needs visibility to B, it must have B as a supplier Plan. Therefore, I
    don't quite understand how partioning classes in C would end up with a
    run-time errror in distributed mode, given that B supplies C (something
    you've perhaps missed out in your example ?).
    Also, is it really possible to "manipulate AIFace objects" ? Interfaces
    are'nt really objects, they just help implement a compile-time type
    check.
    Thanks.
    Eric Pereira
    Forte Consultant
    ----<snip>------------------
    Example:
    Project A - Contains AIFace
    Project B - Contains Class B which implements AIFace, depends on Project
    A
    Project C - Contains Classes manipulating AIFace objects, depends on
    Project A
    This can run fine locally since the local partition has knowledge of all
    the classes in A, B, and C. Now as soon as you throw a service object
    on
    classes on Project C and push them into a remote partition, your
    application starts failing because that partition does not contain the
    information form project B since there is no dependency on that project.
    The partition needs the information from project B though since it
    contains the definitions for the actual implementation objects, however
    there was no way for Forte to determine that need when it generated the
    partition.
    This problem is initially eliminated by keeping the interfaces in the
    same project as the underlying business objects. But once you start to
    have interfaces implemented by multiple classes from multiple projects,
    then this won't cover all the bases either. In any case, it is an issue
    that you will need to consider at some level when using interfaces.
    Good luck!
    Bradley K Wells
    [email protected]
    Strong Capital Management, Inc
    http://www.strong-funds.com/
    From: "Ngai, Stuart" <[email protected]>
    Date: Thu, 30 Jul 1998 11:10:50 -0400
    Subject: RE: Interfaces in Forte - has anyone used them?
    With version 3G, you can not create an array of interfaces. I believe
    Forte
    will have that feature in version 4 (which is scheduled to be in
    production
    at the end of next year).
    -----Original Message-----
    From: Thomas Kunst [SMTP:[email protected]]
    Sent: Thursday, July 30, 1998 8:52 AM
    To: [email protected]
    Cc: General
    Subject: Re: Interfaces in Forte - has anyone used them?
    We are making use of interfaces extensively and have never had the
    slightest problem. Interfaces do not cause any overhead, since theyare
    mainly a means to support type checking by the compiler. At run-timethe
    interface does not appear any more.
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/>
    Get Your Private, Free Email at http://www.hotmail.com
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/>

  • HT204387 Has anyone used their ip4 or higher with the text messaging sync system in the new ford cars it is call map

    Has anyone used their ip4 or higher with the text messaging sync system in the new ford cars it is call map

    Send this to:
    newsgroups.bea.com / security-group.

  • Cisco 7921 - Does anyone Use EAP-TLS in their VoWLAN Deployments?

    Hi Guys,
    I am looking at making a technology decision, in regards to VoWLAN and authentication.
    For our Data Deployment, we use EAP-TLS with a PKI infrastructure and ACS. The ACS passes fields from the certs to AD for verification.
    Can I do exactly the same for the Voice Deployment?
    Has anyone used EAP-TLS with Voice? Are there any problems? Or should I just go ahead and get some certs minted for the phones, setup some AD accounts and whey hey, its time to party?
    Many thx indeed,
    Ken

    Hi Michael,
    So looking at the deployment guide, this is worded (imho) in a confusing manor? Sorry.
    CCKM is listed under authentication, where i though CCKM is an authentication "key managment" protocol?
    It also says 802.1x authentication with AES encrytion, under the authentication heading?
    It says eap-tls, should this not say 802.1x eap-tls or collapse this with the 802.1x authentication?
    ahh, when it says 802.1x, does that mean 802.1x dynamic wep?
    Would it be correct to say, that I want to use 802.1x eap-tls with tkip and CCKM?
    Sorry, this hurts :)
    Thx,
    Ken
    Wireless Security
    When deploying a wireless LAN, you must provide security. The Cisco Unified Wireless IP Phone 7921G supports the following wireless security features.
    Authentication
    - Cisco Centralized Key Management (CCKM)
    - 802.11i (802.1x authentication + TKIP encryption)
    - 802.11i (802.1x authentication + AES encryption)
    - 802.11i (Pre-Shared key + TKIP encryption)
    - 802.11i (Pre-Shared key + AES encryption)
    - Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling (EAP-FAST)
    - Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)
    - Protected Extensible Authentication Protocol (PEAP)
    - Lightweight Extensible Authentication Protocol (LEAP)
    - Open and Shared Key
    Encryption
    - Advanced Encryption Scheme (AES)
    - Temporal Key Integrity Protocol (TKIP) / Message Integrity Check (MIC)
    - 40-bit and 128-bit Wired Equivalent Protocol (WEP)
    Cisco Centralized Key Management (CCKM)
    When using 802.1x type authentication, you should implement CCKM for authentication. 802.1x can introduce delay during roaming due to its requirement for full re-authentication. CCKM centralizes the key management and reduces the number of key exchanges. Also, WPA introduces additional transient keys and can lengthen roaming time. TKIP encryption is recommended when using CCKM for fast roaming as CCKM does not support AES currently.

  • Do you use secure email

    Hi all:
    Out of curiosity, do you use secure email, either at home or at work? What system do you use?

    On 19/08/2013 13:45, Joseph Marton wrote:
    > Dave Howe wrote:
    >
    >> Last I looked, the gwia doesn't even check TLS certificates and has no
    >> way to enforce TLS.....
    >
    > Of course GWIA supports SSL/TLS.
    That isn't what I said. What I said was that, while it *supports* TLS,
    it doesn't bother checking anything at all in the certificate - not even
    expiry or hostname. Try it sometime. It also has no way to enforce it,
    so if you simply MitM a gwia connection and remove the "starttls"
    response from the EHLO responses, the gwia will happily send the whole
    stream unencrypted.
    >> the Trusted Application API lets you connect to anyone's mailbox you
    >> like, whenever you want, using a standard groupwise client and a half
    >> dozen lines of VBS.
    >
    > You need administrator access to even create a trusted application, and
    > even then you can't just use a standard GW client to get into a user's
    > mailbox. You have to use a third-party application which specifically
    > uses the trusted app.
    Erm, no. you need admin access to create the trustapp token - that can
    either be restricted to a specific IP (usually a good idea!) or not.
    The gwcma1.dll installed in the standard installation of the gw client
    has a "SetTrustedApplicationCredentials" method on the application
    object, and a login method - call the first in vbs, call the second
    (again in vbs) and it will launch a full client logged in as the target
    user. By using gwcmb1.dll first, you can list the users in a given post
    office so you can select one for the procedure (that may require admin
    rights if you want to see/select a user not in the normal address book).
    This works, in practice - I have such a vbs script written for
    troubleshooting problems with the BES gateways, and it works just fine.
    > On the other hand, with Exchange all an administrator needs to do is
    > type a single command and now administrators can simply use the Outlook
    > client to access every single user's mailbox.
    Yup. I do note that you can then go into your outlook client (not the
    webapp, sadly) and check to see who has rights to your inbox - but that
    doesn't really matter - pointing and saying "but they are just as bad"
    doesn't work outside of a playground.

  • Has anyone used Malwarebytes or anything similar to protect Mac from virus etc

    Has anyone used Malwarebytes or something similar to scan Mac for virus and other security and effiency problems?

    I should have been more specific, I wasn't given a Mac to keep, I was given a Mac to clean up. I have almost 20 years experience working with personal computers and I've worked on every major OS that's been released during that time (OS/2, every version of Windows since 3.1, Linux, Mac OS, Unix). I no longer work in a shop specifically fixing computers but my family still gives me their computers to look at whenever they have issues. My cousin just gave me her laptop since she was unable to fill out any web forms that would try to verify her e-mail address, plus she kept getting pop ups to run some MacKeeper software. Had this been a computer I received second hand I would have re-installed the OS regardless of the state it was on, but since she needs the files on her computer for school I figured it'd be much easier to run a Mac OS equivalent of Malwarebytes than to backup everything and re-install the OS.
    Unfortunately when you search the internet for a Malwarebytes alternative for Mac OS, the majority of the time you just get posts from people saying "Macs are super secure, don't worry about it you won't get infected", which is a completely useless response for someone whose computer is infected. The rest of the posts responding to people who ARE infected are much like your response "Just re-install the OS" but that doesn't address the underlying issue of what's infecting the computer for those people who can't afford to lose everything. I was eventually able to Google the symptoms of this issue and determine that it was a trojan known as DownLite or VSearch. Once I found where it was located I opened up a terminal, ran sudo su to elevate myself to root, deleted the VSearch folder and files from the terminal, ran ps ax | grep VSearch to find the running application and did a kill -9 [pid] to terminate the app (rather than rebooting.)
    Once that was all done I was able to use Chrome and Safari without all of the popups and hijacks. It took all of 5 minutes once I knew what the underlying issue was but I was really hoping to find a program like Malwarebytes so I could just let it scan the computer and tell me "These applications are malicious..." especially since my cousin installed a lot of stuff I would consider junk on her laptop and I didn't want to delete things that are just harmless junk (since she might use them.) Since I ended up having to do this all manually I'm just hoping there's nothing else lingering on the computer that didn't have visible symptoms.

  • Has anyone used bluetooth hotspot in car for ichat

    Has anyone used ichat on ipad through bluetooth conntection in car?

    You might try the [Approval Workflow Engine (AWE) for HCM 9.0|https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=747740.1&h=Y] red paper. You can find it on Metalink3 at [https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=747740.1&h=Y|https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=747740.1&h=Y].

  • Has anyone used infin to assist in troubleshooting ?

    I had a security problem when my firewall was temporarily turned off.  A tech company named "infin" assisted me with the problem and with a printer problem.  Since assisting me, the tech said that the company will no longer be in business.  Has anyone used "infin" for assistance because the tech said his company does a lot of work on Apple products. I am trying to find out more on the company.

    How did you find that company?
    Did you allow them remote access to your computer?
    Did you give them credit card details?
    If you google their name, you'll find several entries. I've never heard of them. And no, I've never used them - nor would I ever. Why deal with an unknown company when I can call Apple tech support or visit a Genius Bar in the Apple store free of charge?

  • Secure SMTP configuration

    Is it possible for GWIA to allow both Secure SMTP and SMTP at the same time. How is that configured? Thanks in advance for any help you may have.

    * Mary Beth Yandrasitz wrote, On 01/09/2012 09:18 PM:
    > Is it possible for GWIA to allow both Secure SMTP and SMTP at the same time. How
    > is that configured? Thanks in advance for any help you may have.
    GWIA object in C1, set SSL for SMTP to "enabled". If the client (or the other SMTP server) is configured to use SSL, they'll talk encrypted. If the client isn't, the GWIA will fall back to unencrypted SMTP.
    If you set SSL to "required", the GWIA will reject any unencrypted connection attempt, that's not what you want.
    Uwe
    Novell Knowledge Partner (NKP)
    Please don't send me support related e-mail unless I ask you to do so.

Maybe you are looking for

  • TS1411 iMAC 10.5.8 won't start

    I push the on button on the back of the computer to start it and it blinks grey once then doesnt do anything. Any help?

  • Deployable Proxy not reachable

    Hi everyone, I tried in previous post to solve this problem but without success. Here is the scenario : I deployed a "Deployable Proxy" that contains a web service. I create a Java Standalone class. I want to call this proxy and to use the web servic

  • Why have you removed the bookmarks side panel button? This is THE most important feature of firefox.

    Since last update of firefox, the button to open the side bar bookmarks have been removed (ctrl+B) equivalent. I don't want to do a ctrl+B command in a graphical interface that I use so often. There is no good enough extension for that task. This is

  • I regret buying asha 311

    Dear Nokia,I recently bought a nokia asha 311, I am in the Philippines. I though it was a good phone afterall, but everything went wrong. It' does not support YouTube nor some important apps like viber. I really need to swap this phone to galaxy or A

  • How do i crop a perfect circle?

    How do i crop a perfect circle?