Asurion equals Worthless Insurance

I am just posting to advise EVERYONE carrying the Asurion Insurance package for their wireless devices to CANCEL THE INSURANCE IMMEDIATELY.
You are paying for NOTHING!  If you have an accident with your device, YOU WILL GET NOTHING from Asurion, except a BILL demanding that you PAY
FOR ANOTHER DEVICE, and at a price that is far more than what your device is actually worth.
My story:  My daughter accidentally dropped the iphone and the display and the back of the phone cracked.  We called Asurion and they agreed to replace the phone with a REFURBISHED model at a cost of $170.  As if the high monthly premiums of $13.00 per month were'nt bad enough, I had to fork over $170 for a REFURBISHED PHONE and give them the broken one.  Now, here is the RIPOFF PART--A BROKEN iphone of the type that my daughter had is worth only about $40.00 (in EXCELLENT CONDITION it's worth about $80.00). The net result is that I was forced to pay $210.00 for a replacement phone that is only worth $80.00:
                                               I PAID                                                  ASURION'S COST
                    Premiums         $312.00                                                             0
       Replacement Phone        $170.00                                                       $ 80.00
       Returned Phone              $ 40.00                                                       ($ 40.00)
       Total                               $522.00                                                       $ 40.00
So it cost me a total of $522.00 to replace an iphone that was only worth $40.00 in its broken state.  In the meantime, Asurion made a profit of $482.00 off me and provided absolutely NO SERVICE FOR THE MONEY AT ALL. People please believe me-- Consumer Reports is right-- you DON'T need this ripoff insurance.  If you have APPLE products, please buy the APPLECARE. If other, look into extended warranty or even contact your homeowner or renter's insurance agent first. Don't let Verizon agents talk you into this garbage. It's worthless trash and the customer service STINKS!  For example, I just learned that my daughter's phone is covered under her student insurance.  For the love of heaven, GET RID OF ASURION. It's a SCAM and a ripoff.  I am considering legal action against them for this. . .

Bingo Brensgrrl!  Asurion is total garbage and Verizon is in bed with them.
(1) While pitching to make a sale, a Verizon rep clearly spelled out that if you paid for the full coverage, you would be 100% covered if your phone was lost, damaged or stolen.  My fiance was right there --- she can vouch for all of this.  Who pays for coverage if the deductible is greater than the cost of replacement?  Total fraud ---> an intentional misrepresentation meant to induce reliance that causes damages.
(2) After more than 3 years of paying for this "coverage," my phone starts malfunctioning to the point it won't work.  My Verizon phone had malfunctioned from the start, but those issues were semi-manageable --- but now the phone is hardcore flat-lining.  So I bring it in to Verizon to get that squared away thinking it'd be no problem, and that I was finally grateful to have paid for years of full coverage.
(3) Guess what?  Verizon says it's not their problem --- you need to go through "Asurion" plus there'll be a substantial fee charged after it had been previously represented that I paid years for full and total coverage.  I'd never even heard of this third party "Asurion" --- my Verizon rep pitched it as if anything happens to your phone or it craps out ---- you're 100% covered.  Wrong.
(4) Predictably, I go to Asurion - and they insist it's a Verizon issue, and it's not their problem. 
Both sides say take it up with the other guy - not our problem.  Nice.
One other thing:  the Verizon staff, including the manager, were cackling and snickering throughout this whole process - including the waste-of-time call to "Asurion."  Apparently, it was quite amusing that another customer was getting hosed.
Completely worthless.  Garbage.  Utter trash.  Asurion is just a money pit with zero benefit.  And avoid Verizon - they intentionally deceive you for monetary gain.  And evidently, they feel customers being upset over this bait and switch tactic is rather hilarious.  Nice bed partners, huh?

Similar Messages

  • No More Black Tie Phone Insurance!​!

    Phone I bought @ BB got crushed yesterday- Filed Claim with Sprint Insurance online got phone today!!! So glad I cancelled Black Lie Protection and it only cost $50.00

    Ya that is what I was told when they 1st sold me the Black Tie, later went to store and asked more in detail after reading that Crushed phones ARE NOT covered due to beyond normal wear & tear. Cancelled Black Lie Protection Plan was able to back on Asurion cell phone insurance and Now I wont spend another dollar at a Best Buy due to being called a liar by management at Reno Store Because Dominique would NEVER say that if the phone was lost or stolen I would just have to walk into store and get another phone out of the Box. I found this forum and and see many people are told many lies to buy this protection plan. I find that I/'m a much happier consumer if I don/'t step foot in BB & tell everyone I know, but low and behold most of them have horror stories from Best Buy too!

  • Anti-Virus Opinion

    I know Apple Mac's typically do not get virus or malware, but what in your guy's opinion is the best anti-virus software out there for the Mac? Just curious what other Mac owners think... Thanks

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger from:
    http://www.clamxav.com/download.php#tiger
    and for Leopard, Snow Leopard and Lion from here:
    http://www.clamxav.com/
    Note: If you wish to uninstall ClamXav: keep a copy of the disk image from when you downloaded it, or download it again - the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag ClamXav.app to the trash.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software. Examples include MacKeeper, MacDefender and iAntivirus, but there are others.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • Anti virus for iMac with OS X Lion

    Hi;
    I have an iMac with OS X Lion,I'd like to know if Apple really offer a free anti virus for me, or if not so , where can I find a proper anti virus for my iMac?
    Best regards;
    Lama Yahya

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from:
    http://www.clamxav.com/
    The new version for Snow Leopard and Lion is available here:
    http://www.clamxav.com/index.php?page=v2beta
    Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • Is there an anti-viral software and spyware that is recommended??

    Is there anti-viral software and spyware that is preferred for the I-MAC and MAC book Pro??  I don't want to slow my system like one's I've used for PC's in the past.

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger from:
    http://www.clamxav.com/download.php#tiger
    and for Leopard, Snow Leopard and Lion from here:
    http://www.clamxav.com/
    Note: If you wish to uninstall ClamXav: keep a copy of the disk image from when you downloaded it, or download it again - the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag ClamXav.app to the trash.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • What is the best online malware check to use

    What is recommended as the best online malware check on the IMAC? 

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from:
    http://www.clamxav.com/
    The new version for Snow Leopard and Lion is available here:
    http://www.clamxav.com/index.php?page=v2beta
    Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • Which antivirus software should i use for my iMac

    Hello,
    Wondering which antivirus software is recommended by Apple for an iMac?
    Thanks,
    Lisa C.

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger from:
    http://www.clamxav.com/download.php#tiger
    and for Leopard, Snow Leopard and Lion from here:
    http://www.clamxav.com/
    Note: If you wish to uninstall ClamXav: keep a copy of the disk image from when you downloaded it, or download it again - the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag ClamXav.app to the trash.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • How to fix a bad ESN with verizon

    Just got a phone from craigslist and didn't know about the bad ESN any way that it can get fix to use it ( carrier is Verizon )

    Usually the only way an esn is bad is it has been reported lost or stolen, or an insurance claim (damage) that the phone never got returned and customer had to pay an additional fee.
    It is about 99% certain that ASURION, verizon's insurance company for phones, has put the block on.
    The unfortunate side of that is that by legal standings, the phone belongs to asurion.  So until they receive the phone they will likely not release the esn unless you pay for the cost of the phone they sent minus the deductible the original owner paid.
    that is why so many of these are for sale on ebay and advertise BAD ESN in the title.  Technically they are selling stolen property, if I was informed right.

  • Slow wireless internet

    Ok, so i recently reinstalled my Windows 7 and im having wireless problems now which is didnt have before.
    I now takes along time to load pages and my downloads are extremely slow (100KBps). . Im currently sitting on 4 bars which is normal but it is really frustrating because of how slow the internet is. I use the RealTek 8185 extensible 802.11b/g wireless device.My modem is MI424WR for Verizon FiOS.
    So since i reinstalled windows i need to re-download my games. Some are downloading at 100KBs when usually its 8-10MBs. This is strange because my internet connection is normal as before the install besides the speed which is wht im trying to fix. When im browsing its slow aswell..infact it sometimes reaching 5 bars which is even better then normal..I have installed most of the windows updates. (been 3 days since i reinstalled)

    MrsMark, I'm sorry to say, but you are grossly misinformed as to the nature of IP addressing and NAT as used in home routers.
    It really does not matter if someone gets a hold of your external IP address when all it points to is the WAN-facing side of the router. At worst, all they can do is send a denial of service attack your way, but Verizon would block that. They can't figure out who you are or where you live, because Verizon will not release that information without a subpoena (and sometimes, not even then, as illustrated by their actions when the recording industry got thousands of subpoenas trying to identify "John Does" who they had seen sharing music online.)
    Knowing internal IP addresses is useless because they simply cannot be seen from outside the home network. That is what routers do; they physically separate the internal network from the external network while still allowing limited communication between them. Besides, nearly everyone has an internal network with addresses in the 192.168.1.x range; that IP address range was specifically reserved for internal networks with no direct access to the Internet. There are only 255 addresses in that range; it would take seconds to ping all of them and find which ones have computers... assuming an attacker could even get inside the network, which they can't
    (unless they drive up to your house and access the network over Wi-Fi or something... but if that happens, you're already in a world of trouble.)
    If you were a "black hat hacker" and you had my IP address, you still wouldn't be able to track my actions online. You'd have to find a way to infiltrate Verizon's plant and install snooping software there if you wanted to do that. Good luck getting past the multiple levels of security.
    To conclude, there is nothing in either of the OPs screenshots that is sensitive in any way. His external IP address is public information. His internal IP is worthless to any attacker (and if they were in a position to need such information, they wouldn't need him to post a screenshot to get it.) His MAC address is equally worthless; we already know he has an ActionTec router, and that's all the MAC address signifies.
    In short, he has nothing to worry about from posting those shots, and frankly, it's disingenuous for you to claim otherwise.

  • If you bought Asurion insurance for your iPhone, cancel it IMMEDIATELY!!!!!

    It is the BIGGEST ripoff EVER.
    I paid $99 for my iPhone 2 years ago on a promotion, and I have been paying Asurion $10 a month for insurance very since.
    When my phone was stolen and I made a claim, the deductible is $199.
    The brochure is the Verizon lists 2 deductibles for phones: $49 and $99. The "customer service" ***** with whom I spoke told me that this is not applicable to iPhones. When I asked where this information could be found in the brochure, I was told it was listed on the WEBSITE!!!!!
    My phone sells for less $100 on Ebay. Why would I want to pay a $199 deductible to replace it through Asurion.
    These people are a RIPOFF!!!!!!! Do not use them. Cancel your insurance if you have it. Spread the word.
    I am considering filing a small claims suit against them. If there is a lawyer out there who is looking for a class action suit, here is a perfect one!

    I do not see how you have a deductible of 199, the deductible for iphones are actually 169.99, and it is not a verizon service that it goes through, it goes through Asurion, which almost all cell phone providers go through, To be honest, insurance saves alot for the people who have accidents, for a new iphone, you would have to spend about 650.00 for a brand new phone. I'm surprised you would sell your iPhone for 100$, I see most run about 200$ at least. That brochure must be very old because around Winter time, notifications were sent out to all customers around Christmas time, when the 4s came out, I think it was early January Asurion changed the iPhone's deductible, because it is the most targeted phone for being stolen, I think Apple pushed that out actually, lost or stolen or damaged still pays the same deductible no matter what. Insurance usually saves the most when you need the extended warranty though, it covers any internal problems in the phone as long as you have the device, it doesn't expire, but the manufacturer warranty expires after only a year, so it is very beneficial if you think about it, I get insurance on everything, well except Ps3, Walmart's policy isn't very good.

  • Asurion Insurance Theives

    It is hard to believe that Verizon associates with Asurion. Their customer service and policies are tantamount to thievery and there really ought to be a class action lawsuit against them for consumer fraud. After paying an insurance premium for several years with no claims, I finally submit a claim only to be told that the original 50 deductible I signed up for had been raised to 199? They claim that I was notified by Verizon in my bill (somewhere in the fine-print of the 20+ pages of my bill I am sure) and that there is no recourse for me paying for insurance all of this time, other than to pay the 199 deductible for a new phone. Shame on you Verizon for conducting business with such an unscrupulous company that takes advantage of their customers.

    It shouldn't be too hard to believe, every single carrier uses them to some extent.
    They don't play games though, they aren't in the customer service business..you can't cry and whine to get what you want, you only get what you deserve.

  • I need help getting a new Iphone 5s.  I broke it and have asurion insurance (which I used once before).  What is the quickest way to get a phone?

    I am trying to get a new phone through my assurion insurance.  What is the quickest way to do that.

    You can file a claim online:  Cell Phone File Insurance Claim Total Mobile Protection | Verizon Wireless

  • Insurance Claim - Asurion

    I failed a claim with Asurion for a broken phone and they said they can't gurantee that they will replace it with the same color? Is this true?
    then whats the point of monthly payments and $200 Deductable?

    That's an issue you would have to take up on Asurion's forum, Apple has nothing to do with that.
    For $29 more you can just do an out-of-warranty replacement at an Apple Store and get the same color.

  • Why in September when I purchased a through the Edge program with the $5.00 insurance/protection plan (that the sales associate handling the purchase on the phone recommended), is no longer valid?!  2 months after getting the Edge device, I go to make a c

    Where is the insurance and original Edge Agreement from September?  No one in Verizon knows. I purchased (rented) a Galaxy S4 through the Edge program, with the $5.00 insurance/protection plan (that the sales associate handling the purchase on the phone recommended),which is no longer valid!  2 months after getting the Edge device, I go to make a claim and Asurion will not honor it because I am not covered; however, all the order confirmation receipts emailed and physically sent with the device show the addition of insurance when I signed up for the Edge program.  According to Verizon (via live chat with 'Nicole'), this $5 protection plan no longer exists and the order numbers I have on my paperwork (multiple documents) are invalid in the Verizon system.  For over a week, I have spent more than 10 hours on the phone, live chat and in the store trying to get some sort of resolution and the customer service reps just put me on hold or promise to "call me back within 30 minutes after they speak to a supervisor" and (surprise!) they never return my call.  Or they send me to the store to show proof of my documents, but then those associates cannot help either.  Also, the 'Edge Agreement' in my profile has the wrong device (and serial #), wrong payment amounts and no mention of the 'consumer protection plan'  on it, which is listed on the order confirmation sent via email and with the actual Edge device on September 23.  Obviously, there was some sort of glitch or mistake on Verizon's part, but NO ONE WILL EVEN TRY TO ACCEPT THAT FACT!  WHY WON'T ANYONE GET BACK TO ME WITH SOME SORT OF EXPLANATION FOR ANY OF THIS?!  Is it typical for Verizon to do away with a service (i.e., $5.00/month protection) and not inform the customer of this?  And is it company policy to be as unhelpful as possible to a paying customer who needs assistance when there is cleary something wrong on your end?  And finally, am I really suppose to believe that Verizon customer service has no email addresses or fax machines so a customer can send you proof of what is on the receipt you sent and that I have to take more of my time to go to the actual store?!  Finally, does anyone at Verizon even read these messages or even give a F@#k about the customer as long as they keep making money?! 

    RLites22,
    I can understand your concern about the insurance you have on the line. I want to make sure that I put a fresh pair of eyes on your account to find out exactly what is going on. I did send you a Direct Message. Can you please respond back to me in the direct message so we can go over the account specifics. I really hope to hear back from you soon.
    KevinR_VZW
    Follow us on Twitter @VZWSupport

  • My thoughts on Square Trade and asurion

    Great looking deal up front...but in the end ?????
    I am speaking total loss in theory only..and only if your are thinking about buying ins(if you dont want it then this read isnt for you)..I believe in coverage so. I am also a very active person and things happen. My son is 16 going on 30 so he gets covered...
    So I been researching the two, going back and forth on which to get.. with the asurion ins plan you pay 9+ bucks a month and a 200 dollar deductible  up to 2 times a year( or 1500 dollars)... If I just break the screen I will pay to have it fixed and save ins for major... but again talking total loss so stay with me
    say I drop it in the toilet, its fried...I call asurion, I pay 200 bucks they overnight me a new or refurbed phone...say I lose it in the park three months later.. I call asurion they send me new/REFB device and I pay another 200.. up to two times a year and I assume (haven't checked) it starts when you buy or activate, and not when you first make a claim..
    pretty costly but compared to nothing 
    So math time....you would be out 400 (2 200.00 deductibles) plus months paid, say it happened month 11 and 16, that is cost per month, round up to10 x16 is 160 or total 560 for 2 phones replaced...or if you just wrote it off that is 1500 for two with out replacement coverage...
    Not to mention I get to talk to folks right here in good ole TN, most times I have called asurion and someone in the US OF A everytime I have called... so big plus in my book
    Now for SquareTrade
    I called Squaretrade to get some answers to a couple questions I had
    Coverage limit  which =599
     did they replace the device should it be totaled or did I?  a plus in my book, they send check to you so you can buy....more on in a min though..
    deductible= 50 per time, except on warranty issues. For  warranty repairs under apple they send you to the apple counter for repair (fine that is what I would do anyhow), when the apple warranty is up they charge you 50 bucks, you send them the phone or they tell you where to go and they pay the bill???not sure how that works either way your phone is fixed and your out 50 bucks in the end..
    so far pretty good ..... in a nutshell with them it's
    Basically  90 bucks right now up front, no monthly, and 50 deduct for none warranty (not covered by apple ) repairs... Its on top of apple warranty though and extends it to two years. Cheap....
    but lets throw in the mind games
    say you drop it in toilet...it can't be fixed.... you pay a deductible of 50 bucks and they send you 599 to replace your phone...two choices..try to find one on ebay and hope its not locked, or buy new from apple for 700, or new from vzw for 750.  I know where I am going.....wait did you see that?  look again!
    here is what I see!
     if you need it replaced they basically give you 550 to replace it and you pay 700 to get a new one.  so your 50 dollar deductible just went to 150.  well  your still 50 bucks to the good right....wrong... you have to buy another squaretrade warranty(if you want coverage again) which by that time may be 90 or it may be normal cost of 120... so your back at the same cost  as the bucks per month for asurion.... again in my mind
    Oh but wait!!!!
    you were at the park and lost your 2nd phone with asurion....  Square trade probably will give you your unused warranty money back, but that is it. they dont cover lost or stolen phones.
    Sure chances are low and I probably missed some numbers, and that was worse case....  but have you called Square Trade.
    I am sorry but I have a hard enough time explaining myself to folks that speak and understand English. See above gibber gabber!!!!!!
    I felt Like I was talking to HP for that 10 mins of my life on the phone with SquTrade...if you ever been there you know what I mean.
    I think I will go asurion and just pay for screen replacements during the warranty period and fix them myself after the warranty period...
    sorry if this doesn't make sense I am sorry, I haven't took a lot of time figuring this out. It is how my head plays it so
    and no I wont be buying the 1.99 warranty  or the 10 whatever WAP(asurion) and extended Warranty bundle  just the 9+ dollar a month asurion INS policy and hope I dont ever need it. 
    sorry if you feel I wasted your time, but we have got two or three days to play around right..MONDAY will never get here

    SquareTrade doesn't always send you the check for the item insured if it needs replaced - many times, they charge you the deductible, fix the item or send you a refurbished/new unit. And the $50 deductible doesn't apply for things like battery/normal use issues - which is the number one complaint for ALL phone owners. You only have to pay the deductible for accidents. I have a SquareTrade warranty for my iPod Touch (2nd gen) and I've had a few battery issues as well as a screen issue - they sent me a new item everytime.
    And - no, you don't have to buy a new warranty once you get a new iPhone, if your last iPhone couldn't be repaired. The policy transfers to the new unit no matter what. Which should be no problem, since SquareTrade will most likely just send you a new/refurb unit anyway.
    This is taken directly from their site:
    Coverage Details
    2 years of coverage: The SquareTrade iPhone warranty covers your iPhone for up to 2 years, starting on the date of purchase.
    Covered Issues: Both accidents (e.g., broken screen or other damage through drops AND liquid damage including full immersion) and out-of-warranty normal use failures (e.g., battery no longer charging or other hardware failures) are covered. We do not cover loss, theft, willful damage or damage occurring through gross misuse.
    Deductible: There is a $50 deductible when claiming on an accident (e.g., drops, spills). There is no deductible for a normal use failure (e.g., power issue).
    How it works: You can file a claim online or on the phone. Depending on the issue, we will either fix your iPhone or arrange for a replacement. To fix your iPhone, we give you free overnight shipping to-and-from our depot and 80% of iPhones are fixed the day of receipt. If you prefer the convenience of your local Genius Bar, you can take it there and we will reimburse your repair costs.
    Repair or Replacement: Based on what happened to your iPhone, we will let you know if it's suitable for repair, otherwise we will arrange a replacement option.
    Older iPhones: This coverage is restricted to iPhones purchased in the last 30 days. Older iPhones can still be covered through the SquareTrade iPhone application (available in the App Store).
    Our 5-day service guarantee: We will replace OR fix and ship back your iPhone within 5 business days of receiving it at the depot. If it takes longer, let us know and we'll be happy to refund the cost of your warranty.

Maybe you are looking for

  • How do I set while loop priority in an RT Field Point application?

    I have a vi that I want to run in an FP2010 that contains 2 while loops, one must be Time Critical priority and the other Normal or lower priority.  I will be using RT FIFO to transfer data between the two loops. The Normal loop will be used for comm

  • How to convert a string from lower case to upper case withour using transla

    Hi all, how to convert a string from lower case to upper case withour using translate, Thanks in Advance, Reddy

  • Zen Vision to iP

    I'm guessing the answer is no, but does anyone know if there are any adaptors that allow you to use the ZVM on iP*d accessories? There are car stereos that have iP*d connections, speakers etc. There are nowhere near as many accessories for my beloved

  • Flash Hang-ups

    CS3 Flash Hangs specifically while creating motion tweens. I usually have to quit the application and lose any data that wasn't saved prior. Any help in solving this issue would be great. Pwilson

  • Verizon system can't handle porting phone number from Straight Talk customers?

    According to this discussion: Verizon system can't handle porting phone number from Straight Talk customers?  If still true, then VW misses a huge business opportunity. Adjusting the sizing the account number to be wider is not a hard system adjustme