Backdoor

Why can I drag and drop images from Bridge into Photoshop, but not drag and drop Photoshop images onto the Bridge? I have been looking at FAQ's, looking at help, all night long trying to get my Photoshop images onto the Bridge. It won't let me "save as" into the project I want it in, maybe because that folder is empty. Tried saving them as file groups, but no go. How about a simple thing on the application file menu that says "Send to Bridge?"

Bridge is used to browse directories or the results of searches. You don't edit with Bridge, so you can't import anything into it. Would you import photos into the Finder or Windows Explorer?

Similar Messages

  • How do I use safe mode to get rid of a trojan virus? It is a backdoor that wa installed by a hacker.

     HP 11-1120  (3CR2210JN6)
    My security program finally told me about the Trojan but thhere must be malware on
    this computer also.  There are several corrupted extensions In my documents. I am blocked from seeing my files, deleting or altering permissions. I am the rightful owner of this machine so therefor am its administrator( although one handicapped without formal training for the job.
    I have purchased a disc from Microsoft for Windows 8.1 but cannot run it (if I can)
    until the computer is clean. I would like to save the family pictures if possible).  Everytime I try to run any program too close to the corrupted files I get a paper storm that drives me back.  The windows open so fast it feels like I will be buried.  All of my pictures have been locked away, both music and vidieo players are bound and will not serve the system.  Adobie is completely nonfunctional, I must use periphrial programs.  Windows viewer, Bonjuer and art programs.  I keep bring in different readers to read such docs as I can access.  The man that broke into the computer has copies of all my business and private files.  I have had private pictures of different members of my family posted around the web where I would rather not see them. I realize that I will need a clean up program but I do not trust any of the ones seen advertised on the web.  As a matter of fact one of them is the source of the backdoor virus, I'm sure of it.  This driver cleaning program is very agressive I cannot leave my computer for a minute or it will be rooting around in this machine before I know it, uninvited I should let you know.  I cut the DSL off when I leave it for any length of time.  Can you help me? Annie-

    Annie, welcome to the forum.
    Are you using Google's Chrome OS on the laptop?  I need to know which OS so I can find an answer to your question.
    Signature:
    HP TouchPad - 1.2 GHz; 1 GB memory; 32 GB storage; WebOS/CyanogenMod 11(Kit Kat)
    HP 10 Plus; Android-Kit Kat; 1.0 GHz Allwinner A31 ARM Cortex A7 Quad Core Processor ; 2GB RAM Memory Long: 2 GB DDR3L SDRAM (1600MHz); 16GB disable eMMC 16GB v4.51
    HP Omen; i7-4710QH; 8 GB memory; 256 GB San Disk SSD; Win 8.1
    HP Photosmart 7520 AIO
    ++++++++++++++++++
    **Click the Thumbs Up+ to say 'Thanks' and the 'Accept as Solution' if I have solved your problem.**
    Intelligence is God given; Wisdom is the sum of our mistakes!
    I am not an HP employee.

  • How do i know if my pc is infected by a backdoor virus?

    how do i know if my pc is infected by a backdoor virus?.... there was a window, which said that i won something.... the only button was the "ok" button, to go on.....there was no red X on the upper side left and i could not even close safari..... so i said "ok" and then I couldnt use safari anymore, until i started the computer again(doing it usually didn´t workd, so i had to shut it down just holding the start button)....now i´m scared i could have a backdoor on my pc now..... what can I do?... or how do I know if my pc is infected or not?
    please help!!

    You can't get a virus merely by loading a web page. As long as you didn't enter any personal information or open any files downloaded from that site, you're safe.
    Quit Safari (by force if necessary.) Relaunch it by holding down the shift key and clicking its icon in the Dock. That will stop the page from reloading automatically. Select Safari ▹ Preferences ▹ Privacy ▹ Remove all website data to get rid of any cookies or other data left by the server. Open your Downloads folder and delete anything you don't recognize.

  • Is there a backdoor to filevault 2  or possible way to regain access after a lost password?

    Is there a backdoor to filevault 2  or possible way to regain access after a lost password?

    Found this link....
    support.apple.com/kb/HT4790
    ....I hope it helps....

  • Why have BT put a backdoor in the 8.1.H.J firmware...

    Hi all. Some know me here because I worked out how to unlock the Home Hub 1.5 and 2 so that they can be recycled and used on non BT connections.
    Some don't like me because I talk straight, which is what I am going to do now.
    This is a question for the BT staff.
    Would you like to explain to myself and the other good people out there in Home Hub land the reason why you have put in a back door so you can access any router with firmware version 8.1.H.J without the owner's express permission?
    Before you start your denials I wish to state my case and submit my evidence.
    Exhibit A: Firewall: In the default firewall files this line has been added:
    rule add chain=forward_custom name=BTAgent srcintf=wan dstintf=lan dstip=192.168.1.253 serv=BTAgent_dst state=enabled action=accept
    As most Home Hub nerds will attest this is a serious hole in the firewall which allows all traffic from the wan interface (internet) to the lan interface ip 192.168.1.253 which is the secondary IP address of the Home Hub.
    In layman's terms this allows BT access whenever they want and to whatever they want does it not?
    Exhibit B: Bt's added files
    The files above have been extracted from my own 8.1.H.J firmware please feel free to download them and examine them with text and hex file readers. Actually I encourage you to do so.
    The files on the link above are the added extra BTAgent files that you have felt would some way benfit us by adding. They do contain access keys which means the hole in the firewall you created in Exhibit A does have a token measure of security, but let's be honest here what the hell are you doing in my router without my permission in the first place?
    I am no linux expert by any means, however even I can see that you have added a firmware update routine as well as a writeable directory in the user accessable flash memory and the necessary instructions for uploading and executing your own plugins (software) on the router!
    With this in mind I feel you have performed a serious breach of privacy and endangered your customers online safety by knowingly creating flaws in your equipment's online security. This being namely the hole in the firewall mentioned in Exhibit A
    Then there is the fact you can upload and run whatever plugins you like on my or anyone else's router that you deem fit. That could be any monitoring software, click tracking, PHORM, or whatever you wish.
    This I feel is in breach of trust between provider and customer as you can use anyone's router for your own purposes whenever you like and without anyone's, including the router owner's knowledge. Surely this cannot be legal?
    You can argue that this is just a new update system, however the old CWMP/ACS system worked just fine for that last goodness knows how long and how do you explain the libplugins.so executable?
    I await your reply.
    Erlidoch 'm namyn ewyllysi erioed arhosa 'm

    This is deeply disturbing, and recalls the recent thread on the old Beta BTVision forums that suggest a similar backdoor manipulation of the BTVision box, allowing viewing behaviour to be monitored and intrusive and disruptive targeted adverts to be shown; that thread had nearly 3000 views in a week!
    I have started a Privacy and Security thread to suggest that matters of this nature are aired in one location, so if you, psiDOC, or anyone else agrees, feel free to pop over there and add your support for the idea.
    Pash
    Value Added Guest (Inspiring Not Aspiring)
    Rate a post if you like it! - just click the star under the user's name on the left. (N.B. ratings facility no longer available in Forum Help and Suggestions; nor is it available in the Lounge)

  • BGP BACKDOOR

    From the documentation that i have read concerning bgp backdoor, i assume that a network marked as backdoor is NOT advertised:
    network x.x.x.x backdoor
    -> if network x.x.x.x is received from eBGP, its admin distance is changed to 200, to prefer an IGP learned network. However, network x.x.x.x is not advertised to BGP peers by this command, even if x.x.x.x has an exact match in our routing table. Correct ?
    But what will happen in the following situation:
    router eigrp 1
    network x.x.x.x
    router bgp 65000
    network x.x.x.x backdoor
    redistribute eigrp 1
    neighbor y.y.y.y remote-as 65100
    Will network x.x.x.x be advertised to AS65100 by the redistribute command ?? Or will the backdoor command prevent this ?? Will the backdoor command only work on received routes from AS65100 ???
    Can someone shed some light on this ?? I am unable to test this in a lab at this time.
    Regards,
    Geert

    Hi Geert,
    According to what i have read in CCIE Professional Development Routing TCPIP, Volume TWO.
    The address specified by the network backboor command is not advertised to EBGP peers.

  • Mac os 10.5.8: how to know if infected with backdoor.flashback.39

    I am running Mac OS X 10.5.8 and not tech savy.  How do I know if I'm infected with backdoor.flashback.39?

    Flashback Trojan User Tip
    Malware Checker Dowload Link
    Additionally you can Google search as there is plenty out there to find.

  • Facebook's "backdoor" bug into Mail program?

    Yesterday, I was using Facebook's Photos upload feature to upload some pics for my profile's album and the feature generated an actual file directory to my computer desktop and hard drive. I uploaded some pics and all went fine. Then, the Mail program was not able to retrieve any new email and I keep getting messages that other mail client is in use, blocking my access to retrieve emails. I thought this is strange because I have no other mail client opened except Mail. This occurred right after I used Facebook's Photos Upload Feature.
    So I'm thinking... could there be a backdoor/exploit bug generated from Facebook's ability to access to a computer's file directory, specifically targeting Mail and create the impression that other mail client is in use while Mail is not able to retrieve emails?
    I just don't know anything more deep but I'm just concerned. Anyone have this experience?

    I haven't had the specific problem you've had, but I have recently begun responding to requests to join Facebook and at the same time I've begun to have, after years of no problems, weird problems with Mail. Something going on? Good question....

  • Port 4567 (backdoor)

    Hello, After a lot of digging around this forum i found i very useful post, it talked about a backdoor in the firmware. The thread is read only, it had been closed due to repetitive posts http://community.bt.com/t5/BB-in-Home/Why-have-BT-​put-a-backdoor-in-the-8-1-H-J-firmware-that-allows​...
    It appears that there is a different one within the 4.7.5.1.83 (Type B) firmware.
    A simple scan of the routers services shows:
    22/tcp filtered ssh
    80/tcp open http
    139/tcp open netbios-ssn
    443/tcp open https
    445/tcp open microsoft-ds
    4567/tcp open unknown (hmm what is this)
    8080/tcp open http-proxy
    8443/tcp open https-alt
    I am not trying to intimidate or scare customers, just merely point out what i have found. I think people deserve an answer
    So firstly lets try connecting to this port using a browser
    hxxp://192.168.1.254:4567
    On the typeB HH you will notice a login prompt asking for a username and password! Please keep in the mind this is NOT the password you have set within the hubs web interface Even more concerning this is accessible over WAN IPv6, if it is not a backdoor what is it? I have been told by a BTagent that port 4567 is an essential port in TCP/IP networking. Clearly this is untrue and incorrect. After a tonne of emails i got a response along the lines of "the home hub is a free gift, you dont have to use it" Any mass administrated product is vulnerable, simply because there millions of usernames and passwords. For Practical reasons they must all have something in common.
    I am currently unable to dump the typeB firmware which will contain the secret username and password for my hub. I find it scary that someone anywhere in the world can put in my ip followed by :4567 and be greeted with a login prompt. Also there is no failed login attempts or even a delay between logins, Bruteforce attack is very possible and is able to try millions of user passwd combination's in just a few hours. BTW I did try to disable the port within the web interface with no success I am very interested to hear your definition of what this is, I would personally define it as a backdoor if it is set with a user name and password i am unaware of
    Regards
    Ben

    The Home Hub has an interface to the network which is not visible to the customer. It hosts a network management protocol known as "TR-069". This is widely used in the ISP business to manage routers, set top boxes and the like. TR-069 often uses port 4567. Check Wikipedia for more details.
    The TR-069 interface is used to control the Home Hub (firmware downloads, parameter changes etc.), and this function is carried out using software provided by Motive Inc. More details from Motive's website at : http://www.motive.com/solutions/homenetworking/hom​enetworkingproducts.asp
    The actual product used is "HDM". As far as I am aware, firmware updates and other Hub management is carried out by Motive, on behalf of BT.
    The Home Hub is part of a fully managed system. This suits some customers, but not others. If you want to retain full control of your own networking, your only option is to buy your own router and retire the Home Hub.

  • Proof of Concept Thunderbolt backdoor

    Hello Community,
    I've red today an Article (http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can- permanently-backdoor-macs/) that explains an infection about thunderbolt  devices. I know that you need physical access to compromise the system.
    My question is how realistically is it if I buy e.g. from ebay or other similar shop a thunderbolt device that can compromise my system?
    Why are write this down is because there are no way to discover however you are infected or not. Have you more Information (especially developers) how apple solve this problem?
    Thanks,
    @elias

    It is  pretty unrealistic, however if you are paranoid about security then only purchase peripherals from trusted sources.

  • Backdoor number for Macy's Amex

    Does anyone have a backdoor number for Macy's/Amex... Family member submitted fraud and faxed them the release... And they still are trying to collect on it though when he calls, its in process.. in fact they already have submitted to his CR... First they didnt send the form, then he got the form and faxed it in and its been confirmed, and they still are asking to be paid for the reported fraud amount... but theres still no decision? What gives? _

    There is no backdoor number for Macy's Amex.  Have your family member call credit solutions directly and they will be able to help him/her.

  • Backdoor.Win32.Hupigon!IK on ipod 4th generation

    need to remove Backdoor.Win32.Hupigon!IK on ipod 4th generation

    What makes you think it is on your Nano?

  • Backdoor port 32764 really eliminated?

    Has the backdoor in the WRVS 4400N, RVS 4000 etc. really been eliminated from the latest firmware or is it just hidden away?
    http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf
    Never ever again Cisco routers in my house...

    nadir.latif wrote:
    our servers were infected by the libkeyutils virus. some of the servers had this file libkeyutils.so.1.9. other servers that were infected had a libkeyutils.so file with a different version. a cpanel analyst told us to run following command to check for the virus:
    strings full_path_of_libkeyutils.so | egrep 'connect|socket|gethostbyname|inet_ntoa'
    just checking for libkeyutils.so.1.9 file alone is not enough to confirm the virus. each libkeyutils.so file must be checked for presence of network related functions. the above command basically checks for networking related functions in the libkeyutils.so file. these functions are not present in the default libkeyutils.so file and can be used for spamming, allowing ssh access etc.the command "strings" can be found in binutils package. the following command can be used to locate all libkeyutils.so files:
    locate libkeyutils.so
    Thanks for the info nadir.latif.
    Terminal Output wrote:[root@wishmacer andrzejl]# updatedb
    [root@wishmacer andrzejl]# locate libkeyutils.so
    /usr/lib/libkeyutils.so
    /usr/lib/libkeyutils.so.1
    /usr/lib/libkeyutils.so.1.4
    [root@wishmacer andrzejl]# strings /usr/lib/libkeyutils.so | egrep 'connect|socket|gethostbyname|inet_ntoa'
    [root@wishmacer andrzejl]# strings /usr/lib/libkeyutils.so.1 | egrep 'connect|socket|gethostbyname|inet_ntoa'
    [root@wishmacer andrzejl]# strings /usr/lib/libkeyutils.so.1.4 | egrep 'connect|socket|gethostbyname|inet_ntoa'
    [root@wishmacer andrzejl]#
    It seems that I am fine...
    Regards.
    Andrzej
    Last edited by AndrzejL (2013-02-25 09:03:16)

  • Backdoor:Win32/Cycbot.B hit my computer

    Backdoor:Win32/Cycbot.B virus hit my computer and is preventing Firefox from "seeing" the internet. I contacted Microsoft and they helped get my Internet Explorer running, but Firefox is still infected. I removed Firefox and reloaded it, but to no avail. My Internet Explorer now works, but even after removing and reloading Fiorefox, it still won't work. Do you have someone who can assist me in getting rid of this? Thanks.

    The following article(s) may help you.
    Troubleshooting Home Sharing
    Security Software Issues
    Troubleshooting Wi-Fi networks and connections
    Recommended Wi-Fi settings
    Wifi Diagnostic Software (for Mac users)
    You may also find some help on this page, where I’ve collected some of the more unusual solutions to network issues.
    When making adjustments to your network for better optimisation, you may find some of the points mentioned on this page helpful.

  • Backdoor routes

    We are starting a conversion of a rather large network from atm/frame to mpls. We will be managing the ce routers and talk bgp to the pe routers. Our current network is eigrp. We will have quite a few backdoor links in the network. Some will be backup only and not carry normal traffic, others such as the backdoor links between our data centers will be the primary path between the sites.
    My question is what is the best way to handle the backdoor links. We are looking at:
    1)running bgp on the backdoor links also and ibgp between the routers for the backdoor and the ce router.
    2)running eigrp on the backdoor but under a seperate eigrp as number and redistributing into the primary eigrp as.
    Both have their pros and cons. I was wondering which way other organization have gone and why.

    Hello,
    my 2 cents on the subject.
    I haven´t been involved with a customer in the situation you are. So those are some thoughts on the subject not backed up by experience.
    First, you need mutual redistribution BGP<->EIGRP on all CE routers.
    Second, as EIGRP will always prefer internal routes over external ones, you need another protocol on the backdoor links, which should be really backdoor.
    This said I would first select the links, which really shall be backup to the MPLS network. All other (prefered) links should be running EIGRP with main AS to reduce complexity.
    So lets first look at the "MPLS is backup" scenario. You will have the same networks on the CE learned through EIGRP and eBGP. The latter having AD=20 is prefered, which is undesired in this case. Setting eBGP to AD=150 could fix this. Additionally you need to tag the EIGRP networks learned from BGP with a site specific tag, which would allow to exclude them from redistribution back into BGP once they are announced through EIGRP to another CE.
    Generally a tag should indicate that this network was already passed through the MPLS VPN and thus MUST not be redistributed again.
    Now lets have a look at the "MPLS is primary" scenario. As you already stated you need another routing protocol/EIGRP AS in this case. On the CE this would still work, because external EIGRP with AD=170 is worse than (modified) AD=150 of BGP.
    What remains is again to set proper filters to avoid routing loops most likely again with tags and route-maps for scalability.
    With all this mutual redistribution it is clear, that any mistake in configuration or design of the filters will result in a routing loop.
    The other option would be BGP everywhere. Be aware however, that this will most likely not remove the redistribution and filter complexity.
    What I do not quite understand is, how the physical design looks like, i.e. where you have BGP routers and where EIGRP (main AS). In case you don´t want to black hole yourself, you need to redistribute back into EIGRP in any case, or run an iBGP full mesh on most of your internal routers.
    So in the end you have a lot of complexity in both solutions. Both of them can be implemented. From an operation point of view I would say, that my tendency would be towards EIGRP instead of BGP. But just because your staff might know the latter good enough to operate the whole thing without too much pain.
    Looking from a distance:
    1) Have you pushed the SP hard enough (=$$ ?) to allow EIGRP on the PE-CE link? This would simplify the whole situation.
    2) Have you thought of pushing the SP into OSPF on PE-CE and convert everything to OSPF internally? This would also simplify things. OSPF is better prepared to handle routing loops in MPLS VPNs and also sham links allow for having backdoor links, when required.
    Hope this helps! PLease rate all posts.
    Regards, Martin

  • BGP backdoor link

    Dear Team,
    Can u explain how does bgp backdoor link will work , 
    Scenario :
    Two customer sites connected  different PE  
    CE1>>>PE1(mpls core )PE2>>>CE2 this CE 1 and CE2 have back to back connectivity with Eigrp  , how does the loop avoidance happens here 

    Hello.
    If CE-PE protocol is eBGP., then ISP would be using SOO as loop-prevention mechanism.
    Also, if you have same AS for both CE-PE links, then your CE would prevent the prefix to be learnt due to self AS been found in AS-path.
    PS: I hope this answers your question about loop-prevention mechanism on ISP side; If you have a question about CE network, then additional information needed - what is advertised via each links, what is routing policy (active/active or active/backup), what link is primary (MPLS or backdoor) and etc.

Maybe you are looking for

  • External Harddrive not recognized

    I recently bought a generic external 250GB HD. I plugged it in and was able to download all of my music and video files. Randomly I received an error code which stated there was a device removal error. I tried both USB ports and have restarted the ma

  • HTML photo gallery best practices

    Dear Common Wisdom: I have seen a number of variations with regards to types of HTML photo/image galleries within folio files out there. Is a best practice materializing in anyone's opinion? Thanks for your thoughts! CJ

  • Change documents for Recipe

    Dear All, i want to keep track of all the changes made in recipe. can any body tell me how to achieve this. is there something like change documents?? thanks Zeeshan

  • Spotlight issue - Finder comments dont seem to be updated

    Hi, trying to classify files using spotlight comments in the Finder (after Cmd-i; also via AppleScript) but it's hit&miss. Usually (not always) adding a comment works and a search finds it immediately, but sometimes it does not. The other way is wors

  • Conversion from RGB to CMYK

    Hi, I would be so grateful if someone could help! I need to submit a PDF of a book I have written to the printers. They tell me that they are printing in CMYK. My book has many paintings inside and two use RGB mode (others are CMYK). I have tried con