Closing off firewire connect security hole

I connected my Macbook Pro to my iMac to transfer accounts over firewire. It seems i can see the origin Mac's user folders without any trouble at all. I mean i can see the contents and copy all of them over, without using the migration assistant's options. I simply use finder, see the mac HD that is the origin and copy stuff from any account on that mac to the account i am logged into on destination mac. Is there a problem with the folder permissions of origin mac? I checked and they were fine. Is there a way i can now setup my MacBook Pro to not allow such snooping and copying permissions once it is connected via firewire?

As mentioned, there is single user mode. Very useful for troubleshooting, but for nefarious individuals, this is the root kit hack that is built in for all to use. Start your machine holding down the Apple and the S keys. This will enter you into single user mode. From here, you have access to everything as root. Thus, for intruders with physical access to the machine, a reboot and that key combination provides unrestricted access. This access can be used to transfer data to another drive, fire up a network stack, or worse. Four commands and no knowledge of prior accounts or passwords can reset the admin password and have near full access to the account after a reboot.
Likewise, if you have another volume with a bootable OS, say on a firewire/USB drive, a nefarious user can plug it it, force a reboot, hold down the option key and then select the alternate bootable volume. This will allow booting the machine from the external drive and that too can provide unrestricted access to the normal internal drive.
Please keep in mind that I am not saying these are security flaws in the design of OS X or the hardware. These are features that are indispensable to field service technicians and serve very useful purposes for normal operation with Apple hardware. I am simply stating the obvious. Physical access to a machine means complete access to data. As long as you are not running excess services or visiting questionable locations on the internet, you are pretty safe.
Apple does have features in place to protect security conscious individuals. As mentioned, the Firmware password is the first step. However, as you can discover, physical access can overcome firmware passwords. If you have critical information on the machine, you should look at File Vault. Research it before you enable it as you need to make specific adjustments to how you backup and interact with your machine. If you use it, never sleep the machine while logged in to your account. Next, enable encrypted swap and periodically perform a secure erase of free space. These are all features built into the OS.
If you are using a laptop and travel with it, these suggestions should be considered. Think about how many places between home and that business meeting four states away that your laptop can sprout legs and walk. If that was to happen and it contains proprietary information, product development information, personal or financial data, etc, think about the nightmare you would be in trying to cover all the exploits. Heck, even if you were to get your address book taken or email account exploited.
Again, do not misread my post. The features are there for a reason and provide functionality that is required to manage, repair, and diagnose Apple hardware. These features are not security risks unless the machine is accessible by people of questionable intent. For those instances, Apple has provided methods to protect your data. For machines that are in your home, behind a locked door, you should be pretty safe. If this is a laptop that travels or a machine in a school or other public space, then these are "features" that need to be suppressed.
Hope this helps.

Similar Messages

  • MS Office secretly connects to my Mac and scans my activity. How??? Security hole? Exploitable by hackers?

    I have a strange problem. All by itself it's not so serious, but it concerns me that it reveals a security hole which can be exploited by hackers.
    I may be over-reacting, so any reassurance or explanation would be appreciated.
    Here's the situation:
    I have a MacBook Pro running OSX 10.6.5. I also have a new MacBook Air also running 10.6.5. I recently used Migration Assistant to move all my applications from the MacBook Pro to the MacBook Air. The migration worked fine with one very troubling exception.
    One of the applications that got migrated was MS Office 2008 (MSWord, Excel, etc.). When I just had my MacBook Pro, MS Office worked fine. Also, now, if my MacBook Pro is turned off and I'm just using my Air, MS Office again works fine.
    HOWEVER...if I have my MacBook Pro open and running MS Office on it, and then I simultaneously open my Air and try to launch MS Office, I get an error message that says
    "Microsoft Office 2008 for Mac cannot start because Microsoft Office is already in use.
    An office program is being used by Apple Mac. Your installation exceeds the number of installations permitted by the license agreement."
    However, if I then "Quit" MS Office on the Pro, and then try to launch it on the Air, I don't get the error message, and it works as normal. The same thing happens if I switch computers -- if it's running on the Air first, then I can't launch it on the Pro. Basically, only one of the computers can run MS Office at any one time.
    Now, the issue about the MS license agreement is not what concerns me -- I guess the version of MS Office I bought back in 2008 was only supposed to be installed on one single computer, and never migrated to a new computer (I eventually plan to use the Air full time and retire the Pro). I'm probably going to get a newer version of MS Office eventually anyway, and also I almost never use both computers at the same time, so I'm not worried about being unable to use MS Office on both computes simultaneously. No, what worries me is this:
    How does MS Office on one computer even know that my other computer is running and has MS Office open?
    I'm not an expert on networks and sharing and connectivity and all that, so excuse me if I use inaccurate terminology, but...:
    Both computers connect via AirPort to a cable modem and thus share the same wifi hotspot to connect to the internet.
    But as far as I can tell, the two computers are not "connected" to each other. In the System Preferences for both computers, in the "Sharing" panel, all File Sharing is off. Also, none of the sharing boxes are checked.
    Neither computer shows the hard drive of the other on its Desktop. If I wanted to, I could use Finder's "Go" menu, choose "Connect to server," then "Browse," then find the other computer, double-click on it, type in the admin password, and then connect the two computers. But I haven't done that, and MS Office is able to see what the other comoputer is doing, even when they aren't connected in any way (as far as I can tell).
    I find this pretty disturbing. How in the world does the MS Office on one computer even know that the other computer exists? Furthermore, how does it know that the other computer is on and running? And lastly and more importantly, how does it know which programs are running on the other computer?
    One extra detail: in order to try to diagnose this odd behavior, I installed a program called "Little Snitch" which monitors all network activity and notifies the user whenever any malware programs or other sneaky behind-the-scens apps try to send data over your connection without your knowledge. Little Snitch seems to work great but when I test the problem after installing it, Little Snitch did not even detect or report that MS Office was doing any surreptitious network snooping. So whatever MS Office is doing, it's doing it pretty sneakily.
    Here is my worry: Could a hacker somehow exploit this capability of MS Office to monitor activity on my computer without my being aware of it? Or could someone re-adapt this snooping code from MS Office for more nefarious purposes?
    Or am I completely misapprehending the situation somehow?
    Any  reassurance or explanation would be greatly appreciated! Thanks.

    But my question is: How does the software do that?
    It scans the local network for computers trying to "share" software that is only supposed to be licensed for one computer. I can't give you a technical answer, I can just tell you that's what it's doing.
    then what's preventing less ethical coders from deploying similar but more sinister malware with the same capability?
    Nothing. Any vendor of any software, from a one person shareware or freeware app to a company the size of Apple, Microsoft or Adobe could sneak in damaging code. Any company that wants to stay in business though would never allow it.
    In a typical software company (particularly larger ones), you have not only the people who write the code, but also system analysts who review the code looking for flaws or anything else that shouldn't be there.
    Now I have the fear that if I'm using a wifi hotspot in a cafe or wherever, someone else with hacking skills on that same hotspot could basically see what I'm doing on my computer, without my knowledge.
    The software to pry (they hope undetected) into other folks' computers on an open network like that has been around for years. That's why you at least need to have your firewall enabled when using a wifi hotspot.

  • Although I turned off WiFi, set as 'require admin password to turn on and off wifi, when I turn on my MacBook Pro, retina latest model, just got for a month, it turns on wifi automatically, is this a back door or virus or security hole? Thank you

    I have my all networks at 'Off' status in the system panel, never use Bluetooth either, also in the top status bar, and set as 'require admin password to turn on and off WiFi', but when I turn on my MacBookPro 15" retina newest model only one month old, it goes on to WiFi automatically by itself.
    Is this a back door? Security hole?
    The other day, I was taking a break for five minutes, when I came back, the Microsoft outlook is open for setting up an account, I never use outlook, it is there only because it comes with the office package. Also, iTunes was playing music, I don't use iTunes when I'm working. Both were not on before I left for the break.
    What is the problem?

    I have my all networks at 'Off' status in the system panel, never use Bluetooth either, also in the top status bar, and set as 'require admin password to turn on and off WiFi', but when I turn on my MacBookPro 15" retina newest model only one month old, it goes on to WiFi automatically by itself.
    Is this a back door? Security hole?
    The other day, I was taking a break for five minutes, when I came back, the Microsoft outlook is open for setting up an account, I never use outlook, it is there only because it comes with the office package. Also, iTunes was playing music, I don't use iTunes when I'm working. Both were not on before I left for the break.
    What is the problem?

  • I can not turn off connect securely. How do i do so and your help page sucks cant find anything

    I can not turn off connect
    securely. How do i do so it was working fine then i reset fiefox and now i can get on pages

    Which problems did you have that you decided to reset Firefox?
    Note that if you have visited pages before on a server via a secure connection then Firefox will prefer to using a secure connection (a reset imports the history).
    You can set the Boolean browser.urlbar.autoFill pref to false to disable auto-fill on the location bar.
    See "Prevent Firefox from automatically completing URLs":
    *https://support.mozilla.org/kb/search-your-bookmarks-history-and-tabs-awesome-bar

  • Migratiing files from a MacBook Pro to a new iMac via firewire connection

    The firewire connection does not appear to work between my older MacBook Pro running 10.4.11 and my new iMac running 10.5.6. I've been trying to use migration assistant and it never gets passed "waiting for old mac to restart". I 've put the target macbook pro into target disk mode by pressing "t" at startup and then using system preferences, start up disk, start disk in target mode. It appears that the iMac just can't see the older mac. Any suggestions to trouble shoot? Very little info on apple's support documentation. I have over 90 GB of data (music, files, photos). I can do this over a network connection but it will take 30 hours just to copy my itunes library.

    I would start by doing the following on the MBP:
    Repairing the Hard Drive and Permissions
    Boot from your OS X Installer disc. After the installer loads select your language and click on the Continue button. When the menu bar appears select Disk Utility from the Installer menu (Utilities menu for Tiger and Leopard.) After DU loads select your hard drive entry (mfgr.'s ID and drive size) from the the left side list. In the DU status area you will see an entry for the S.M.A.R.T. status of the hard drive. If it does not say "Verified" then the hard drive is failing or failed. (SMART status is not reported on external Firewire or USB drives.) If the drive is "Verified" then select your OS X volume from the list on the left (sub-entry below the drive entry,) click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the installer. Now restart normally.
    If DU reports errors it cannot fix, then you will need Disk Warrior and/or Tech Tool Pro to repair the drive. If you don't have either of them or if neither of them can fix the drive, then you will need to reformat the drive and reinstall OS X.
    Next, turn off both computers. Connect via a Firewire cable. Boot the MBP into TDM. Wait for the TDM screen to appear. Now boot the iMac normally. See if the disk drive of the MBP doesn't appear on the iMac's Desktop.

  • Possible Login Screen Security Hole in Lion?

    I think that I have found a glitch in the login screen in Lion that allows a user to hack in to an account without a password! It appears to occur on Macbooks with OS X Lion and here is how to reproduce it:
    Make sure that you account is password-protected and that you require a password 5 seconds after the screen saver/sleep begins. Also, be sure that you have the default "hot corner" settngs and OS X Lion. Lastly, make sure that Finder is on the farthest left icon on your dock and that your screen saver is set to spectrum!
    Close all open windows to see your desktop.
    Now, close you Macbook lid, wait 10 seconds, and open it up. You should see a screen similar to the one shown below, but with your wallpaper & info: 
    Now forcefully (yes, forcefully) restart your Mac by pressing down command, control, and the power button at the same time.
    Wait for your Mac to start up and you should see the same screen you saw (like the image above.)
    Click in the battery/time/wifi signal/etc. area in the top right corner without mousing over the courner.
    Now, mouseover the top right corner of the screen, as it will launch some kind of odd "mission control". From there, ANYONE can control your Mac without seeing your screen. From there, mouse over where you think Finder is on the dock (in the bottom-left corner of the dock) without mousing over and corners of the screen and click it. That SHOULD launch finder on your Mac.
    The login screen should reappear! (Odd, isn't it?)
    Now, mouseover the bottom-left corner and hold esc as soon as the screen turns completely dark. If sucessful, you should see your screensaver show up. While holding esc, move your mouse around towards the bottom-right corner. You should see your cursor over top of the "wheel of doom".
    The screen should flicker and you have hacked in to your account! Funny, isn't it?
    You should see finder over top of your desktop if you located finder correctly in step 7! Cool?
    If you are not sucessful, restart the entire process from step 4 and skip steps 7-8. If it doesn't work out for you after a few attemps, give up! Let's not waste any time on hacking in to an account (unless you are a hacker.)
    Is it just me or can anyone else reproduce this? If it occurs (or not), please list your Macbook's specs and details in a reply.

    jonathan_2005 wrote:
    One of the options in the security panel permits a user to require that a username and password be entered to login once the screen saver locks your account.
    The option is "Require password to wake this computer from sleep or screen saver"
    Although one would assume that the credentials required to wake the computer is the username/password of the account that was being used when the computer went into sleep mode or the screen saver.
    Never assume
    WRONG!!! Anyone with an account on the machine can enter their username/password and wake the computer and voila that user now has control of the machine as the former user. That's right you guessed it HUGE security hole.
    Anyone with a standard user account? Are you quite sure?
    Anyone thinking that they can wake away from their machine and have the screen saver or sleep mode protect their account after a specified period of time is sadly mistaken. Anyone with an account on the machine can enter their own username and password and drop right into your account right where you left off.
    I never think that way. A more secure lock is ensured by using the screen lock feature of the keychain.
    Can you believe this stuff?
    Not sure what stuff you refer to.
    No warning, no release note to tell you of such a poorly designed "security" option.
    Would you believe that anyone can access your computer? Stolen computers are regularly started up without much problem.
    Apple please fix what must have been an oversight or at least tell people about this intentional design BEFORE they find anyone can wake the computer and become you as a user.
    You are writing to other users like yourself here, not Apple.
    I also presume you are new to the Mac world.

  • Can you confirm a security hole in file sharing?

    I have found a very annoying security hole, and I wonder if it is unique to my setup. I have my mini set up with file sharing turned on. It has 5 accounts, one administrator, rest ordinary users. My login for the administrative user on my laptop is the same as on the mini. I have not turned on "Back to my Mac."
    From my laptop I navigate to the mini using either (a) the network panel in finder, (b) the local IP (afp://192.168.0.xxx), or the global IP (afp://64.xxx.xxx.xxx). (My router is set up to forward the appropriate ports to the mini's local IP). I mount the administrative user's home directory under apple file sharing. Now I have full access to these files. I DO NOT SAVE THE PASSWORD IN KEYCHAIN. All this is as it should be.
    Now I eject the administrator disk.
    From now on (until I reboot my laptop), I can mount that same disk without a password!
    Can someone confirm?

    {quote:title=William Lloyd wrote:}This is not a security hole.{quote}
    While I can understand that some may consider Kerberos automagically creating what is essentially a keychain without the users express knowledge or consent a "feature", I definitely consider it a bug and a huge security hole.
    The kerberos ticket should not live longer then the user is actually connected to the machine. Currently, if the user clicks the Disconnect button the Kerberos ticket lives on and any future connections to that server will user that ticket. This is not what users (especially novice to intermediate) would expect. If the user clicks the Disconnect button, then they would expect that they are completely disconnected and any further connections to that server would require authentication. Otherwise they leave their machine wide open, hense the security hole.
    The other thing that makes this so nasty is that if the OS decides not to use kerberos, for whatever reason, the behavior is different. It behaves as the user would expect. Clicking Disconnect does completely disconnect you from the server and any future connections will require authentication. So at a minimum there is a dangerous inconsistency in behavior between when the OS uses Kerberos and when it doesn't. That, at a minimum, should be fixed.

  • Is dodgy firewire connection to blame for 'restart' message.

    I have been getting the 'you need to restart your computer...' message in the black box, when uploading some footage to IMovie.
    I need to know if it could be a software problem, the actual firewire, or like I think- the following problem:
    For a while, 2 of the the pins inside the DV firewire connection point on the camcorder (Panasonic Mini-DV, about 5 years old). have been broken off to about half way. It normally works anyway but this time, after a few minutes, IMovie lost the connection. I took the cable out and put it back in- which normally does the trick, but then got the 'restart' message.
    Is my computer just freaking out at the corrupt connection.
    Need to know what I need to fix.
    Cheers.

    It's very likely that it's your camcorder is at fault. What you're experiencing is a Kernel Panic and most KP's happen because of hardware.
    I'm not sure whether or not repairing the connection in a 5yr. old camcorder is feasible due to cost or lack of parts but it might be something to check out.

  • ORA-12518: TNS:listener could not hand off client connection (DBD ERROR: OCIServerAttach)

    Hi again,
    I'm on my enterprise management console and Database Instance and Listener shows the green arrow, but the Agent Connection to Instance shows a red downward arrow and the error:
    Status: Failed
    Details: ORA-12518: TNS:listener could not hand off client connection (DBD ERROR: OCIServerAttach)
    My OraClrAgnt service is up and running (using winxp pro, oracle 11gR2), I'm on my home pc, all my ports are open (my machine's name is "abigail" and it is dmzhost)
    Any suggestions to resolve this error?
    My Tnsnames ora:
    ABIGAIL =
      (DESCRIPTION =
        (ADDRESS_LIST =
          (ADDRESS = (PROTOCOL = TCP)(HOST = ABIGAIL)(PORT = 1521))
        (CONNECT_DATA =
          (SERVICE_NAME = orcl.0.0.10)
    LISTENER_ORCL =
      (DESCRIPTION =
        (ADDRESS_LIST =
          (ADDRESS = (PROTOCOL = TCP)(HOST = ABIGAIL)(PORT = 1521))
        (CONNECT_DATA =
          (SID = ORCL)
    RMAN =
      (DESCRIPTION =
        (ADDRESS = (PROTOCOL = TCP)(HOST = ABIGAIL)(PORT = 1521))
        (CONNECT_DATA =
          (SERVER = DEDICATED)
          (SERVICE_NAME = rman.abigail)
    My listener.ora
    SID_LIST_LISTENER =
      (SID_LIST =
        (SID_DESC =
          (SID_NAME = CLRExtProc)
          (ORACLE_HOME = E:\app\abigail\product\11.2.0\dbhome_1)
          (PROGRAM = extproc)
          (ENVS = "EXTPROC_DLLS=ONLY:E:\app\abigail\product\11.2.0\dbhome_1\bin\oraclr11.dll")  
    LISTENER =
      (DESCRIPTION_LIST =
        (DESCRIPTION =
          (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC1521))
          (ADDRESS = (PROTOCOL = TCP)(HOST = ABIGAIL)(PORT = 1521))
    ADR_BASE_LISTENER = E:\app\abigail
    My SQLNET.ORA
    SQLNET.AUTHENTICATION_SERVICES= (NTS)
    NAMES.DIRECTORY_PATH= (EZCONNECT, TNSNAMES, LOCALHOST)
    NAMES.TRACE_LEVEL = ADMIN
    My alert file
    <msg time='2013-10-10T20:47:02.687-04:00' org_id='oracle' comp_id='tnslsnr'
    type='UNKNOWN' level='16' host_id='ABIGAIL'
    host_addr='::1'>
    <txt>10-OCT-2013 20:47:01 * (CONNECT_DATA=(CID=(PROGRAM=)(HOST=__jdbc__)(USER=SYSTEM))(SERVICE_NAME=orcl.0.0.10)) * (ADDRESS=(PROTOCOL=tcp)(HOST=127.0.0.1)(PORT=38289)) * establish * orcl.0.0.10 * 12518
    </txt>
    </msg>
    <msg time='2013-10-10T20:47:02.687-04:00' org_id='oracle' comp_id='tnslsnr'
    type='UNKNOWN' level='16' host_id='ABIGAIL'
    host_addr='::1'>
    <txt>TNS-12518: TNS:listener could not hand off client connection
    TNS-12560: TNS:protocol adapter error
    </txt>
    </msg>
    My listener status and services
    LSNRCTL> status
    Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=EXTPROC1521)))
    STATUS of the LISTENER
    Alias                     LISTENER
    Version                   TNSLSNR for 32-bit Windows: Version 11.2.0.1.0 - Produ
    ction
    Start Date                10-OCT-2013 22:47:58
    Uptime                    0 days 0 hr. 2 min. 1 sec
    Trace Level               off
    Security                  ON: Local OS Authentication
    SNMP                      OFF
    Listener Parameter File   E:\app\abigail\product\11.2.0\dbhome_1\network\admin\l
    istener.ora
    Listener Log File         e:\app\abigail\diag\tnslsnr\ABIGAIL\listener\ale
    rt\log.xml
    Listening Endpoints Summary...
      (DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(PIPENAME=\\.\pipe\EXTPROC1521ipc)))
      (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=ABIGAIL)(PORT=1521)))
    Services Summary...
    Service "CLRExtProc" has 1 instance(s).
      Instance "CLRExtProc", status UNKNOWN, has 1 handler(s) for this service...
    Service "orcl.0.0.10" has 1 instance(s).
      Instance "orcl", status READY, has 8 handler(s) for this service...
    The command completed successfully
    LSNRCTL> services
    Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=EXTPROC1521)))
    Services Summary...
    Service "CLRExtProc" has 1 instance(s).
      Instance "CLRExtProc", status UNKNOWN, has 1 handler(s) for this service...
        Handler(s):
          "DEDICATED" established:0 refused:0
             LOCAL SERVER
    Service "orcl.0.0.10" has 1 instance(s).
      Instance "orcl", status READY, has 8 handler(s) for this service...
        Handler(s):
          "D006" established:0 refused:0 current:0 max:800 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 1312>
             (ADDRESS=(PROTOCOL=tcps)(HOST=ABIGAIL)(PORT=1060))
          "D005" established:0 refused:12 current:0 max:800 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 1288>
             (ADDRESS=(PROTOCOL=tcps)(HOST=ABIGAIL)(PORT=1061))
          "D004" established:0 refused:1 current:1 max:16383 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 1260>
             (ADDRESS=(PROTOCOL=tcp)(HOST=ABIGAIL)(PORT=1063))
          "D003" established:0 refused:1 current:1 max:16383 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 1140>
             (ADDRESS=(PROTOCOL=tcp)(HOST=ABIGAIL)(PORT=1062))
          "D002" established:0 refused:1 current:1 max:16383 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 140>
             (ADDRESS=(PROTOCOL=tcp)(HOST=ABIGAIL)(PORT=1059))
          "D001" established:0 refused:1 current:1 max:16383 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 1072>
             (ADDRESS=(PROTOCOL=tcp)(HOST=ABIGAIL)(PORT=1057))
          "D000" established:0 refused:1 current:1 max:16383 state:ready
             DISPATCHER <machine: ABIGAIL, pid: 748>
             (ADDRESS=(PROTOCOL=tcp)(HOST=ABIGAIL)(PORT=1058))
          "DEDICATED" established:0 refused:0 state:ready
             LOCAL SERVER
    The command completed successfully

    I added this on my listener.ora
    DIRECT_HANDOFF_TTC_LISTENER=OFF
    Works now!
    Moral of the story, google is ur friend lol. Thanks for the reply tho!

  • Can i turn the Laptop screen off while connecting the TV?

    Dear All,
    I am connecting my Mac to TV 32'' via mini display port converted to HDMI.
    I am using it on MAC OS X 10.6.6, and on Windows 7 Ultimate SP1 also.
    when i am connecting my TV, the 2 screens are on, Laptop screen and TV screen.
    Can i turn the Laptop screen off while connecting the TV?
    how to do this on both operating systems?
    Thanks & Regards,
    Boudy,

    The quick answer is, hook up the tv to the computer, close the lid, then wake the computer up by clicking the mouse while the lid is closed. Not sure if it'll work while running windows, but I'd bet it does if you have the mac drivers installed on the win os.

  • DEP (Date Execution Prevention) Closed iTunes due to security reason

    I just bought a new laptop (SONY SR) operated with Window Vista. My laptop never run iTunes since I installed it. I tried uninstall and reinstall again n again, but it just doesn't work.
    A screen appeared and say that iTunes stopped working, DEP (Data Execution Prevention) has closed iTunes due to security reason.
    How do I off that "DEP"? Thanks!!!

    Hi, I just got this problem solved. Hope it helps.
    You don't have to turn off DEP or reinstall any program.
    The only thing you need to do is associate your Quicktime files ONLY to QuickTime player.
    When you open QuickTime it will automatically pop up a window to ask you if you want to fix file association. The answer is positive of course.
    If it still doesn't work maybe you could uninstall some codec / media players which associate with QuickTime files.

  • New iPod with FireWire connection?

    When I plug in my new video iPod to the FireWire connection, the screen says "FireWire connection not supported. Please use USB cable." I was just wondering if anyone knows a way to use FireWire with a new video iPod.
    Thanks,
    Geoff
    iMac   Mac OS X (10.4.8)  

    It is impossible to use firewire to transfer media off your computer to your 5g Video iPod. However you can still use the firewire cable to charge your iPod.
    Regrads--- jgurbisz
    If I helped... please mark as helpful or solved.

  • HUGE SECURITY HOLE IN LOGIN FROM SCREEN SAVER

    One of the options in the security panel permits a user to require that a username and password be entered to login once the screen saver locks your account.
    The option is "Require password to wake this computer from sleep or screen saver"
    Although one would assume that the credentials required to wake the computer is the username/password of the account that was being used when the computer went into sleep mode or the screen saver. WRONG!!! Anyone with an account on the machine can enter their username/password and wake the computer and voila that user now has control of the machine as the former user. That's right you guessed it HUGE security hole.
    Anyone thinking that they can wake away from their machine and have the screen saver or sleep mode protect their account after a specified period of time is sadly mistaken. Anyone with an account on the machine can enter their own username and password and drop right into your account right where you left off.
    Can you believe this stuff? No warning, no release note to tell you of such a poorly designed "security" option.
    Apple please fix what must have been an oversight or at least tell people about this intentional design BEFORE they find anyone can wake the computer and become you as a user.
    Thanks,
    JH

    jonathan_2005 wrote:
    One of the options in the security panel permits a user to require that a username and password be entered to login once the screen saver locks your account.
    The option is "Require password to wake this computer from sleep or screen saver"
    Although one would assume that the credentials required to wake the computer is the username/password of the account that was being used when the computer went into sleep mode or the screen saver.
    Never assume
    WRONG!!! Anyone with an account on the machine can enter their username/password and wake the computer and voila that user now has control of the machine as the former user. That's right you guessed it HUGE security hole.
    Anyone with a standard user account? Are you quite sure?
    Anyone thinking that they can wake away from their machine and have the screen saver or sleep mode protect their account after a specified period of time is sadly mistaken. Anyone with an account on the machine can enter their own username and password and drop right into your account right where you left off.
    I never think that way. A more secure lock is ensured by using the screen lock feature of the keychain.
    Can you believe this stuff?
    Not sure what stuff you refer to.
    No warning, no release note to tell you of such a poorly designed "security" option.
    Would you believe that anyone can access your computer? Stolen computers are regularly started up without much problem.
    Apple please fix what must have been an oversight or at least tell people about this intentional design BEFORE they find anyone can wake the computer and become you as a user.
    You are writing to other users like yourself here, not Apple.
    I also presume you are new to the Mac world.

  • TNS-12518: TNS:listener could not hand off client connection TNS-12547

    Hi guys,
    I have started my listener from 10.2.0.5 home , which was in 10.2.0.4.
    from that point am having issue connect to 10.2.0.4 databases which are in restricted session(DR db)
    when I try to connect to databases which are in restricted session it says TNS connection closed. databases which are open am able to connect.
    listener.log shows
    TNS-12518: TNS:listener could not hand off client connection TNS-12547: TNS:lost contact TNS-12560: TNS:protocol adapter error TNS-00517: Lost contact Solaris Error: 32: Broken pipe
    any idea why its happening.

    902988 wrote:
    Hi guys,
    I have started my listener from 10.2.0.5 home , which was in 10.2.0.4.
    from that point am having issue connect to 10.2.0.4 databases which are in restricted session(DR db)
    when I try to connect to databases which are in restricted session it says TNS connection closed. databases which are open am able to connect.
    listener.log shows
    TNS-12518: TNS:listener could not hand off client connection TNS-12547: TNS:lost contact TNS-12560: TNS:protocol adapter error TNS-00517: Lost contact
    Solaris Error: 32: Broken pipeOS/Networking misconfiguration.
    Oracle is victim; not culprit.
    Root cause & solution is external to Oracle
    How many different DB versions installed on this system?
    post results from following OS command
    env | sort
    Handle:     902988
    Status Level:     Newbie
    Registered:     Dec 17, 2011
    Total Posts:     7
    Total Questions:     4 (4 unresolved)
    Why post here when you NEVER get any answers?
    Edited by: sb92075 on Apr 13, 2012 1:12 PM

  • TNS-12518: TNS:listener could not hand off client connection, XE 10g/WinXP

    I've installed Oracle XE 10 on Windows XP. When I browse to the database homepage, I get this in listener.log:
    Listening on: (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=127.0.0.1)(PORT=8080))(Presentation=HTTP)(Session=RAW))
    08-FEB-2012 01:07:24 * service_register * xe * 0
    08-FEB-2012 01:07:24 * http * (ADDRESS=(PROTOCOL=tcp)(HOST=127.0.0.1)(PORT=1702)) * handoff * http * 12518
    TNS-12518: TNS:listener could not hand off client connection
    TNS-12560: TNS:protocol adapter error
    I don't think it is shortage of resources (just rebooted). I put "DIRECT_HANDOFF_TTC_LISTENER=OFF" in listener.ora .. no luck. I removed the listener.ora file altogether ... ditto.
    What else could cause this?
    Steve

    I can connect from SQLPlus. Laptop has 3 GB RAM.
    ===== set =====
    C:\Documents and Settings\shawes>set
    ALLUSERSPROFILE=C:\Documents and Settings\All Users
    APPDATA=C:\Documents and Settings\shawes\Application Data
    CLIENTNAME=Console
    CommonProgramFiles=C:\Program Files\Common Files
    COMPUTERNAME=shawes-us
    ComSpec=C:\WINDOWS\system32\cmd.exe
    DEFLOGDIR=C:\Documents and Settings\All Users\Application Data\McAfee\DesktopProtection
    FP_NO_HOST_CHECK=NO
    HOMEDRIVE=C:
    HOMEPATH=\Documents and Settings\shawes
    JDEV_USER_DIR=D:\JDeveloper\mywork
    LOGONSERVER=\\shawes-us
    NUMBER_OF_PROCESSORS=4
    OS=Windows_NT
    Path=C:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\Program Files\Intel\WiFi\bin\;C:\Program Files\
    ThinkPad\ConnectUtilities;C:\Program Files\TortoiseSVN\bin;C:\bin
    PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
    PROCESSOR_ARCHITECTURE=x86
    PROCESSOR_IDENTIFIER=x86 Family 6 Model 37 Stepping 2, GenuineIntel
    PROCESSOR_LEVEL=6
    PROCESSOR_REVISION=2502
    ProgramFiles=C:\Program Files
    PROMPT=$P$G
    SESSIONNAME=Console
    SystemDrive=C:
    SystemRoot=C:\WINDOWS
    TEMP=C:\DOCUME~1\shawes\LOCALS~1\Temp
    TMP=C:\DOCUME~1\shawes\LOCALS~1\Temp
    TPCCommon=C:\PROGRA~1\THINKV~1\PrdCtr
    TSMPATH=C:\Program Files\ThinkPad\UltraNav Utility
    USERDOMAIN=shawes-us
    USERNAME=shawes
    USERPROFILE=C:\Documents and Settings\shawes
    VSEDEFLOGDIR=C:\Documents and Settings\All Users\Application Data\McAfee\DesktopProtection
    windir=C:\WINDOWS
    ===== lsnrctl stat =====
    C:\Documents and Settings\shawes>lsnrctl stat
    LSNRCTL for 32-bit Windows: Version 10.2.0.1.0 - Production on 08-FEB-2012 23:55:53
    Copyright (c) 1991, 2005, Oracle. All rights reserved.
    Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=EXTPROC_FOR_XE)))
    STATUS of the LISTENER
    Alias LISTENER
    Version TNSLSNR for 32-bit Windows: Version 10.2.0.1.0 - Production
    Start Date 08-FEB-2012 19:32:02
    Uptime 0 days 4 hr. 23 min. 53 sec
    Trace Level user
    Security ON: Local OS Authentication
    SNMP OFF
    Default Service XE
    Listener Parameter File C:\oraclexe\app\oracle\product\10.2.0\server\network\admin\listener.ora
    Listener Log File C:\oraclexe\app\oracle\product\10.2.0\server\network\log\listener.log
    Listener Trace File C:\oraclexe\app\oracle\product\10.2.0\server\network\trace\listener.trc
    Listening Endpoints Summary...
    (DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(PIPENAME=\\.\pipe\EXTPROC_FOR_XEipc)))
    (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=SHAWES-US.us.oracle.com)(PORT=1521)))
    (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=127.0.0.1)(PORT=8080))(Presentation=HTTP)(Session=RAW))
    Services Summary...
    Service "CLRExtProc" has 1 instance(s).
    Instance "CLRExtProc", status UNKNOWN, has 1 handler(s) for this service...
    Service "PLSExtProc" has 1 instance(s).
    Instance "PLSExtProc", status UNKNOWN, has 1 handler(s) for this service...
    Service "XEXDB" has 1 instance(s).
    Instance "xe", status READY, has 1 handler(s) for this service...
    Service "XE_XPT" has 1 instance(s).
    Instance "xe", status READY, has 1 handler(s) for this service...
    Service "xe" has 1 instance(s).
    Instance "xe", status READY, has 1 handler(s) for this service...
    The command completed successfully

Maybe you are looking for