Computerized Theft of Personal Information (Virus)

Not sure what to call this, and what to do about it but advice is appreciated. I spent several hours this weekend browsing the web. The next day I had an e-mail from one of the web sites (a Russian enterprise by the way) inviting me to join their service for a monthly fee. I DID NOT GIVE THEM MY E-MAIL ADDRESS BUT THEY GOT IT (i.e. took it) ANYWAY.
I can't call it a Virus, because the Mac is working fine, but they did steal information from my address book without asking.
Aside from whatever to call this, what kind of defense should I get? A separate hardware-based personal fire-wall or software application? Something like Norton or Symantec security suite? Shareware?
Your adice is much appreciated.

Good questions, going towards how they may have obtained my e-mail address? I do own a domain name, but the message was addressed to my primary e-mail address. I save this address for use by family and friends, all "outsiders" and commercial interests get my general purpose every day e-mail address.
The only place I know of where that primary family and friends e-mail address appears in is in my Mac address book. My suspicion is that they used some kind of software hack to get that data - for sure I did not give it to them. Does this help to narrow things down?

Similar Messages

  • Are the Gameover Zeus and Cryptolocker malware a threat to Mac/Apple computers? If so, what should be done to protect the computer and personal information?

    Are the Gameover Zeus and Cryptolocker malware a threat to Mac/Apple computers? if so, what should be done to protect the computer and personal information?

    These are Windows viruses and will not effect your Mac.
    GameOver Zeus P2P Malware: http://www.us-cert.gov/ncas/alerts/TA14-150A
    Systems Affected
    • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
    • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
    CryptoLocker Ransomware Infections: http://www.us-cert.gov/ncas/alerts/TA13-309A
    Systems Affected
    • Microsoft Windows systems running Windows 8, Windows 7, Vista, and XP operating systems

  • I have been getting messages from Safari when I am on commercial sites where I am sure that I have typed in the address correctly.  Messages say that the website was signed by an unknown certifying authority and my personal information may be at risk.  Th

    Am getting daily messages from Safari warning me that I am on a website with an unknow certifying authority and my personal information may be at risk.
    Happens when in Cox webmail and when I am visitying a legitimate site, and I have typed in address correctly such as Citibank rewards site.
    Have 3 choices, "Show Certficate" "Cancel" or "Continue". Screen is frozen and cannot exit Safari without acknowledging the message or clicking escape. I had been clicking continue, but after a month or more of many such messages decided to ask Cox.  They say it is a virus.  Was I careless in clicking continue?  What do many messages like this mean?  they can't all be unknown certifying authorities can they?

    Take each of the following steps that you haven't already tried. Stop when the problem is resolved.
    1. Are the current date (including the year) and time shown on your system clock? If not, correct them and test.
    2. Check that the following files exist:
    /System/Library/Keychains/SystemCACertificates.keychain
    /System/Library/Keychains/SystemRootCertificates.keychain
    If they don't, restore them from a backup or reinstall OS X after backing up all data.
    3. Disable any third-party firewall, "security" software, or network filter. Test.
    4. In some versions of OS X, Parental Controls has a bug that prevents loading of secure websites. Turn it off.
    5. The process by which OS X checks the validity of root SSL certificates doesn't work behind the authenticating SOCKS proxies used on some enterprise networks. If applicable, contact your network administrator. The proxy server may need to have its settings changed.
    6. Launch the Activity Monitor application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Activity Monitor in the icon grid.
    Select All Processes from the menu in the toolbar of the Activity Monitor window, if not already selected. Enter "ocspd" (without the quotes) in the "Filter" text field. Is a process with that name listed?
    If not, back up all data, then select
    Go ▹ Go to Folder
    from the Finder menu bar. Into the text box that opens, copy the following line of text:
    /var/db/crls
    From the folder that opens, move these two files to the Trash:
    crlcache.db
    ocspcache.db
    You’ll be prompted for your administrator password. Reboot, empty the Trash, and test.

  • Credit Cards for personal information - REQUIRED

    Don't ever again ask someone for their driver's license..... it is an invasion of privacy. Quite frankly, it's none of your company's business who I am or what my address is. If I were dumb enough to comply, there is no guanantee that your company can offer that would ensure that my personal information would be safe from theft or use by your company at a later date for whatever purpose that you decide to use it for. In other words, it's not a good idea to hand over such info that would be entered into a database outside of my control.
    If I was applying for credit... then okay, you need it.
    I just recently ran into this problem in your North San Antonio store IH10.
    I was attempting to return a product that quit working and I was told that your company's policy was to enter my info into your computer.
    When I refused to give up my personal information, I was told that I could not return any item without complying....????????
    What made matters worse, I purchased an extended warranty that made me feel more comfortable about my purchase that was not able to use as well.
    Now, I could understand the excuse that your store director used and claimed to try and justify this stupid policy with... "we need to get this information to help us prevent fraud".
    After that stupid remark, I reminded him that I not only have the original package, receipt, the exact credit card that was used to purchase the item and a matching driver's license, THAT HE COULD LOOK AT, that proves who I am and that he could use to validate the sale.
    But that was not good enough because it's your company's policy.......  What a crock of garbage.
    I quickly summized that it's your company's intent is to use my information for whatever purpose that you choose in the future. Otherwise, my complete documention would be sufficient to prove that this transaction was legitimate. In other words, you are trying to extort imformation from your customers.  HOW DISGUSTING
    So, I have come to the conclusion that I will never do business with you jackasses ever again.

    I have a suggestion. Why don't you set up a system that would be specific to each customer with a unique "in-house" I.D. that would identify the customer for tracking puposes as you see fit.
    That will accomplish your goals without adding to the idenity theft problem. I wouldn't have a problem with using my email address as anidentifier.... it's already out there. A lot of companies use that now.
    I don't intend to be cruel or insulting here... so please don't take it as such. But do you have any idea what you are suggesting? Do you realize the cost in this? I work for the government where I.D. cards are used and made on a daily basis. I see the administrative costs for this and I would really and truly hate to see such a burden of a cost on BestBuy. I also don't see them paying such a price for I.D. cards. There are nearly 314 million people in the U.S according to the 2012 census. and about 240.83 million of those people are above the age of 18. 
    Now just breaking this down even further to stay fair here... Microsoft makes out like that 200 million copies of Windows 8 licenses have been sold so far.even though realistiically you could cut down that number to less than 100 million considering not all licenses are going to be in use. You may have 60 million licenses in use. This data was took from the U.S. census and also from Computer World in 2013.
    A printer that makes I.D. badges can cost you $600 and up easily. I don't know the specific amount of of stores BestBuy owns however, I do know it's over 1,000. 
    So right there you are looking at a $60,000 investment by itself. We already talking big money! The actual I.D. card itself will cost the company somewhere around 50 cents to a dollar PER plastic card, that's right. That's a lot of money for a card.
    I just don't logically seeing this being a viable solution sorry. Again I mean no disrespect intended but I felt I needed to alert you of the actual prices of stuff such as this.
    I am not affiliated with Best Buy nor have I ever been employed by Best Buy. All of my thoughts and posts are of my own opinion and personal experience.
    I may not always know the right answer, but I will always tell you what I do know. I also do free computer analysis and consultation via private message.

  • MAC and IP should specifically be listed "Personal Information" for all interactions in your Privacy Policy

    Except for those who run cute lil' programs that could disorient or disrupt the system, possessing someone's MAC is possessing the 'true name' of at least one portion of their computer. Follow the computer in your accumulated files, and somewhere, this note even, gives you the mailing address, and a good lead on who owner is. IP address, if too static, well, same deal. With policy in place, I can feel free to run a server AND the rest of my system on the same fiber broadband line, saving me enough $/yr to buy an upgrade or two.
    Let's face it, YOU are your equipment, and if I wanted to use my name, I would.

    First, if you keep up a file until you can match a firewall MAC with doc with a name on it, the rest is fairly simple. Traceroute the IP, and, while NOT as easy as a return address sticker, it is a pretty easy thing to do. Mozilla admits this:
    Any information that can connect even a firewall with a place or individual(s)should be defined strictly as "personal information in a privacy policy, period.
    I worry about the Eternal Word, especially the records kept by suppliers of everything, including Mozilla, which, without paperwork like a subpoena or warrant,
    "may share potentially-personally identifying information with its employees, contractors, service providers, and subsidiaries and related organizations. ..." Otherwise, Mozilla will not publicly release potentially-personally identifying information except under the same circumstances as Mozilla releases personally identifying information. Those circumstances are explained below, the Four Reasons Mozilla may release to companies including Google's Doubleclick Division, which crows, in privacy statements about a)getting access to all of Google's raw data, b) crunching and mashing for best web ad placement - NOT for "people like YOU" but Only for YOU the wife of Bradbury's Fireman is told, as she awaits a once-in-lifetime chance to influence the flow of a 3V soap opera..
    Here's one Mozilla protection against releasing information to the PUBLIC, private industry and the governments of the world:
    First, in admitting what you said above is not the case:,
    "... Mozilla also collects potentially-personally identifying information like Internet Protocol (IP) addresses, which are non-personally identifying in and of themselves but could be used in conjunction with other information to personally identify users"
    What does it do with these records, which I would prefer have every identification mark removed the microsecond it arrives?
    Well, if you are not in business with Mozilla, just another user:
    "1. Mozilla does not publicly release information gathered in connection with commercial transactions (i.e., transactions involving money), including transactions conducted through the Mozilla Foundation Store or donations to the Mozilla Foundation.
    2. Mozilla does not publicly release personally identifying information collected in connection with an application for employment with Mozilla.
    3. Mozilla does not make publicly available information that is used to authenticate users the publication of which would compromise the security of Mozilla's websites (e.g., passwords).
    4. Mozilla does not make publicly available information that it specifically promises at the time of collection to maintain in confidence."
    Part 1 is UNTRUE to the extent that Mozilla reports and/or verifies donations, either the 5 largest or everyone donating more than I think it's $30K for the annual Form IRS 990, a NfP's equivalent of a Form 1040 - the last three are generally posted on the foundation site.
    Part 2 is The Law in most states.
    Part 3 promises internal security to Mozilla, and says NOTHING about users.
    Part 4 avoids nasty suits.
    And the list is followed by a curious statement: "Outside those four contexts, users should assume that personally identifying information provided through Mozilla's websites will be made available to the public."
    What about PRIVATE transactions (purchases, trades, 'aid in kind') - curiously missing is any statement? Or 'requests' from public and private guys in suits?
    Ominously, for those who regard the rapid collection of data from social networking 'harmless' or 'fun', "Mozilla may interact with you through social networks to further our mission. When you interact with us at a third-party social network, such as Facebook, Twitter, or Google +, the network gives us the ability to access and store certain information from your profile for that social network.
    Like the guy who posted a copy of an ad he found for hospital lubricant in 55-gallon drums - and found himself the Facebook spokesman for a KY-Jelly-type product.
    "Consistent with our privacy commitments, we will scrutinize third party requests for information about YOU for compliance with the law, including those coming from governmental agencies or civil litigants. We may access, use, preserve or disclose information about you only WHEN WE HAVE A GOOD FAITH BELIEF that it is REASONABLY necessary to do so to satisfy the applicable law, regulation, legal process or LAWFUL GOVERNMENT REQUEST OF ANY COUNTRY, or to protect the rights, property or safety of Mozilla, its users or the public. We will provide notice of legal process or governmental requests unless prohibited to do so by law or the circumstances warrant otherwise."[emphases added, words a direct quote.] Good Faith in legality of actionswas Nixon's initial excuse too - for setting up the Plumbers unit.
    I would prefer a statement like:
    'Mozilla Foundation and its subdivisions are committed to neither selling, trading, supplying, borrowing or using any data that can possibly be linked to a given user or volunteer.
    We will fight tooth and claw on behalf of our users and participants - to resist ANY attempt by any agency, public or private, for ANY reason, including promises of money or advertising, to divulge ANY information about them to anyone, PARTICULARLY when the request comes from a government with a less-than-stellar civil/judicial rights record, according to agencies like Human Rights Watch, the European Union's human rights division, the Permanent Court of International Justice division dealing with mass murderers and the like.
    We will fight as strongly against US, State or local government agency requests for information. We will place the people we work so hard to serve above ourselves, and be dragged kicking and screaming all the way to the courthouse door, with as many live net feeds and calls to the traditional public media as possible. And we will barricade any door if we fear a midnight knock.
    We will provide governments outside the countries where we do business (list here) with nothing unless ordered to by US courts, at least after fighting as many rounds of appeals as we are allowed, and will publicly and politically battle any agency which attempts to get user/participant data from us. All Foundation AND subsidiary employees earning more than $150,000 a year have pledged a minimum of 10% of their salary to these battles, if needed.
    We further put agencies, public and private, on notice that we maintain as little data as possible on our free and paying customers, and do not maintain a single record we are not required to keep, even if it makes our business a bit more difficult to perform.
    And if we get word someone might be coming, they're liable to find all computers free of data, which, if legally possible - before a subpoena or warrant arrives, just on rumor it is coming, we will destroy everything - to the point of installing and activating scuttling devices on all disks and backups, no matter where stored. We take this protection very seriously, and would rather face a business and directory rebuild than give any information that could locate a product user.'
    I'd rather like to see a statement like this as part of the Privacy Policy of every IT-related corporation in the world - though I doubt even Mozilla has the nerve or commitment to its manifesto. We wont ever see anything like it - when asked by the local Homeland Security-style division, for info on a dozen or, for that matter, all users, it is CYA time around the world.
    Smith 1 is in 1984, Smith 2 is a great San Francisco xerography artist. Smiths 3,4,5,6,7 have been spotted on the net. Use the name, it is a good name to let Big Google know how you feel.

  • What can I do if 2 Imac were stolen from my school with my personal information?

    My two Imac were stolen at my classroom. It was a federal program and has my personal information as a guardian of the equipment. Both of them has a password for login. They can login and see all in the computers? my accounts? students information? Can i block each computer?

    You should be able to go the apple store and they can tell show you how to get the location of your products. They can also show you how to erase all your personal information on your products as well.  Then also make sure you file a police report.  I live in Anchorage, AK and we have a store here that gives free lessons on all the Mac products.  I hope this helps.

  • Can't see the ESS Additional Personal Data link within Personal Information

    Hi All,
    For some reasons, I can not see the Additional Personal Data link within the ESS Personal Information iView. I have checked the Homepage framework and the existence of the iView in the PCD and everything appears to be fine.
    Do I need to assign any additional infotype to my id or give myself specific authorisations to see this link?
    I would really appreciate if you could provide an answer to my query.
    Thanks,
    Vibhu

    Hi,
    I think mostly you have maintained the data in PA30 Transaction and had data in Info type 0105.
    After this try to check with your EA-HR patch and SAP HR patch in the services. If  both are not maintained at the same patch levels such type of problems will occur.
    Regards,
    kishore.

  • RFC Call Error - from Portal End - For ESS Personal Information service

    Hi,
    I am getting "Syntax error in program SAPLHRXSS_PER_MAC                       ., error key: RFC_ERROR_SYSTEM_FAILURE  " error Message on the portal (ESS--->Personal Information Screen).
    When I did RFC trace analysis (using ST 22) this is what i get.
    Can you let me know what could be the issue.
    We are running HR Backend(Support Pack 15,ecc 5.0).
    Portal (EP 6.0 SP19, ESS 100 (SP 10)).
    Could you please let me know what could be the issue ?
    Syntax error in program "SAPLHRXSS_PER_MAC ".
         What happened?
              Error in ABAP application program.
              The current ABAP program "SAPMSSY1" had to be terminated because one of the
              statements could not be executed.
              This is probably due to an error in the ABAP program.
              In program "SAPLHRXSS_PER_MAC ", the following syntax error occurred
              in the Include "IF_HRPA_PERNR_INFTY_XSS=======IU " in line 114:
              "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown."
              Author and last person to change the Include are:
              Author "SAP "
              Last changed by "C5069405 "
         What can you do?
              Please eliminate the error by performing a syntax check
              (or an extended program check) on the program "SAPLHRXSS_PER_MAC ".
              You can also perform the syntax check from the ABAP/4 Editor.
              If the problem persists, proceed as follows:
              Print out the error message (using the "Print" function)
              and make a note of the actions and input that caused the
              error.
              To resolve the problem, contact your SAP system administrator.
              You can use transaction ST22 (ABAP Dump Analysis) to view and administer
               termination messages, especially those beyond their normal deletion
              date.
              is especially useful if you want to keep a particular message.
         Error analysis
              In program "SAPLHRXSS_PER_MAC ", the following syntax error occurred:
              "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown."
         How to correct the error
              Probably the only way to eliminate the error is to correct the program.
              If you cannot solve the problem yourself and you wish to send
              an error message to SAP, include the following documents:
              1. A printout of the problem description (short dump)
                 To obtain this, select in the current display "System->List->
                 Save->Local File (unconverted)".
              2. A suitable printout of the system log
                 To obtain this, call the system log through transaction SM21.
                 Limit the time interval to 10 minutes before and 5 minutes
                 after the short dump. In the display, then select the function
                 "System->List->Save->Local File (unconverted)".
              3. If the programs are your own programs or modified SAP programs,
                 supply the source code.
                 To do this, select the Editor function "Further Utilities->
                 Upload/Download->Download".
              4. Details regarding the conditions under which the error occurred
                 or which actions and input led to the error.
         System environment
              SAP Release.............. "640"
              Application server....... "srv006"
              Network address.......... "167.116.230.56"
              Operating system......... "HP-UX"
              Release.................. "B.11.11"
              Hardware type............ "9000/800"
              Character length......... 8 Bits
              Pointer length........... 64 Bits
              Work process number...... 1
              Short dump setting....... "full"
              Database server.......... "srv006"
              Database type............ "ORACLE"
              Database name............ "H81"
              Database owner........... "SAPR3"
              Character set............ "en_US.iso88591"
              SAP kernel............... "640"
              Created on............... "May 21 2006 20:29:01"
              Created in............... "HP-UX B.11.00 A 9000/800"
              Database version......... "OCI_920 "
              Patch level.............. "129"
              Patch text............... " "
              Supported environment....
              Database................. "ORACLE 9.2.0.., ORACLE 10.1.0.., ORACLE
               10.2.0.."
              SAP database version..... "640"
              Operating system......... "HP-UX B.11"
              Memory usage.............
              Roll..................... 16128
              EM....................... 4189928
              Heap..................... 0
              Page..................... 0
              MM Used.................. 629192
              MM Free.................. 3558216
              SAP Release.............. "640"
         User and Transaction
         Information on where terminated
              The termination occurred in the ABAP program "SAPMSSY1" in
               "REMOTE_FUNCTION_CALL".
              The main program was "SAPMSSY1 ".
              The termination occurred in line 68 of the source code of the (Include)
               program "SAPMSSY1"
              of the source code of program "SAPMSSY1" (when calling the editor 680).
         Source Code Extract
         Line     SourceCde
            38     
            39     module %_rfcdia_call output.
            40         "Do not display screen !
            41         call 'DY_INVISIBLE_SCREEN'.
            42         perform remote_function_diacall.
            43     endmodule.
            44     
            45     module %_cpic_start.
            46       if sy-xprog(4) = '%RFC'.
            47         perform remote_function_call using rfctype_external_cpic.
            48       else.
            49         call 'APPC_HD' id 'HEADER' field header id 'CONVID' field convid.
            50         perform cpic_call using convid.
            51       endif.
            52     endmodule.
            53     
            54     
            55     form cpic_call using convid type c.
            56       communication send id convid buffer header.
            57       if sy-subrc eq 0.
            58         perform (sy-xform) in program (sy-xprog).
            59       else.
            60         message a800.
            61       endif.
            62     endform.
            63     
            64     form remote_function_call using value(type).
            65       do.
            66     *   test if sy-xprog and sy-xform are set
            67     *   sy-xform = 'quatsch'. sy-xprog = 'quatsch'.
         >>>>>         call 'RfcImport' id 'Type' field type.
            69         perform (sy-xform) in program (sy-xprog).
            70         rsyn >scont sysc 00011111 0.
            71       enddo.
            72     endform.
            73     
            74     form remote_function_diastart.
            75       do.
            76         call 'RfcImport' id 'Type' field rfctype_rfcdia.
            77         perform (sy-xform) in program (sy-xprog).
            78         "Parking position for next request
            79         rsyn >scont sysc 00011111 10.
            80         "ALternativ : Free mode
            81         "COMMIT WORK.
            82         "SYSTEM-CALL FREE MODE 0.
            83       enddo.
            84     endform.
            85     
            86     form remote_function_diacall.
            87         sy-xcode = '%_@no@'.
         Contents of system fields
         Name     Val.
         SY-SUBRC     0
         SY-INDEX     2
         SY-TABIX     0
         SY-DBCNT     0
         SY-FDPOS     0
         SY-LSIND     0
         SY-PAGNO     0
         SY-LINNO     1
         SY-COLNO     1
         SY-PFKEY     
         SY-UCOMM     
         SY-TITLE     CPIC and RFC Control
         SY-MSGTY     
         SY-MSGID     
         SY-MSGNO     000
         SY-MSGV1     
         SY-MSGV2     
         SY-MSGV3     
         SY-MSGV4     
         Active Calls/Events
         No.   Ty.          Program                             Include                             Line
               Name
             2 FORM         SAPMSSY1                            SAPMSSY1                               68
               REMOTE_FUNCTION_CALL
             1 MODULE (PBO) SAPMSSY1                            SAPMSSY1                               30
               %_RFC_START
         Chosen variables
         Name
             Val.
         No.          2     Ty.      FORM
         Name      REMOTE_FUNCTION_CALL
         %_DUMMY$$
                 2222
                 0000
         SY-REPID
              SAPMSSY1
                 5454555322222222222222222222222222222222
                 310D339100000000000000000000000000000000
         SYST-REPID
              SAPMSSY1
                 5454555322222222222222222222222222222222
                 310D339100000000000000000000000000000000
         %_ARCHIVE
                 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222
                 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
         TYPE
              3
                 0000
                 0003
         SY-XPROG
              SAPLSYST
                 5454555522222222222222222222222222222222
                 310C393400000000000000000000000000000000
         SY-XFORM
              HRXSS_PER_CLEANUP
                 455555545544444552222222222222
                 82833F052F3C51E500000000000000
         %_SPACE
                 2
                 0
         No.          1     Ty.      MODULE (PBO)
         Name      %_RFC_START
         %_PRINT
                  000                                                                                0 ##
                 2222333222222222222222222222222222222222222222222222222222222222222222222222222222222222223200
                 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
         RFCTYPE_INTERNAL
              3
                 0000
                 0003
         Internal notes
              The termination occurred in the function "ab_genprog" of the SAP
              Basis System, specifically in line 1374 of the module
               "//bas/640_REL/src/krn/runt/abgen.c#10".
              The internal operation just processed is "CALY".
              The internal session was started at 20070502223335.
              Program name.........: "SAPLHRXSS_PER_MAC ".
              Error message........: "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown.".
         Active Calls in SAP Kernel
         Lines of C Stack in Kernel (Structure Differs on Each Platform)
         ( 0)  0x40000000016d6a8c   CTrcStack2 + 0x2bc  [dw.sapH81_DVEBMGS33]
         ( 1)  0x40000000016d67c0   CTrcStack + 0x18  [dw.sapH81_DVEBMGS33]
         ( 2)  0x4000000001d41438   rabax_CStackSave__Fv + 0x100  [dw.sapH81_DVEBMGS33]
         ( 3)  0x4000000001d4dbf8   ab_rabax + 0x1f68  [dw.sapH81_DVEBMGS33]
         ( 4)  0x40000000018cc09c   ab_genprog__FPcPvUii + 0xdbc  [dw.sapH81_DVEBMGS33]
         ( 5)  0x4000000000d3b4cc   newload__FPcP13TmpSubpoolDirUi + 0x29c  [dw.sapH81_DVEBMGS33]
         ( 6)  0x40000000016a7324   ab_LoadProg__FPcUi + 0xec  [dw.sapH81_DVEBMGS33]
         ( 7)  0x40000000016831fc   ab_link + 0x334  [dw.sapH81_DVEBMGS33]
         ( 8)  0x40000000015694d4   ab_rfcimport + 0xccc  [dw.sapH81_DVEBMGS33]
         ( 9)  0x40000000018cff98   ab_jcaly__Fv + 0x598  [dw.sapH81_DVEBMGS33]
         (10)  0x4000000000f98df8   ab_extri__Fv + 0x17a0  [dw.sapH81_DVEBMGS33]
         (11)  0x40000000016ab2d8   ab_xevent__FPCc + 0x38  [dw.sapH81_DVEBMGS33]
         (12)  0x400000000189c9a8   ab_dstep + 0x120  [dw.sapH81_DVEBMGS33]
         (13)  0x4000000000ed4c00   dynpmcal + 0xd0  [dw.sapH81_DVEBMGS33]
         (14)  0x4000000000ed1554   dynppbo0 + 0x1e4  [dw.sapH81_DVEBMGS33]
         (15)  0x4000000000ed0af4   dynprctl + 0x43c  [dw.sapH81_DVEBMGS33]
         (16)  0x4000000000ecb7a0   dynpen00 + 0x2118  [dw.sapH81_DVEBMGS33]
         (17)  0x4000000000fa598c   Thdynpen00 + 0x6a4  [dw.sapH81_DVEBMGS33]
         (18)  0x4000000000fa49b8   TskhLoop + 0x50d8  [dw.sapH81_DVEBMGS33]
         (19)  0x4000000000f999f8   tskhstart + 0x1e0  [dw.sapH81_DVEBMGS33]
         (20)  0x4000000000d42194   DpMain + 0x484  [dw.sapH81_DVEBMGS33]
         (21)  0x400000000220d41c   nlsui_main + 0x14  [dw.sapH81_DVEBMGS33]
         (22)  0x4000000000992794   main + 0x14  [dw.sapH81_DVEBMGS33]
         (23)  0xc000000000020ab0   $START$ + 0xa0  [/usr/lib/pa20_64/dld.sl]
         List of ABAP programs affected
         Index     Ty.     Program     Group     Date     Time     Size     Lang.
              0     Prg     SAPMSSY1          0     06.11.2003     20:53:07         18432     E
              1     Prg     SAPLSYST          1     10.05.2006     09:57:38         30720     E
              2     Typ     SYST          0     04.12.2000     14:54:51         27648     
         Directory of Application Tables
         Name                                     Date       Time       Lngth
             Val.
         Program      SAPMSSY1
         SYST            .  .            :  :          00002404
         ABAP Control Blocks (CONT)
         Index     Name     Fl     PAR0     PAR1     PAR2     PAR3     PAR4     PAR5     PAR6     SourceCde
           118     CLEA     00     0035                                   SAPMSSY1
           119     CLEA     00     0036                                   SAPMSSY1
           120     CLEA     00     0037                                   SAPMSSY1
           121     MESS     00     001C                                   SAPMSSY1
           122     ENDF     00     0000                                   SAPMSSY1
           123     -
         00     0000                                   SAPMSSY1
           124     PERP     00     0001                                   SAPMSSY1
           125     PERP     02     0000                                   SAPMSSY1
           126     WHIL     00     0002     0000     0000     0000     0000     0000     0000     SAPMSSY1
           130     WHIL     00     0003     0000     0000     0000     0000     0000     0000     SAPMSSY1
           134     BRAN     05     000E                                   SAPMSSY1
           135     CALY     00     0003     0038     002A     0005     002B     0000     0000     SAPMSSY1
         >>>>>     CALY     02     0000     0039     8000     0000     0000     0000     0000     SAPMSSY1
           143     xper     02     0000     0010     0011                         SAPMSSY1
           145     PERP     80     0000                                   SAPMSSY1
           146     SYSC     1F     0000                                   SAPMSSY1
           147     BRAX     00     FFEF                                   SAPMSSY1
           148     WHIL     00     0004     0000     0000     0000     0000     0000     0000     SAPMSSY1
           152     ENDF     00     0000                                   SAPMSSY1
           153     -
         00     0000                                   SAPMSSY1

    Hi,
    The error is occuring in the program file SAPLHRXSS_PER_MAC.
    In program "SAPLHRXSS_PER_MAC ", the following syntax error occurred 
    in the Include "IF_HRPA_PERNR_INFTY_XSS=======IU " in line 114:      
    "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown."    
    Information on where terminated                                              
        The termination occurred in the ABAP program "SAPMSSY1" in               
         "REMOTE_FUNCTION_CALL".                                                 
        The main program was "SAPMSSY1 ".
    This place  where it has terminated is highlighted in bold letters.                                       
    form remote_function_call using value(type).   
      do.                                          
      test if sy-xprog and sy-xform are set      
      sy-xform = 'quatsch'. sy-xprog = 'quatsch'.
    <b>    call 'RfcImport' id 'Type' field type.     </b>
        perform (sy-xform) in program (sy-xprog).  
        rsyn >scont sysc 00011111 0.               
      enddo.                                       
    endform.                                       
    Thanks,
    Manoj

  • My employer is issuing an iPad 4 to me, but has informed me that I "...can expect no privacey" of any personal information that may be put on the iPad. This is not acceptable to me. How can I use iTunes to keep my personal information off the iPad?

    My employer is issuing an iPad 4 to me, but has informed me that "...I can expect no privacy" with regard to any information on it. What has me concerned is that my employer has also requested that I use my Persoanl iTunes account to syc and update the iPad.  I am concerend with my personal privacey, as I have two other iPads that use this account regualary.
    My question is: How can I use iTunes to update etc. the company iPad using iTunes without compromising my personal information?
    What I have done is to set up a different sign in (is that called an Apple ID?) within iTunes (I now have two different names I can use to sign in to iTunes). They both still use the same iTunes and my personal apps and information appear to be available to my second sign in name (the second sign in name is what I intend to use for the company iPad). When I sync the company iPad how do/can I keep my persoanl information from being syc'd automatically to the comapany iPad?

    Hi herbie13!
    It sounds like you will still want to link your iPad and computer, but you want to prevent the iPad from syncing information from your computer to your iPad. I have an article here for you that can help tell you how to set this up:
    iOS: Syncing with iTunes
    http://support.apple.com/kb/ht1386
    You will want to follow the steps here to set up the iPad for syncing, but when it comes time to sync, you'll just want to make sure that the boxes for syncing the multitude of items that you can sync remain unchecked so that none of that information gets synced into the iPad.
    Another note: your second Apple ID will not be able to access the apps, music, movies, tv shows, etc., that you have purchased under your primary Apple ID. Even though it seems that the secondary Apple ID still has access to those items, that is just because you are viewing your second Apple ID through the iTunes Store section on your computer and you have those items saved locally on your computer. You will need to repurchase and download all of the content that you wish to use again on your second Apple ID, if that is what you wish to solely use on this iPad.
    Take care, and thanks for visiting the Apple Support Communities.
    -Braden

  • I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.How can I erase all data on the phone so the thief can't access my personal information.

    I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.I have a password on the phone but i'm not sure if I turned on the option where the phone resets if you incorrectly put the password more than ten time. I immediately called my phone company (Verizon) and reported the phone stolen.So I know whoever took the phone cannot place calls or use the phone. But can they still access my data on the phone if they manage to unlock the phone?  If so how can I erase all data on the phone so the thief can't access my personal information? is there any other way other than Find my IPhone to wipe off the data on the phone? I really don't want my personal information such as pictures, text messages, notes and social networks profile available to a stranger!!? Help please!!!

        Hello thewrongway,
    I'm sorry to hear about your phone!  I understand the need for an active device. You are able to activate an old device and process an insurance claim for your iPhone 4s within 60days from the incident date.  Keep in mind if the old phone is not a smartphone and you currently have unlimited data that feature will fall off.  If you have a tier data plan no changes will be made.  Please let me know if you have any additional questions.  Thank you.   
    TominqueBo
    VZW Support
    Follow us on Twitter at @VZWSupport

  • My email was deleted and I have long since forgotten the password - plus I must have typed personal information in incorrectly... I can't reset my password (email goes to deceased email account) and I have $$$$ left! What do I do?

    My email was deleted and I have long since forgotten the password - plus I must have typed personal information in incorrectly... I can't reset my password (email goes to deceased email account) and I have $$$$ left! What do I do to get access to the remaining dollars?

    You do realize that there are many, many email providers and without knowing which one you are talking about, there is no way to answer your question?
    Which then leads to this ..... Have you contacted your email provider about this? That's probably the best place to start. See what they recommend.

  • How can I share this link Tell Congress to stop bulk collection of our personal information. there is no easy way to do this other then copy the entire link

    I want to share the link and post the:
    Tell Congress:
    It’s Time to Stop Mass Surveillance
    Mass surveillance threatens people’s privacy and security online.
    Tell Congress to stop bulk collection of our personal information.
    there is no easy way to post this or forward without sending the entire page link and nobody will touch those if something like a preview doesn't show up, just looks like a bunch of unsafe links to most people, you need to have a share button on this if you really want us to share it

    Heres the link to "Take action" http://mzl.la/1CgTnKg. In the future if you want to copy links, right click the address bar, and the whole link should be selected, then click "Copy" in the menu that comes up.
    Have a great day!!
    Jon

  • I'm looking for an app that will allow me to upload my contracts and forms to my iPad, fill in a customer's personal information, sign them, save them and email them.

    I'm looking for an app that will allow me to upload my contracts and forms to my iPad, fill in a customer's personal information, sign them, save them and email them.  I looked at easySign, Filemaker, FM Touch, Sign Docs, Zosh, Exzact, Mi-Co

    FormConnect (http://itunes.apple.com/us/app/formconnect/id432653695?mt=8&ls=1) can handle the filling out, signing, saving and emailing the contracts/forms but uploading the contract and the form is going to be a challenge because you’re dealing with paper documents that have to be scanned.  If you can convert the scanned documents into an OCR program, you might be able to copy and paste the contract without having to retype it but the form itself is probably going to have to be recreated.  Alternatively, you could use a document annotation program such as iAnnotate and mark up the contract with ink.

  • False Advertising: Selling Used Tablet as New and Personal Information to the Public

    So last week I purchased an LG G Pad 7.0 for my wife. It was on sale for $126.99. I purchased this tablet as I bought one for myself months back and have been very happy with it. This past Monday it was delivered. My wife called me at work and told me it arrived. I told her that she should open it up and plug it in as most manufacturers say you should give it a full charge before use. I told her that I would get her started on it when I came home.
    Later that evening, I came home and checked to make sure it had a full charge. It did. I then powered up the tablet only to find a message on the lock screen saying, "Contact 865-XXX-XXXX if you find this". Immediately I was puzzled. When I first bought my tablet, it took me through a basic set up of the tablet. Not to a lock screen. I then opened the tablet up to the home screen. Numerous user downloaded apps were installed on the tablet. Ebay, Amazon, Yahoo mail, Home Depot, Holy Bible, etc. After paging through the tablet for a few minutes it was clear that this tablet belonged to someone prior to me purchasing it.
    I'm assuming that "Jeffrey XXXXXX" purchased this tablet and returned it for whatever reason. Needless to say, if I were ever to return a tablet that had personal information on it, I would make sure I did a factory reset on it and make sure all my personal data was removed before returning it. Not to mention if I was the business that planned on reselling this tablet, I would make sure all devices were "clean" of any personal information prior to reselling it to avoid liability issues. This tablet not only has personal information on it but also has this man's private business information on it. The "Quick Start Guide" also has sensitive info written on the back of it.
    Now I purchased this item as "NEW". Not used, not refurbished, not from a "Marketplace" seller. From BestBuy.com themselves. Not at any given point did it state that it was used. In fact, after I realized it was used, I went back to BestBuy.com to see if any changes were made. NONE. I took screenshots of the page. Now it did have options to buy it as "Open-Box" for $117.99 but I never selected it. I then checked my paper invoice and my order details online. Not anywhere was it listed as some type of used product.
    This is now the second time in about a month that I have had issues with BestBuy.com. See below link:
    http://forums.bestbuy.com/t5/Delivery-Installation/Won-t-Deliver-Front-Loading-Washing-Machine-But-I...
    I have spent about $2000 in the past few months at Best Buy. And apperently they want me to take my money elsewhere. I expect to get the new tablet that I purchased and would appreciate a response as soon as possible.

    Dear User123727,
    I find a lot of joy in opening a new product; breaking the seals on the box, taking the protective plastic off the screen and seeing the first setup screen. If I had been in your situation, I am sure I would have shared your distaste in discovering the tablet was previously used. I am sorry for any inconvenience and doubt your recent experiences have caused you.
    Using your email address you provided here on the forums, I was able to pull up the order in question. It appears this item shipped from one of our stores. There is a chance all the steps were not followed if this item was previously returned to that store location and was later shipped to you. When a customer returns any product, a thorough inspection should be done by the Best Buy associate that is performing the return transaction. They should be checking for things like accessories, physical condition and functionality, to name a few. However, if the packaging appeared to be sealed and unopened, an employee would not typically open the product as it would then have to be sold as such. Even if you had purchased an open item version of this particular tablet, it still should have been tested, reset by to the default factory settings, and wiped of any existing data before being resold.
    In an effort to look into this situation for you more, I have sent you a private message to acquire some more information from you.
    Sincerely,
    JD|Social Media Specialist | Best Buy® Corporate
     Private Message

  • I had my personal information given to the public thanks to a verizon employee

    I went to the verizon store in Arcade, NY on Tuesday August 27 to get a used cell phone. An employee by the name of >>removed<< assisted me. They had a used I phone that I had agreed to get. He transferred all of my contacts and pictures, etc. into the I phone and plugged it into a charger to charge it up before he could activate it for me. The phone was not charging and then he informed me that a piece on the phone was broken and that is why it wasn't charging. He told me that he couldn't let me get that phone because he knew it was broken and I would return with it in a few days because it wouldn't charge. I thanked him for his honesty and left the store with my original phone.
    On September 9 my son gets a call from one of his friends (all of whom are in my contacts) stating that a man called him inquiring about an Iphone that he purchased on craigslist for $150.00. I call the man and he tells me that he purchased the Iphone on craigslist from a man named >>removed<<. He just so happens to work at the verizon store in Arcade, Ny. He tells me that the phone is broken..but we already knew that. also he wasnt able to activate the phone because it was reported lost or stolen. He tells me that he was able to get in touch with us because ALL of my information is still on the phone. ALL of my contacts! ALL of my pictures...EVERYTHING!!!!! I had pictures of my grandson on that phone and for all I know the person or people that have seen this could be pedifiles! I am absolutely aphauled that a verizon employee would do something so serious. I thought personal safety was supposed to be a high priority. I have no clue how many people have had access to my information thanks to him.
    I returned to the verizon store on September 18 and spoke with an employee by the name of >>removed<<. I explained the situation to him. He informed me that he would speak to his manager when he came in later that day and would have the manager contact me that day. I am STILL waiting for a call from the manager.
    On Thursday Sept 19 I contacted Verizon customer support on my phone. I spoke with a representative by the name of >>removed<<. I told her everything and she told me to go to verizon wireless.com and under the contact us link, file a complaint. Well I did exactly as she instructed and there is nowhere to file a complaint. I don't know what to do now. This is a complete outrage! How can a verizon store and employee be allowed to sell a phone that they knew to be broken ,and above, that lost or stolen. And worst of all, how can they just hand over all of my personal information to who only knows who?
    There has to be something that can be done...I just don't know what. I keep getting a run around from everyone. They stole my information!!! Please help!!
    >>Edited to comply with the Verizon Wireless Terms of Service <<
    Message was edited by: Verizon Moderator

    Also file a complaint with the Federal Trade Commission
    >>Post edited to remove discussion of moderation.  Please send a Direct Message to moderator or admin_moderator if you have concerns about moderation.<<
    Message was edited by: Verizon Moderator

Maybe you are looking for

  • I want to create pdf automatically in my program - my program specifies name

    In my application - ex: print invoices. I want to open the adobe pdf printer name the document Inv: 123456.pdf and put in the folder C:\Invoices. So, my program will create all the invoices for today and they will be in the folder C:\Invoices. I want

  • What's the model number for my HP tablet

    HP provides a type of model name near the screen of your tablet, but this name or number might not be sufficient to get proper support for your tablet. These names or numbers might represent a series of tablets that look similar but have different op

  • BO Explorer

    Hi All, Could anyone tell me which server is used for 'BO Explorer' & where we can check? Regards,

  • Capture Now does not complete capture

    I completed a project with 7 DVDs. I found one, the first one, that had an error. It has been about 5 months since I completed this first DVD. Since I needed more disk space I could not keep all of the information for the seven disks so I started del

  • Application of "Contacts" in iPad2 32+3G (firmware 4.3.4)

    Good day! Application of "Contacts" in iPad2 32+3G (firmware 4.3.4) Today, when editing contacts application closed and reopened all the contacts from it are gone. Two questions: 1.How to restore contacts (address books are not synchronized, making r