Deleting infected RRUbackups

On my X40 with R&R version 2.0 (2.02.078) Bitdefender is reporting hidden rootkits in my RRUbackups folder.  
I recently took this machine, along with our two desktops, to my tech support guy who is very experienced and who managed to remove rootkits and other nasties from all the machines using Malwarebytes Anti-Malware and other tools which I have continued to run on the desktops.  These tools found a few more over the course of a few days, but now seem to be clean.  
The X40 was the last one they worked on and when I ran a deepscan with BitDefender AV 2008 (which is running on all the machines), it reported hidden rootkits in the  RRUbackups folder.  When I contacted BitDefender support, they suggested I disable real-time protection and then delete the folder. When I tried that, the following error message appears:
Cannot delete RRUbackups: Access is denied.
Make sure the disk is not full or write-protected and that the file is not currently in use.
I read elsewhere that to delete existing backups I have to run a new one, which I tried.  Once it starts, XP reports an error and says it has to close R&R.  As I recall R&R does in fact run and simply continues to eat up precious space on the disk.   
When I hover over the RRUbackups folder with the mouse, I'm told the folder is empty.  If I double-click it,  I'm told "Access denied."  
Any help in advising me how to delete this folder would be greatly appreciated.

On my X40 with R&R version 2.0 (2.02.078) Bitdefender is reporting hidden rootkits in my RRUbackups folder.  
I recently took this machine, along with our two desktops, to my tech support guy who is very experienced and who managed to remove rootkits and other nasties from all the machines using Malwarebytes Anti-Malware and other tools which I have continued to run on the desktops.  These tools found a few more over the course of a few days, but now seem to be clean.  
The X40 was the last one they worked on and when I ran a deepscan with BitDefender AV 2008 (which is running on all the machines), it reported hidden rootkits in the  RRUbackups folder.  When I contacted BitDefender support, they suggested I disable real-time protection and then delete the folder. When I tried that, the following error message appears:
Cannot delete RRUbackups: Access is denied.
Make sure the disk is not full or write-protected and that the file is not currently in use.
I read elsewhere that to delete existing backups I have to run a new one, which I tried.  Once it starts, XP reports an error and says it has to close R&R.  As I recall R&R does in fact run and simply continues to eat up precious space on the disk.   
When I hover over the RRUbackups folder with the mouse, I'm told the folder is empty.  If I double-click it,  I'm told "Access denied."  
Any help in advising me how to delete this folder would be greatly appreciated.

Similar Messages

  • MacbookPro Mid 2012 13" weird crash window (sometimes during gameplay)

    Hey guys...
    strange error occurs even don't really know how to describe, I'll try but the video will describe it better, of course.
    Configuration:
    Macbook Pro 13" Mid 2012
    8gb RAM (originally 4gb, self upgrade to 8gb (Corsair Vengeance SoDimm CL9 PC3-12800 8GB 1600MHz DD3-RAM Kit))
    Intel HD 4000
    Mountain Lion
    Error:
    Reproducible: Yes! (Many times), by playing a game (simple games like Virtual City Playground, or some real games like Starcraft II)
    Description:
    Playing a game or sometimes without running any real heavy applications/ games my MBP totally freaks out. Flickering on the screen and a weird repeating warn-signal or whatever appears so that I can't do anything than turning it completely off by using the Power-Button. After a restart Macbook Spotlight indicates again and it seems like the TimeMachine Update needs a lot more time to run, to analyse where it stopped or whatever. Please take a look on the Vid, to see the error. Applications and everything seem to be up-to-date. For me it seems like a graphic-card issue, but can't remember having this problem using Lion (but had Lion just a week or two, so not a lot of experience with it).
    http://youtu.be/MQX4UZaPYXQ
    Console since StarCraftII start to simulate the error:
    11.09.12 22:07:03,861 StarCraft II[2606]: Current process is NOT running as Admin: -60007
    11.09.12 22:07:04,000 kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=2615[Blizzard Launche] clearing CS_VALID
    11.09.12 22:07:22,082 Dock[279]: no information back from LS about running process
    11.09.12 22:07:22,342 Agent[2608]: objc[2608]: Object 0x20c75b0 of class __NSCFData autoreleased with no pool in place - just leaking - break on objc_autoreleaseNoPool() to debug
    11.09.12 22:07:24,526 WindowServer[91]: Display 0x42730c0 captured by conn 0x1339b
    11.09.12 22:07:44,544 coreservicesd[63]: SendFlattenedData, got error #268435459 (ipc/send) invalid destination port from ::mach_msg(), sending notification kLSNotifyApplicationDeath to notificationID=6594
    11.09.12 22:14:45,000 bootlog[0]: BOOT_TIME 1347423285 0
    11.09.12 22:15:03,000 kernel[0]: PMAP: PCID enabled
    11.09.12 22:15:03,000 kernel[0]: PMAP: Supervisor Mode Execute Protection enabled
    11.09.12 22:15:03,000 kernel[0]: Darwin Kernel Version 12.1.0: Tue Aug 14 13:29:55 PDT 2012; root:xnu-2050.9.2~1/RELEASE_X86_64
    11.09.12 22:15:03,000 kernel[0]: vm_page_bootstrap: 1993035 free pages and 87733 wired pages
    11.09.12 22:15:03,000 kernel[0]: kext submap [0xffffff7f8073e000 - 0xffffff8000000000], kernel text [0xffffff8000200000 - 0xffffff800073e000]
    11.09.12 22:15:03,000 kernel[0]: zone leak detection enabled
    11.09.12 22:15:03,000 kernel[0]: standard timeslicing quantum is 10000 us
    11.09.12 22:15:03,000 kernel[0]: standard background quantum is 2500 us
    11.09.12 22:15:03,000 kernel[0]: mig_table_max_displ = 74
    11.09.12 22:15:03,000 kernel[0]: TSC Deadline Timer supported and enabled
    11.09.12 22:15:03,000 kernel[0]: corecrypto kext started!
    11.09.12 22:15:03,000 kernel[0]: Running kernel space in FIPS MODE
    11.09.12 22:15:03,000 kernel[0]: Plist hmac value is    735d392b68241ef173d81097b1c8ce9ba283521626d1c973ac376838c466757d
    11.09.12 22:15:03,000 kernel[0]: Computed hmac value is 735d392b68241ef173d81097b1c8ce9ba283521626d1c973ac376838c466757d
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS integrity POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS AES CBC POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS TDES CBC POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS AES ECB AESNI POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS AES XTS AESNI POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS SHA POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS HMAC POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS ECDSA POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS DRBG POST test passed!
    11.09.12 22:15:03,000 kernel[0]: corecrypto.kext FIPS POST passed!
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=3 LocalApicId=1 Enabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=4 LocalApicId=3 Enabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=5 LocalApicId=255 Disabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=6 LocalApicId=255 Disabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=7 LocalApicId=255 Disabled
    11.09.12 22:15:03,000 kernel[0]: AppleACPICPU: ProcessorId=8 LocalApicId=255 Disabled
    11.09.12 22:15:03,000 kernel[0]: calling mpo_policy_init for TMSafetyNet
    11.09.12 22:15:03,000 kernel[0]: Security policy loaded: Safety net for Time Machine (TMSafetyNet)
    11.09.12 22:15:03,000 kernel[0]: calling mpo_policy_init for Sandbox
    11.09.12 22:15:03,000 kernel[0]: Security policy loaded: Seatbelt sandbox policy (Sandbox)
    11.09.12 22:15:03,000 kernel[0]: calling mpo_policy_init for Quarantine
    11.09.12 22:15:03,000 kernel[0]: Security policy loaded: Quarantine policy (Quarantine)
    11.09.12 22:15:03,000 kernel[0]: Copyright (c) 1982, 1986, 1989, 1991, 1993
    11.09.12 22:15:03,000 kernel[0]: The Regents of the University of California. All rights reserved.
    11.09.12 22:15:03,000 kernel[0]: MAC Framework successfully initialized
    11.09.12 22:15:03,000 kernel[0]: using 16384 buffer headers and 10240 cluster IO buffer headers
    11.09.12 22:15:03,000 kernel[0]: IOAPIC: Version 0x20 Vectors 64:87
    11.09.12 22:15:03,000 kernel[0]: ACPI: System State [S0 S3 S4 S5] (S3)
    11.09.12 22:15:03,000 kernel[0]: AppleIntelCPUPowerManagement: Turbo Ratios 0046
    11.09.12 22:15:03,000 kernel[0]: AppleIntelCPUPowerManagement: (built 23:03:24 Jun 24 2012) initialization complete
    11.09.12 22:15:03,000 kernel[0]: PFM64 (36 cpu) 0xf10000000, 0xf0000000
    11.09.12 22:15:03,000 kernel[0]: [ PCI configuration begin ]
    11.09.12 22:15:03,000 kernel[0]: console relocated to 0xf10000000
    11.09.12 22:15:03,000 kernel[0]: PCI configuration changed (bridge=15 device=4 cardbus=0)
    11.09.12 22:15:03,000 kernel[0]: [ PCI configuration end, bridges 11 devices 15 ]
    11.09.12 22:15:03,000 kernel[0]: mbinit: done [96 MB total pool size, (64/32) split]
    11.09.12 22:15:03,000 kernel[0]: Pthread support ABORTS when sync kernel primitives misused
    11.09.12 22:15:03,000 kernel[0]: rooting via boot-uuid from /chosen: E18B8BC2-6344-3067-A4CE-FC695124E956
    11.09.12 22:15:03,000 kernel[0]: Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>
    11.09.12 22:15:03,000 kernel[0]: com.apple.AppleFSCompressionTypeZlib kmod start
    11.09.12 22:15:03,000 kernel[0]: com.apple.AppleFSCompressionTypeDataless kmod start
    11.09.12 22:15:03,000 kernel[0]: com.apple.AppleFSCompressionTypeZlib load succeeded
    11.09.12 22:15:03,000 kernel[0]: com.apple.AppleFSCompressionTypeDataless load succeeded
    11.09.12 22:15:03,000 kernel[0]: AppleIntelCPUPowerManagementClient: ready
    11.09.12 22:15:03,000 kernel[0]: BTCOEXIST off
    11.09.12 22:15:03,000 kernel[0]: BRCM tunables:
    11.09.12 22:15:03,000 kernel[0]: pullmode[1] txringsize[  256] reapmin[   32] reapcount[  128]
    11.09.12 22:15:03,000 kernel[0]: highWaterMark: VO[  192]  VI[  192]  BE[  192]  BK[  192]
    11.09.12 22:15:03,000 kernel[0]: Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/SATA@1F,2/AppleIntelPchS eriesAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOB lockStorageDriver/TOSHIBA MK5065GSXF Media/IOGUIDPartitionScheme/Customer@2
    11.09.12 22:15:03,000 kernel[0]: BSD root: disk0s2, major 1, minor 2
    11.09.12 22:15:03,000 kernel[0]: jnl: unknown-dev: replay_journal: from: 17126912 to: 19440640 (joffset 0xe8a000)
    11.09.12 22:15:03,000 kernel[0]: FireWire (OHCI) Lucent ID 5901 built-in now active, GUID 003ee1fffe10e820; max speed s800.
    11.09.12 22:15:03,000 kernel[0]: AppleUSBMultitouchDriver::checkStatus - received Status Packet, Payload 2: device was reinitialized
    11.09.12 22:15:03,000 kernel[0]: jnl: unknown-dev: journal replay done.
    11.09.12 22:15:03,000 kernel[0]: Kernel is LP64
    11.09.12 22:15:03,000 kernel[0]: hfs: Removed 34 orphaned / unlinked files and 907 directories
    11.09.12 22:14:48,919 com.apple.launchd[1]: *** launchd[1] has started up. ***
    11.09.12 22:14:48,919 com.apple.launchd[1]: *** Shutdown logging is enabled. ***
    11.09.12 22:15:01,075 com.apple.launchd[1]: (com.apple.automountd) Unknown key for boolean: NSSupportsSuddenTermination
    11.09.12 22:15:06,107 hidd[47]: Posting 'com.apple.iokit.hid.displayStatus' notifyState=1
    11.09.12 22:15:06,110 fseventsd[48]: event logs in /.fseventsd out of sync with volume.  destroying old logs. (2685 21 2757)
    11.09.12 22:15:06,111 fseventsd[48]: log dir: /.fseventsd getting new uuid: E41FE4C6-F5B9-4468-97D2-76653665DDEB
    11.09.12 22:15:11,000 kernel[0]: Waiting for DSMOS...
    11.09.12 22:15:11,000 kernel[0]: macx_swapon SUCCESS
    11.09.12 22:15:11,000 kernel[0]: BCM5701Enet: Ethernet address 40:6c:8f:41:93:a9
    11.09.12 22:15:11,000 kernel[0]: AirPort_Brcm4331: Ethernet address 7c:d1:c3:73:05:32
    11.09.12 22:15:11,000 kernel[0]: IO80211Controller::dataLinkLayerAttachComplete():  adding AppleEFINVRAM notification
    11.09.12 22:15:11,000 kernel[0]: IO80211Interface::efiNVRAMPublished(): 
    11.09.12 22:15:12,003 mDNSResponder[40]: mDNSResponder mDNSResponder-379.27.1 (Aug  1 2012 20:12:04) starting OSXVers 12
    11.09.12 22:15:12,117 appleeventsd[53]: main: Starting up
    11.09.12 22:15:12,130 hidd[47]: void __IOHIDLoadBundles(): Loaded 0 HID plugins
    11.09.12 22:15:12,155 airportd[69]: _processDLILEvent: en1 attached (down)
    11.09.12 22:15:12,222 com.apple.usbmuxd[26]: usbmuxd-268.5 on Apr  5 2012 at 15:33:48, running 64 bit
    11.09.12 22:15:12,228 coreservicesd[63]: FindBestLSSession(), no match for inSessionID 0xfffffffffffffffc auditTokenInfo( uid=0 euid=0 auSessionID=100000 create=false
    11.09.12 22:15:12,000 kernel[0]: createVirtIf(): ifRole = 1
    11.09.12 22:15:12,000 kernel[0]: in func createVirtualInterface ifRole = 1
    11.09.12 22:15:12,000 kernel[0]: AirPort_Brcm4331_P2PInterface::init name <p2p0> role 1 this 0xffffff8016a11800
    11.09.12 22:15:12,000 kernel[0]: AirPort_Brcm4331_P2PInterface::init() <p2p> role 1
    11.09.12 22:15:12,000 kernel[0]: Created virtif 0xffffff8016a11800 p2p0
    11.09.12 22:15:12,000 kernel[0]: IOBluetoothUSBDFU::probe
    11.09.12 22:15:12,000 kernel[0]: IOBluetoothUSBDFU::probe ProductID - 0x821D FirmwareVersion - 0x0086
    11.09.12 22:15:12,000 kernel[0]: [BroadcomBluetoothHCIControllerUSBTransport][start] -- completed
    11.09.12 22:15:12,000 kernel[0]: Previous Shutdown Cause: 3
    11.09.12 22:15:12,000 kernel[0]: [IOBluetoothHCIController][staticBluetoothHCIControllerTransportShowsUp] -- Received Bluetooth Controller register service notification
    11.09.12 22:15:12,000 kernel[0]: [IOBluetoothHCIController][start] -- completed
    11.09.12 22:15:12,000 kernel[0]: [IOBluetoothHCIController::setConfigState] calling registerService
    11.09.12 22:15:12,000 kernel[0]: DSMOS has arrived
    11.09.12 22:15:12,794 WindowServer[76]: Server is starting up
    11.09.12 22:15:13,035 WindowServer[76]: Session 256 retained (2 references)
    11.09.12 22:15:13,035 WindowServer[76]: Session 256 released (1 references)
    11.09.12 22:15:13,044 WindowServer[76]: Session 256 retained (2 references)
    11.09.12 22:15:13,045 WindowServer[76]: init_page_flip: page flip mode is on
    11.09.12 22:15:13,126 mds[39]: (Normal) FMW: FMW 0 0
    11.09.12 22:15:13,146 WindowServer[76]: mux_initialize: kAGCGetMuxState (kMuxControl, kMuxControl_switchingMode) failed (0xe0000001)
    11.09.12 22:15:13,146 WindowServer[76]: mux_initialize: Mode is safe
    11.09.12 22:15:13,163 WindowServer[76]: GLCompositor enabled for tile size [256 x 256]
    11.09.12 22:15:13,163 WindowServer[76]: CGXGLInitMipMap: mip map mode is on
    11.09.12 22:15:13,183 WindowServer[76]: WSMachineUsesNewStyleMirroring: false
    11.09.12 22:15:13,183 WindowServer[76]: Display 0x042730c0: GL mask 0x1; bounds (0, 0)[1280 x 800], 10 modes available
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model 9cc3, S/N 0, Unit 0, Rotation 0
    UUID 0x0000061000009cc300000000042730c0
    11.09.12 22:15:13,184 WindowServer[76]: Display 0x003f003f: GL mask 0x8; bounds (0, 0)[0 x 0], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 3, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003f
    11.09.12 22:15:13,184 WindowServer[76]: Display 0x003f003e: GL mask 0x4; bounds (0, 0)[0 x 0], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003e
    11.09.12 22:15:13,184 WindowServer[76]: Display 0x003f003d: GL mask 0x2; bounds (0, 0)[0 x 0], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003d
    11.09.12 22:15:13,193 WindowServer[76]: Created shield window 0x5 for display 0x042730c0
    11.09.12 22:15:13,193 WindowServer[76]: Created shield window 0x6 for display 0x003f003f
    11.09.12 22:15:13,193 WindowServer[76]: Created shield window 0x7 for display 0x003f003e
    11.09.12 22:15:13,193 WindowServer[76]: Created shield window 0x8 for display 0x003f003d
    11.09.12 22:15:13,200 WindowServer[76]: Display 0x042730c0: GL mask 0x1; bounds (0, 0)[1280 x 800], 10 modes available
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model 9cc3, S/N 0, Unit 0, Rotation 0
    UUID 0x0000061000009cc300000000042730c0
    11.09.12 22:15:13,200 WindowServer[76]: Display 0x003f003f: GL mask 0x8; bounds (2304, 0)[1 x 1], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 3, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003f
    11.09.12 22:15:13,200 WindowServer[76]: Display 0x003f003e: GL mask 0x4; bounds (2305, 0)[1 x 1], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003e
    11.09.12 22:15:13,200 WindowServer[76]: Display 0x003f003d: GL mask 0x2; bounds (2306, 0)[1 x 1], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003d
    11.09.12 22:15:13,201 WindowServer[76]: CGXPerformInitialDisplayConfiguration
    11.09.12 22:15:13,201 WindowServer[76]:   Display 0x042730c0: MappedDisplay Unit 0; Vendor 0x610 Model 0x9cc3 S/N 0 Dimensions 11.26 x 7.05; online enabled built-in, Bounds (0,0)[1280 x 800], Rotation 0, Resolution 1
    11.09.12 22:15:13,201 WindowServer[76]:   Display 0x003f003f: MappedDisplay Unit 3; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (2304,0)[1 x 1], Rotation 0, Resolution 1
    11.09.12 22:15:13,201 WindowServer[76]:   Display 0x003f003e: MappedDisplay Unit 2; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (2305,0)[1 x 1], Rotation 0, Resolution 1
    11.09.12 22:15:13,201 WindowServer[76]:   Display 0x003f003d: MappedDisplay Unit 1; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (2306,0)[1 x 1], Rotation 0, Resolution 1
    11.09.12 22:15:13,201 WindowServer[76]: CGXMuxBoot: Unexpected boot switch return value (0xe00002c7)
    11.09.12 22:15:13,253 launchctl[80]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:15:13,253 launchctl[80]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:15:13,287 WindowServer[76]: GLCompositor: GL renderer id 0x01024400, GL mask 0x0000000f, accelerator 0x00003e17, unit 0, caps QEX|QGL|MIPMAP, vram 580 MB
    11.09.12 22:15:13,287 WindowServer[76]: GLCompositor: GL renderer id 0x01024400, GL mask 0x0000000f, texture units 8, texture max 16384, viewport max {16384, 16384}, extensions FPRG|NPOT|GLSL|FLOAT
    11.09.12 22:15:13,297 WindowServer[76]: Unable to open IOHIDSystem (e00002bd)
    11.09.12 22:15:13,000 kernel[0]: virtual bool IOHIDEventSystemUserClient::initWithTask(task_t, void *, UInt32): Client task not privileged to open IOHIDSystem for mapping memory (e00002c1)
    11.09.12 22:15:14,188 mds[39]: (Warning) Server: No stores registered for metascope "kMDQueryScopeComputer"
    11.09.12 22:15:14,188 mds[39]: (Warning) Server: No stores registered for metascope "kMDQueryScopeComputer"
    11.09.12 22:15:14,236 mds[39]: (Warning) Server: No stores registered for metascope "kMDQueryScopeComputer"
    11.09.12 22:15:14,340 launchctl[85]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:15:14,340 launchctl[85]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:15:14,000 kernel[0]: nspace-handler-set-snapshot-time: 1347423316
    11.09.12 22:15:14,543 com.apple.SecurityServer[15]: Session 100000 created
    11.09.12 22:15:15,000 kernel[0]: AirPort: Link Down on en1. Reason 1 (Unspecified).
    11.09.12 22:15:15,000 kernel[0]: en1::IO80211Interface::postMessage bssid changed
    11.09.12 22:15:15,132 configd[18]: network changed.
    11.09.12 22:15:15,133 configd[18]: setting hostname to "MBP-Simon.local"
    11.09.12 22:15:15,194 WindowServer[76]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.
    11.09.12 22:15:16,291 WindowServer[76]: MPAccessSurfaceForDisplayDevice: Set up page flip mode on display 0x042730c0 device: 0x10f80e320  isBackBuffered: 1 numComp: 3 numDisp: 3
    11.09.12 22:15:27,002 com.apple.SecurityServer[15]: Entering service
    11.09.12 22:15:27,076 loginwindow[43]: Login Window Application Started
    11.09.12 22:15:27,113 apsd[59]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)
    11.09.12 22:15:27,128 apsd[59]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)
    11.09.12 22:15:27,132 WindowServer[90]: Server is starting up
    11.09.12 22:15:27,134 WindowServer[90]: Session 256 retained (2 references)
    11.09.12 22:15:27,134 WindowServer[90]: Session 256 released (1 references)
    11.09.12 22:15:27,142 WindowServer[90]: Session 256 retained (2 references)
    11.09.12 22:15:27,143 UserEventAgent[11]: Captive: [HandleNetworkInformationChanged:2435] nwi_state_copy returned NULL
    11.09.12 22:15:27,143 WindowServer[90]: init_page_flip: page flip mode is on
    11.09.12 22:15:27,148 awacsd[57]: Starting awacsd connectivity-77 (Jun 20 2012 15:40:49)
    11.09.12 22:15:27,165 awacsd[57]: InnerStore CopyAllZones: no info in Dynamic Store
    11.09.12 22:15:27,169 WindowServer[90]: mux_initialize: kAGCGetMuxState (kMuxControl, kMuxControl_switchingMode) failed (0xe0000001)
    11.09.12 22:15:27,169 WindowServer[90]: mux_initialize: Mode is safe
    11.09.12 22:15:27,186 WindowServer[90]: GLCompositor enabled for tile size [256 x 256]
    11.09.12 22:15:27,186 WindowServer[90]: CGXGLInitMipMap: mip map mode is on
    11.09.12 22:15:27,196 netbiosd[86]: Unable to start NetBIOS name service:
    11.09.12 22:15:27,199 WindowServer[90]: WSMachineUsesNewStyleMirroring: false
    11.09.12 22:15:27,199 WindowServer[90]: Display 0x042730c0: GL mask 0x1; bounds (0, 0)[1280 x 800], 10 modes available
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model 9cc3, S/N 0, Unit 0, Rotation 0
    UUID 0x0000061000009cc300000000042730c0
    11.09.12 22:15:27,199 WindowServer[90]: Display 0x003f003f: GL mask 0x8; bounds (0, 0)[0 x 0], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 3, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003f
    11.09.12 22:15:27,199 WindowServer[90]: Display 0x003f003e: GL mask 0x4; bounds (0, 0)[0 x 0], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003e
    11.09.12 22:15:27,200 WindowServer[90]: Display 0x003f003d: GL mask 0x2; bounds (0, 0)[0 x 0], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003d
    11.09.12 22:15:27,211 WindowServer[90]: Created shield window 0x4 for display 0x042730c0
    11.09.12 22:15:27,211 WindowServer[90]: Created shield window 0x5 for display 0x003f003f
    11.09.12 22:15:27,211 WindowServer[90]: Created shield window 0x6 for display 0x003f003e
    11.09.12 22:15:27,211 WindowServer[90]: Created shield window 0x7 for display 0x003f003d
    11.09.12 22:15:27,224 WindowServer[90]: Display 0x042730c0: GL mask 0x1; bounds (0, 0)[1280 x 800], 10 modes available
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model 9cc3, S/N 0, Unit 0, Rotation 0
    UUID 0x0000061000009cc300000000042730c0
    11.09.12 22:15:27,224 WindowServer[90]: Display 0x003f003f: GL mask 0x8; bounds (2304, 0)[1 x 1], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 3, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003f
    11.09.12 22:15:27,224 WindowServer[90]: Display 0x003f003e: GL mask 0x4; bounds (2305, 0)[1 x 1], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003e
    11.09.12 22:15:27,225 WindowServer[90]: Display 0x003f003d: GL mask 0x2; bounds (2306, 0)[1 x 1], 1 modes available
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0
    UUID 0xffffffffffffffffffffffff003f003d
    11.09.12 22:15:27,225 WindowServer[90]: CGXPerformInitialDisplayConfiguration
    11.09.12 22:15:27,225 WindowServer[90]:   Display 0x042730c0: MappedDisplay Unit 0; Vendor 0x610 Model 0x9cc3 S/N 0 Dimensions 11.26 x 7.05; online enabled built-in, Bounds (0,0)[1280 x 800], Rotation 0, Resolution 1
    11.09.12 22:15:27,225 WindowServer[90]:   Display 0x003f003f: MappedDisplay Unit 3; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (2304,0)[1 x 1], Rotation 0, Resolution 1
    11.09.12 22:15:27,225 WindowServer[90]:   Display 0x003f003e: MappedDisplay Unit 2; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (2305,0)[1 x 1], Rotation 0, Resolution 1
    11.09.12 22:15:27,225 WindowServer[90]:   Display 0x003f003d: MappedDisplay Unit 1; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (2306,0)[1 x 1], Rotation 0, Resolution 1
    11.09.12 22:15:27,225 WindowServer[90]: CGXMuxBoot: Unexpected boot switch return value (0xe00002c7)
    11.09.12 22:15:27,233 WindowServer[90]: GLCompositor: GL renderer id 0x01024400, GL mask 0x0000000f, accelerator 0x00003d17, unit 0, caps QEX|QGL|MIPMAP, vram 580 MB
    11.09.12 22:15:27,233 WindowServer[90]: GLCompositor: GL renderer id 0x01024400, GL mask 0x0000000f, texture units 8, texture max 16384, viewport max {16384, 16384}, extensions FPRG|NPOT|GLSL|FLOAT
    11.09.12 22:15:27,242 loginwindow[43]: **DMPROXY** Found `/System/Library/CoreServices/DMProxy'.
    11.09.12 22:15:27,301 digest-service[100]: label: default
    11.09.12 22:15:27,301 digest-service[100]:           dbname: od:/Local/Default
    11.09.12 22:15:27,301 digest-service[100]:           mkey_file: /var/db/krb5kdc/m-key
    11.09.12 22:15:27,301 digest-service[100]:           acl_file: /var/db/krb5kdc/kadmind.acl
    11.09.12 22:15:27,303 digest-service[100]: digest-request: uid=0
    11.09.12 22:15:27,320 aosnotifyd[102]: bootstrap_look_up failed (44e)
    11.09.12 22:15:27,323 rpcsvchost[111]: sandbox_init: com.apple.msrpc.netlogon.sb succeeded
    11.09.12 22:15:27,325 digest-service[100]: digest-request: init request
    11.09.12 22:15:27,329 digest-service[100]: digest-request: init return domain: BUILTIN server: MBP-SIMON
    11.09.12 22:15:29,213 WindowServer[90]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.
    11.09.12 22:15:30,241 WindowServer[90]: MPAccessSurfaceForDisplayDevice: Set up page flip mode on display 0x042730c0 device: 0x10c13b320  isBackBuffered: 1 numComp: 3 numDisp: 3
    11.09.12 22:15:32,202 systemkeychain[68]: done file: /var/run/systemkeychaincheck.done
    11.09.12 22:15:32,221 configd[18]: network changed: DNS*
    11.09.12 22:15:32,000 kernel[0]: MacAuthEvent en1   Auth result for: 20:76:00:07:c6:dc  MAC AUTH succeeded
    11.09.12 22:15:32,000 kernel[0]: wlEvent: en1 en1 Link UP virtIf = 0
    11.09.12 22:15:32,000 kernel[0]: AirPort: Link Up on en1
    11.09.12 22:15:32,000 kernel[0]: en1: BSSID changed to 20:76:00:07:c6:dc
    11.09.12 22:15:32,000 kernel[0]: en1::IO80211Interface::postMessage bssid changed
    11.09.12 22:15:32,000 kernel[0]: AirPort: RSN handshake complete on en1
    11.09.12 22:15:35,074 configd[18]: network changed: DNS*
    11.09.12 22:15:35,078 mDNSResponder[40]: D2D_IPC: Loaded
    11.09.12 22:15:35,078 mDNSResponder[40]: D2DInitialize succeeded
    11.09.12 22:15:35,082 awacsd[57]: Configuring lazy AWACS client: 1366256562.p04.members.btmm.icloud.com.
    11.09.12 22:15:39,210 mDNSResponder[40]: Adding registration domain 1366256562.members.btmm.icloud.com.
    11.09.12 22:15:44,287 awacsd[57]: KV HTTP 0
    11.09.12 22:15:46,630 DMProxy[87]: CGSShutdownServerConnections: Detaching application from window server
    11.09.12 22:15:46,630 DMProxy[87]: CGSDisplayServerShutdown: Detaching display subsystem from window server
    11.09.12 22:15:46,647 WindowServer[90]: Created shield window 0x8 for display 0x042730c0
    11.09.12 22:15:46,648 WindowServer[90]: Display 0x042730c0: MappedDisplay Unit 0; ColorProfile { 2, "Color LCD"}; TransferTable (256, 3)
    11.09.12 22:15:46,665 WindowServer[90]: Display 0x042730c0: MappedDisplay Unit 0; ColorProfile { 2, "Color LCD"}; TransferTable (256, 3)
    11.09.12 22:15:47,075 configd[18]: network changed: v4(en1+:192.168.1.74) DNS+ Proxy+ SMB
    11.09.12 22:15:47,100 UserEventAgent[11]: Captive: en1: Not probing 'TELUS7187' (protected network)
    11.09.12 22:15:47,104 configd[18]: network changed: v4(en1!:192.168.1.74) DNS Proxy SMB
    11.09.12 22:15:47,896 ntpd[95]: proto: precision = 1.000 usec
    11.09.12 22:15:47,911 WindowServer[90]: Display 0x042730c0: MappedDisplay Unit 0; ColorProfile { 2, "Color LCD"}; TransferTable (256, 3)
    11.09.12 22:15:47,912 WindowServer[90]: Display 0x042730c0: MappedDisplay Unit 0; ColorProfile { 2, "Color LCD"}; TransferTable (256, 3)
    11.09.12 22:15:47,918 launchctl[174]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:15:47,918 launchctl[174]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:15:47,947 launchctl[174]: com.apple.findmymacmessenger: Already loaded
    11.09.12 22:15:47,973 com.apple.SecurityServer[15]: Session 100005 created
    11.09.12 22:15:48,002 hidd[47]: CGSShutdownServerConnections: Detaching application from window server
    11.09.12 22:15:48,002 hidd[47]: CGSDisplayServerShutdown: Detaching display subsystem from window server
    11.09.12 22:15:48,012 WindowServer[90]: Display 0x042730c0: MappedDisplay Unit 0; ColorProfile { 2, "Color LCD"}; TransferTable (256, 3)
    11.09.12 22:15:48,028 loginwindow[43]: Login Window Started Security Agent
    11.09.12 22:15:48,076 locationd[44]: NOTICE,Location icon should now be in state 0
    11.09.12 22:15:48,077 locationd[44]: locationd was started after an unclean shutdown
    11.09.12 22:15:48,140 SecurityAgent[182]: This is the first run
    11.09.12 22:15:48,140 SecurityAgent[182]: MacBuddy was run = 0
    11.09.12 22:15:48,339 launchctl[186]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:15:48,340 launchctl[186]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:15:48,421 UserEventAgent[176]: cannot find useragent 1102
    11.09.12 22:15:49,169 com.apple.launchd[1]: (com.apple.xprotectupdater[24]) Exited with code: 252
    11.09.12 22:15:49,766 airportd[69]: _doAutoJoin: Already associated to “TELUS7187”. Bailing on auto-join.
    11.09.12 22:15:49,787 airportd[69]: _doAutoJoin: Already associated to “TELUS7187”. Bailing on auto-join.
    11.09.12 22:15:49,807 airportd[69]: _doAutoJoin: Already associated to “TELUS7187”. Bailing on auto-join.
    11.09.12 22:15:50,863 awacsd[57]: InnerStore GetWakeInfoForZone: no external port for 1366256562.members.btmm.icloud.com.
    11.09.12 22:15:51,198 awacsd[57]: InnerStore GetWakeInfoForZone: no external port for 1366256562.members.btmm.icloud.com.
    11.09.12 22:15:51,000 kernel[0]: utun_ctl_connect: creating interface utun0
    11.09.12 22:15:52,000 kernel[0]: ast_pending=0xffffff8003aa71b0
    11.09.12 22:15:52,000 kernel[0]: cpu_interrupt=0xffffff8003abe650
    11.09.12 22:15:52,000 kernel[0]: vboxdrv: fAsync=0 offMin=0x11cb offMax=0x1d7a
    11.09.12 22:15:52,000 kernel[0]: VBoxDrv: version 4.1.20 r80170; IOCtl version 0x190000; IDC version 0x10000; dev major=34
    11.09.12 22:15:52,000 kernel[0]: VBoxFltDrv: version 4.1.20 r80170
    11.09.12 22:15:52,000 kernel[0]: VBoxAdpDrv: version 4.1.20 r80170
    11.09.12 22:15:52,958 SecurityAgent[182]: User info context values set for simscheel
    11.09.12 22:15:53,096 SecurityAgent[182]: Login Window login proceeding
    11.09.12 22:15:53,299 loginwindow[43]: Login Window - Returned from Security Agent
    11.09.12 22:15:53,323 loginwindow[43]: USER_PROCESS: 43 console
    11.09.12 22:15:53,336 launchctl[237]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:15:53,336 launchctl[237]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:15:53,355 airportd[69]: _doAutoJoin: Already associated to “TELUS7187”. Bailing on auto-join.
    11.09.12 22:15:53,474 launchctl[240]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:15:53,474 launchctl[240]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:15:53,489 com.apple.launchd.peruser.501[236]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self
    11.09.12 22:15:53,493 loginwindow[43]: Connection with distnoted server was invalidated
    11.09.12 22:15:53,506 distnoted[241]: # distnote server agent  absolute time: 68.111959738   civil time: Tue Sep 11 22:15:53 2012   pid: 241 uid: 501  root: no
    11.09.12 22:15:53,763 WindowServer[90]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.
    11.09.12 22:15:53,776 Little Snitch Agent[249]: Little Snitch Agent version 3871 started.
    11.09.12 22:15:53,830 com.apple.SecurityServer[15]: Session 100007 created
    11.09.12 22:15:53,846 WindowServer[90]: Display 0x042730c0: MappedDisplay Unit 0; ColorProfile { 2, "Color LCD"}; TransferTable (256, 3)
    11.09.12 22:15:53,932 Little Snitch Network Monitor[255]: Little Snitch Netzwerkmonitor version 3871 started.
    11.09.12 22:15:54,958 coreaudiod[260]: 2012-09-11 10:15:54.957627 PM [AirPlay] Started browsing for _airplay._tcp.
    11.09.12 22:15:54,958 coreaudiod[260]: 2012-09-11 10:15:54.958113 PM [AirPlay] Started browsing for _raop._tcp.
    11.09.12 22:15:55,361 awacsd[57]: InnerStore GetWakeInfoForZone: no external port for 1366256562.members.btmm.icloud.com.
    11.09.12 22:15:56,657 com.apple.launchd.peruser.501[236]: (com.apple.afpstat-qfa[278]) Exited with code: 2
    11.09.12 22:15:56,000 kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=279[GoogleSoftwareUp] clearing CS_VALID
    11.09.12 22:15:56,869 coreservicesd[63]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyChildApplicationLaunch to notificationID=129
    11.09.12 22:15:57,991 com.apple.SecurityServer[15]: Session 100008 created
    11.09.12 22:15:57,993 coreservicesd[63]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyApplicationDeath to notificationID=152
    11.09.12 22:15:58,001 SocialPushAgent[265]: Error: unable to get the current device-token:(null) and/or the uuid:(null)
    11.09.12 22:15:58,004 SocialPushAgent[265]: Error: unable to get the current device-token:(null) and/or the uuid:(null)
    11.09.12 22:15:58,117 appleprofilepolicyd[302]: appleprofilepolicyd: profiling drivers not loaded, loading
    11.09.12 22:15:58,153 NotificationCenter[268]: Unable to simultaneously satisfy constraints:
        "<NSLayoutConstraint:0x7fc842c34ee0 H:[NSView:0x7fc842a5d9f0]-(0)-|(LTR)   (Names: widgetView:0x7fc842c31d90, '|':widgetView:0x7fc842c31d90 )>",
        "<NSLayoutConstraint:0x7fc842c4f490 H:|-(100)-[NSView:0x7fc842a5d9f0](LTR)   (Names: widgetView:0x7fc842c31d90, '|':widgetView:0x7fc842c31d90 )>",
        "<NSLayoutConstraint:0x7fc842c1c000 H:|-(0)-[NSView:0x7fc84286fa80]   (Names: '|':NSView:0x7fc842a5d9f0 )>",
        "<NSLayoutConstraint:0x7fc842c4f720 H:[NSView:0x7fc84286fa80]-(0)-|   (Names: '|':NSView:0x7fc842a5d9f0 )>",
        "<NSAutoresizingMaskLayoutConstraint:0x7fc84282bbd0 h=--& v=-&- H:[widgetView(385)]   (Names: widgetView:0x7fc842c31d90 )>",
        "<NSLayoutConstraint:0x7fc84286c720 H:[NCSwitchButton:0x7fc84286bbd0]-(>=9)-|   (Names: '|':NSView:0x7fc84286fa80 )>",
        "<NSLayoutConstraint:0x7fc84286c6b0 H:|-(35)-[NSTextField:0x7fc84286c1f0]   (Names: '|':NSView:0x7fc84286fa80 )>",
        "<NSLayoutConstraint:0x7fc842819df0 H:[NCSwitchButton:0x7fc84286bbd0(64)]>",
        "<NSLayoutConstraint:0x7fc842800c90 H:[NSTextField:0x7fc84286c1f0]-(NSSpace(8))-[NCSwitchButton:0x7fc84286bbd0]>",
        "<NSLayoutConstraint:0x7fc84286c2c0 H:[NSTextField:0x7fc84286c1f0(184)]>"
    Will attempt to recover by breaking constraint
    <NSLayoutConstraint:0x7fc84286c2c0 H:[NSTextField:0x7fc84286c1f0(184)]>
    Set the NSUserDefault NSConstraintBasedLayoutVisualizeMutuallyExclusiveConstraints to YES to have -[NSWindow visualizeConstraints:] automatically called when this happens.  And/or, break on objc_exception_throw to catch this in the debugger.
    11.09.12 22:15:58,153 lsboxd[301]: @AE relay 4755524c:4755524c
    11.09.12 22:15:58,184 lsboxd[301]: @AE relay 4755524c:4755524c
    11.09.12 22:15:58,196 NetworkBrowserAgent[304]: Starting NetworkBrowserAgent
    11.09.12 22:15:58,259 blued[300]: kBTXPCUpdateUserPreferences gConsoleUserUID = 501
    11.09.12 22:15:58,769 Battery Health[291]: Receipt at /Applications/Battery Health.app/Contents/_MASReceipt/receipt Ok!
    11.09.12 22:16:00,688 ClamXavSentry[286]: clamd not running. Now trying to launch it...
    11.09.12 22:16:04,902 com.apple.time[264]: Interval minimum value is 30 seconds (specified value: 21).
    11.09.12 22:16:06,140 ClamXavSentry[286]: clamd launched successfully.  Continuing...
    11.09.12 22:16:06,148 ClamXavSentry[286]: scan email files
    11.09.12 22:16:06,148 ClamXavSentry[286]: I will quarantine infected files
    11.09.12 22:16:06,856 sudo[336]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/local/clamXav/bin/freshclam --log=/usr/local/clamXav/share/clamav/freshclam.log --on-update-execute=EXIT_1
    11.09.12 22:16:13,464 com.apple.launchd[1]: (com.apple.coreservices.appleid.authentication[180]) Exit timeout elapsed (20 seconds). Killing
    11.09.12 22:16:14,591 sudo[352]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/sbin/chown -R clamav:clamav /usr/local/clamXav/share/clamav
    11.09.12 22:16:14,618 sudo[354]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0775 /usr/local/clamXav/share/clamav
    11.09.12 22:16:14,638 sudo[356]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /usr/local/clamXav/share/clamav/bytecode.cld /usr/local/clamXav/share/clamav/daily.cld /usr/local/clamXav/share/clamav/freshclam.log /usr/local/clamXav/share/clamav/main.cvd /usr/local/clamXav/share/clamav/mirrors.dat
    11.09.12 22:16:14,656 sudo[358]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/bin/touch /usr/local/clamXav/share/clamav/freshclam.log
    11.09.12 22:16:14,676 sudo[360]:     root : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod a+rw /usr/local/clamXav/share/clamav/freshclam.log
    11.09.12 22:16:29,345 launchctl[378]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer.plist
    11.09.12 22:16:29,346 launchctl[378]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.teamviewer.teamviewer_desktop.plist
    11.09.12 22:16:29,867 com.apple.SecurityServer[15]: Session 100004 created
    11.09.12 22:17:05,092 Google Chrome[421]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:05,000 kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=422[ksadmin] clearing CS_VALID
    11.09.12 22:17:05,956 Google Chrome Helper[424]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:06,333 Google Chrome Helper[427]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:06,000 kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=426[ksadmin] clearing CS_VALID
    11.09.12 22:17:06,506 Google Chrome Helper[430]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:06,507 Google Chrome Helper[429]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:06,610 Google Chrome Helper[424]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:06,648 Google Chrome Helper[431]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:06,846 Google Chrome Helper[427]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:07,090 Google Chrome Helper[431]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:07,556 Google Chrome Helper[429]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:07,635 Google Chrome[421]: Couldn't contact spell checker for Deutsch
    11.09.12 22:17:09,267 Google Chrome Helper[435]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:09,369 Google Chrome Helper[436]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:09,439 Google Chrome Helper[437]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:09,602 Google Chrome Helper[438]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:09,910 Google Chrome Helper[437]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:10,192 Google Chrome Helper[440]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:10,228 Google Chrome Helper[438]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:10,798 Google Chrome Helper EH[441]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:10,952 Google Chrome Helper[436]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:11,221 Google Chrome Helper[440]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:11,613 Google Chrome Helper EH[443]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:12,726 Google Chrome Helper[435]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1100)
    11.09.12 22:17:13,461 Google Chrome Helper EH[446]: Unsure about the internals of CFAllocator but going to patch them anyway. If there is a crash inside of CFAllocatorAllocate, please report it at http://crbug.com/117476 . If there is a crash and it is NOT inside of CFAllocatorAllocate, it is NOT RELATED. DO NOT REPORT IT THERE but rather FILE A NEW BUG.
    11.09.12 22:17:27,353 WindowServer[90]: CGXSetWindowBackgroundBlurRadius: Invalid window 0xffffffff
    11.09.12 22:17:27,397 loginwindow[43]: find_shared_window: WID -1
    11.09.12 22:17:27,397 loginwindow[43]: CGSGetWindowTags: Invalid window 0xffffffff
    11.09.12 22:17:27,398 loginwindow[43]: find_shared_window: WID -1
    11.09.12 22:17:27,398 loginwindow[43]: CGSSetWindowTags: Invalid window 0xffffffff
    11.09.12 22:17:27,501 coreservicesd[63]: Application App:"loginwindow" [ 0x0/0x1001]  @ 0x0x7f81a0609e00 tried to be brought forward, but isn't in fPermittedFrontASNs ( ( ASN:0x0-0x7b07b:) ), so denying.
    11.09.12 22:17:27,501 WindowServer[90]: [cps/setfront] Failed setting the front application to loginwindow, psn 0x0-0x1001, securitySessionID=0x186a5, err=-13066
    11.09.12 22:17:27,681 loginwindow[43]: *** WARNING: -[NSImage compositeToPoint:operation:fraction:] is deprecated in MacOSX 10.8 and later. Please use -[NSImage drawAtPoint:fromRect:operation:fraction:] instead.
    11.09.12 22:17:27,682 loginwindow[43]: *** WARNING: -[NSImage compositeToPoint:fromRect:operation:fraction:] is deprecated in MacOSX 10.8 and later. Please use -[NSImage drawAtPoint:fromRect:operation:fraction:] instead.
    11.09.12 22:17:33,932 Dock[282]: no information back from LS about running process
    A response with any suggestions would be great! Am actually off for a business trip and can't visit my local Apple Store where I bought my MBP and even don't really want that
    Thanks in advance!
    Regards
    Simon

    quax88 wrote:
    11.09.12 22:16:06,148 ClamXavSentry[286]: scan email files
    11.09.12 22:16:06,148 ClamXavSentry[286]: I will quarantine infected files
    This doesn't have anything to do with your problem, but it will likely cause other issues with your e-mail.
    Here's my standard recommendation concerting the use of A-V software to deal with potentially infected messages:
    Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail.
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.
    When possibly infected e-mail files are found:
    Right-click/Control-click on either the infection or file name in the ClamXav window.
    Select "Reveal In Finder" from the pop-up menu.
    When the window opens, double-click on the file to open the message in your e-mail client application.
    Read the message and if you agree that it is junk/spam/phishing then use the e-mail client's delete button to delete it (this is especially important when the word "Heuristics" appears in the infection name).
    If you disagree and choose to retain the message, return to ClamXav and choose "Exclude From Future Scans" from the pop-up menu.
    If this is a g-mail account and those messages continue to show up after you have deleted them in the above manner, you may need to log in to webmail using your browser, go to the "All Mail" folder, find the message(s) and use the delete button there to permanently delete them from the server.
    To fix the corrupted mailbox index(es), highlight each one that was corrupted and choose Rebuild from the appropriate menu.

  • Is it possible to use old Apple Flat Panel Display (62 watt power adapter) with MacBookPro 13" Mid-2012 running 10.8.4? Tried mini display to VGA cable

    Is it possible to use old Apple Flat Panel Display (62 watt power adapter) with a MacBookPro 13" Mid-2012 laptop?  Would like to use larger screen when working at home.  I have a mini display port to VGA cable and have tried to hook up the old display but it seems not to work.  When I try to activate the screen on the old display-- a window comes up in the MacBookPro and asks me if I want to shut down the computer.  What little I have read it that the MacBookPro had Thunderbolt and the old display may not be compatible?  Any assistance would be appreciated.

    quax88 wrote:
    11.09.12 22:16:06,148 ClamXavSentry[286]: scan email files
    11.09.12 22:16:06,148 ClamXavSentry[286]: I will quarantine infected files
    This doesn't have anything to do with your problem, but it will likely cause other issues with your e-mail.
    Here's my standard recommendation concerting the use of A-V software to deal with potentially infected messages:
    Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail.
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.
    When possibly infected e-mail files are found:
    Right-click/Control-click on either the infection or file name in the ClamXav window.
    Select "Reveal In Finder" from the pop-up menu.
    When the window opens, double-click on the file to open the message in your e-mail client application.
    Read the message and if you agree that it is junk/spam/phishing then use the e-mail client's delete button to delete it (this is especially important when the word "Heuristics" appears in the infection name).
    If you disagree and choose to retain the message, return to ClamXav and choose "Exclude From Future Scans" from the pop-up menu.
    If this is a g-mail account and those messages continue to show up after you have deleted them in the above manner, you may need to log in to webmail using your browser, go to the "All Mail" folder, find the message(s) and use the delete button there to permanently delete them from the server.
    To fix the corrupted mailbox index(es), highlight each one that was corrupted and choose Rebuild from the appropriate menu.

  • "Show in Mail" link in To-Dos - can't get rid of, like a virus

    Hello!
    I use To-Dos in iCal intensively.
    But strange thing started to happen - all my To-Dos magically get "Show in Mail" link in URL field.
    When I enter a new To-Do - everything is fine,
    but after a couple of days "Show in Mail" link sticks to it again.
    (This link takes you to nowhere).
    And I can't get rid of it any other way then just by deleting "infected" To-Do.
    Please help.

    I think I've got it fixed....I "reset" my mail program, I deleted my mailbox then re-created it and I'm all set for now.

  • After upgrade 10.6.2 computer no longer goes to sleep. system.log active.

    I can put it to sleep and it will do so (light in button slowly blinks).
    However over the energy control panel it no longer goes to sleep.
    In my system.log I see endless activity. Not sure how this will help me fix it though. Here is some of it.
    Dec 29 09:56:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 09:57:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 09:58:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 09:59:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:00:28 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:01:31: --- last message repeated 1 time ---
    Dec 29 10:01:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:02:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:03:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:04:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:05:28 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:06:31: --- last message repeated 1 time ---
    Dec 29 10:06:31 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:06:54 MBP-E loginwindow[31]: in pamsmauthenticate(): Failed to determine Kerberos principal name.
    Dec 29 10:07:00 MBP-E loginwindow[31]: loginwindow SleepWakeCallback WILL sleep
    Dec 29 10:07:00 MBP-E ClamXavSentry[157]: We're currently watching for changes, so stop and then register to know when we wake up again
    Dec 29 10:07:00 MBP-E ClamXavSentry[157]: attempting to terminate gfslogger
    Dec 29 10:07:00 MBP-E ClamXavSentry[157]: Nighty night!
    Dec 29 10:07:00 MBP-E ClamXavSentry[157]: termination status = 15
    Dec 29 10:07:00 MBP-E kernel[0]: AFPSleepWakeHandler: going to sleep
    Dec 29 10:07:01 MBP-E spindump[7272]: Error loading /Library/Audio/Plug-Ins/HAL/JackRouter.plugin/Contents/MacOS/JackRouter: dlopen(/Library/Audio/Plug-Ins/HAL/JackRouter.plugin/Contents/MacOS/JackRouter, 262): no suitable image found. Did find:\n /Library/Audio/Plug-Ins/HAL/JackRouter.plugin/Contents/MacOS/JackRouter: no matching architecture in universal wrapper
    Dec 29 10:07:01 MBP-E spindump[7272]: Cannot find function pointer MyFactory for factory FAFCAFC3-BAE8-11D6-B4A8-00039315CD46 in CFBundle/CFPlugIn 0x1001119e0 </Library/Audio/Plug-Ins/HAL/JackRouter.plugin> (bundle, not loaded)
    Dec 29 10:07:21 MBP-E loginwindow[31]: loginwindow SleepWakeCallback will power on, Currenttime:12/29/2009 10:07:21.001 AM - Waketime:12/29/2009 10:07:21.000 AM = Deltatime:0.000836909
    Dec 29 10:07:22 MBP-E loginwindow[31]: askForPasswordBuiltIn after makekey, Currenttime:12/29/2009 10:07:22.044 AM - Waketime:12/29/2009 10:07:21.000 AM = Deltatime:1.043954909
    Dec 29 10:07:23 MBP-E configd[13]: Sleep: Success - AC 97 - Software Sleep
    Dec 29 10:07:23 MBP-E configd[13]: Wake: Success - AC 97 - EHC1 EHC2
    Dec 29 10:07:23 MBP-E configd[13]: Hibernate Statistics
    Dec 29 10:07:23 MBP-E ClamXavSentry[157]: Wakey wakey!
    Dec 29 10:07:24 MBP-E kernel[0]: AFPSleepWakeHandler: waking up
    Dec 29 10:07:24 MBP-E configd[13]: network configuration changed.
    Dec 29 10:07:24 MBP-E configd[13]: PMConnection AirPort configd plug-in com.apple.powermanagement.applicationresponse.slowresponse 3462 ms
    Dec 29 10:07:24 MBP-E configd[13]: PMConnection IPConfiguration com.apple.powermanagement.applicationresponse.slowresponse 3464 ms
    Dec 29 10:07:24 MBP-E ClamXavSentry[157]: do NOT scan email files
    Dec 29 10:07:24 MBP-E ClamXavSentry[157]: I will delete infected files
    Dec 29 10:07:24 MBP-E ClamXavSentry[157]: I will quarantine infected files
    Dec 29 10:07:25 MBP-E loginwindow[31]: in pamsmauthenticate(): Failed to determine Kerberos principal name.
    Dec 29 10:07:25 MBP-E loginwindow[31]: builtInAuthWindowDidResignKey
    Dec 29 10:07:25 MBP-E loginwindow[31]: handleUnlockResult, Currenttime:12/29/2009 10:07:25.535 AM - Waketime:12/29/2009 10:07:21.000 AM = Deltatime:4.534515917
    Dec 29 10:07:25 MBP-E [0x0-0x317317].backupd-helper[7287]: Not starting Time Machine backup after wake - less than 60 minutes since last backup completed.
    Dec 29 10:07:26 MBP-E configd[13]: network configuration changed.
    Dec 29 10:07:42 MBP-E ntpd[20]: time reset -0.135977 s
    Dec 29 10:07:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:07:55 MBP-E loginwindow[31]: no spins reported for this wake
    Dec 29 10:08:45 MBP-E com.apple.launchctl.Background[7298]: launchctl: Dubious ownership on file (skipping): /Library/LaunchAgents/com.me.trouble
    Dec 29 10:08:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:09:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:10:45 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:11:26: --- last message repeated 1 time ---
    Dec 29 10:11:26 MBP-E spindump[7316]: Error loading /Library/Audio/Plug-Ins/HAL/JackRouter.plugin/Contents/MacOS/JackRouter: dlopen(/Library/Audio/Plug-Ins/HAL/JackRouter.plugin/Contents/MacOS/JackRouter, 262): no suitable image found. Did find:\n /Library/Audio/Plug-Ins/HAL/JackRouter.plugin/Contents/MacOS/JackRouter: no matching architecture in universal wrapper
    Dec 29 10:11:26 MBP-E spindump[7316]: Cannot find function pointer MyFactory for factory FAFCAFC3-BAE8-11D6-B4A8-00039315CD46 in CFBundle/CFPlugIn 0x100105cd0 </Library/Audio/Plug-Ins/HAL/JackRouter.plugin> (bundle, not loaded)
    Dec 29 10:11:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:12:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:13:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:14:32 MBP-E com.apple.launchctl.Background[7334]: launchctl: Dubious ownership on file (skipping): /Library/LaunchAgents/com.me.trouble
    Dec 29 10:14:48 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Dec 29 10:15:45 MBP-E /Library/Printers/Brother/Utilities/Server/NETserver.app/Contents/MacOS/NETserv er[163]: dnssd_clientstub ConnectToServer: socket failed 24 Too many open files
    Anybody knows how to fix this, or what is happening?
    Thanks

    Barney-15E wrote:
    Do you still have the same console errors?
    Barney, good morning, yes all are gone but not the Brother one.
    Dec 30 09:06:12 MBP-E mDNSResponder[30]: Client application bug: DNSServiceResolve(Brother\032DCP-9045CDN.pdl-datastream.tcp.local.) active for over two minutes. This places considerable burden on the network.
    I removed all the Brother stuff downloaded new from Brother website and nothing changed.
    I also discovered a new one this AM:
    Dec 29 13:26:08 MBP-E SoftwareUpdateCheck[107]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherICC.pkg
    Dec 29 13:26:08 MBP-E SoftwareUpdateCheck[107]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherPPD.pkg
    Dec 29 13:27:15 MBP-E repair_packages[222]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherICC.pkg
    Dec 29 13:27:15 MBP-E repair_packages[222]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherPPD.pkg
    Dec 29 18:21:29 MBP-E Installer[248]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherICC.pkg
    Dec 29 18:21:29 MBP-E Installer[248]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherPPD.pkg
    Dec 29 18:23:24 MBP-E Installer[208]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherICC.pkg
    Dec 29 18:23:24 MBP-E Installer[208]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherPPD.pkg
    Dec 29 18:23:37 MBP-E installd[222]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherICC.pkg
    Dec 29 18:23:37 MBP-E installd[222]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherPPD.pkg
    Dec 30 09:13:05 MBP-E Software Update[2113]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherICC.pkg
    Dec 30 09:13:05 MBP-E Software Update[2113]: PackageKit: * Missing bundle identifier: /Library/Receipts/BrotherPPD.pkg
    however the package is there in the folder and is there in my backup (10.5) and is the same creation date etc. So I am not sure why it does not like it.

  • ClamXav detecting phishing email (can't get rid of them)

    I received an email from my wife that she did not send me. It was an email that made no sense. It just had a bunch of words in a very long document. I assumed that her email program (Mac Mail) must have become infected with something that sent this email out to everyone in her address book. I deleted the email and downloaded ClamXav to check my system and make sure everything is ok.
    Whenever I run ClamXav, it detects 8 files with the following infection name: (Heuristics.Phishing.Email.SpoofedDomain)
    I ask ClamXav to quarantine the files, then I go into that folder and delete them. But if I run a check later, those 8 files are back. I can't get rid of them.
    I'm wondering if they are reinfecting my Mac Mail program via Apple's mail servers. I'm not sure if all my mail messages are kept on Apple's server, and them somehow these malware files get re-downloaded to my computer. I tried to figure out if there is a setting in my mail program that allows me to uncheck a box that says, "save mail files on server".....but I can't find any such setting. I thought I remember seeing something like that in the past.
    Does anyone have any idea what is causing my computer to be continuously reinfected and what I should do about it? I don't notice any problems with my computer, but obviously these files that I can't permanently delete has me worried.

    Randall Olson1 wrote:
    Whenever I run ClamXav, it detects 8 files with the following infection name: (Heuristics.Phishing.Email.SpoofedDomain)
    I ask ClamXav to quarantine the files, then I go into that folder and delete them. But if I run a check later, those 8 files are back. I can't get rid of them.
    First, I would encourage you to come to the ClamXav Forum to more quickly and efficiently answer questions such as this.
    My standard guidance for handling reported e-mail infection is as follows (pay particular attention to #6):
    Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail.
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.
    When possibly infected e-mail files are found:
    Right-click/Control-click on either the infection or file name in the ClamXav window.
    Select "Reveal In Finder" from the pop-up menu.
    When the window opens, double-click on the file to open the message in your e-mail client application.
    Read the message and if you agree that it is junk/spam/phishing then use the e-mail client's delete button to delete it (this is especially important when the word "Heuristics" appears in the infection name).
    If you disagree and choose to retain the message, return to ClamXav and choose "Exclude From Future Scans" from the pop-up menu.
    If this is a g-mail account and those messages continue to show up after you have deleted them in the above manner, you may need to log in to webmail using your browser, go to the "All Mail" folder, find the message(s) and use the delete button there to permanently delete them from the server.
    To fix corrupted mailbox index(es), highlight each one that was corrupted and choose Rebuild from the appropriate menu.

  • How to use Clamxav and sentry

    Hi, I have decided I would benefit from using Camxav and its sentry but I am struggling to understand how I get the it to watch my incoming emails, which is primarily the purpose I want it for.

    Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail.
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.

  • Please Help...Virus I think

    I downloaded something that seemed a little fishy last night(my fault..my fiancee friend told her about it) and then immediatley deleted it but my computer was acting VERY funny after that. Things were running really slow, not opening at all and not allowing me to type. Well this morning I wss going to run disk utility but when I start my comp I must put in my passwrk which does not work anymore. I know it's right and tried it about 20 times but it won't work.
    What should I do. I really appreciate any help here. Thanks.

    Try this... for snow leopard, the link is here:
    http://www.clamxav.com/index.php?page=v2beta
    Seems the developer has made this new build from the ground up and he's gonna quit now.
    download and install, just replacing any previous version. Just agree to Warrenty it's only the dev protecting himself. be sure to follow instructions including installing contextual menu plugin, after
    all that you need to log out and back in on the Mac. Finally, do go through it's preferences because it's pre set to delete infected files so set it to quarantine only and set anything else to your preference.
    I set it to watch the /users folder.

  • Annoying popups constantly asking me to download things -help

    I've used i-antivirus and deleted infected files. And yet, everytime I use firefox, annoying popups emerge when I click on a website (say, BBC.com or Netflix.com), smaller than the main windown, usually asking me to download something, such as "flash player". I've investigated my flash version and I'm up to date. It's clearly malware, because it also asks me to download various other things. It is a recent phenomenon, within the past few months. I've set my browser preferences to block popups, and these popups still keep coming - in spite of preferences being set to block popups.
    I'm on the verge of switching to Safari or another web browser, even though I've loved Firefox. It's because I can't find any support on the internet that can resolve this popup issue once and for all. Please help, I do not want to have to stop using Firefox.

    Try checking for Malware/Adware with these free Programs.
    spybot.info - Spybot Search and Destroy
    http://www.malwarebytes.org/ - Malwarebytes Anti-Malware
    http://www.surfright.nl/en/hitmanpro/ - Hitman Pro
    http://download.cnet.com/AdwCleaner/3000-7786_4-75851221.html - AdwCleaner
    http://www.eset.com/us/online-scanner/ - Eset Online Scanner
    http://support.kaspersky.com/5350?el=88446 - TDSS Killer
    https://www.superantispyware.com/portablescannerhome.html - SuperAntiSpyware Portable

  • Internet Security Suite on Mac

    I insalled the Internet security suite for Mac and am running OS X 10.5.8.  VISS popped up with a mesage that there was a virus found on my system and 'no action was taken'.  I scanned my system and checked the disinfect/delete infected files but when it found the infected file, it said no action taken again  When the scan was complete, the scan status said n viruses were found, but two were listed in the log and the 'action' taken was 'Reported' even though I selected all infected files to be disinfected/deleted.  I had to manually find the files and delete them from my system to rid the infected files.

    This is what it found in today's  (11/27) scan- 6  .pdf files:
    Viruses detected: Exploit.PDF-JS.Gen
    Action taken: None, file was left in its original location.
    Earlier in the week, it found 2 other files with the same virus- one in my Toast 9 Titanium folder and one in my Toast 10 Titanium folder for a cd/dvd label background (.pdf files).
    The original viruses it found were Joke.Rabbit in 2 files on 11/8/09, Spyware.945 and Backdoor.Generic.148842 on 11/7/09. 
    In all cases Internet Security Suite is set to Repair/Delete, but it reports back 'Action taken: None, file was left in its original location.' and I have to manually delete the files.

  • EXC_BAD_ACCESS (0x0001)

    Crashing different programs lately, mostly NEW ones that I started working with, like while setting up the prefs in ClamXav (anti-virus), or after uploading large files in iDrive-for-Mac (online backup), and couple others, are ALL DEFINED BY THIS SAME  EXC_BAD_ACCESS (0x0001)   and I'm wondering, is there something to it?
    Here are 2 examples:
    EXC_BAD_ACCESS (0x0001)
    KERN_PROTECTION_FAILURE (0x0002) at 0x00000000
    EXC_BAD_ACCESS (0x0001)KERN_INVALID_ADDRESS (0x0001) at 0xe800017a

    OK, since my last post here, I did upgrade to Leopard, 10.5.8 and upgraded ClamXav too...
    But while doing something totally unrelated I got ClamXav crashing....  I have the FULL REPORT that I saved. But following your directions, here it is:
    This is from the main Console Message I found after the last crash:
    5/6/12 4:19:02 PM com.apple.launchd[100] ([0x0-0x15015].uk.co.markallan.clamxav.ClamXavSentry[139]) Exited abnormally: Bus error
    5/6/12 5:26:18 PM ClamXavSentry[143] All console output now going to /Users/Ami/Library/Logs/clamXav-scan.log
    5/6/12 5:26:32 PM ClamXavSentry[143] clamd not running. Now trying to launch it...
    5/6/12 5:27:07 PM ClamXavSentry[143] clamd launched successfully.  Continuing...
    5/6/12 5:27:07 PM ClamXavSentry[143] scan email files
    5/6/12 5:27:07 PM ClamXavSentry[143] I will delete infected files
    5/6/12 5:39:25 PM com.apple.launchd[90] ([0x0-0x17017].uk.co.markallan.clamxav.ClamXavSentry[143]) Exited abnormally: Bus error 
    Can't find any "User Diagnostic Reports" or "System Diagnostic Reports"
    BUT
    This is from Crash Reporter for the last one (5:39:25:
    Process:         ClamXavSentry [143]
    Path:            /Applications/Utilities/ClamXav/ClamXav.app/Contents/Resources/ClamXavSentry.ap p/Contents/MacOS/ClamXavSentry
    Identifier:      uk.co.markallan.clamxav.ClamXavSentry
    10  ...allan.clamxav.ClamXavSentry          0x00002840 _start + 756
    11  ...allan.clamxav.ClamXavSentry          0x00002544 start + 44
    3   ...allan.clamxav.ClamXavSentry          0x0000726c -[Throbber animateMenuForScan] + 216
    4   ...allan.clamxav.ClamXavSentry          0x00006cec -[Throbber mainLoop:] + 1856
    3   ...allan.clamxav.ClamXavSentry          0x0000a23c -[Dispatcher mainLoop:] + 216
    3   ...allan.clamxav.ClamXavSentry          0x0000b210 -[PatientScanner mainLoop:] + 168
    6   ...allan.clamxav.ClamXavSentry          0x0000b65c -[PatientScanner performScan] + 656
    7   ...allan.clamxav.ClamXavSentry          0x0000b294 -[PatientScanner mainLoop:] + 300
    4   ...allan.clamxav.ClamXavSentry          0x0000ce58 -[FSEventWatcher startWatching] + 584
    5   ...allan.clamxav.ClamXavSentry          0x0000cb80 -[FSEventWatcher mainLoop:] + 204
        0x1000 -    0x10fff +uk.co.markallan.clamxav.ClamXavSentry 2.6.5 (257) <79224114252815e524cb4ed2a9c4096a> /Applications/Utilities/ClamXav/ClamXav.app/Contents/Resources/ClamXavSentry.ap p/Contents/MacOS/ClamXavSentry
    0xc0000000 - 0xc000bfff +com.growl.growlframework 1.2.2 (1.2.2) <b66eb0053db266ee3fffff44a4f1cad1> /Applications/Utilities/ClamXav/ClamXav.app/Contents/Resources/ClamXavSentry.ap p/Contents/Frameworks/Growl.framework/Versions/A/Growl

  • Do I have a virus/malware problem? Idiot needs help

    Hello, Received an email from 'Royal Mail Global' saying that they had failed in delivering a package and to open the attached '.zip' file. Without thinking, I opened the file- it didn't launch anything. I realise this is incredibly stupid and I am mortified. However, I am now concerned that I have a virus, malware, etc. As I am a computer idiot: how do I check if a virus is on the system or a malware programme is stealing all my details? People say "you'll be ok, Mac's don't get virsus" but how do you know? I have encountered no issues, as yet.... I run OS X and have a mac mini. Please help- will be eternally grateful. Thank you in advance

    MacHagan wrote:
    Hello, Received an email from 'Royal Mail Global' saying that they had failed in delivering a package and to open the attached '.zip' file. Without thinking, I opened the file- it didn't launch anything.
    First of all, your Lion OS would have notified you if that was anything currently known to be dangerous. If it was malware it was almost certainly designed for Windows and of no consequence to OS X. If you are certain that the email is spam/junk/hoax then use the delete button in your e-mail client to get rid of it. Check the trash folder and delete it from there, if necessary. If this is a Gmail account, let me know as there may be one more step.
    When you say you opended the file, I assume you used an open button or double-clicked the attachment symbol? And then it didn't launch anything, but it should have launch the Archive Utility to unzip the attachment. Did that not happen? Did you see anything after you "opened it"?
    Even if it was unzipped, sitting in an attachment folder somewhere and is malware, it won't do anything at all until you attempt to open it. And as I said previously, it's almost certainly for Windows users, anyway.
    If you followed the suggestion to use ClamXav (or any other A-V software), there are some special considerations regarding e-mail. Here are my standard cautions:
    Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail.
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.
    When possibly infected e-mail files are found:
    Right-click/Control-click on either the infection or file name in the ClamXav window.
    Select "Reveal In Finder" from the pop-up menu.
    When the window opens, double-click on the file to open the message in your e-mail client application.
    Read the message and if you agree that it is junk/spam/phishing then use the e-mail client's delete button to delete it (this is especially important when the word "Heuristics" appears in the infection name).
    If you disagree and choose to retain the message, return to ClamXav and choose "Exclude From Future Scans" from the pop-up menu.
    If this is a g-mail account and those messages continue to show up after you have deleted them in the above manner, you may need to log in to webmail using your browser, go to the "All Mail" folder, find the message(s) and use the delete button there to permanently delete them from the server.
    For instructions on how to handle any infections that do not involved e-mail, use the Help menu or go directly to this link Dealing with Infected Files.

  • Trojan Man

    I found a folder that I thought had been deleted from my trash.  My folder's name is titled "Icons."  The problem is when I open the folder, all of my files are not viewable.  Each item says BRLaser has 4 numbers and then ends in .icns.  They are all pictures of different printers...seriously?  The were all accounting files initially, mostly spreadsheets and some PDF files.
    This all started when I ran Clam and detected several Trojans.  After I cleaned them up, Quarantined them and sent them to the trash, this is when I had problems.  Does anybody have a solution to this?

    Reds_fan wrote:
    Actually I just found a couple.  Filename is 36317.emlx, infection name Email.Trojan-432.  Another is 36321.emlx, Win.Trojan.Agen
    OK, so those are both e-mails, so you will need to do a little repair work.
    The only Trojan's known to impact OS X were sent to Tibetan sympathizers, so unless you are in that catagory, you have nothing to worry about. The second one is Windows only.  I need to check on the first one, but odds are great that it is also.
    First of all, here's an easy way to locate find out what mailbox they came from:
    Open the Terminal app (found in /Applications/Utilities/), then copy and paste the following after the "$ " prompt:
    grep 'FOUND' ~/Library/Logs/clamXav-scan.log
    and hit return.
    Now open the Mail app and highlight each of the mailboxes where infected files were found and select "Rebuild" from the bottom of the Mailbox menu.
    If this was from a Gmail account let me know as there is probably still more work to be done.
    And for the future:
    Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail.
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.
    When possibly infected e-mail files are found:
    - Highlight the entry in the ClamXav window's top pane that needs to be dealt with.
    - Right-click/Control-click on the entry.
    - Select "Reveal In Finder" from the pop-up menu.
    - When the window opens, double-click on the file to open the message in your e-mail client application.
    - Read the message and if you agree that it is junk/spam/phishing then use the e-mail client's delete button to delete it (reading it is especially important when the word "Heuristics" appears in the infection name).
    - If you disagree and choose to retain the message, return to ClamXav and choose "Exclude From Future Scans" from the pop-up menu.

  • Cannot install latest flash player, previous adobe download had lots of pups

    Clamwin found and quarantined lots of infected (more than 60 adobe) files.  I deleted them from the clamwin quarantine and then from my recycle folder.  Then I got lots of "unresponsive scripts".  Then, I tried to download and install the latest adobe flash player (because I thought the deleted infected files might be adobe flash files...they were definitely some kind(s) of adobe files.  Now, I am trying to download and reinstall the latest flash player to remedy my lot of "unresponsive scripts", but I cannot complete its installation. I get a message that instructs me to close Mozilla Firefox...which is not open.
    What's a Mother to do?
    (No idea what community this should be in, btw.)

    The plug-in version of Flash Player is for browsers other than Internet Explorer. 
    Enabling Flash Player in Internet Explorer 9
    Since the Flash Player for Internet Explorer is an activex add-on, active x filtering must be turned off to view videos.
    ActiveX Filtering in Internet Explorer 9

  • Help with Win Trojan Graftor 1987 please!

    So I just ran ClamXav for the first time and it picked up these. What do they mean and how do I get rid of them?
    Thanks

    This is from the ClamXav site:
    http://www.clamxav.com/BB/viewtopic.php?p=20840&sid=49f9035bd3148cd384b200426b56 a2b9
    "Never use ClamXav (or any other A-V software) to move (quarantine) or delete e-mail. It will corrupt the mailbox index which could cause loss of other e-mail and other issues with functions such as searching. It may also leave the original e-mail on your ISP's e-mail server and will be re-downloaded to your hard drive the next time you check for new mail."
    So, if you choose to "Scan e-mail content for malware and phishing" in the General Preferences, make sure you do not elect to either Quarantine or Delete infected files.
    When possibly infected e-mail files are found:
    - Highlight the entry in the ClamXav window's top pane that needs to be dealt with.
    - Right-click/<Control>-click on the entry.
    - Select "Reveal In Finder" from the pop-up menu.
    - When the window opens, double-click on the file to open the message in your e-mail client application.
    - Read the message and if you agree that it is junk/spam/phishing then note the date and subject of the message and close the e-mail window. Now, using your e-mail client, locate that message in whatever mailbox folder it was found in and delete the message using the delete button. Reading it is especially important when the word "Heuristics" appears in the infection name.
    - If you disagree and choose to retain the message, return to ClamXav and choose "Exclude From Future Scans" from the pop-up menu.
    - If this is a g-mail account and those messages continue to show up after you have deleted them in the above manner, you may need to log in to webmail using your browser, go to the "All Mail" folder, find the message(s) and use the delete button there to permanently delete them from the server. Then check the "Trash" folder and delete them there.

Maybe you are looking for