Hack by somebody

Hi,
I would like to inform you that I think my account was hacked by somebody. Can I delete my skype account permanently but maintain the microsoft account vaild?
Besides, I have one Microsoft account only, why two different account name showed in my friends contact list? why one is online but another is offline?
Many Thanks

Here is what you can do is someone has takenover your Skype account -
https://support.skype.com/en/faq/FA10920/what-can-​i-do-if-someone-has-taken-over-my-account
IF YOU FOUND OUR POST USEFUL THEN PLEASE GIVE "KUDOS". IF IT HELPED TO FIX YOUR ISSUE PLEASE MARK IT AS A "SOLUTION" TO HELP OTHERS. THANKS!
ALTERNATIVE SKYPE DOWNLOAD LINKS | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUSPICIOS CALLS AND MESSAGES

Similar Messages

  • My Macbook was hacked by somebody right after activating downloaded VLC player. I couldn't control my machine. Every thing was messed up! Finally after reboot I realized that even my administration password was changed. Stupid hint I was able to reed: Wha

    My Macbook was hacked by somebody right after activating downloaded VLC player.
    I couldn’t control my machine. Every thing was messed up! Finally after reboot I realized that even my administration password was changed. Stupid hint I was able to reed: What located in box above low case ? I used my friends computer and founded hot to fix my problem using Unix commands to reboot in a single user mode. I founded a lot of different solutions which had prity the same beginnings but very complicated continuation, which, I understood will force me to cach during restoration anuther crap – time bomb in my mac! Finaly I did restor. somehow. But still feel somebodyies presents. Safary messed up – I will send you a log Itunes – messed up. Speaker in a top menu – grayed, and I can’t control my volume. But the most triky thing – bouth my Apple keybords – internal and mostly bluetouth external also working and typing wired! I am sorry for my spelling, because I cant check spell for Mac’s Word (in Microsoft it was F7) I have also several attacks from my neighbors by community I know their names, because they are somethere very close to me – I can see them throuth FI-FI connection. They often kick-me out from my place and started to use my resaurces. And also Mackeeper make me a hard time!
    In Microsoft times u just reinstalled computer – clean installetion from corporate licensed disk. But now I am a beginner in MAC – I love it! But a lot of new and triky – at this way
    Fore example – my goal – to do fool Macbook backup at external USB drive using boot srartup option and make my life yaser in case of crash. But now, I don’t know if I can trust recommended program  Carbon copy cloner – Ms. Bombich?
    I am very sorry for my spelling, because I feel somebodies presents, who playin with me.
    Final question Do I need some antivirus Mac compatable which is update paches, service packs? How to map defolt documents folder not to a local, but to external USB?
    Esquse me for a lot of questions, but I am beginner in MAC, and I LOVE it!
    PS. Good news. Looks like Safari came back! Somebody, probably allredy helping!
    But my interface qute different from original – so something still wrong!

    Didn't really read much at all of your post. Much, much too long, irrelevant details and & no paragraphs.
    Can't use time machine due to corruptness
    Post over here -> Mac OS X v10.6 - Snow Leopard forum
    About my macbook and apple ID how can I upgrade my Macbook from 10.6.3 to 10.6.8 with out all the permissions being changed and corrupt??
    Same as above. Post in the correct forum.
    Need to gain access to my apple Id that would be a great start
    -> http://support.apple.com/kb/HT5625

  • Suspect hacking

    I am posting on behalf of a friend who thinks that her BT home hub has been hacked.  She has had suspicions for a while as a nosey neighbour always seems to know far more about her activities than he or she should do.  The person under suspicion lives very close by (ie within wifi range) and has expert IT skills.
    Earlier today my friend logged onto her BT home hub manager and found a list of 5 devices on her DHCP table one of which is an ipad touch (she does not own one but her neighbour does) and another is an iphone called XXXsiphone where XXX is the first name of the person under suspicion.  Is this proof that her network has been hacked and what action should my friend now take?  The really odd thing is that when she navigated away from that part of the webpage and then went back to it, 4 of the 5 devices on the list had vansihed and the only device left was her own pc.  Can anyone explain what is going on here??
    Any advice really appreciated.  My friends neighbour is making her life a misery.  She is now paranoid about doing any of her own investigations as she feels all her online activity and phone calls are being snooped on.
    Thanks

    gg30340 wrote:
    Rottie, you are not right about the friend being responsible for somebody who has hacked into her account and carried out anything illegal. Look how many "famous" prosecutions there have been for hacking into somebody's accounts.
    The fact that hacking into an account or in this case a router is illegal would mitigate her responsibility as long as it could be proved that another person did indeed hack into the account and did in do something illegal. 
    The Communications Act 2003 section 125 might cover it
    Dishonestly obtaining electronic communications
    (1)A person who—
    (a)dishonestly obtains an electronic communications service, and
    (b)does so with intent to avoid payment of a charge applicable to the provision of that service,
    is guilty of an offence.
    This link also points out other offences.
    http://www.cps.gov.uk/legal/a_to_c/communications_offences/
    Thanks for the correction, gg. As the old saying goes "You live and learn."

  • Account hacked, now I cant prove my identity??

    so, my account got hacked and somebody stole $10 of credit to call mobiles to countries in the middle east. Whilst I'm waiting for the CIA to knock down my door, I decide to change my password (obviously), and contact support to try and recover my lost account balance.
    exactly 26 hours later I get a reply stating: "We're sorry to inform you that the information you have provided didn't pass the required information needed to verify your account.". Ok, I'll fill out your enormous form AGAIN and try to prove Im not the same hacker who compromised my account in the first place. Ive had my skype account for as long as I can remember, and cant find my registration email, so the only question I cant complete is 'when did you open your account'.
    Today (this time exactly 24 hours later, well done on that) I get the exact same reply again, requesting I complete the same form with the same information all over again.
    I hope the irony is not lost on the support team at Skype who wont accept the identity information of the rightful account holder in order to simply open a support ticket after your company granted access to my account to possible terrorists.
    Thank you for leaving me high and dry, Skype. I'm off to find my emails from 10 years ago. I hope my 1.44mb floppy disks havent corrupted yet.

    Hey agussagasti,
    Thanks for using Apple Support Communities.
    Looks like you are not able to download apps from a different country's store. You may need to change the store country for the apps purchased in the other country.
    Change the country of your iTunes Store, App Store, iBooks Store, and Mac App Store account
    http://support.apple.com/kb/HT6119
    After you change the country of your account, you won't see the items you purchased from the previous country’s store in the Purchased section.
    Have a nice day,
    Mario

  • Oracle...Most Insecure Database!

    i have suficient prove.
    check this and read it carefully..
    http://www.appsecinc.com/presentations/Search_Engine_Attack_Database.pdf
    thats why icant resist to say that despite oracle adding to flexibility by enabling web access or else browser based computing. this is a very dangerous loophole.
    note, am not against oracle. NO. but the truth is i tried this and ma conclusion..,there are very many insecure databases out there. tuning is desired. oracle maybe a hero in the field, but u'll agree with me the fastest moving cars crash the loudest, else cause the worst accidens. u have to do somethin, i easily did this, i tel u easy, tune those dbs there and reply here to educate others,,plz!

    I think the subject line for this post is incorrect. I don't think Oracle is inherently more insecure than any other database. Most if not all of the vulnerabilities in the paper you link to are the result of poor configuration on the part of the database installers, not the least of which is a failure to understand the role of the robots.txt file. Many other systems apart from Oracle databases can be hacked by anybody with a modicum of Google Fu.
    Anybody who finds their database has been hacked by somebody who's read that paper has failed to read and implement Metalink Note: #131752.1. Lewis cunninghma recently wrote a useful article recently on hardening passwords. And of course, there's Pete Finnegan's excellent site, a veritable cornucopia of Oracle security resources.
    Still, this is a useful paper and one which people ought to read.
    Cheers, APC

  • Corrupted repositories?

    Hi archers! When I did a pacman -Syu on 2009-01-29 apache got upgraded (2.2.11-1 -> 2.2.11-2). I used the same pkg files to upgrade another archlinux machine, but here I used a different mirror to sync the database. When pacman found apache-2.2.11-2-i686.pkg.tar.gz it said it is corrupted. So I downloaded the package again from a few different mirrors and it was ok in all mirrors.
    But the package I got in the first place is different and it is not due to a network error! I don't know which mirror I got it from because I changed /etc/pacman.d/mirrorlist recently but I suspect it was either belnet.be or hosteurope.de because I used mostly those two. At this moment both belnet.be and hosteurope.de have the same fine packages of apache.
    Here is md5sum output:
    a86a7048450a8326521af48766305ab5 /var/cache/pacman/pkg/apache-2.2.11-2-i686.pkg.tar.gz
    7ceaaa89043fd961f8a9e094a1f9d431 /var/cache/pacman/pkg/apache-2.2.11-2-i686.pkg.tar.gz.weird
    The packages extracted ok. Here is output of diff -ur of extracted tar.gz archives:
    --- apache-ok/.PKGINFO 2009-01-29 15:15:00.000000000 +0100
    +++ apache-corrupted/.PKGINFO 2009-01-29 18:02:47.000000000 +0100
    @@ -1,13 +1,13 @@
    # Generated by makepkg 3.2.2
    # using fakeroot version 1.12.1
    -# Thu Jan 29 14:15:00 UTC 2009
    +# Thu Jan 29 17:02:47 UTC 2009
    pkgname = apache
    pkgver = 2.2.11-2
    pkgdesc = A high performance Unix-based HTTP server
    url = http://www.apache.org/dist/httpd
    -builddate = 1233238500
    -packager = Pierre Schmitz <[email protected]>
    -size = 4251648
    +builddate = 1233248567
    +packager = Giovanni Scafora <[email protected]>
    +size = 4139008
    arch = i686
    license = APACHE
    depend = openssl
    diff -ur apache-ok/usr/lib/httpd/build/config_vars.mk apache-corrupted/usr/lib/httpd/build/config_vars.mk
    --- apache-ok/usr/lib/httpd/build/config_vars.mk 2009-01-29 15:14:55.000000000 +0100
    +++ apache-corrupted/usr/lib/httpd/build/config_vars.mk 2009-01-29 18:02:46.000000000 +0100
    @@ -78,7 +78,7 @@
    EXTRA_INCLUDES = -I$(includedir) -I. -I/usr/include/apr-1 -I/usr/include
    LIBTOOL = /usr/share/apr-1/build/libtool --silent
    SHELL = /bin/sh
    -RSYNC =
    +RSYNC = /usr/bin/rsync
    SH_LIBS =
    SH_LIBTOOL = $(LIBTOOL)
    MK_IMPLIB =
    diff -ur apache-ok/usr/sbin/apachectl apache-corrupted/usr/sbin/apachectl
    --- apache-ok/usr/sbin/apachectl 2009-01-29 15:13:15.000000000 +0100
    +++ apache-corrupted/usr/sbin/apachectl 2009-01-29 18:00:32.000000000 +0100
    @@ -51,7 +51,7 @@
    # a command that outputs a formatted text version of the HTML at the
    # url given on the command line. Designed for lynx, however other
    # programs may work.
    -LYNX="lynx -dump"
    +LYNX="links -dump"
    # the URL to your server's mod_status status page. If you do not
    # have one, then status and fullstatus will not work.
    Binary files apache-ok/usr/sbin/httpd and apache-corrupted/usr/sbin/httpd differ
    The most scarry part is that httpd binaries differ! Could it be that 2 developers built the same package, labeled them the same version and they got uploaded to different mirrors? I hope this is the case because the first thing I thought was that I may have some malware on my computer.
    Which brings me to another question: are there any measures to ensure the integrity of pacman database? In other words, if some mirror gets hacked and somebody puts some malicious stuff into a package, if and how would pacman be able to detect this? Pacman gets the database from the same mirror as it gets the packages, and if a package is deliberately modified, the database on the same server could be as well. Perhaps the database could be signed by archlinux.org and the pacman package would include the public key to verify the signature on each pacman -Sy operation?

    Even if this is a simple and innocent mistake on the part of the devs, it does highlight the need for package signing. I haven't been following it myself, but I believe that PGP signing is in the pipeline but I have no idea if there's any ETA for that or if it's even on anybody's priority list.
    As for the database and packages coming from the same server, you could use powerpill to get around that. Put archlinux.org (or another trusted server) at the top of your mirrorlist and pacman will use it to sync the database. Uncomment several other servers to which you get a good connection (or use reflector) and powerpill will use them to download the packages but will check their md5sums against the database from your trusted server. The info page linked in my sig provides more details.

  • Birthdays of address book accounts others than local

    There appear no birthdays in iCal for contacts of Apple's address book, if the contact are NOT within the Local account, but part of a CardDAV account. If I copy a contact to the Local account the birthday appears in iCal.
    My iPhone (iOS4) uses also CardDAV to sync these contacts, but the birthdays are shown in the iPhone's calendar perfectly.
    Is iCal able to handle birthdays of Local contacts only?

    Sorry for the delayed response.  As I said, this is a quick hack of somebody else's work, so the end result isn't pretty, but it works.
    http://www.jmatt.net/misc/vbook.php.txt
    http://www.jmatt.net/misc/vcard.php.txt
    vbook is the script you run.  It requires vcard.
    To execute it, first export your address book entries into a single vcf file.  In Address Book, select the server account.  In the menu , select File->Export->Export Group vCard  and put the file wherever you want it.  The script as written expects to find this file in the folder above the script, but that's easy to change.
    After you have the file in the right place, execute the script.  It writes to standard output, so you'll probably want to pipe it to an .ics file.  Then import that file into iCal.
    As I mentioned, if you have multiple Macs, you'll want to run this file on each one, and import the file into a local calendar.  If you try to put it on a server and share it between Macs, the address book links in the calendar entries won't work.
    Obviously, this is a minor PITA as you need to run it regularly if you have a lot of changes in your Address Book.  It's not too bad for me, because I don't have a lot of changing info.  I run it every few months, whenever I think about it, in case I've recently added a birthday to my address book.
    I'm hoping that this will all become unnecessary when iCloud rolls out

  • CSS: Mgt port for management vs normal port for Maqnagement

    What are the pros and cons of using the ethenet management port for managing a CSS and using a normal ethernet port for managing a CSS.
    Is any functionality of CSS depends on Management ethernet port? Is connecting via local lan still an issue/requirement?

    you can use whatever port.
    People usually wants to use a management port that is *separated* from the rest of the device so that if a regular port gets hacked and somebody gain access to the device, you can't access the management network.
    To obtain this separation between regular port and the management port, a lot of restriction have been created on the management port.
    You can't configure a default route on the management port, you can't have routes overlapping between management port and regular ports, ...
    Therefore, personally, I prefer not to use the management port. The chance that somebody gain access to the CSS via a regular port is almost null so it does not justify the pain to use the management port.
    Regards,
    Gilles.

  • I forgot my apple password  and i forgot the security q , and i think somebody hacks my email . please help

    i forgot my apple password  and i forgot the security q , and i think somebody hacks my email . please help!!!
    this is it ([email protected])

    Locked Out, Forgot Lock or Restrictions Passcode, or Need to Restore Your Device: Several Alternative Solutions
    A
    1. iOS- Forgotten passcode or device disabled after entering wrong passcode
    2. iPhone, iPad, iPod touch: Wrong passcode results in red disabled screen
    3. Restoring iPod touch after forgotten passcode
    4. What to Do If You've Forgotten Your iPhone's Passcode
    5. iOS- Understanding passcodes
    6. iTunes 10 for Mac- Update and restore software on iPod, iPhone, or iPad
    7. iOS - Unable to update or restore
    Forgotten Restrictions Passcode Help
                iPad,iPod,iPod Touch Recovery Mode
    You will need to restore your device as New to remove a Restrictions passcode. Go through the normal process to restore your device, but when you see the options to restore as New or from a backup, be sure to choose New.
    You can restore from a backup if you have one from BEFORE you set the restrictions passcode.
    Also, see iTunes- Restoring iOS software.
    Alternatives for Help Resetting Security Questions and Rescue Mail
         1. Apple ID- All about Apple ID security questions.
         2. Rescue email address and how to reset Apple ID security questions
         3. Apple ID- Contacting Apple for help with Apple ID account security.
         4. Fill out and submit this form. Select the topic, Account Security.
         5.  Call Apple Customer Service: Contacting Apple for support in your
              country and ask to speak to Account Security.
    How to Manage your Apple ID: Manage My Apple ID

  • I reset my apple password but i cannot recieved email on recovery email either on same email which i submit for apple id somebody hacked my apple id please help and worst thing i remembered security quitions but i cant remembered date of birth please help

    i reset my apple password but i cannot recieved email on recovery email either on same email which i submit for apple id somebody hacked my apple id please help and worst thing i remembered security quitions but i cant remembered date of birth please help

    Place the iOS device in Recovery Mode and then connect to your computer and restore via iTunes. The iPod will be erased.
    iOS: Wrong passcode results in red disabled screen                         
    If recovery mode does not work try DFU mode.                        
    How to put iPod touch / iPhone into DFU mode « Karthik's scribblings        
    For how to restore:
    iTunes: Restoring iOS software
    To restore from backup see:
    iOS: How to back up     
    If you restore from iCloud backup the apps will be automatically downloaded. If you restore from iTunes backup the apps and music have to be in the iTunes library since synced media like apps and music are not included in the backup of the iOS device that iTunes makes.
    You can redownload most iTunes purchases by:
    Downloading past purchases from the App Store, iBookstore, and iTunes Store        
    Also
    If you have Find My iPhone enabled, you can use Remote Wipe to erase the contents of your device. If you have been using iCloud to back up, you may be able to restore the most recent backup to reset the passcode after the device has been erased.

  • Somebody Hacked my iCloud Email and delete all contacts, how to renew it?

    hello,
    few days ago I used to be in Israel, during my visit somebody hacked my email on iCloud, there was sent few hundreds of emails from my account, asking money to my contacts.
    after I get back to office and get my account back i found all contacts from my Contacts book was deleted as well as on my iPhone 5S!!!!
    Please help me how to restore this data.
    All The Best,
    Beka

    First, don't unsubscribe.  This only tells the spammer that your email address is valid and they will send even more.
    If this is only being sent from a few specific email addresses, you can set up a rules on icloud.com similar to the image below to send them to the trash.  This describes how to set up a rule: http://help.apple.com/icloud/#mm6b1a3f8a.

  • My friend itune account has been hack by someone . so he don't have password or security questions answers.So he want to delete his itune account because he can't signout his icloud account on his iphone.somebody help us!!

    My friend itune account has been hacked by someone.And he change every things like password,security questions and recovery mail.So my friend don't have password or security questions answers.And he want to delete his itune account because he can't signout his icloud account on his iphone.Please tell me how to turn off find my iphone without password.
    somebody help us!!
    sorry for my some mistake in descussion because i am bad in english.

    Welcome to the Apple community moonlight94.
    If you are unable to remember your password, security questions, don’t have access to your rescue address or are unable to reset your password for whatever reason, your only option is to contact AppleCare (or Apple ID Support), upon speaking to an operator you should explain that your problem is related to your Apple ID, this way you will not be charged for assistance, even if you don’t have an AppleCare plan.
    The operator will take you through some steps you may have already tried, however they need to be sure they have exhausted all usual approaches before trying to reset your account, so you should try to be helpful and show patience with the procedure.
    The operator will need to verify they are speaking to the account holder and may ask you some questions that only the account holder could know, and you will need to answer them if the process is to proceed.
    Once the operator has verified your identity they will send a message through to your device which contains an alpha numeric code, which you will need to read back to them.
    Once this has been completed they will send an email to your iCloud email address after a period of 24 hours, so you should check that mail is enabled in your devices iCloud settings.
    Upon receipt of the email, use the reset link provided to reset your password, after which you should be able to make the adjustments to iCloud that you wish to do.

  • Somebody threatened me to hack my account, should I be worried?

    Somebody threatened me to hack my account, should I be worried? And how can I protect myself?

    I have no idea how secure Google is, but if your Apple ID password is different than your Gmail password you're OK.
    For added security, I would recommend setting up two-step verification for both Google and Apple. This way, no one can sign in without physical access to your device.
    I also want to stress again that you should take this matter to the police. This guy should be brought to justice.

  • Seems like somebody is using/hacking my account?

    Hi,
    I've been using Skype and it has kept turning me online occasionally whilst I am invisible, I've tried to find solutions such as turning off promotions and disabling uPnP (as I saw looking at people with similar problems). I recently learnt that to other people even when I don't have skype running on my computer that people see me as online, or away. When I go onto skype (automatically as invisible) I go invisible to other people, but as soon as I quit skype I return back to away.
    I am concerned about this and I have changed my password also, but it is still happening. Today whilst I was making a call, the ringing tone stayed during the call and even after I quit skype and I couldn't find anything in processes but it still kept ringing! (It eventually subsided).
    Any help would be greatly appreciated.

    you can visit the link below for suggestions;
    Suggestions on how to handle “Hacked Skype Accounts”
    IF YOU FOUND OUR POST USEFUL THEN PLEASE GIVE "KUDOS". IF IT HELPED TO FIX YOUR ISSUE PLEASE MARK IT AS A "SOLUTION" TO HELP OTHERS. THANKS!
    ALTERNATIVE SKYPE DOWNLOAD LINKS | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUSPICIOS CALLS AND MESSAGES
    SEE MORE TIPS, TRICKS, TUTORIALS AND UPDATES in
    | skypefordummies.blogspot.com | 

  • I think somebody is hacking my visiting websites and ip address.Some sites are not opening.When I am trying to open mozilla 1 message box is being displayed stating that one firefox is being opened and not responding first close it & restart the system.

    At present 2 websites are not opening. When I am trying to open these sites either "problem loading page or the website you are looking is not present". These two messages are being displayed.

    Try clearing your browser cache.
    Tools > Clear Recent History... - hit Details and make sure only Cache is selected, then select Everything and hit the Clear Now button.

Maybe you are looking for

  • Arrays or Variable

    Hi, I’m trying to get a pass rating from my database, this information is not in the database but it’s calculated from information in the database. I have 1500 user enrolled in my training and each individual is in pps_principals.name What I want is

  • Folders on NAS read-only. Can't change

    I have a buffalo linkstation pro duo NAS. It is formatted in XFS. It seems that randomly some folders have been changed to read-only, when they were previously read-write. I have one folder that is stuck in a read-only state. The folder contains some

  • Mass maintenance and BDC Recodring of custom fields added in PO header.

    Hello Experts, I have created a custom fields in PO header and used  Structure for BADI implementation to update the header with values enterd in custom table. My requirement is for some selected PO i want to fix the value of one of my custom field a

  • PAL 25fps to Progressive for DVD

    Is there a guide somewhere which states how to correctly convert between PAL 25fps video (telecined from film) to NTSC Progressive, with the 4% slowdown added and using the very best possible quality settings? I'm confused about conforming the PAL vi

  • How can I import and edit photos on my laptop and synch with PS Elements?

    I have my Photoshop elements library on my desktop. Can Lightroom help with this, or do I need to update to Creative Cloud with Photoshop?