Hacker attack?

This is perhaps not a specific Mac question, but I don't know where else to post. Yesterday when I woke my MacBook Air  in the afternoon I found that almost all applications were open. I didn't start those applications before putting it to sleep. At the same time, my wife told me that while she was working in the afternoon on her Windows 8 PC, suddenly the mouse started to move by itself, and 20 windows popped up. This was happening for about 5 minutes. Since it happened to both a Mac and a PC, I guess it's not a virus. Could it be an intrusion in our WiFi network? I use WEP, which is admittedly weak. If that is the case, what could an attacker have gotten out of it?

I have file sharing turned on, but only of access to my public folder, not screen sharing.
Then it appears screen sharing was on on your wife's Win 8 PC. No mouse movement should have been active on your Mac.
could some kind of keylogging program have been installed on our computers?
It would take installation of some sort for that to occur that you allowed. Have you installed any software from torrents, or other illegal downloads? Not trying to imply you did, but that is the number one source of Mac malware. They stuff other other items into popular software that wouldn't normally be. Once you give OS X the OK to install (example: Photoshop), you give it the OK to install everything else in that package. Including items you weren't expecting or knew was even there.
If none of this applies, then you're probably okay.
So that, even if we change the WiFi password, the intruder can still monitor us through the internet?
Assuming it was a wifi intrusion, yes. Do this to cut them off:
1) Go into the router's settings. Typically, from your web browser and put 192.168.0.1 into the URL field. Check the manual to see what to use for certain. If a password dialogue comes up in the browser before it will show the router's configuration pages, the manual will also tell you what the defaults are.
2) Once into the configuration page, the very first thing to do is turn off wireless broadcasting. You don't want anyone to see what you're changing.
3) Create a strong login password for the router. If you leave it at the defaults, it's like having no protection at all, regardless of what wireless security you're using. Anyone within range of your wireless signal who wants to break in can just type in the same IP address I noted above and try the very common default admin and password entries. Once by that, they can see everything you can, including any wireless passwords. Then they can just login again.
4) With the wireless signal still disabled, now change your setting to WPA2 and enter a new long, random character password. Something like UMjtnEm9xbIsLhjFkVRnVjUu . An excellent little free utility to generate such passwords is RPG. Since special punctuation characters can throw off both Macs and PCs, I keep the Punctuation & Symbols check box turned off. Longer is always better. I'd use at minimum a 20 character password.
5) Write your new WPA2 password down as you'll need to update any devices in your home that need to access your router.
6) Now turn wireless broadcasting back on. Unless they manage to figure out the web admin login password, no one outside of your home will be able to get into your router settings to see what your wireless passwords are.
Is there any kind of log where I can detect if there was an intrusion?
Unless you had the Mac's firewall on, you won't find any messages there. By default, the firewall is on in Windows. You should be able to find a log to read through and possibly see who was accessing your computers.

Similar Messages

  • I am using dreamweaver cs6 is it protected from various hacker attacks such as sql injection,xss,?

    i mean if i built a site using php and sql using dreamweaver cs 6 ...will it be protected from various hacker attacks such as sql injection,xss,spoofed form input,etc..?? if it is not protected...tell me where can i learn to protect my website using php and sql....from all types of hacker attacks...help needed.... thank you..:)

    A couple more comments.
    To guard against most of these security risks, you have to completely sanitize any user input whether processed further on subsequent pages or added to a database.  That complete sanitization usually involves stripping out any HTML/JavaScript, and blocking SQL-crashing equalities/inequalities.
    You can get alot of information about these and other methods on the Dreamweaver AppDev forum -
    http://forums.adobe.com/community/dreamweaver/dreamweaver_development?view=discussions
    which is where most server-scripting topics are discussed.

  • Urgent, hacker attack on our site, BS subscription is off...HELP!!!

    Hi guys,
    We had a hacker attack on our site during the last several days. We solved the issue and stopped the attack, but they ate all our BS subscription for this month and our site is 100% out now!
    Who can we contact to reinforce the subscription for this month? It's super urgent!

    Hi Alexey,
    For subscription question I suggest you contact with Azure support team ASAP. Please try this channel:
     http://www.windowsazure.com/en-us/support/contact/
    Any information, please let me know.
    Regards,
    Will
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Open Directory & Firewall: How to prevent hack attacks

    With my current Open Directory configuration user accounts get disabled as soon as 12 login attempts fail.
    Now the problem is the following: there are periodic attacks trying to hack user accounts. They do this by trying typical user names and common password I guess (e.g. password=user name, password=123, ...). I enforce a rather strict password policy so allowing only 12 guesses should be kind of safe.
    And typically they do not even guess an existing login name .... except for one. I discovered this issue because one user came to me twice this week because his account was disabled. So I finally found out that his username was in a hacker list. I solved the problem by making an new account with different login name. But that's not a good solution for the future.
    Is there a better way? What I would like for example is disable login attempts from a certain host for a couple of hours after sufficient many failed login attempts. Or even better: putting these hosts into a ban list until I free them manually.
    Maybe such things can be done with the firewall (and if yes: how?).

    Preface: I am not fiscally tied to any product or service I might mention, I'm just a paranoid system administrator.
    I never like to see anyone directly expose a file server to the Internet. That is asking for the kind of trouble you're seeing or worse.
    The "best practice" I've adopted at my office is this: if a project office is large enough to warrant a file server, it is large enough to warrant a dedicated firewall appliance.
    The unit I have been purchasing for my projects lately is the Astaro ASG120. It is a small firewall box that not only does standard firewall duties, but also serves as a VPN endpoint for remote users, a VPN peer for site-to-site VPN connections, a web filter for managing end-user access to questionable sites, with virus scanning, and an email filter if I should choose to operate an email server at the project site.
    The appliance is not the cheapest on the market, but for the initial cost of about $2000 USD & an annual cost of about $800, the peace of mind is worth every penny.
    G. Discenza

  • Hacker attacking my FTP

    I've had my website hacked 4 times recently and can't work out how they are gaining access. The host provider simply says I'm not keeping my password secret. I have moved to another provider today but not convinced it won't happen again. It is just a small holiday cottage website but has been attacked by anti zionist rantings from Egypt. Clearly a random attack but I'm worried they could attack again just for the fun of it.
    I've no idea how FTP sites are hacked anyway but is there any software for OSX that I can run to eliminate the possibility of any virus on my computer that could be providing a leak?
    I also use DropBox and LogMeIn on a daily basis to link between machines. Do any of them have security weaknesses?
    Thanks for any help. This has been stressful and I'm not getting any helpful answers from the old host provider on this!

    Coming here is to an OSX forum was to find out if there are any known risks using OSX in general. Everyone always says 'Macs never get viruses' etc but wanted other people's views on this.
    As far as that goes:
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from (on no account install Norton Anti-Virus on a Mac running OS X):
    http://www.clamxav.com/
    The new version for Snow Leopard is available here:
    http://www.clamxav.com/index.php?page=v2beta
    (Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.)
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites like Twitter etc), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    As to the recent 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program. A recent example is of malware distributed through innocent looking free screensavers: http://www.zdnet.com/blog/security/malware-watch-free-mac-os-x-screensavers-bund led-with-spyware/6560?tag=nl.e589
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    Last but not least, there is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    NOTE: Snow Leopard, OS 10.6.x, offers additional security to that of previous versions of OS X, but not to the extent that you should ignore the foregoing:
    http://www.apple.com/macosx/security/

  • Apparent hacker attack via Skype. (They seem to ha...

    We have someone placing phishing calls to us (one of those ones that asks us to go to a different site) but this had the additional details that...
    The camera activated before the calls. About a minute or so. We see the light come on and while we are trying to figure out what that is all about the call then comes in.
    When the call comes we cannot hang up the call nor even close Skype. We have to either reboot the system or use the windows Task Manager to get rid of it.
    So far we have had four of these come in over the past 3 days or so. On three of them we had to shut off the computer to get rid of them. On the fourth I tried the task manager and after killing Skype the call was gone. But then I restarted the system just to be sure.
    Also of note is that this morning a friend of mine was describing the exact same thing happening at his house. Both he and his son's computers got one of these calls. Although my friend says he did not notice either way his son does say that he noticed the light was on showing his camera was activated before the call actually came in. In both of their cases they could not get the cal to hang up or Skype to close so they shut down their computers.
    Final detail, our comuters are set to not allow calls from people outside our contact list. These calls all came from IDs I have never heard of and are not in our lists. 

    Well...it seems to me if there was a security hole in Skype itself we'd be hearing about a LOT more cases than the few you're reporting.  I wonder if what you're seeing isn't a case of a few Skype users you know having their accounts hacked.  (That does happen.)
    Think about it...if I was on your Contacts list, and someone hacked my Skype account, and the hacker sent you an IM that seemed to come from me with a link to malware, you'd think the message was from me, someone you knew, and you might click on the link.
    If I were a phisher in that situation I'd say something in my IM like..."hey it's me.  Take a look at this.  It's safe and it works great."
    I'm not putting my tin hat on just yet but I will see if I can bring this thread to the attention of someone at Skype.
    edit:  A forum Moderator is aware of this thread and will be bringing it to the attention of the appropriate people at Skype.
    Please note: I do not respond to requests for help via Private Message.

  • Does today's hacker attack regarding stolen passwords for FB, Google, Twitter, etc. affect Macs?

    And is there a website that lists virus affecting Macs?

    Only if you if your password was one of those. It is important to remember the difference between passwords saved online and the security of your Mac. Your Mac is far more secure than any web server. The chances of getting any virus or hack on your Mac is virtually zero. Big web sites, however, typically don't have good security for user information and passwords. They get hacked on a regular basis.
    Unfortunately, the typical response is to install antivirus on your Mac which does nothing but make it slow and buggy and continuing to use poor security practices on the internet. Your Mac is safe. Keep that antivirus off. Never reuse passwords online. Use iCloud Keychain to generate more secure, and unique, online passwords.

  • How can I protect my Macs from virus/hacker attacks?

    What virus/Firewall software can I purchase to protect my MacBook & iMac? Are Macs totally safe?
    I'm a business owner and need to protect it.

    Have a read here...
    http://www.reedcorner.net/guides/macvirus/
    And see this...
    https://discussions.apple.com/thread/3710639?start=0&tstart=0

  • My MacBook air is hacked.

    Hi !
    I need some help. From someone with really great knowledge and connections.
    (but I'm going to write a bad question (maybe) because I'm fed up with idiotic know-how insides like "how to write a good question". a question is always good, mind you. But I don't know if I should post it in another topic, if so, feel free to fix that, anyone, thx).
    I just bought a mac book air, and strange things are happening.
    For instance, the computer would block, I can't click anywhere with any result for sth like 30 sec. It's brand new. I've just unpacked it.
    Or the bookmarks in safari were strange, because there was my own bank in it (+ apple + google maps + wikipedias + misc.). (I'm not suffering any memory affection or anything).
    Or I just did a research with google (sim city) and results appeared with "Disney" in the research field.
    To set the scene, my Facebook and Twitter accounts are quite often hacked, with the same subtle processes. (like" they" or God maybe, someone who's not me, would add some followers supposedly added a few weeks ago, and so on). I think  I'm being followed by a few excited engineers with great extended connections  (because (probably) I filed a case against them, for...harassment. (It's been going on for a few years and I'm really, really tired, given that they used the info they got to destroy my life , social relations and career )
    I can't believe a just-bought-just-started computer could be hacked so easily. Although I had logged into my apple account. And they got my Ip address. But the only things I downloaded were uploads from the app store.
    How can you prove your computer is being hacked?
    Thank you (in advance and a lot) to anyone who can help.

    Hello, thanks for answering !
    I don't know what they want, and I can't make you understand how it feels to be constantly "spied" on whatever you're doing - especially work when you're not someone who believes she does everything right or ever will or ever wants to be that kind of person. They made me lose hours and hours with my printer, lose documents, and so on.
    If you were a hacker, benwiggy you'd be caught. Probably. On the long term, that is.
    If you push the game too much, then it's too obvious and cops will have to react. It won't last. It's much more fun to drive someone mad with no possibility to assert her basic rights, for lack of proofs. (therefore the quicktime solution is not a bad one, although it does not fix everything. Yesterday I got a video of my mouse moving by itself right in the middle of something I was doing (entering an email address) on this computer but still, it's no obvious proof, I could have done it myself (say you're typing extremely fast with just one hand, using the other to click right on the other field).
    It's much more efficient than crashing a hard drive.And not less annoying. And  I did crash my hard drive  all by myself, twice, after several complete reinstallation of mac os on my previous computer. And then, I was so annoyed by their little game that I banged my fist on the computer, which did not prove convincing. At the end of the day, that's two hard drives and one complete machine broken, just on me.
    Anyway, speaking about it is a good defensive mean, so thank you.
    I think people should know about this category of hacking. It's quite disgusting. I would prefer a good hacker attack, with a pirate boat flashing several times on my screen, and then the whole thing exploding.That would be sort of fair piracy. (But mines are cowards).

  • OSX-partition not identified after trojan-attack with win7-partion deactivated

    Hello,
    1. After a hacker attack on my windows partition, a hacker hijacked this system with the ukash-trojan in a newer variant (a very bad and good programmed trojan). I could not make any actions as administrator and I could only run the system under safe mode. Boot Camp was destroyed/deactivated under windows by the trojan.
    2. I idiotically deactivated the windows partition.
    3. The Mac don't restart under OSX Snow Leppard: operation system not found.
    4. Booting anything from DVD-Rom-Drive is blocked, but the drive sounds, as if it is ok (booting by pressing the C-/option (command-key) key doesn't work).
    5. the Mac-hardware test under F2 say, that everything is ok with the hardware.
    6. Driving the MacBook Pro with another (this) computer via data cable doesn't work.
    7. Any USB-DVD-Rom-Drive could not be identified.
    Are there any possibilities, like esc,F8,F10,F12 at Windows-PCs, to define the booting conditions?
    Thank you very much ! (I am sorry for my bad English).

    A little information or knowledge can be dangerous in some hands.
    Start over.
    To understand partitions and EFI as well as GPT -
    http://www.microsoft.com/whdc/device/storage/GPT_FAQ.mspx
    Secrets of GPT http://developer.apple.com/library/mac/#technotes/tn2006/tn2166.html

  • You've been hacked !! (by tiger-mate)

    En-route to ASC today I suffered a hack attack by tiger-m@ate ...I say I suffered the attack, in fact it seems to have been an attack on either google.co.uk or apple.com. There is some insistence that it can't be the latter.
    New to ASC I started a discussion at:  https://discussions.apple.com/thread/3345813?start=0&tstart=0
    ...advised that it belongs here instead, it not being an attack on ASC (unconfirmed).
    It seems that several hundred servers were attacked today and most likely these were XSS-attacks. My initial research leads me to believe that these attacks are based on the exploitation of server-side vulnerabilities rather than malware on the client-side but I'm no expert.
    I've always assumed that as much as I try to protect my network against hacking and my computers from physical theft, there will always be a risk. For this reason I ensure my data is well protected: I use 1Password for log-in security, Knox for encrypting my documents and data (whilst retaining portability) and Espionage for securing application data. Nevertheless, it concerns me that my system may have been compromised.
    Please contribute if you've had a similar experience or can offer advice on the extent of the risk involved.
    Andrew

    @etresoft  thanks for your response — it seemed to me when I revisted it, that the redirected page had no apparent functionality and appeared to be more of a calling-card ...seemingly aimed at increasing the noteriety of tiger-m@te, than to launch any kind of malicious attack on the end-user.
    Seeing a browser window shrink, dance around the screen like a sprite and then expand to reveal "hacked" across the screen was a little disconcerting ....and naturally ones immediate reaction is to quit, trash and cut the connection.
    Thanks for your input, hopefully it will reassure others.

  • Adobe hack bigger than first admitted

    So it seems that adobe lost 38 million user details, 10 times more than they first admitted to.
    Thats the bad news.
    The good news of course is the hackers got the code to photoshop. So hopefully it will find its way into a variety of other developers and into the general public ridding the world of adobes corporate greed with this faulty creative cloud scam they got running.

    Here is one article about it:
    http://www.nbcnews.com/technology/adobe-hacker-attack-much-bigger-previously-disclosed-8C1 1493155
    My biggest concern is trusting Adobe with my credit card any more.  My credit card company is sending me a new card and automatically cancelled my current one (Adobe contacted them).  Now I have the pain of changing the card at a variety of places.  How do I know that Adobe has figured out how they got hacked?  Has the hole been plugged or will we be going through this all over again in a few months?  The fact that they said one thing a few weeks ago and now this is "bigger" than they thought... makes me wonder if they really understand what happened and can keep my information safe in the future.  I am very skeptical.  I have been a big supporter of Adobe over the years and actually feel that CC isn't that bad of a deal (considering I use a Mac and a PC, the pricing is much better since I don't have to own two different licenses).  However, this is really making me think hard about giving Adobe my CC any more in the future.

  • Virus attack on router?

    I have an issue with my router this happened twice in 1 week. I have reset the router but this keeps happening. What could this be? Could this be some hacker attacking my router or a virus trying to get in? See the video here
    http://www.youtube.com/watch?v=_R2RYDsitf4
    Please leave comments on the forum. You can also leave them on the video page but Iwould rather the comments be left on this forum. My router is hardware version 5 and it has the latest firmware. This has been a good router I am not ready to give it up. It has a range better than a wireless N i have that is why I am still useing this router. Oh and I live away from town and only a few neighbors have wireless but they are not close enough to cause problems.
                                                                          Thanks

    You said you performed a reset and the problem recurs.  Have you done a hard reset using the 30-30-30 method? That involves pressing the reset button for 30 secs, removing the power for 30 while still pressing in the reset button. Then plugging power back in while still holding for 30 last seconds.  Then after that power if off and wait 60 seconds before resuming. This will perform a complete hardreset where the unit should be restored to all factory defaults of the firmware.
    If the above steps does not fix the issue then the next step would be to reflash the router with the latest firmware.  If after a firmware upgrade the issue continues then the router is more then likely on its way out and needs replaced.

  • Video chat problems - please help!!!!!

    Please help, I am trying to video chat with my father on a PC, and brother on a macbook
    I cannot video chat with either of them, I have an comm error -8 come back every time i initiate a video session with either my brother or my father. However my father (using a PC and AIM 6.5) can have successful video chat with both my brother and I.
    I have made the suggested alterations to both QT and iChat preferences, I have switched off both the router and mac firewalls, but still no joy.
    I am using a intel iMac OSX 10.4.11, with ichat 3.1.9 and a belkin router, any help would be appreciated, Thanks in advance

    If you have two computers on your LAN that you want to use the same ports for then you have to use a method that allows multiple computers.
    UPnP is one method and easiest to set up as it is usually an On/Off setting
    Port Triggering is another and needs you to know which ports iChat uses first and where it uses next to get it set up.
    UPnP also tends to get around any NAT issues
    Having said that the Link I sent you to earlier does not show UPnP or Port Triggering in the menu.
    User Manual
    http://www.belkin.com/uk/support/article/?lid=enu&pid=F5D7633uk4A&aid=6117&scid= 0
    Which Says it does have UPnP and an SPI firewall
    *Universal Plug-and-Play (UPnP) Compatibility*
    UPnP (Universal Plug-and-Play) is a technology that offers seamless
    operation of voice messaging, video messaging, games, and other
    applications that are UPnP-compliant.
    *SPI Firewall*
    Your Router is equipped with a firewall that will protect your network
    from a wide array of common hacker attacks including IP Spoofing,
    Land Attack, Ping of Death (PoD), Denial of Service (DoS), IP with zero
    length, Smurf Attack, TCP Null Scan, SYN flood, UDP flooding, Tear
    Drop Attack, ICMP defect, RIP defect, and fragment flooding.
    This last is the most likely cause of blocks as iChat data can be seen as an Attack by this sort of "firewall" It appears on page 56 of the manual.
    UPnP is on page 67
    10:10 PM Sunday; January 13, 2008

  • To SONY management not Sony ericsson Management, please don't do the same mistakes.

    Please Don’t Make Same Sony-Ericsson Mistakes
    by USER-986393 » Thu Oct 27, 2011 3:40 pm
    Congratulations on your Erricsson's share acquire, I must say i have been Sony phone holder from the day SONY CDM-Z1 was created, forced my self to stick with SE... and now happy to come back to SONY again. I would like to talk about couple of things...
    Response:
    The major fall of SE is the fact that they did not listen to fans and most importantly customers. we complained so much over Xperia X1 and Xperia X10 until SE forced us to purchase other brands due to lack of response. so please, responding to complaints is critical when there are so many better phone makers out there.
    Lack of future vision:
    Look at the Galaxy S, Galaxy Sii, Iphone... you know what they have in common? light years technology for the same price as Caved in SE phones. Arc vs Sii?... SE was against technology for some reason, for instance. who ever was against dual processor and how much it would attract customers, needs to find another company to put down. Lack of LTE?, how can someone not find that as something a cell phone can use in the future? Market share in USA? why would someone not give the US attention, no one buys a full priced phone these days, that only worked when there was no contracts. these days i don't mind a contract as long as i am getting a phone a i can not afford. also i never understood this frequency difference, why did SE wait until iPhone 4s marketed the idea a "world phone" that works anywhere? why did SE insist on making an American version and an international version? example ARC LT15A and ARC LT15i is it SO HARD to make a phone that has all the frequencies LT15Ai? really? who ever was against that idea needs to go as well.
    I will assume who ever is reading the example i mentioned above is grasping the importance of it... it's as simple as this SE would have been more successful had more people bought SE phones, i am interested in the ARC LT18A, well there is only LT18I that wont work 3g on At&t. here are the problems that you will face... 1 - a happy innocent customer that did not know that, purchased a LT18I (international) and realized SE customers service in Canada or USA that it won't work in the U.S. on 3g...   2 - a frustrated customer like me who knew about the difference from previous mistakes and decided to buy an iphone instead just bc of the being neglected or carelessness from SE towards people in the U.S.  either way, wither those two two points were shocking to you as a SE manager, or a common fact that is not important enough... that manager needs to go.  with a tahnk you note for loosing market share in the U.S. deserves an excelence in that actually.
    Wrong Focus, right focus was a little too late:
    SE phones especially in 2011 was way behind any other company in smart phones, yes the ARC S was maybe a nice attempt but simply not enough... the world is advancing really fast, if you dont catch the train, then your about to bankrupt. it took forever to jump on really powerful phones and instead there so many variations. you can get a cyber-shot but not a Walkman.. you can get a walkman phone but not as smart as the p900 you can get the p900 but not as slim as the p600. SE was competing with its own self ... lets FOCUS, get your stuff together and make a Quality phone not Quantity phone. (GOOD JOB ON THE TABLET) the variations are based on needs not confusing differences. The ARC was a great phone, but SE had missed the train.
    THE UPDATES:
    The most frustrating customer service i have ever experienced, and when updates come out, they come out first in Nordic places then in middle east country by country... giving every day more fuel to angry customers wondering when they will be lucky to get an update ... why can't there be one global update for all phones and different updates to phone carriers for each country. make it easier, it does not take a company purchase to do so.
    Announcements:
    it was frustrating, just like it is right now, i still don't know when ARC S comes out. oh wait i am in the U.S. it comes out "WHENEVER" does it look like i am happy? i need a new phone, how SE expect me to purchase an ARC S when i don't know how long i am waiting for it and there is GALAXY and Iphones released in the markets hovering around me every day?
    USA, USA, CHINA, USA:
    Why was the U.S. not a focus, please someone answer!
    Creativity:
    androids are awesome operating systems, they are simply great and simply work every single time you use them. i believe, i gave SE so many ideas, non of them were integrated. to be able to distinguish your self from the rest of the pack; you need to be the alpha. simply having the most powerful phone is one factor, Xmore R is another, crazy led designs. look at the Tablet S, it's not the thinnest, it's not the cheapest, it's not the most powerful, yet it's unique in design. and for the market with the dull flat tablets, who ever designed it should design your new phones. the ARC design was AMAZING but lacked the items that are enough to give it a competitive edge in the market.
    Charging:
    Why is it only micro USB is the main charger, Why can't it be that and another EASY WAY OF CHARGING, why do we have to wait tell apple go to conductive charging? SONY come up with two ways of charging, micro usb is great cause every one has either a BB or an android somewhere. but imagine just placing your phone on something without me connecting... I AM BUYING.
    Pricing:
    SE charges an arm and a leg, when Galaxy Sii and iphone 4s are $200.00... do you not thing there is something wrong here?
    Accessories:
    I have suggested times and times, make more accessories, lets compare phones covers for the Iphone and the Any SE phones... the amusing aspect is, why did not SE see what I see?
    Cool names PLEASE:
    the ARC is a way to start after 10 years of naming products like fax machines... I need to see Jima, president, awesome... less chemical equations of fax machine names. LT18a, imagine I tell my friends have you seen the LT18a or have you seen the Sony ARC?
    FM:
    Really?  your research says in 2011 people won't buy a phone without FM?  and the customers would also do the twist dance from the joy of knowing the phone has FM.  it's 2011, perhaps you need to look in your research again.
    SonyEricsson does not see the need for a dual processor for an android that won't support it yet:
    that right there shows the difference between a company with a long vision and another with a short one.  my answer to that statement, please set down get some popcorn as you are just about to watch S ii and iphone 4S a chance to be light years ahead of you, and sell millions of more phones than you.  just because someone that works at SE has a very short vision ruining a whole company. president of Syria bashar alasad, believes that his country is under control.  the achievements of democratic countries did not impress him and the fall of Lebian, Egyptian, and Algerian presidents did not get him to even think twice about what is happening.  it amazes me how people can be so selfish and short visioned.
    Waterproof: 
    Great idea, where is the phone, i am in the U.S. while you are at it, let me suggest accessories.  a helmet accessory that would station that phone on my helmet while i am racing... right there i can buy a phone that is weather proof records 720 p and when i am done from my athletic even i can use it as a phone.  knowing SE, don't even think about that idea, and i will get an email saying we only have a shoulder accessory for now thank you for inquiring.
    Closing fan websites?
    xperiablog.net, um........ ? 
    now there are people at SE that need to be promoted,
    Updates had gotten faster and better, but they still need more work
    unlocking the boot loader is a great i dea
    designs started becoming extra beautiful
    SE website is beautiful
    facebook page is great
    xmor r, phone screen size EXCELENT
    forum support is getting better
    there many many things I can bring to the table, question is, SONY are you going to do the same Mistakes? or am i going to changes? perhaps you need to hire me, so I can get something done. how open are you to changes? how open are you to listen to your customers and fans? how open are you to realize the completion and take actions to be ahead of the curve? how open are you to realize that the Video games on cell phones are only fun the first 5 minutes but after that iphone 4s is better?
    LTE, Gorilla Glass, conductive charging, Unique design, unified phone, focus on 1 - 3 phones for the whole year, interactive customer service, New logo, Battery performance, UNIQUE DESIGN, top notch camera, waterproof, why dual when you can go Quad... go in to the market with a bang and bigger bang with it's prices. Start cranking AT&T and Tmobile, Verizon and Sprint from now in the U.S. chop chop you have work to do...
    I wish you the best of luck SONY and hope to see interesting phones coming from your end.
    Solved!
    Go to Solution.

    lov2bugu, you said things the exact way I wanted to express them! It was like watching me talking to a SONY’s CEO.
    I don’t really think they are not aware of the problems. SONY used to be the 27th largest company in the world, according to Forbes. They are now at the 456th place!!
    They are aware of their problems and I think, the move to buy the remaining stocks from Ericsson, is a move to bounce back into the market. They found the right time, where the stock is too low and the economics around the globe don’t  look promising enough. I have to recognize them, all the bad phases they went into this year … hacking attack, loss of their factory in London, global economic climate etc.
    But these are not excuses good enough not to produce quality, reliable and technologically advanced goods. I think that SONY is not to blame for the bad course SE has had. I think this is what SONY wants to revert. They want to “embody” all their technology … BRAVIA engines (TV Tech), Walkman and Cybershot tech (using Carl Zeiss lenses), VAIO (Comp tech) and finally PS3. Ericsson tried to integrate them, unsuccessfully.
    Overall, I thing SONY, did not have or did not attempt to have the control of SE, hence, the answer you got back from SONY “… anything related to SE must be posted on the website of SE”. I think they will bounce. Just give ‘em some time. I’m willing to give them time, but not too much though. Just because I’ve always loved this brand!

Maybe you are looking for

  • JP2 file cannot parse in Photoshop CS6

    I have recently upgraded to Photoshop CS6 on MacBook Pro running OS X 10.8 and need to open a JP2 file that is 2.11 GB. Photoshop throws out an error message "...the file format module cannot parse the file". Can anyone help? I would like to convert

  • Dump Core on Service Timeout

    Hello, is there a way to configure Tuxedo such that it dumps a core on a service timeout? Once in a blue moon we experienc a service timeout on a large production system. Unfortunately we would need to turn on a massive amount of logging to determine

  • Displaying 0 in report

    Hi,    How can i display '0' (Zero) in report insed of Blanks in reports.    I used NOREXX function but it is not working Thanks

  • On Reply why does ?? appear in From:, To: and Cc:?

    Example: From: ?? Sent: Tuesday, April 29, 2014 8:26AM To: ?? Cc: ?? Subject: Re: [email subject]

  • Finder Not Running!

    How do I make the finder "Run"? I upgraded from 10.2 to 10.3.4 using full install discs. The Finder bar appeared but kept blinking on and off, and the finder wasn't available by the curser...I launched Safari and software updated to 10.3.9 (takes qui