Hacker attacking my FTP

I've had my website hacked 4 times recently and can't work out how they are gaining access. The host provider simply says I'm not keeping my password secret. I have moved to another provider today but not convinced it won't happen again. It is just a small holiday cottage website but has been attacked by anti zionist rantings from Egypt. Clearly a random attack but I'm worried they could attack again just for the fun of it.
I've no idea how FTP sites are hacked anyway but is there any software for OSX that I can run to eliminate the possibility of any virus on my computer that could be providing a leak?
I also use DropBox and LogMeIn on a daily basis to link between machines. Do any of them have security weaknesses?
Thanks for any help. This has been stressful and I'm not getting any helpful answers from the old host provider on this!

Coming here is to an OSX forum was to find out if there are any known risks using OSX in general. Everyone always says 'Macs never get viruses' etc but wanted other people's views on this.
As far as that goes:
No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from (on no account install Norton Anti-Virus on a Mac running OS X):
http://www.clamxav.com/
The new version for Snow Leopard is available here:
http://www.clamxav.com/index.php?page=v2beta
(Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.)
However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
You can read more about how, for example, the OSX/DNSChanger Trojan works here:
http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
http://macscan.securemac.com/
The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
(Note that a 30 day trial version of MacScan can be downloaded free of charge from:
http://macscan.securemac.com/buy/
and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
Also, beware of MacSweeper:
MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
http://en.wikipedia.org/wiki/MacSweeper
On June 23, 2008 this news reached Mac users:
http://www.theregister.co.uk/2008/06/23/mac_trojan/
More on Trojans on the Mac here:
http://www.technewsworld.com/story/63574.html?welcome=1214487119
This was published on July 25, 2008:
Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
Net security groups say there is anecdotal evidence that small scale attacks are already happening.
Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites like Twitter etc), as reported here on December 9, 2008:
http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
http://www.securemac.com/
There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
As to the recent 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program. A recent example is of malware distributed through innocent looking free screensavers: http://www.zdnet.com/blog/security/malware-watch-free-mac-os-x-screensavers-bund led-with-spyware/6560?tag=nl.e589
3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
4. Use Mac OS X's built-in Firewalls and other security features.
5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
Last but not least, there is the potential for having your entire email contact list stolen for use for spamming:
http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
NOTE: Snow Leopard, OS 10.6.x, offers additional security to that of previous versions of OS X, but not to the extent that you should ignore the foregoing:
http://www.apple.com/macosx/security/

Similar Messages

  • I am using dreamweaver cs6 is it protected from various hacker attacks such as sql injection,xss,?

    i mean if i built a site using php and sql using dreamweaver cs 6 ...will it be protected from various hacker attacks such as sql injection,xss,spoofed form input,etc..?? if it is not protected...tell me where can i learn to protect my website using php and sql....from all types of hacker attacks...help needed.... thank you..:)

    A couple more comments.
    To guard against most of these security risks, you have to completely sanitize any user input whether processed further on subsequent pages or added to a database.  That complete sanitization usually involves stripping out any HTML/JavaScript, and blocking SQL-crashing equalities/inequalities.
    You can get alot of information about these and other methods on the Dreamweaver AppDev forum -
    http://forums.adobe.com/community/dreamweaver/dreamweaver_development?view=discussions
    which is where most server-scripting topics are discussed.

  • Urgent, hacker attack on our site, BS subscription is off...HELP!!!

    Hi guys,
    We had a hacker attack on our site during the last several days. We solved the issue and stopped the attack, but they ate all our BS subscription for this month and our site is 100% out now!
    Who can we contact to reinforce the subscription for this month? It's super urgent!

    Hi Alexey,
    For subscription question I suggest you contact with Azure support team ASAP. Please try this channel:
     http://www.windowsazure.com/en-us/support/contact/
    Any information, please let me know.
    Regards,
    Will
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Open Directory & Firewall: How to prevent hack attacks

    With my current Open Directory configuration user accounts get disabled as soon as 12 login attempts fail.
    Now the problem is the following: there are periodic attacks trying to hack user accounts. They do this by trying typical user names and common password I guess (e.g. password=user name, password=123, ...). I enforce a rather strict password policy so allowing only 12 guesses should be kind of safe.
    And typically they do not even guess an existing login name .... except for one. I discovered this issue because one user came to me twice this week because his account was disabled. So I finally found out that his username was in a hacker list. I solved the problem by making an new account with different login name. But that's not a good solution for the future.
    Is there a better way? What I would like for example is disable login attempts from a certain host for a couple of hours after sufficient many failed login attempts. Or even better: putting these hosts into a ban list until I free them manually.
    Maybe such things can be done with the firewall (and if yes: how?).

    Preface: I am not fiscally tied to any product or service I might mention, I'm just a paranoid system administrator.
    I never like to see anyone directly expose a file server to the Internet. That is asking for the kind of trouble you're seeing or worse.
    The "best practice" I've adopted at my office is this: if a project office is large enough to warrant a file server, it is large enough to warrant a dedicated firewall appliance.
    The unit I have been purchasing for my projects lately is the Astaro ASG120. It is a small firewall box that not only does standard firewall duties, but also serves as a VPN endpoint for remote users, a VPN peer for site-to-site VPN connections, a web filter for managing end-user access to questionable sites, with virus scanning, and an email filter if I should choose to operate an email server at the project site.
    The appliance is not the cheapest on the market, but for the initial cost of about $2000 USD & an annual cost of about $800, the peace of mind is worth every penny.
    G. Discenza

  • Apparent hacker attack via Skype. (They seem to ha...

    We have someone placing phishing calls to us (one of those ones that asks us to go to a different site) but this had the additional details that...
    The camera activated before the calls. About a minute or so. We see the light come on and while we are trying to figure out what that is all about the call then comes in.
    When the call comes we cannot hang up the call nor even close Skype. We have to either reboot the system or use the windows Task Manager to get rid of it.
    So far we have had four of these come in over the past 3 days or so. On three of them we had to shut off the computer to get rid of them. On the fourth I tried the task manager and after killing Skype the call was gone. But then I restarted the system just to be sure.
    Also of note is that this morning a friend of mine was describing the exact same thing happening at his house. Both he and his son's computers got one of these calls. Although my friend says he did not notice either way his son does say that he noticed the light was on showing his camera was activated before the call actually came in. In both of their cases they could not get the cal to hang up or Skype to close so they shut down their computers.
    Final detail, our comuters are set to not allow calls from people outside our contact list. These calls all came from IDs I have never heard of and are not in our lists. 

    Well...it seems to me if there was a security hole in Skype itself we'd be hearing about a LOT more cases than the few you're reporting.  I wonder if what you're seeing isn't a case of a few Skype users you know having their accounts hacked.  (That does happen.)
    Think about it...if I was on your Contacts list, and someone hacked my Skype account, and the hacker sent you an IM that seemed to come from me with a link to malware, you'd think the message was from me, someone you knew, and you might click on the link.
    If I were a phisher in that situation I'd say something in my IM like..."hey it's me.  Take a look at this.  It's safe and it works great."
    I'm not putting my tin hat on just yet but I will see if I can bring this thread to the attention of someone at Skype.
    edit:  A forum Moderator is aware of this thread and will be bringing it to the attention of the appropriate people at Skype.
    Please note: I do not respond to requests for help via Private Message.

  • Hacker attack?

    This is perhaps not a specific Mac question, but I don't know where else to post. Yesterday when I woke my MacBook Air  in the afternoon I found that almost all applications were open. I didn't start those applications before putting it to sleep. At the same time, my wife told me that while she was working in the afternoon on her Windows 8 PC, suddenly the mouse started to move by itself, and 20 windows popped up. This was happening for about 5 minutes. Since it happened to both a Mac and a PC, I guess it's not a virus. Could it be an intrusion in our WiFi network? I use WEP, which is admittedly weak. If that is the case, what could an attacker have gotten out of it?

    I have file sharing turned on, but only of access to my public folder, not screen sharing.
    Then it appears screen sharing was on on your wife's Win 8 PC. No mouse movement should have been active on your Mac.
    could some kind of keylogging program have been installed on our computers?
    It would take installation of some sort for that to occur that you allowed. Have you installed any software from torrents, or other illegal downloads? Not trying to imply you did, but that is the number one source of Mac malware. They stuff other other items into popular software that wouldn't normally be. Once you give OS X the OK to install (example: Photoshop), you give it the OK to install everything else in that package. Including items you weren't expecting or knew was even there.
    If none of this applies, then you're probably okay.
    So that, even if we change the WiFi password, the intruder can still monitor us through the internet?
    Assuming it was a wifi intrusion, yes. Do this to cut them off:
    1) Go into the router's settings. Typically, from your web browser and put 192.168.0.1 into the URL field. Check the manual to see what to use for certain. If a password dialogue comes up in the browser before it will show the router's configuration pages, the manual will also tell you what the defaults are.
    2) Once into the configuration page, the very first thing to do is turn off wireless broadcasting. You don't want anyone to see what you're changing.
    3) Create a strong login password for the router. If you leave it at the defaults, it's like having no protection at all, regardless of what wireless security you're using. Anyone within range of your wireless signal who wants to break in can just type in the same IP address I noted above and try the very common default admin and password entries. Once by that, they can see everything you can, including any wireless passwords. Then they can just login again.
    4) With the wireless signal still disabled, now change your setting to WPA2 and enter a new long, random character password. Something like UMjtnEm9xbIsLhjFkVRnVjUu . An excellent little free utility to generate such passwords is RPG. Since special punctuation characters can throw off both Macs and PCs, I keep the Punctuation & Symbols check box turned off. Longer is always better. I'd use at minimum a 20 character password.
    5) Write your new WPA2 password down as you'll need to update any devices in your home that need to access your router.
    6) Now turn wireless broadcasting back on. Unless they manage to figure out the web admin login password, no one outside of your home will be able to get into your router settings to see what your wireless passwords are.
    Is there any kind of log where I can detect if there was an intrusion?
    Unless you had the Mac's firewall on, you won't find any messages there. By default, the firewall is on in Windows. You should be able to find a log to read through and possibly see who was accessing your computers.

  • Does today's hacker attack regarding stolen passwords for FB, Google, Twitter, etc. affect Macs?

    And is there a website that lists virus affecting Macs?

    Only if you if your password was one of those. It is important to remember the difference between passwords saved online and the security of your Mac. Your Mac is far more secure than any web server. The chances of getting any virus or hack on your Mac is virtually zero. Big web sites, however, typically don't have good security for user information and passwords. They get hacked on a regular basis.
    Unfortunately, the typical response is to install antivirus on your Mac which does nothing but make it slow and buggy and continuing to use poor security practices on the internet. Your Mac is safe. Keep that antivirus off. Never reuse passwords online. Use iCloud Keychain to generate more secure, and unique, online passwords.

  • How can I protect my Macs from virus/hacker attacks?

    What virus/Firewall software can I purchase to protect my MacBook & iMac? Are Macs totally safe?
    I'm a business owner and need to protect it.

    Have a read here...
    http://www.reedcorner.net/guides/macvirus/
    And see this...
    https://discussions.apple.com/thread/3710639?start=0&tstart=0

  • My MacBook air is hacked.

    Hi !
    I need some help. From someone with really great knowledge and connections.
    (but I'm going to write a bad question (maybe) because I'm fed up with idiotic know-how insides like "how to write a good question". a question is always good, mind you. But I don't know if I should post it in another topic, if so, feel free to fix that, anyone, thx).
    I just bought a mac book air, and strange things are happening.
    For instance, the computer would block, I can't click anywhere with any result for sth like 30 sec. It's brand new. I've just unpacked it.
    Or the bookmarks in safari were strange, because there was my own bank in it (+ apple + google maps + wikipedias + misc.). (I'm not suffering any memory affection or anything).
    Or I just did a research with google (sim city) and results appeared with "Disney" in the research field.
    To set the scene, my Facebook and Twitter accounts are quite often hacked, with the same subtle processes. (like" they" or God maybe, someone who's not me, would add some followers supposedly added a few weeks ago, and so on). I think  I'm being followed by a few excited engineers with great extended connections  (because (probably) I filed a case against them, for...harassment. (It's been going on for a few years and I'm really, really tired, given that they used the info they got to destroy my life , social relations and career )
    I can't believe a just-bought-just-started computer could be hacked so easily. Although I had logged into my apple account. And they got my Ip address. But the only things I downloaded were uploads from the app store.
    How can you prove your computer is being hacked?
    Thank you (in advance and a lot) to anyone who can help.

    Hello, thanks for answering !
    I don't know what they want, and I can't make you understand how it feels to be constantly "spied" on whatever you're doing - especially work when you're not someone who believes she does everything right or ever will or ever wants to be that kind of person. They made me lose hours and hours with my printer, lose documents, and so on.
    If you were a hacker, benwiggy you'd be caught. Probably. On the long term, that is.
    If you push the game too much, then it's too obvious and cops will have to react. It won't last. It's much more fun to drive someone mad with no possibility to assert her basic rights, for lack of proofs. (therefore the quicktime solution is not a bad one, although it does not fix everything. Yesterday I got a video of my mouse moving by itself right in the middle of something I was doing (entering an email address) on this computer but still, it's no obvious proof, I could have done it myself (say you're typing extremely fast with just one hand, using the other to click right on the other field).
    It's much more efficient than crashing a hard drive.And not less annoying. And  I did crash my hard drive  all by myself, twice, after several complete reinstallation of mac os on my previous computer. And then, I was so annoyed by their little game that I banged my fist on the computer, which did not prove convincing. At the end of the day, that's two hard drives and one complete machine broken, just on me.
    Anyway, speaking about it is a good defensive mean, so thank you.
    I think people should know about this category of hacking. It's quite disgusting. I would prefer a good hacker attack, with a pirate boat flashing several times on my screen, and then the whole thing exploding.That would be sort of fair piracy. (But mines are cowards).

  • OSX-partition not identified after trojan-attack with win7-partion deactivated

    Hello,
    1. After a hacker attack on my windows partition, a hacker hijacked this system with the ukash-trojan in a newer variant (a very bad and good programmed trojan). I could not make any actions as administrator and I could only run the system under safe mode. Boot Camp was destroyed/deactivated under windows by the trojan.
    2. I idiotically deactivated the windows partition.
    3. The Mac don't restart under OSX Snow Leppard: operation system not found.
    4. Booting anything from DVD-Rom-Drive is blocked, but the drive sounds, as if it is ok (booting by pressing the C-/option (command-key) key doesn't work).
    5. the Mac-hardware test under F2 say, that everything is ok with the hardware.
    6. Driving the MacBook Pro with another (this) computer via data cable doesn't work.
    7. Any USB-DVD-Rom-Drive could not be identified.
    Are there any possibilities, like esc,F8,F10,F12 at Windows-PCs, to define the booting conditions?
    Thank you very much ! (I am sorry for my bad English).

    A little information or knowledge can be dangerous in some hands.
    Start over.
    To understand partitions and EFI as well as GPT -
    http://www.microsoft.com/whdc/device/storage/GPT_FAQ.mspx
    Secrets of GPT http://developer.apple.com/library/mac/#technotes/tn2006/tn2166.html

  • You've been hacked !! (by tiger-mate)

    En-route to ASC today I suffered a hack attack by tiger-m@ate ...I say I suffered the attack, in fact it seems to have been an attack on either google.co.uk or apple.com. There is some insistence that it can't be the latter.
    New to ASC I started a discussion at:  https://discussions.apple.com/thread/3345813?start=0&tstart=0
    ...advised that it belongs here instead, it not being an attack on ASC (unconfirmed).
    It seems that several hundred servers were attacked today and most likely these were XSS-attacks. My initial research leads me to believe that these attacks are based on the exploitation of server-side vulnerabilities rather than malware on the client-side but I'm no expert.
    I've always assumed that as much as I try to protect my network against hacking and my computers from physical theft, there will always be a risk. For this reason I ensure my data is well protected: I use 1Password for log-in security, Knox for encrypting my documents and data (whilst retaining portability) and Espionage for securing application data. Nevertheless, it concerns me that my system may have been compromised.
    Please contribute if you've had a similar experience or can offer advice on the extent of the risk involved.
    Andrew

    @etresoft  thanks for your response — it seemed to me when I revisted it, that the redirected page had no apparent functionality and appeared to be more of a calling-card ...seemingly aimed at increasing the noteriety of tiger-m@te, than to launch any kind of malicious attack on the end-user.
    Seeing a browser window shrink, dance around the screen like a sprite and then expand to reveal "hacked" across the screen was a little disconcerting ....and naturally ones immediate reaction is to quit, trash and cut the connection.
    Thanks for your input, hopefully it will reassure others.

  • Adobe hack bigger than first admitted

    So it seems that adobe lost 38 million user details, 10 times more than they first admitted to.
    Thats the bad news.
    The good news of course is the hackers got the code to photoshop. So hopefully it will find its way into a variety of other developers and into the general public ridding the world of adobes corporate greed with this faulty creative cloud scam they got running.

    Here is one article about it:
    http://www.nbcnews.com/technology/adobe-hacker-attack-much-bigger-previously-disclosed-8C1 1493155
    My biggest concern is trusting Adobe with my credit card any more.  My credit card company is sending me a new card and automatically cancelled my current one (Adobe contacted them).  Now I have the pain of changing the card at a variety of places.  How do I know that Adobe has figured out how they got hacked?  Has the hole been plugged or will we be going through this all over again in a few months?  The fact that they said one thing a few weeks ago and now this is "bigger" than they thought... makes me wonder if they really understand what happened and can keep my information safe in the future.  I am very skeptical.  I have been a big supporter of Adobe over the years and actually feel that CC isn't that bad of a deal (considering I use a Mac and a PC, the pricing is much better since I don't have to own two different licenses).  However, this is really making me think hard about giving Adobe my CC any more in the future.

  • Virus attack on router?

    I have an issue with my router this happened twice in 1 week. I have reset the router but this keeps happening. What could this be? Could this be some hacker attacking my router or a virus trying to get in? See the video here
    http://www.youtube.com/watch?v=_R2RYDsitf4
    Please leave comments on the forum. You can also leave them on the video page but Iwould rather the comments be left on this forum. My router is hardware version 5 and it has the latest firmware. This has been a good router I am not ready to give it up. It has a range better than a wireless N i have that is why I am still useing this router. Oh and I live away from town and only a few neighbors have wireless but they are not close enough to cause problems.
                                                                          Thanks

    You said you performed a reset and the problem recurs.  Have you done a hard reset using the 30-30-30 method? That involves pressing the reset button for 30 secs, removing the power for 30 while still pressing in the reset button. Then plugging power back in while still holding for 30 last seconds.  Then after that power if off and wait 60 seconds before resuming. This will perform a complete hardreset where the unit should be restored to all factory defaults of the firmware.
    If the above steps does not fix the issue then the next step would be to reflash the router with the latest firmware.  If after a firmware upgrade the issue continues then the router is more then likely on its way out and needs replaced.

  • BitTorrent Problems

    Hi, I have the BitTorrent app, Xtorrent. This isn't exactly related to the application itself but mostly it's the connection that I'm confused about. When I am connected to my wireless router, I download my torrent files however, they only download at a maximum of 0.8 kb/s (very slow), however when I am connected to a VPN connection, it downloads super fast at maximum speeds of 300 kb/s (extremely fast). Why does this do this and is there a way that I can make so I don't have to be connected via VPN and get the same, fast result? Thank you for your time!

    Torrent software essentially can make your machine both server and client at the same time. As a result your bandwidth may be affected by how the software is setup. If you don't know how to prevent it from acting as a server, find software that is easier to manage.
    A note: Most Mac software that is available for download is available via FTP and/or websites. Your security risks are lower, and your download speeds normally are higher. Only use Torrent software if you can do so legally, and you don't expose yourself to external hacker attacks. http://www.versiontracker.com/macosx/ and http://www.macupdate.com/ are popular sites for Mac software.

  • Video chat problems - please help!!!!!

    Please help, I am trying to video chat with my father on a PC, and brother on a macbook
    I cannot video chat with either of them, I have an comm error -8 come back every time i initiate a video session with either my brother or my father. However my father (using a PC and AIM 6.5) can have successful video chat with both my brother and I.
    I have made the suggested alterations to both QT and iChat preferences, I have switched off both the router and mac firewalls, but still no joy.
    I am using a intel iMac OSX 10.4.11, with ichat 3.1.9 and a belkin router, any help would be appreciated, Thanks in advance

    If you have two computers on your LAN that you want to use the same ports for then you have to use a method that allows multiple computers.
    UPnP is one method and easiest to set up as it is usually an On/Off setting
    Port Triggering is another and needs you to know which ports iChat uses first and where it uses next to get it set up.
    UPnP also tends to get around any NAT issues
    Having said that the Link I sent you to earlier does not show UPnP or Port Triggering in the menu.
    User Manual
    http://www.belkin.com/uk/support/article/?lid=enu&pid=F5D7633uk4A&aid=6117&scid= 0
    Which Says it does have UPnP and an SPI firewall
    *Universal Plug-and-Play (UPnP) Compatibility*
    UPnP (Universal Plug-and-Play) is a technology that offers seamless
    operation of voice messaging, video messaging, games, and other
    applications that are UPnP-compliant.
    *SPI Firewall*
    Your Router is equipped with a firewall that will protect your network
    from a wide array of common hacker attacks including IP Spoofing,
    Land Attack, Ping of Death (PoD), Denial of Service (DoS), IP with zero
    length, Smurf Attack, TCP Null Scan, SYN flood, UDP flooding, Tear
    Drop Attack, ICMP defect, RIP defect, and fragment flooding.
    This last is the most likely cause of blocks as iChat data can be seen as an Attack by this sort of "firewall" It appears on page 56 of the manual.
    UPnP is on page 67
    10:10 PM Sunday; January 13, 2008

Maybe you are looking for

  • As a abap programmer what is the role in ale/idoc.

    hi guru. i am a abap programmer. please tell me<b> what is the role of abap programmer in ale/ idoc.</b> regards. subhasis.

  • Vendor and Customer BADI needed

    Hi Folks,               I need BADI for Vendor and Customer which can store Purchase and Sales organization details entered  while creating Vendor and Customer in xk01,xd01 TX Codes respectively..... Thanks in Advance. Prasad.

  • How to run Import/Export for Portal Page

    Hi all ! I have to export the Portal page .What are the steps I have to follow to complete the process ?I'm new to Oracle portal.. Please help . Thanks in advance chris

  • FB 4.7 64 Bit Won't Uninstall (Win 7 SP1 Enterprise)

    I installed FB 4.7 64 bit and entered the serial number on Windows 7 SP1, and all seemed to go fine. But every time I start it up, I get a message saying, "Your application install seems to be damaged, Please reinstall the application." So I finally

  • Vista x64 support; Core duo usage; SLI or Crossfire

    With all the new hardware and OS advantages out there, it would be nice to speed more time doing than waiting . . . 1. Vista x64 support! 2.duo or quad processor: Lightroom could benefit from multi-threaded or distributed processing for speed or comp