Hacking attempts?
I have been receiving strange e-mails with no sender, no content and odd dates (like 1/1/69). They show up only on my iphone (not on in my computer with the same e-mail account).
I have had some problems with malware/bot on my computer - are these e-mails attempts to probe my system and if so does anyone know what I can do to protect my computer. I run ESET security on my computer.
I do have the most recent iphone os - i think it is 4.3.3.
A friend suggested that I run Malwarebytes' Anti-Malware. It identified some things that I subsequently removed.
The interesting thing is that when I get the strange e-mails on my iphone, I get a pop-up on my computer asking me to confirm my e-mail passwords (I use Office Outlook). What was happening is that I would confirm the e-mail password for Office, and then something would change my ATT e-mail passwords.
I got rid of it for a while. Now it is starting to happen again. As long as I don't confirm my e-mail passwords nothing is hijacking my e-mail, but when I run any any scans of my computer - nothing shows up.
So I am wondering if it is something coming through my iphone
Similar Messages
-
How can you tell of a hack attempt
Hi
Freaking a little!! So any quick advise!
I was at college teaching and had my laptop on Ethernet and Wireless.
Anyway, I was using one of the iMacs the college has and was leaving my laptop to be idle.
I looked over when the screen suddenly lit up and the mouse moved on its own.
I held my mouse and the cursor carried on moving and even clicked on an application. That opened up.
I disconnected quickly and shut the lid.
I am not home trying to understand what happened.
Can someone give me advise on what it was, if it was a hack, or could it have been another wireless mouse in range that accidentally controlled my computer by mistake?
Any help please
I have now switched on the system Firewall and am running WaterRoof (however, I don't know how to configure that)
Thanks in advanceRob Snow wrote:
Is there a way to make it so that only my computer and the other two computers can interact and no others?
You can use a tool like Waterroof to configure the ipfw firewall to allow only your home machines to connect.
I also didn't have the firewall on, as I heard much the same, that the system Firewalll is pretty useless and to use the modem one instead.
It isn't useless, just misused and misunderstood. I don't know what you mean by "modern" firewall. The "older" one is actually much more powerful and much more difficult to use.
Now, I could assume that the attempt was by a student that saw me on the network, but they need to know my password.
That is true. Given how common cell phones and cameras are these days, it would have been pretty trivial to record you typing your password and play it back in slow motion.
Anyway, now that I have firewall on, I see that sharing options have been turned off or are inactive.
I will change my password and then see how things go.
Keep in mind that you must now change all of your passwords. There is no way for you to tell when your password was compromised. Once you get one password, you can easily social engineer others. Plus, whomever had your password also had access to all of your files.
Is there a way you can via the menu bar activate and deactivate such services, instead of going to system prefs every time. Or a shortcut?
The quickest way is to disable all incoming connections in the firewall. -
Hack attempt by a certain user I know
Hey everyone, I thought it'd be fair to share this information I know just in case that person attempts to hack into other skype user's account.
So basically this guy from my contact list has been trying to send me a picture for a while (name is Fre*****y, asterisk signs to keep the privacy- I'm sure skype staff will know who am I talking about anyway if you view my contact list somehow), lately, when we haven't been in excellent relationship to say the least. I got few of my accounts in other communities etc. hacked before so I'm ultra sensitive when it comes to this, I had a feeling that he might be sending me this picture to try and virus my computer or something else- after all, why'd he want to send me some picture over skype if he can just post a link like everyone else does? Takes a lot less effort.
After I rejected he went 'fu' at me which everyone knows what does mean, he got kinda pissed off. Today he sent me a picture again(actually yesterday, because I'm writing this after midnight) so I didn't press accept or decline at all, and like 5-10 minutes after he sent me the picture again. I thought, heck, why not, after all I got my norton and it should protect me if it's some kind of a virus. Mind you, the .jpg picture had some very weird and lengthy name like 493204590329054390_28343dfsad_4532389....jpg.
So yeah, call it paranoia if you want, I changed my password right after because he was talking kinda weird and it was all suspicious to me- he just sent me some random picture and acted as if it was something special- Picture. So I instantly changed my password because I thought something fishy was going on- and I'm pretty sure it was. Right after that my internet connection dropped for some brief moments as if I got DDoS'ed or something(he could've gotten my IP somehow through sending the file?) and my internet could not simply work. Okay now that's even more suspicious, I thought, though I feared not because I changed my password preemptively.
So after a while my internet started working and I saw everyone online on skype apart from... Fre*****y guy! It seemed like he logged off right when I did too, as if he tried to perhaps log my account? Anyhow, he logged back online around 10 seconds after I did(and it could not have been that we share ISP and it went down- he lives in Norway and I live in Poland) and was acting even stranger than usual. So my wild guess is he in some way tried to:
1. Get rid of my internet connection for a while which could be DDoS thing,
2. Log off his account instantly
3. Try to log on my account and take control over it
After that we had some brief conversation, it was mostly him talking a lot in some weird manner as if he was trying to fool me, here is the conversation(P is me, F is him):
[2012-02-21 18:27:26] P: :0
[2012-02-21 18:28:02] P: i won't sleep now
[2012-02-21 18:28:26] F: atleast he is the ni***st,cant get anymore ni**ish
[2012-02-21 18:30:32] P: ni**rest
[2012-02-21 18:32:52] P: p***y
[2012-02-21 18:33:16] F: imagine how his nigglets are gonna turn out looking
[2012-02-21 18:33:40] P: did you just ddos me?
[2012-02-21 18:33:47] P: i lost my internet connection after getting the pic
[2012-02-21 18:35:03] F: i didnt
[2012-02-21 18:35:24] F: When I do that u also get probeb analy
[2012-02-21 18:35:32] F: one of my many trademarks
[2012-02-21 18:35:38] P:
[2012-02-21 18:35:43] P: you were offline for a while too
[2012-02-21 18:36:03] F: Back in my old village they used to call me "The Analator"
[2012-02-21 18:36:36] F: That was only until I abused a 12 year old girl,then then started calling me "the vaginalator"
[2012-02-21 18:36:47] F: but I will always be the analator in my eyes
[2012-02-21 18:37:17] P: i c
[2012-02-21 18:37:53] F: I hope u are taking notes
[2012-02-21 18:38:01] F: cause this is importent stuff
[2012-02-21 18:38:17] P: ye i couldn't live without this information
[2012-02-21 18:38:46] F: My gf says I talk too much **bleep** and should tone it down...I say I dont talk enough and should tone it up!
[2012-02-21 18:39:20] P: (mm)
So that would be it, it all looked suspicious to me because usually he doesn't talk so much at all, and when I asked him directly if he DDoSed me, he just started spamming me with these messages changing the topic entirely.
Anyways, perhaps I just made it all up in my mind but I like to be in a clear situation so I'm letting you skype staff know about it, and I'm also asking politely from you to look into this situation and check if my suspicions were actually right(that is if you have the possibility to do so- I guess you do).
Shall you find out whether I'm just being paranoid or I actually was right there, please make sure to get back to me and let me know .
Thanks in advance.
Solved!
Go to Solution.report the user to [email protected]
CONTACT SKYPE CUSTOMER SERVICE | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUPICIOUS CALLS AND MESSAGES | WINDOWS PROBLEMS TROUBLESHOOTING | SKYPE DOWNLOAD LINKS
MORE TIPS, TRICKS AND UPDATES AT
skypefordummies.blogspot.com -
How to check hacking attempts ?
Hi all;
Is there anyway to check who is trying or have tried to hack network ? I am using ASA 5520 firewall. Is there any command to check it ?
Thanks.Hi,
You can start by using the 'show local-host' command. This would show you if there's multiple attempts for a half-opened TCP sessions. You could narrow it down to known IP such as servers.
Sent from Cisco Technical Support iPhone App -
I have a problem with my Apple ID password. I have been asked several times over the last few months for my Apple ID password and then when I go to enter it tells me that it is incorrect and I have to through the whole thing again.
If you are receiving e-mail messages telling you to reset your password, you should never click links in those e-mail messages and enter your password there! That is a common phishing attempt, and entering your Apple ID and password on the page you are directed to would give it to the hackers behind it.
It could also be an error of some kind (someone is trying to reset what they think is their Apple ID) or a malicious attempt to reset your password (stupid, since you'd get the reset e-mail, but some folks aren't that bright about this sort of stuff). In either case, turning on two-factor authentication will prevent anyone from even attempting to reset your password without additional information. See:
Apple introduces two-factor authentication
If you keep getting the reset e-mails after turning that on, it's phishing and you should just delete the messages. -
Hi everyone:
I received an email this evening detailing a supposed Apple Support phone call I was purported to have made yesterday (I did not, and I am the only one in my family who does when necessary). So I called Apple to inquire about it, and when I explained the situation, they confirmed that someone (he called himself Patrick) did indeed call them with my iMac's SN and my email address, requesting Apple reset my Admin password. Of course Apple did not because this 'Patrick' could not confirm my other information and Apple can't do this, but I am a bit unnerved. I have a Centurylink router with a password and use OS X Lion. Does anyone know how this 'Patrick' could have obtained my SN and email? And any suggestions for advanced security practices on my end? I really would appreciate insight.
On a side note - both my hubby and I noticed last evening our router kept dropping the connection, which was a first. It lasted a few hours. Could that have been the hacker attempting to gain access?
Thanks for any advice.What encryption does your Router Use? Hopefully WPA2 with a good Password?
Yahho was hacked a couple of months ago for about 450K emails & some passwords, which somehow led to linkedin, gMail, Facebook, Twitter, & a few more breaches. -
Our Windows 2008R2 security log is full of failed login attempt events 4776, but we're unable to block them because no IP address is provided for the network source of these attempts - like it was in Windows 2003 Server.
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 9/26/2012 2:32:27 AM
Event ID: 4776
Task Category: Credential Validation
Level: Information
Keywords: Audit Failure
User: N/A
Computer: MAIL.XYZ.COM
Description:
The computer attempted to validate the credentials for an account.
Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account: admin
Source Workstation: MAIL
Error Code: 0xc0000064
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
<EventID>4776</EventID>
<Version>0</Version>
<Level>0</Level>
<Task>14336</Task>
<Opcode>0</Opcode>
<Keywords>0x8010000000000000</Keywords>
<TimeCreated SystemTime="2012-09-26T06:32:27.570062500Z" />
<EventRecordID>18318</EventRecordID>
<Correlation />
<Execution ProcessID="452" ThreadID="540" />
<Channel>Security</Channel>
<Computer>MAIL.XYZ.COM</Computer>
<Security />
</System>
<EventData>
<Data Name="PackageName">MICROSOFT_AUTHENTICATION_PACKAGE_V1_0</Data>
<Data Name="TargetUserName">admin</Data>
<Data Name="Workstation">MAIL</Data>
<Data Name="Status">0xc0000064</Data>
</EventData>
</Event>The user names are all different in these log events, and they constantly change, which may indicate a hacking attempt. However, in Windows 2003 these type of events looked like this, showing the IP address the request came from, so we could trace
and block them -- but not in Windows 2008:
Logon Failure:
Reason: Unknown user name or bad password
User Name: s
Domain: MAIL
Logon Type: 10
Logon Process: User32
Authentication Package: Negotiate
Workstation Name: MAIL
Caller User Name: MAIL$
Caller Domain: XXXX
Caller Logon ID: (0x0,0x3E7)
Caller Process ID: 3728
Transited Services: -
Source Network Address: 202.67.170.186
Source Port: 57365 -
Can a hacked website hack my iMac?
Hi,
Yesterday I visited a website I've visited a number of times that appears to be run from India. However, when I went on yesterday instead of the usual homepage the page was black and had the words "HACKED BY PREDATOR" and then two boxes came up which you had to click Ok on before you could leave. It did say who it was hacked by and when I googled it it was a CYBERTEAM in indonesia that has a facebook group.
I just wondered if it was possible that as I went on there for something to invade my computer?
The site today is just a website hosting page.
Thanks
RyanIf you're running Windows, maybe; if you're not, then I'd say not - something can only "invade" your computer if it can recognize the OS or code and most hacking attempts are written to recognize Windows. As an extra precaution: when you're facing a website that will not allow you to do anything unless you click on something, simply close the entire window or, better yet, quit the browser and then open it again. You may lose your open tabs, but at least you haven't clicked anything you really didn't want to. Additionally, the Mac OS requires you to authorize any install of anything, so unless you input your password and let something install, it didn't happen. Also see this excellent article:
http://www.reedcorner.net/thomas/guides/macvirus/ -
Had an offshore phone call from LogMeIn Rescure claiming they had messages there were hacking attempts on my Mac. Wanted to control myh system's fix' problem. Are these guys legit??
No reputable company will call you for this purpose, they're crooks, trying to steal from you.
Ignore them. -
Account hacked, email changed without my request
My account is stolen, email was changed without my request and without confirmation.
Hacker changed password.
I already sent a support request. Support Request Number:1299247654
Hacker attempt is attempting fraud with people in my contacts.
Please, block him as soon as possible. Review my case and return my account to its original email address. Please responed on following email: [e-mail removed for privacy and security]Succesfully resolved in two hours after request. Thanks!
-
I installed Firefox as an experiment to assist another poster. Within 24 hours I was notified by my gmail and iCloud account of suspicious activity.
i Changed my passwords and added 2 step verification on my gmail account. Uninstalled firefox.
i Don't know what other information has been collected from my phone. I will be changing more passwords just in case.
if you use Firefox and have had similar alerts, hacked phone or corrupted data, uninstall, secure your accounts.
photo of my computer screen:AHa, good for you! Unwinding is good....
Since the IP used to try and gain access is in Africa, or says it is in Africa anyway, I know it was a hacking attempt. And as the picture I posted shows, they were using a browser that I never use on a Windows computer, which I don't have.
my iCloud account, yahoo account and now Google account are all 2 step verified and can't be used on any other device without authorization code, which changes every time. These accounts all show a list of which devices I have used my signin on.
This could happen to anyone. I feel I've secured my accounts. I figured other's may need the information as I see more and more incidents of hacking daily.
My yahoo account was hacked 2 years ago. The hacker used my account to send emails to all my contacts. The sent email showed in my sent file. I changed my password and he got in again. I deleted my contacts, changed the password and added 2 step verification. If Google would make finding this easier, I would have set up 2 step then. -
Accounts being created with administrative group rights
Hello,
The server is a Windows 2003 R2 Enterprise fully patched used for Shared Hosting purposes. It runs Hsphere control panel. I am trying to identify how the following hack is happening.
1) There are users being created with Administrative group rights. Below is the EventViewer log for the user creation:
User Account Created:
New Account Name: username
New Domain: PCNAME
New Account ID: PCNAME\username
Caller User Name: PCNAME$
Caller Domain: DOMAINNAME
Caller Logon ID: (0x0,0x3E7)
Privileges -
Attributes:
Sam Account Name: username
Display Name: <value not set>
User Principal Name: -
Home Directory: <value not set>
Home Drive: <value not set>
Script Path: <value not set>
Profile Path: <value not set>
User Workstations: <value not set>
Password Last Set: <never>
Account Expires: <never>
Primary Group ID: 513
AllowedToDelegateTo: -
Old UAC Value: 0x2DAB2B0
New UAC Value: 0x2DAB2B0
User Account Control: -
User Parameters: <value not set>
Sid History: -
Logon Hours: <value changed, but not displayed>
There exists entries as well where the primary group ID is changed to the Administrative group, but I am omitting such.
2) I tried to identify what Caller Logon ID: (0x0,0x3E7) means. I found out from here:
http://blog.joeware.net/2013/01/14/2667/ that I can use LogonSessions.exe to identify it.
Output from LogonSessions.exe is pasted below (snippet):
[0] Logon session 00000000:000003e7:
User name: DOMAINNAME\PCNAME$
Auth package: NTLM
Logon type: (none)
Session: 0
Sid: S-1-5-18
Logon time: 9/11/2014 12:41:53 PM
Logon server:
DNS Domain:
UPN:
4: System
316: smss.exe
364: csrss.exe
392: winlogon.exe
440: services.exe
452: lsass.exe
628: svchost.exe
756: LMAgent.exe
840: svchost.exe
1000: spoolsv.exe
1252: avagent.exe
1268: camWMIAgent.exe
1324: cissesrv.exe
1380: cpqrcmc.exe
1404: vcagent.exe
1440: svchost.exe
1480: HsQuotas.exe
1740: inetinfo.exe
1780: EmailAgent.exe
1856: snmp.exe
1884: sysdown.exe
1920: smhstart.exe
2192: svchost.exe
2388: cmd.exe
2396: hpsmhd.exe
2444: cqmgserv.exe
2464: cqmgstor.exe
2484: HSphere.exe
2596: wmiprvse.exe
2676: cmd.exe
2684: rotatelogs.exe
2692: cmd.exe
2700: rotatelogs.exe
2732: searchindexer.exe
2812: hpsmhd.exe
2824: cqmghost.exe
2852: svchost.exe
3044: cmd.exe
3052: rotatelogs.exe
3080: cmd.exe
3088: rotatelogs.exe
5452: svchost.exe
5596: GravitixService.exe
7392: csrss.exe
7232: winlogon.exe
6888: csrss.exe
9832: winlogon.exe
10388: wawrapper.exe
10352: cpqnimgt.exe
9496: msiexec.exe
6068: w3wp.exe
4748: webalizer.exe
3) I also learned from http://support.microsoft.com/kb/243330/en-us that Sid: S-1-5-18 means:
SID: S-1-5-18
Name: Local System
Description: A service account that is used by the operating system
That is all great info, but I am not sure I can put together what I have learned to attempt and get closer towards identifying how in the world users are being created and then being assigned administrative group rights.
I am a Linux person mostly, but I am comfortable following a properly explained thread regarding windows 2003 R2 Enterprise issues.
The server is fully patched and it is running Lumension security product. What's more, Norman Malware tracker, tdskiller.exe (Kaspersky) and McAfee rootkitremover.exe have been run without any apparent Malware/Virus infection
Hope someone with advanced admin skills can advise.
Thank youHi,
You mentioned that, “I am trying to identify how the following hack is happening”, would you please tell us that why did you think the event represent a hacking behavior?
In a Shared Server Hosting environment, the underlying hosting control panel tool (Hsphere in this case) should be creating only virtual FTP users with a specific group. So no users with Administrative group should be ever created. If this happens,
it constitutes a breach of server security=positive hacking attempt.
>how in the world users are being created and then being assigned administrative group rights.
In addition, would you please be more specific about this question? Did you find the event message on a domain joined machine?
I want to be able to understand in full how/what process is allowing users to be created with Admin rights. In other words, I want to know what IP was used to issue the command, if ASP.net was used (abused in this case), or anything else related to
it so that we can patch this particular hole.
Best Regards,
Amy -
The Adobe Flash plugin keeps crashing on Firefox 12.0
The Adobe Flash plugin keeps crashing on Firefox 12.0, and my Plugin Check link in Addons Manager directs to https://www.mozilla.com/en/404 .
Is this a hack attempt? Is Firefox 3.6 safer than the release channel?Thankss, but it sounds a bit complicated for me. Maybe I can just reinstall FF?
~And would switching back to FF 3.6 (or whatever the latest Official release is), rather than being on the new Release Channel be safer than FF 12? -
How do I restrict the source trying to access a port?
I have VoIP phones in my office and I am experiencing dozens of hacking attempts per day. I received the following email from the company that I purchase service from:
Hi ,
Based on our research and experience with these type of calls, these are hacking attempts usually using a program called SIP Vicious or a variant. You can check the link below about SIP Vicious.
http://threatpost.com/hackers-pushing-sipvicious-voip-tools-malicious-attacks-08 3111/
These attacks for the most part do not affect users behind our managed routers since we have security features in place to block them.
The calls that the remote users are getting do not traverse the Broadcorenetwork at all. Meaning even if the user put the phone on DND or we try to block calls through the Web portal, calls will still go through because the call does not go through our Session Border Controller ( SBC ) .
The call is directly hitting the IP of the remote users router (bypassing Broadcore completely) and scanning the ports for a SIP device which is the Polycom Phone. Once they get an answer back from the phone, the hacker now has a target to attack. What they want to do is get the credentials for the user so they can authenticate a soft phone for example and make free calls.
Unmanaged network /Router limits us of how we can block these calls , however we have a suggestion which could help you eliminate these calls.
What the remote user can do is to implement this policy . Allow UDP protocol on port 5060 but the only source should be west.broadcore.com.
Since the remote user uses his/her own router, you might need help from their respective support team.
Thank you,
How do I set up the port mapping to only allow incoming traffic from the specified source west.broadcore.com?
Also, is there some sort of documentation, manual, web site or book that covers what the settings of the Airport are? In detail? So, that I can learn for myself what is what and be able to answer my own questions such as: Timed Access - Does this only apply to Wi-Fi or does it disable to whole router during the restricted period?
Thanks in advance,
Noa
By the way I'm using the Airport Express 802.11n Wi-Fi (2nd Generation), Firmware 7.6.4, Airport Utility 6.3.4 on my Mac or the latest version on my iPhone 6.What the remote user can do is to implement this policy . Allow UDP protocol on port 5060 but the only source should be west.broadcore.com.
Unfortunately, Apple routers are quite simple, and do not have the features and settings that you would need to do this.
However, if you are using a modem/router or gateway device with the AirPort Express, then you might be able to set up the modem/router to do what you need. What is the make and model number of the device that you likely call your "modem"? -
[GUIDE] How to get MapleStory working in Arch Linux
MapleStory is a free-of-charge, 2D, side-scrolling massively multiplayer online role-playing game developed by the South Korean company Wizet. Several versions of the game are available for specific countries or regions, and each is published by various companies such as Wizet and Nexon. Although playing the game is free, character appearances and gameplay enhancements can be purchased from the "Cash Shop" using real money. MapleStory has a combined total of over 50 million subscriber accounts in all of its versions. MapleStory North America (Global), for players mainly in North America and outside of East Asia, Southeast Asia and Europe, has over three million players.
In the game, players travel the "Maple World", defeating monsters and developing their characters' skills and abilities as is typical in role-playing games. Players can interact with others in many ways, such as through chatting, trading, and playing minigames. Groups of players can band together in parties to hunt monsters and share the rewards. Players can also join a guild to interact more easily with each other.
I am an avid mapler myself, however, I am also an avid archer! For some time, I have wanted to get MapleStory working on Arch Linux in some way, but nothing seemed to work. As you might have guessed by now, recently, while playing around with VirtualBox, I discovered a method to get MapleStory working on it! Though in this method you won't actually have MapleStory running on Arch Linux, you'll have it running on a VirtualBox Windows virtual machine, that is still pretty good compared to other people's experiences.
I hope there are at least a few maplers on this forum, and if there aren't, I hope that someone will port this post over to other Linux, or even MapleStory, forums. Anyways, let's begin.
1. Download and install a version of Virtual Box that is version 3.0+. The reason for this is that, only versions 3.0+ support an experimental DirectX Driver with 3D acceleration that is required for MapleStory to run.
2. Create a Windows Virtual Machine, add a hard disk to it, and install and update Windows on it(preferably Windows XP, as it uses less resources than other contemporary Windows installations).
3. Once you have done all you needed and wanted on that Windows installation, restart it, boot it into safe mode by holding F8 at the boot, and wait until the desktop is fully loaded.
4. After you are at the desktop, go to "Devices" at the top of the menu of the Windows virtual machine, and select "Install Guest Additions...". Wait until Guest Additions finishes installing, and when VirtualBox asks you if you want to mount the disk containing the Guest Additions on the virtual machine, say "Yes".
5. Run the main executable on the disk that doesn't have amd64 or x86 following its name. Follow the instructions it gives you, and when it asks you what components to install, make sure both of the boxes it shows you are checked.
6. After the install is completed, the virtual machine will restart. After it restarts, shut it down.
7. Congratulations! You now have DirectX installed on your VirtualBox virtual machine! Now you need to activate the "3D Acceleration", that enables it.
8. In the VirtualBox main window, make sure you have your machine with Windows selected. Then, click on "Machine", and then "Settings...", at the top. A new window should pop up. On the left hand side, click on the display panel, and in the new settings section, tick Enable 3D Acceleration. Click "OK", to save the settings.
9. Start your Windows virtual machine, install MapleStory just as you would on a normal windows computer, and run MapleStory.
Notes: This way of running MapleStory is slower than by running it normally, on a normal windows computer. Also, try to not interact with your Linux desktop while playing MapleStory, because this can cause HackShield to shut down MapleStory, due to the fact that it believes there is a hacking attempt.
If any of you port this guide to any other place on the web, please, credit me, neovaysburd5.
For any further questions or inquiries, this goes to all of you, please contact me at [email protected].
Last edited by neovaysburd5 (2009-08-19 16:51:31)Alright, I've posted it in the wiki. I don't know if it meets the Arch Linux wiki standards, so if there is absolutely anything wrong with it, please fix it right away. Don't even ask my permission.
http://wiki.archlinux.org/index.php/MapleStory
Maybe you are looking for
-
Upload data into SAP through standard program
hi! why don't we prefer to upload data into sap through standard program like RFBIKR00 to upload for vendor master or other standard programs to upload durectly without using BDC or LSMW and how do we upload data into SAP through BAPI. pls help me wi
-
I've had my new 80GB iPod for over a week, and I'm getting no use out of it because of iTunes. I first installed iTunes 7 right after getting my new iPod. It took several tries to install it. After I thought it worked, it ended up not working because
-
ICR Process 003 - Unassigned documents
Hi, We have been live with the ICR module for three accounting periods now and have just encountered a serious issue. There is an instance on one company where all the Payables documents between two particular trading partners are displayed in FBICR
-
if you could me, it would be georgous!!!
-
Shockplayer not listed in "manage add ons"
I have taken all the suggested steps to get shockwave player working but no go. This player is not even listed in the manage add ons. What am i doing wrong here?