Help catching a hacker

About 8 months ago I was hacked.  My imac turned itself on from being powered down  and I witnessed someone else controlling my screen.    I pulled the plug out and took it in and did a clean install.   I have read all the mac security articles and have used  the protective settings.   Since then I have been paranoid about security.  I am not worried about viruses, cookies or malware from the general public.  I am worried that a specific person is hacking my computer.   What can I do to 1) be certain if someone is getting access, key logging or spying  2) if there is how can I catch them?   If the person really knows what they are doing I am of the understanding that anti spyware software will not detect them and they can hide what they are doing.
I am running mountain lion.  Use complex passwords.  Use littlesnitch (although do not have the knowledge as to what all the connections are).   No one has physical access to the imac but me.   I also have an iphone 5 and ipad mini.   I do not use Bluetooth and it is disabled. The imac connects over Ethernet and I  disabled the wifi for it as I do not need it.  Remote sharing is turned off.   I use FileVault.  Have a firmware password.   And generally run as a standard user. 
Despite taking all the precautions I am starting to notice suspicious things again and I simply want some peace of mind.
Some of the suspicious things are:
In console it shows screenshots being taken when I did not take then
I periodically review all my setting and the odd change occurs when I did not change them
In my Bluetooth plist file my neighbours laptop name shows up.
I get consistent advertising from sites that I have never visited and in no way would I have be profiled to get those ads
There are many things in console logs that I find suspicious. However this could simply be paranoia and lack of understanding
Please help.
Thanks

First, note that if the computer was actually fully powered down (not just sleeping), it is impossible for a hacker to remotely turn it on, unless that hacker has somehow modified the physical hardware of your computer.
It is possible to set your computer to start up on a schedule. Unfortunately, since you wiped the hard drive, we have no way to check to see if that was done. An alternative explanation would be a hardware issue, which could also fit with the "remote control" issues. Although remote control is certainly not impossible, it's unlikely in most cases. On the other hand, I've seen many, many cases where people were convinced they were being remotely controlled and it turned out to be something much less interesting, like static electricity buildup, a swelling battery or some malfunctioning software.
For more info on the remote control thing, see:
My mouse keeps moving around on its own, as if someone is remotely controlling my Mac!
As for keeping your Mac safe, it sounds like you're already doing everything right. Your Mac, as you describe it, should not be at all susceptible to remote hacking.
The one mistake you're making is delving into the Console for clues. That is a black hole from which those having paranoid thoughts seldom escape. There's a lot of weird stuff logged in there that is perfectly normal, but that looks scary to those who don't have a real understanding of what they're looking at. Unless you're a Unix guru, you'd be wise to stay away from the Console.
As for the weird things you're seeing, the screenshot thing is something that is done internally when your machine goes to sleep. Settings have been known to get changed mysteriously for some people following system updates. No idea why, but normal. The Bluetooth thing probably represents a log of computers found nearby at some point when you had Bluetooth turned on.
As for advertising, where are you seeing that? In e-mail? If so, I get all kinds of ridiculous spam all the time that has nothing at all to do with my interests. That's normal. Keep in mind, if you're wondering how they got your address, that the Windows computers or e-mail accounts of anyone you have ever exchanged e-mail with could easily be infected/hacked, and then all the e-mail addresses could be harvested to be sold to spammers. Basically, once you have shared your address with people, it's only a matter of time before it starts getting spammed.

Similar Messages

  • Help me catch my hacker...please!

    Hi. I have an old Mac Pro 1,1 (2007 I believe), OSX 10.7.5 that has been hacked. I have read some of the questions here so I'll try to include all the necessary info. some of the things that have happened are that a new admin user account is on my computer where I have never created any other account and was using my admin account solely which I now know is not smart. I see the new account at the login screen although it tries to look like it is my account, same icon, but it thankfully can't shut down or restart the computer. I am the sole user of my computer and no one else has access to it physically. also, I can no longer throw anything into the trash. Everything just gets moved somewhere as I can see this from the dialog box that pops up. Also, I have to enter a password just to throw anything away(!), but the trash bin always remains empty so nothing ever makes it there but is obviously going elsewhere. The other thing is all my files are now locked and password protected which of course I didn't do. So, hopefully this all shows my computer has indeed been hacked. In fact, I do know who has done this and he's hacked my iphone as well. He currently lives in another country and when I did wipe my phone and enable location services I started getting ads for the nearest major city of that country where he lives and he is the only person I know who lives in that country. I have other info too as to how I know who it is but won't go into it here. He is some guy I used to know who somehow thinks I'm responsible for him losing his job which is completely preposterous. I know he's gone after my finances but thus far has not been able to access them. My email, which I never check on my home computer or phone anymore, will even on my home computer keep trying to connect to paypal. When I've logged into AppleID on my phone to download apps he has changed my AppleID password & security questions but I was fortunately able to change it and get back into it. He put security questions I would never use like asking something about dates and I never remember dates.
    Anyway, I really need to catch this guy as I have info that he has done this to others as well. I know I could just wipe my machine but that is not something I want to do. While my mac tech guy is normally great he doesn't even believe a mac can have a virus and wants to debate that so for him to believe my computer could have been hacked is impossible so he wouldn't help me. I have contacted a couple other techs I know but one was PC-oriented and the other who does some work on macs said he didn't have enough mac experience when I told him the litany of things happening on my computer and phone. So, I am turning to the good people of this forum to help me do this myself as I know you guys are great from past experience with minor computer issues.
    What I've done so far, mostly from reading these forums: I ran EtreCheck and the only thing that came up looking off was a version of Adobe Flash Player I downloaded that EtreCheck says was a mismatch in their red type. I believe that is how the hacker got his software on my computer. I made visible all the users/accounts and nothing looked funny but a lot of this stuff is greek to me as I have never used the Terminal before. I did find a root user and so disabled that. I have looked through all the Processes, and ran that 5-step terminal thing you guys recommend here that shows preferences & launch agents, etc. and looked and looked but see nothing off. I unfortunately had my computer rather wide open before and so now have done all the normal user things to tighten my security and have Little Snitch and Avast Security on my computer. Oh, I did find the Genio-L bug through MacScan and deleted that. My computer had been running at a crawl but is now faster. Also, I had read something about hackers getting access through Bluetooth and saw besides my keyboard and mouse (my modem is wired so I don't have WiFi) some third item listed. I deleted it as it looked suspicious with very little info on it compared to my other devices. (I forgot to take a screenshot of it.) I have also made all files visible through the Terminal. I was looking around in the Private/Etc files but I don't really know what i'm looking at. Also, I found 3 applications that were loading automatically on login so I deleted them: Adobe Resource Synchronizer, Optimism Agent (Optimism software I have) and FontExplorer.
    Anyway, I would love recommendations for how to find this hacking software which I'm assuming can be found through the Terminal. I did try to use Deeper but when I tried to get it to show all the IP addresses for the users on the login page it had an applescript error come up. It said:
    FSPathMakeRef (/System/Library/CoreServices/HelpViewer.app) failed with error -43. (1)
    i'm sure this guy probably has some pretty sophisticated hacking software, which I understand can even be parental control software. I have reason to believe he has put a keylogger on my computer. So, if there is a way to catch this guy please, please give me some tips but do explain everything really simply & step by step as I know nothing about using the Terminal despite the few things I've done. I was reading under the ssh and it says something about -x being used to disable keyloggers from forwarding info. I do seem to have the applicaton X11 on my computer which I never noticed before. There was also something under ssh about ~# which can list all forwarded connections. Of course I don't know how or where to do these things but if you guys think it would help then I'd totally appreciate directions on how to do these things.
    Sorry for writing an essay but I may not be able to get back to this computer for 3-4 days so wanted to give plenty of info for the questions you guys usually ask. Thanks in advance for any and all help!

    I went ahead and repaired the permissions and the disk itself didn't need any repairs. I still really don't want to wipe my HD, and haven't yet, because I want to catch this guy. can you guys give me a code to enter into the Terminal to show all hidden admin users? I tried something I found on these forums to unhide all 500users but i'm not sure if it was for Lion. (btw, the descriptions for this forum are off. i have a silver tower, it's definitely a mac pro 1,1 and am running Lion 10.7.5) anyway, the terminal said in response:
    sudo: /private/etc/sudoers is mode 0446, should be 0440.
    this response was before I repaired the permissions.
    to address Kurt's question of why i'm convinced I have a hacker I didn't share everything in my OP partly because it was already so long and party because some info I don't feel comfortable sharing online. suffice it to say I have solid knowledge that I've been hacked. I was 99.9% sure of who it was and when the location-based ad on my iphone came up for the country this person currently lives in I knew I was right. think of it like this, if you knew one person who lived in Latvia and suspected he was for sure the person who hacked your computer/phone because you know he's done it to others you know, and suddenly your phone in the US starts getting ads for the nearest major city to where the person lives in Latvia, right after you enabled location-based ads, you'd be pretty sure you suspect the right person. as to how I know this is for sure a hacking I am not comfortable going into on a public forum. suffice it to say, I know without a shadow of a doubt. obviously, the fact that I have an additional admin account on my computer when I live alone and no one, and I mean no one, has physical access to my computer is quite a good indicator.
    just earlier today I had additional problems on my iphone 4. (in the last week I've reset the settings several times whenever I have like one or two bars for my connection which is definitely not normal. resetting the settings seems to be really helping the connection.) this morning I was reading on safari (on the NPR site) and suddenly my phone goes black and the same screen I see when my phone is resetting shows up (all-black screen with white horizontal progress bar). something was being reset so I immediately tried to turn off the phone and it wouldn't turn off, but it did not let the progress bar continue with whatever was happening as long as I held the power button down. then after awhile of doing this, the screen suddenly went back to my usual NPR page. I immediately turned off my phone and will reset it when I turn it back on.
    so, my question is how protect my phone? I have erased it previously, but don't want to do that again as I can't risk logging into Apple ID on it again, to download apps, as last time I did that my Apple ID password & security question as got changed and I had a hard time getting back into it. what I have done so far is to use a password, set a restrictions password and I have turned off most locations settings and limited ad tracking. when this all started awhile ago the app I use the most, a newspaper, suddenly popped up with a survey that it tried to force me to click on and take. there was no option not to take the survey and the website address it showed ended in .xyz as if that is a real legitimate site. what I did was close the app and delete it as I knew this had nothing to do with this major newspaper app. it was directly after that that the location-based ad in this guy's country started coming up. so, how the heck can I keep this guy off my phone now? I still want to catch him and am hoping I can somehow do that either on my computer or phone. no one should be allowed to do this to another person. it's been a nightmare. again thanks for any and all help.

  • Help: Mail program hacked by Spammers

    My "Mail" application has been hacked by spammers. About 3 weeks ago, I noticed when I clicked on "get mail" 15 incoming messages would appear in the mail activity box, but only 3 or 4 actual email messages would appear in my incoming message box. When I send out an email, there is alway at least one phantom email that goes with it, yet nothing appears in my sent mail box. Norton hasn't found anything. Today Comcast sent me a message saying Spam was being detected coming from my account and they were suspending my email port until it was resolved. I've tried changing my password and changing my outgoing mail port to a more secure port, but nothing has helped. This is my primary business email account and I need it to be clean. Does anyone have a suggestion for what I can do or a better virus/spam protection software package? Thanks!

    I guess my confusion has to do with your direction to: "Open the list of applications and check off the ones you want---in your case probably just Mail." I was expecting to see a "list of applications" when I clicked on Applications in the Optional Install Package, but I saw neither a list of applications or the Mail application.
    Regarding the install disk. I have a new Mac G5 that came with OS 10.4 pre-installed. I think this help line is getting frustration for both of us. A better solution might be for me to take my computer into the shop that sold it to me and have them deal with the problem. Thank you for your assistance.
    Paul

  • Help catching Control-K

    Hi i hope you can help me i need to catch the control-k combination key in a  grid , so i can delete a row like business one but i can't. i try using the pval.modifiers but the only combination i catch is control-o
    I try qith an api but i doesn't work
    Thank
    Rodolfo Ruiz Camacho

    Hi,
    I'm delete row when user select it and press "Delete" button ( I don't understand why SAP Manage choosed for it Ctrl-K). It's no problem to catch pressing on "Delete" button. For deleting row you can use DeleteRow method of the Matrix object.
    And also - SBO don't catch pressing buttons events while there's no focused object on the form (selecting row don't put focus on the matrix).
    Best regards.
    Mark

  • I need real help. Got hacked.

    I have been sending skype support messages 7 times and they still can't help me I send them prove of me being doss by that user. Still no help they are still asking me **beeping** the same questions no stop. I send them screenshot of that happening. I need some one in skype staff to help me. IM getting pissed off. I get hacked, they ask me to get a screenshot of the program they guy used on me. Like what the hell, how would some one get a screenshot of the program of he used on me on action hacking my account. if a smart skype admin would nicely help me and not do the same they did, i can even send you all the messages. you would undersant why im fustrated.

    Here is the link to the page in the help section of skype.com that discusses suggestions regarding hacked/compromised accounts;
    https://support.skype.com/en/faq/FA10920/what-can-​i-do-if-someone-has-taken-over-my-account
    IF YOU FOUND OUR POST USEFUL THEN PLEASE GIVE "KUDOS". IF IT HELPED TO FIX YOUR ISSUE PLEASE MARK IT AS A "SOLUTION" TO HELP OTHERS. THANKS!
    ALTERNATIVE SKYPE DOWNLOAD LINKS | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUSPICIOS CALLS AND MESSAGES
    SEE MORE TIPS, TRICKS, TUTORIALS AND UPDATES in
    | skypefordummies.blogspot.com | 

  • HELP needed! HACKED NOW LOCKED OUT

    Hi all
    I am very new to apple and not very good with IT anyway so please be gentle with me!
    I bought a new mac a few months ago which my boyfriend (whom I am 38 weeks pregnant with!) talked me into and set up for me.  7 weeks ago I caught him cheating and kicked the lowlife out,  I changed all my passwords etc set up a new email account but was convinced he still had remote access, I turned off remote access and removed him as admin, still He seemed to have access (told by lots of IT savvy people this wasnt possible) BUT then I couldnt sleep one night and was on computer as he was accessing, I quickily photocopied some of the things he was looking at bank account, email account, facebook messages and even had copies of text messages that were sent to MY iphone??? etc then pulled the plug police came out he got arressted and cautioned for misuse of computer act but as he EXPLAINED how he did it (not really just gave them enough) they didnt bother going into the system in the end, he has since told me how he tied them up in circles and bluffed his way through which he finds highly amusing!!! Picked up mac yesterday got up in the middle of the night so I could get on with no interference from him, even though it still says im admin it wont let me put anything in anywhere I can open things with right click on the mouse but cant close anything or change anything went back to log in page now cant access anything from there, I have no idea where the reinstall disk is,  I already know he locked me out of my mobile me account which is one of the first things he did, I have spoken to apple support and because I know nothing, and he paid for it (mobileme account) I have lost ALL of my photos (including all my photos of my little boy when he was a baby ), contacts, music everything. Please help I dont have the money to pay a fortune for a specialist to go through it, what do I do???

    The best advice i can really give you is to start again,
    this is a mac pro right? not a macbook?
    if thats the case, buy a new internal hard disk, put it into a spare sled, and reinstall OSX onto it and set it up yourself, a new copy of osx isn't to expensive, once you've done this you should be able to get back into the old disk and take back the files that you want, then in system prefrences setup some serious firewalls and turn your filevault on, to prevent further security issues.
    once you've got everything you need, go into disk utillity and just wipe the old hard disk and volia you have a brand new system with more storage than you had before.

  • Help catch a crook

    Hi,
    Someone at my work is calling abroad (Africa) from my office phone how can I find out the number (last number dialed) to confront the crook and make them pay.

    this is a BT residential forum you sound like a business user in which case you need to contact the BT business forum at this link http://business.forums.bt.com/t5/Broadband-and-internet/bd-p/Broadband
    If you want to say thanks for a helpful answer,please click on the Ratings star on the left-hand side If the reply answers your question then please mark as ’Mark as Accepted Solution’

  • Help! Someone hacked my iTunes account and downloaded $400!!!

    I'm freaking out because someone got my account info and spent $400!!! My bank account is froze and i have no money because iTunes took it!!! No one has responded from my email!!!

    Call your credit card company FIRST and put a hold on your card. Then tell them the situation and they will help you solve the issue.

  • How do you catch hackers hacking your computer?

    Is there a tool or software to catch hackers?
    they should make one!
    angle

    How to Transfer Photos from an iPad to a Computer
    http://www.wikihow.com/Transfer-Photos-from-an-iPad-to-a-Computer
    Importing Personal Photos and videos from your iOS device to your computer.
    http://support.apple.com/kb/HT4083
     Cheers, Tom

  • HT201303 Help! Someone hacked into my apple account and and made purchases, what should I do?

    Someone hacked into my apple itunes account and made purchases, and changed the address and credit card information.  What should I do first?
    Thanks!

    Change your password.
    Report the incident to Apple :  iTunes Customer Service Contact - http://www.apple.com/support/itunes/contact.html
    If any charges were made to your credit card you should report them to your credit card company.

  • Help: Catching the ClassNotFoundException

    My question is related to the question at http://forum.java.sun.com/thread.jsp?forum=31&thread=396176
    I start a new thread as it has a different emphasis. I have the following code to catch the ClassNotFoundException:
    catch (ClassNotFoundException cnfe)
    System.out.println("Not found");
    Later on I will use a dialog window to send the error message but in the meantime I just want to display it on the console. But it appears to me that the two machine (all runs windows XP) I used, one at home and the other one at the computer lab at my campus, react differently to the exception thrown. I found that my home machine only display "Not Found" message on the console while the machine at the lab display the message followed by an extensive error message:
    java.lang.NullPointerException
    at MainWindow.<init><MainWindow.java:97>
    at .....
    at .....
    etc.
    What does make these two machine react differently?
    Any input will be appreciated. Thanks.

    The class cnfe might be present in the campus machine due to which your code is not throwing the class not found exception and is throwing null pointer due to some other case.

  • Need help catching all members in my query

    Here’s the problem: I think my very last statement is causing the report to pull ONLY people who’ve actually ever logged in. Is there any way to still pull only the latest LOGIN_TIME OR a NULL/Empty time?
    Thanks for anything you can tell me!
    select
    PS.LNAME,
    PS.FNAME,
    SI.LOGIN_ID,
    PS.EMAIL_ADDR,
    US.col_num_20 Library_Type,
    US.col_num_30 Place_of_Work,
    US.col_num_10 Was_Rejected,
    US.col_num_70 Date_Created,
    PS.POSTAL,
    PS.STATE,
    DECODE (PS.NOTACTIVE, 'Y', 'N', 'Y') AS is_active, PS.NOTACTIVE,
    SI.LOGIN_TIME,
    SI.SEQ_NUM
    from PA_STUDENT PS, PV_STUD_USER US, PA_LOGIN_SESSION_INFO SI
    where PS.STUD_ID = US.STUD_ID (+)
    and PS.STUD_ID = SI.LOGIN_ID (+)
    and SI.LOGIN_TIME = (select max(LOGIN_TIME)from PA_LOGIN_SESSION_INFO SN where SI.LOGIN_ID=SN.LOGIN_ID)

    Hi,
    Without knowing your data, or the results you want from that data, I can't say for sure, but I'm guessing you want all the conditions to be outer join conditions. Using ANSI join syntax, you can do soemthing like this:
    select
           PS.LNAME,
           PS.FNAME,
           SI.LOGIN_ID,
           PS.EMAIL_ADDR,
           US.col_num_20 Library_Type,
           US.col_num_30 Place_of_Work,
           US.col_num_10 Was_Rejected,
           US.col_num_70 Date_Created,
           PS.POSTAL,
           PS.STATE,
           DECODE (PS.NOTACTIVE, 'Y', 'N', 'Y') AS is_active, PS.NOTACTIVE,
           SI.LOGIN_TIME,
           SI.SEQ_NUM
    from            PA_STUDENT          PS
    left outer join       PV_STUD_USER           US     on     PS.STUD_ID     = US.STUD_ID      
    left outer join       PA_LOGIN_SESSION_INFO SI     on      PS.STUD_ID     = SI.LOGIN_ID
                                            and      SI.LOGIN_TIME      = (
                                                        select  max (LOGIN_TIME)
                                                        from    PA_LOGIN_SESSION_INFO SN
                                                        where   SI.LOGIN_ID     = SN.LOGIN_ID
    ;Since you were using a + sign after a column from si in this condition:
    and PS.STUD_ID = SI.LOGIN_ID (+)you must have a + sign in all conditions involving si; otherwise, the effect is an inner join.
    Using the old join syntax (with + signs) you can't outer-join to a sub-query. If you really want to use the old syntax, re-write the condition involving si.login_time so that it doesn't join to a scalar sub-query (whihc might be more efficient anyway).
    I hope this answers your question.
    If not, post a little sample data (CREATE TABLE and INSERT statements, relevant columns only) for all tables involved, and also post the results you want from that data.
    Explain, using specific examples, how you get those results from that data.
    Always say which version of Oracle you're using.

  • Need help catching duplicates from csv import

    I have a page where a user can import a csv file. I want to
    check for duplicates and either disregard them and only use the
    number once or delete the duplicates. Here is my code:
    <cffile action="read" file="#form.FiletoUpload#"
    variable="csvfile">
    <cfloop index="index" list="#csvfile#"
    delimiters="#chr(10)##chr(13)#">
    <cfquery name="massimport1" datasource="#bads#">
    INSERT INTO table1(ID, RID, Level, Schedule, Date1,Date2)
    VALUES ('#listgetAt('#index#',1, ',')#', '#id#',
    '#form.Level#', '#form.Schedule#', '#form.date1#', '#form.date2#')
    </cfquery>
    </cfloop>
    Is there any way to eliminate duplicate ID numbers entered at
    that step? Any ideas would be appreciated.

    use this type of insert query
    insert into mytable
    (fields)
    select distinct values
    from SomeSmallTable
    where
    (select count(*)
    from mytable
    where somefield = somevalue) = 0

  • Help! My account hacked! :'(

    Help! Someone hacked my account. Tied him to someone else's mailbox. Steal money from the card for the subscription "Peace" and some other. I use Skype for many years. Give me back my account please and cancel these horrible subscription, we do not have that kind of money. Any photos and information provided. Login ribokoshka.

    you can visit the link below for suggestions;
    Suggestions on how to handle “Hacked Skype Accounts”
    IF YOU FOUND OUR POST USEFUL THEN PLEASE GIVE "KUDOS". IF IT HELPED TO FIX YOUR ISSUE PLEASE MARK IT AS A "SOLUTION" TO HELP OTHERS. THANKS!
    ALTERNATIVE SKYPE DOWNLOAD LINKS | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUSPICIOS CALLS AND MESSAGES
    SEE MORE TIPS, TRICKS, TUTORIALS AND UPDATES in
    | skypefordummies.blogspot.com | 

  • Some has hacked all my iPhone data.  What do I change?

    Hello iPhone users,
    Recently a jealous x has managed to hack contacts in my phone, knows the right people to contact, and has been hacking/spoofing my number sending lewd text messages to them from my number and vise versa.  In a bad attempt to cover themselves up they sent the same messages from their phone number to one of my friends then denied it was them (as if to say their phone number is being spoofed too).  The loophole in their plan though is that AT&T confirms the texts were sent from their phone to my friends phone (indicating it wasn't a spoof) but doesn't show any texts sent from my phone when I'm being hacked/spoofed.
    I've tried getting help from AT&T, the FCC, and Police to do something about it.  AT&T just said "sorry this is happening but we can't give you any information or do anything about it.  It's not our problem." The FCC said, "wow technology is scary huh."  The Police said "this is a childish issue" and wouldn't even take my report.
    So what can I do to safeguard myself in the future since obviously no one cares to help?  Apple is the last place I'm going to. 
    Obviously iPhone security is vulnerable.  I am getting a new iPhone with a new number and new service provider today.  But since my phone has already been hacked, what can the person see?  I'm assuming they could have my email and passwords since I've used them on my phone.  Same with my Apple ID.  Is there any way they can hack into my computer from my iPhone?  Or hack into my next iPhone I get?  Do I need to set up a new Apple ID for my new iPhone and if so how do I transfer all my apps from my old iPhone to my new one? 
    I'm really scared to try to move to a different number and provider and have this keep happening to me especially because no one cares to help catch this person and tell them to stop.

    This exact thing is currently going on with me. It started about a week ago and i thought it was a software update with a problem, so i did a restore on my phone.  Heres alittle background: my friends started recieving calls from my phone, they did not appear in my outgoing, but i could see me multiple calls on their incoming call list.  I also was getting these calls from them.  We dubbed it "ghost" calls because no one was on the other end.  I then started to recieve text messages from someone who informed me they had been doing this to my phone.  Each message i recieved from them came from a different number, never the same one.  I recieved 5 messages from different numbers.  Whats even crazier they said they were going after 2 of my friends that are dating, and they used my phone to make me "break up my friends." I already changed my AppleID, my password, unlinked my accounts from my phone, but have left my phone off.  This spoofing of the iphone is real. I have changed every password that has been used on my phone.  (i did this after the initial issues with my phone, and it still continued).

Maybe you are looking for

  • Urgent!! 'Screen output without connection to user'

    Hi, Our requirement is to send an e-mail in the outlook when a workflow is triggered. On trigerring, the WF is started but in TRXn SWEL the RFC status says <i><b>'Screen output without connection to user'</b></i>. In transaction SM58, i get the statu

  • Cannot access servlet in tomcat4

    I'm a newbie to server side java. Please guide me. Installed Apache2 and Tomcat4 in Win2K. The installation seems OK because the index pages of both apache and tomcat appear when accessed as localhost on browser. I wrote (in fact, copied from a tutor

  • Advanced Security manager- Error Initializing the Essbase API.

    Hi, I have installed  OLAPUnderground> Advanced Security manager for exporting all the User security.  when i try to click connect it throws a connection error "error Initializing the Essbase API, cannot connect." Has any one seen this error before?

  • How to move entire Final Cut Project to CS5?

    Hi, I would like to import my entire final cut pro 7 project (20 bins, 10 sequences, 300+ clips) to Premiere CS5.It is very important that the structure that I have setup be maintained (bins, sequences and the clips within them)   About two months a

  • Brightness and Contrast Import Defaults

    When I import NEFs from a D200, LR gives it a brightness +50 and contrast +25. The photos look pretty good with that setting, but LR instructions suggests to first adjust exposure, recovery, and blacks before futzing with brightness and contrast. So,