How do I "untrack as intruder"?

I got a new xbox 360 and I put the password in and I could connect with no problem. Then my dad thought the Xbox was someone else and hit "track as intruder" and blocked me (I assume). Because the password and everything is correct, and I was on before and now i can't connect to the router.
What do I do?

Welcome to the Cisco Home Community.
Are you pertaining to Network Magic or LELAs functionality "Track as Intruder"? If so, you can simply stop tracking the Xbox from the Application as well.
The Search Function is your friend.... and Google too.
How to Secure your Network
How to Upgrade Routers Firmware
Setting-Up a Router with DSL Internet Service
Setting-Up a Router with Cable Internet Service
How to Hard Reset or 30/30/30 your Router

Similar Messages

  • How to get rid of intruder/hacker from simultaneously, with me, using firefox to igoogle account and gmail?

    This is a "start over". In effect, my question, restated,is this: I have a second user who is not authorized, i.e a "hacker" who slipped by WebRoot's Security Screens and the folks at Fire Fox. How do I ferret this person out? I thought I had him/her in my sights by tracing IP's but these, so far, are from Verizon Wireless who I use as an ISP via the use of their MyFi2200 modem. VZ wireless has a series of locations (towers) they operate from that automatically switch as load capacities vary; ergo they leave an IP trail of many different switched to places which leaves a false impression of an intruding hacker. La de Dah ! tj.

    I'm surprised this topic has persisted since early last year without anyone mentioning the word "adware" - because that's probably what's at play for everyone here.
    A couple possible solutions are my AdwareMedic app, or, if you are rightfully a little leery of running an unfamiliar app recommended by a stranger in a forum, the manual instructions in my Adware Removal Guide.
    (Fair disclosure: I may receive compensation from links to my site and software, in the form of buttons allowing for donations. Donations are not required to use my site or software.)

  • I accidentally makerd an intruder and kicked them off with network lock, how do i find them again?

    I accidentally makerd an intruder and kicked them off with network lock, how do i find them and add them again?
    I can not see them in the network map or anywhere.

    timh86 wrote:
    I accidentally makerd an intruder and kicked them off with network lock, how do i find them and add them again?
    I can not see them in the network map or anywhere.
    Hi timh86,
    You can't unless it is your own computers. Turn on all your computers and printers. Turn off the Network Lock. Once all are reconnected to the Router, reenable the Network Lock.
    thecreator - Running Network Magic version -5.5..9195.0-Pure0 on Windows XP Home Edition SP 3
    Running Network Magic version -5.5.9195.0-Pure0 on Wireless Computer with McAfee Personal Firewall Build 11.5.131 Wireless Computer has D-Link DWA-552 connecting to D-Link DIR-655 A3 Router.

  • An interactive dialogue box appears. How do I get rid of this invader? I don't know what it is & don't want to open it. Is there a way to find out what it is without letting an intruder in?

    I believe I'm using the latest Firefox. I download it whenever you tell me it's available. I have Windows Vista. This box appears in the desktop area (which MSN seems to have redesigned from the way I had it). This seems like a boarder which hops on to my computer after I do a search on Yahoo, but I don't really know where it comes from, what it is, or what it's doing.
    One time you showed me a box which let me get rid of cookies. I don't know how to call that box back, but I'd like to

    etresoft  a long time contributer to Apple Support Communities wrote a very useful app he called etrecheck which helps in diagnosing many problems caused by third party installs etc.. Go to his website, read his information and from there download and run the program according to his instructions
    http://www.etresoft.com/etrecheck
    Post the results back here
    Pete

  • My mother sent an infected email that has infected my MacBook Pro with a virus that interrupts things with ads, hijacks whatever you're working on with pop-ups, and intrudes on everything. How can I get rid of it?

    My mother sent me a message that was infected with a virus.  This thing has ads popping up all over the place and hijacking whatever it is I'm working on.  How can I get rid of it? 

    Please post a screenshot that shows what you mean. Be careful not to include any private information.
    Start a reply to this message. Click the camera icon in the toolbar of the editing window and select the image file to upload it. You can also include text in the reply.

  • Since updating every time I click on something another window intrudes and I can no longer log in to secure (bank etc) sites. What's happened and how do I sort it ou? It's become unusable

    Since updating Firefox every time I click on something another site (v. dodgy looking) opens and I can no longer log in to secure (bank etc.) sites, what has happened and how do I cure it? It's reached the point where I no longer use Firefox.

    Im wondering why my post hasn't been answered yet.  I did file a report with the BBB and I had a rude representative from Verizon call me named Steve. He said I can file all of the reports I want and I will just keep getting calls from him.  I can understand why my phone couldn't be replaced because of the small crack.  I guess I have to eat that one (but it sucks because the lollipop update is what caused the problems)  but what about all of the data overage I had to pay for for trying to fix this phone because of a lollipop update.  I dont think it is fair to have to pay that as well. In addition,  because I have an east coast phone number but live on the west coast, I cannot have tech support after 8pm.  Verizon has cut this off.  Im very dissatisfied and I have been a customer of Verizon for 13 years.  Im hoping for a response this time.

  • How do I get iTunes 11 to play separate tracks that are intended to be played consecutively, even when in "shuffle"? (i.e., Van Halen's "Intruder" and "Oh, Pretty Woman")

    Any help would be most greatly appreciated!

    I believe you can shuffle by groupings, can't you?
    Get info for both tracks, and add the same information to the Grouping tag for both of them. Then, when shuffling, select to Shuffle by Grouping.
    That seems to work with me: I dimly recall setting this up with a lot of my classical music years ago, and it looks like that kind of shuffling still functions.

  • How to share safari iCloud tabs using a secondary iCloud account?

    I have 4 iOS devices in the family: an iPhone 4S, iPhone 5, ipad 2 and an ipad 3, all with the latest iOS software.
    Each  pair has its own separate primary icloud account. So, one phone shares a primary icloud account with one ipad, the other iPhone  shares with the second ipad. That allows us to keep most things separated as necessary. However,. the are just 2 things I wanted to across across ALL 4 devices: Shared Safari Tabs, and Find iPhone. I wanted to be able to see what safari tabs are currently open on ALL these devices, FROM any device of these devices.  I also wanted to be able to see the location of ALL 4 devices from any of these devices.  To do this, I set us a second shared iCloud account on all 4 devices.
    The new shared safari tabs feature works great with your main iCloud account on all devices you want to share this with....HOWEVER, it WILL NOT WORK AT ALL if you are trying to share tabs with a secondary iCloud account.
    I set up a secondary shared family iCloud account on all 4 of our iOS devices by going to Settings/Mail, Contacts, Calendars/Add Account... and selected iCloud as the account type, and created a new family account. After creating it, I was offered options to share various things with that account. I turned OFF every share option except Safari and Find iphone.
    Turning ON the Safari sharing option generated a box telling me that Safari sharing will be turned OFF for main iCloud account, (which is fine), and asking if I want to save my current Safari data and roll it into the new iCloud account or delete it (I've tried it both ways). I then repeated this process on all 4 of our family iOS devices. The result is that Safari iCloud sharing actually stops working all together. The new "cloud" symbol that was at the top of the browser window on my iPads , next to the bookmarks button, has now disappeared. On my iPhones, the menu option for sharing safari tabs has disappeared. So, enabling Safari sharing in a secondary iCloud account DOES disable sharing in the primary account, but DOES NOT REALLY enable it in the secondary account, even though it SAYS it is enabled.
    Apple's phone support is worthless on this issue. multiple calls to senior advisors, 3 times being told my issue was being referred to "engineering"....never a single followup call or email back EVER, after weeks. i am really tired of so-called senior advisors even telling me "Oh, you can't have more that one icloud account in a device", which is NOT true, see above for how I have added one.
    What is really odd is that the one other thing i wanted to share across all 4 devices does work: the Find Iphone app. Again,, turning this on in the secondary iCloud account settings causes a warning that Find iPhone will be turned off for the primary iCloud account on that device, which is fine for me. I did it on all 4 devices, and now from any of them I can log into Find iPhone and see the location of all 4 devices, even though they use different primary iCloud accounts. Sharing this feature still works with the secondary account.
    So why won't the Safari data share properly with the secondary account? if this feature isn't supported with a secondary account, why is it there as on option in the first place? What purpose does Safari sharing serve with a secondary account? NONE that I can find, aside from DISABLING sharing completely for the primary iCloud account.
    If anyone has an idea of how to make this work, or what purpose the Safari sharing serves in a secondary icloud account, I'd love to know. Better yet,  explain it to Apple because they are clueless.........

    Sigh...it's gotten even worse with iOS7.
    While iOS7 may be a big leap forwards in most respects, the "Find my iPhone" feature has taken a big step in reverse. This useful feature is NO LONGER AVAILABLE for use with secondary iCloud accounts, ONLY your PRIMARY account.
    This may not be a huge concern for most users, because many (including most first-tier tech reps at Apple I've spoken to) seem to believe that you can only have one iCloud account on a device. NOT TRUE. While you can only have one PRIMARY account, you can add multiple additional iCloud EMAIL accounts (go to Settings/Mail, Contacts & Calendars/Add Account/iCloud). In the last iOS, once you created a new, secondary iCloud email address, you could activate many iCloud features for use with the new account, including Mail, Calendar, Contacts, Reminders, Notes, Safari Data (which never actually worked), and Find My iPhone. Under iOS7, however, Find My iPhone is no longer available. Instead, a small paragraph below the new iCloud email account setup screen says "Only your main account can use Bookmarks, Photo Stream, Documents & Data, Backup, and Find My iPhone."
    Consider two cases where this is a huge problem.
    1) We have a large number of company iOS devices that we need to keep track of.
    2) Personally, I have an iPhone and iPad, and so does my wife. So do our kids!
    In both the above cases, we created a secondary iCloud account, we'll call it "[email protected]", and added it as a secondary iCloud email address on ALL our iOS devices. In the setup screen we disabled everything EXCEPT "Find My iPhone". This account has a unique password, making it possible to see the location of ANY OR ALL the devices using the Find My iPhone App, WITHOUT having to share email, contacts, calendars, etc. among all these devices.
    In our company, I can tract the location of any iOS device I gave to an employee, but his personal PRIMARY iCloud account is used to keep his mail, contacts, calendars, etc. secure. He shares this data between his iPhone and iPad, but NOT with everyone else. In my family, we all have our own primary iCloud accounts. I share mine between my iPhone and iPad; my wife and kids do the same. This allows us to keep our calendars, contacts, emails, etc. separated. But we all used the secondary iCloud email account ONLY with Find My iPhone. This allowed everyone in the family to see the location of everyone else, very nice in an emergency. Unlike the Find My Friends app, the device being located doesn't have to respond to a request to be found (very important when finding a lost or stolen device).
    In both the above cases, we just log into the Find My iPhone APP on ANY iOS device, using the secondary iCloud account's email address and password (the email address is actually saved in the app, so you really only need to enter the password after the initial login). Viola! You can now see the location of any device that has that secondary iCloud account installed. And a person can still be untrackable if they wish, simply by turning off the Find My iPhone feature under the shared account's iCloud account settings on their device.
    Alas, with iOS7 this is no longer possible. With the Find My iPhone feature only available for use with the device's PRIMARY iCloud account, there are only two ways to track another device:
    1) Use the same primary iCloud account (which forces you to share other data and features you may not want to);
    2) Log into the Find My iPhone APP with the PRIMARY iCloud email address and password of the person you want to track.
    Either way, the person doing the tracking MUST have access to the PRIMARY iCloud credentials of the device they are tracking. This is a large security hole! Ask yourself: if you are a parent, do you really want your kids to have access to your primary iCloud account, including your mail, contacts, calendars, etc? Some people may not want their spouse to access that. In a company setting, do you want all your employees to be FORCED to share Documents & Data, Backup and Bookmarks, just to use the Find My iPhone feature? If they want to keep their mail, contacts, calendars, etc. separated from other employees, they will be forced to move these to a secondary iCloud account, which will no longer allow them to share Bookmarks, Photo Stream, Documents & Data or Backup. Why this ridiculous limitation?
    The bottom line:Find My iPhone is now only useful for the primary iCloud account holder, and can no longer be used effectively between larger numbers of iOS devices, such as families or corporate institutions. This should be addressed in the next update to the iOS.

  • How do I fix an incompatibility problem with Windows 7?

    Through the day, I have been getting this eror message:  Adobe Acrobat 5 is not compatile with Windows 7, which is my OS.  What should I do?
    Earlier in the day, I had gotten a certificate revocation notice about Acrobat.  Thinking it was an intruder, I did not allow it to make changes to my computer.  Now, I am sure that was a mistake but I am not sure what I need to do.   Sure could use some help.

    Thank you, Kglad and Mylenium.   It is Adobe Acrobat Reader 5.  It is just the version that came with my PC.  There has never been a problem before yesterday. 
    Things seem to be working OK but I feel sure I need that program to be working. 
    I have looked at what is available for upgrading  and I am not sure where to go from here.  I thought the update on this page would be right but it does not mention Windows 7.  Nothing later than XP.  http://www.adobe.com/support/downloads/detail.jsp?ftpID=1309
    It also says.......Note: Acrobat must be closed before running the patch.   Can you tell me how to close Acrobat and if this is the right patch to download?
    Thank you so much for your help.  You are  much appreciated.

  • When Firefox first loads, there is threatening script which quickly comes up and disappears, but I want to freeze and read it; but how?

    I am the victim of Identity Theft. The perpetrator has taken over as Roaming Administrator of my PC's. I once had 7 of them, but she has stolen/destroyed all but 2. She is taking online classes at college from Microsoft, and puts her class notes on one of the 2 surviving ones, which was returned to me by law enforcement. She has denied me access even to my "My Documents" subdirectory, &, in an ASUS AMD 8-core PC w/16GB of RAM, with a 3D blu-ray DVD reader/writer & 52-memory card reader/writer built in & a 2TB Western Digital eSATA HDD, all of which I designed & built, she has hidden the entire directory tree on the hard drive & rendered all of the other devices disabled so that the system is kaput; all because I was amassing evidence against her for law enforcement & the FTC.
    The question at-hand is how I screen-freeze Firefox as it is loading so that I can read the JavaScript she has written at the bottom of the banner. It is something about how she has accessed my Norton Identity Safe Vault, changed the password on me, & shut off & denied me access to my 2 Facebook accounts & others I am not quick enough to read. I need to screen-capture this message for law enforcement, because they STILL, after a year & losing a total of $223,000 from my bank account to her, don't have a case file with them! PLEASE CAN YOU HELP ME! Katrina has actually hired a hit-man whom we have captured on surveillance video trying to shoot me in the head! She has also hacked her way into my router, changed my password & disabled the reset capability of the router so that even my ISP can't reset it! Imagine what YOU could do with $223,000! I am elderly, broke, and have lost almost 250 pounds because of her! If I live long enough, I want to see her in federal prison. If I die, I want her to die by lethal injection in Washington State for First Degree Murder!
    FYI...I have used Firefox since its creation. The last time she wiped it off one of my systems & I reinstalled it, she caused it to install in Swedish. She has stolen the keys to all of my paid programs, & the companies now believe they actually belong to her, instead of myself. Norton 360 Premiere thinks I'm an intruder on my own machines, and Symanted has disabled my account, and will not communicate with me anymore. They gave her my Vault with more than 200 usernames and passwords! With GoDaddy, I had 17 non-profit SSL domains, for which I paid in excess of $8,000 to secure for 10 years with 21 email accounts. She obtained my SSN, impersonated me, demanded back the money I had paid, and they sent it to her. She stole the phone on which I had 2-step authentication, and now they won't let me near my accounts! I've had the same Gmail account for 8 years. Google opened up my password-secured YouTube account to 70,000+ strangers and pornography, and, after being LinkedIn's nominee for International Businesswoman of the Year, 2013, Google opened up my Wallet account to 2 other Identity Thieves to make purchases in my name, and they say I don't exist.
    Lastly, she has poisoned our indoor spa with bio-terroristic flesh-eating parasites in the form of hybridized, skin-burrowing arthropods that killed our dog, cats, and dozens of birds in our special-needs avian sanctuary. I barely survived an 8-day stay in the hospital in June in, in "grave condition with toxic encephalopathy" because the parasites are immune to all parasiticides, and had crossed my blood-brain barrier. My husband has heart attacks, strokes and seizures constantly from them. I can no longer walk.
    It is but one question I have asked, but your answer could be the key to stopping her from destroying what is left of our lives. With that JavaScripted message, she has cut me off from thousands of friends and family who have no idea what has happened to me. I live in a desolate, isolated corner of rural America without so much as phone or text service. All I have is the Internet and Firefox to keep me alive. If I can freeze that message and show it to the Whitman County Sheriff's Office, for whom I am the volunteer computer expert, they will accept their first-ever case of Identity Theft, and pursue her. It's bad enough that I lost the family fortune that my parents worked their whole lives to amass; I've lost my credibility, my self-esteem, and my will to live.
    If you can help me, I plan on writing a book about the whole traumatic experience so that innocent others won't have to suffer the devastating nightmares as we have. Ours has been called, by the experts who should know, the worst case of Identity Theft in the history of the crime.
    <sub>edit: removed identifiable personal information, since this is against our [[Forum rules and guidelines]] (philipp)</sub>

    Hi,
    Troubleshooting a start up script can be difficult. There are some third party programs that also keep logs of start up programs, however for Firefox this may be different.
    Is Firefox a startup program? [http://www.winxptutor.com/msinfo32.htm]
    Its also possible to check the Web developer tools for any scripts in a page: [https://developer.mozilla.org/en-US/docs/Tools/Debugger]
    In the control panel there is also Administrative tools to view event logs, but this may be something a local technician can walk you through.

  • I recieved a scam email from apple. then sent me the same email using my own email account. how do I report this to apple. can't find any contact details.

    hi over the past month have received maybe 5 scam emails from apple.
    I opened one the other day cause I thought well maybe it is from apple.
    went through the steps and it was  amazed at how well they did at copying apple website. you could even go to the apple shop page from their page!
    what set me off that it was fake was that I tried to open the other apple pages along the top and it wouldn't let me. so I opened my own apple page and logged in. and realised that they don't ask for your bank details in your Apple ID account.
    anyways so now what has happened is I got an email today " from myself" with this same scam email. it is as if they have hacked my email account and sending me these emails. I want to report this to apple but am unable to find any contact details apart from call back options. does any one have any advice on this.

    I've had that same exact issue, I received the first e-mail claiming to be from Apple last night (though over the past week I've received two other scam e-mails from different addresses claiming that my bank transactions have been aborted). It said it was from my own address, and I checked it closely to make sure it wasn't a spoof account but found it was indeed my own e-mail address. Five minutes ago I changed my password, and I have just now received a second e-mail exactly the same, still coming from my own account. My best guess at an explanation is that it may have been sent before I changed my password and there was just a delay in the message sending, resulting in it coming through after changing my password.
    I've now forwarded the e-mail on as an attachment to the [email protected] address, however this still doesn't help me with regards to stopping these e-mails. It concerns me that even though I changed my password they still possibly have access to my account. I tried checking my account activity but as opening the mail app on my iPhone is considered as a log in and I check it almost twice an hour, it's impossible to tell which could possible be an intruder logging in.

  • Since updates my printing for emails and downloaded documents is miniscule and showing landscape, so how do I reset this to print the page as it appears?

    Whenever I print something from online or from a document, I do not have an option to change from landscape back to portrait. I also have miniscule print that is all squished to the left margin and printed on landscape. I cannot use this in business transactions and this has been occuring since an upgrade this fall. Also, I have started using netflix with this computer FYI.
    I do not have this problem with Safari as a browser. I really like Firefox because I feel it has kept our PCs here at home safer as well as my MACBOOK.
    Please tell me how I can change settings back to what they originally were for data going to my HP printer 3745.
    Thank you

    I've had that same exact issue, I received the first e-mail claiming to be from Apple last night (though over the past week I've received two other scam e-mails from different addresses claiming that my bank transactions have been aborted). It said it was from my own address, and I checked it closely to make sure it wasn't a spoof account but found it was indeed my own e-mail address. Five minutes ago I changed my password, and I have just now received a second e-mail exactly the same, still coming from my own account. My best guess at an explanation is that it may have been sent before I changed my password and there was just a delay in the message sending, resulting in it coming through after changing my password.
    I've now forwarded the e-mail on as an attachment to the [email protected] address, however this still doesn't help me with regards to stopping these e-mails. It concerns me that even though I changed my password they still possibly have access to my account. I tried checking my account activity but as opening the mail app on my iPhone is considered as a log in and I check it almost twice an hour, it's impossible to tell which could possible be an intruder logging in.

  • How to tell if a machine is compromised?

    Is there a definitive way to confirm that a machine has been compromised and and allowing an outside user hidden access? I'm not quite sure what the limits are on how much the reality can be distorted. I know teh logs can be altered and system binaries can be modified or replaced so I'm thinking nothing about the machine can really be trusted in such a situation. Unfortunately, I do not have anything like Tripwire installed.
    Is it possible to hide files from a terminal session run from a Boot CD? Is there a way to guarantee that ps will show all of the processes? Where can a user hide? Is it possible for an unauthorized Administrator account to overtake a Root account that has a secure password? Will Repair Permissions slow down an intruder at all? Is there a reason loggerd should be running as two processes? And what would cause my secure log to have recorded events two minutes before the system log says the machine started?
    I'd appreciate any advice or assistance. I'm not finding much info on the specifics of OS X in this area.
    Thx.

    Hi rmd103,
       I'm sorry for the late reply but I didn't want to be the first to answer. I'm hardly a security professional but I'm a hobbyist and don't want your question to pass without comment either. I've seen the magic of a rootkit and it still amazes me. I never could find a way to detect the intruder with the rootkitted kernel. However, to answer one of your question, this magic doesn't occur if you boot from a disk with an unaltered kernel.
       What to look for when you've booted from a disk could be the subject of books. One thing you could try is chkrootkit. That app looks for evidence of known rootkits in binaries on the system. Just reading about chkrootkit will teach you a lot and it makes some of its tools, like searching the binaries for strings, available to the user.
       On the other hand, I don't think chkrootkit can look for known rootkits on OS X because to my knowledge there are none. I've heard "Opener" referred to as a rootkit but it's hard to imagine someone who's "duked it out" with a real rootkit would refer to "Opener" as such. I've seen people find "Opener" by accident. However, there can always be a first and that could be you. A study of the chkrootkit site should help you a lot in figuring out if you're the unfortunate pioneer.
       One thing you can look for is a lot of strange files whose names all start with the same characters. The rootkit has to hide files and the ones with which I'm familiar recognize those files because their names all begin with some unusual character.
    > Is it possible to hide files from a terminal session
    run from a Boot CD?
       Actually before the special characters recognized by the compromised kernel, I believe the filenames begin with a period so they are probably hidden is the usual UNIX sense but a listing with "ls" from a boot CD with the "-a" or "-A" option will easily see them. Therefore basically, the files are as easy to see as any other files.
    > Is there a way to guarantee that ps will show all of
    the processes?
       Yes again, run it from the boot CD. However, this generally isn't that helpful because the boot CD hasn't been compromised in any way so the malicious processes probably aren't running.
    > Is it possible for an unauthorized Administrator account
    to overtake a Root account that has a secure password?
       Behind the scenes an administrator is any account that is a member of the "admin" UNIX group. Any such account already has access to root privileges via sudo so it can do anything it wants. However, there wouldn't be much point in messing with root if you can use sudo. Similarly the rootkit could alter sudo so that it always gave root access to the intruder's account so it probably isn't an issue anyway.
    > Will Repair Permissions slow down an intruder at all?
       Would it effect an intruder with root access and a rootkit written for OS X? No. Would it effect a garden variety intruder? I don't know. I can't think of how it would help but it's always a good thing to do so I'm hardly going to discourage it.
    > Is there a reason loggerd should be running as two processes?
       I have no such process on my machine so if you do, you should try to figure out what it is.
    > And what would cause my secure log to have recorded
    events two minutes before the system log says the
    machine started?
       A clock that was wrong before it was synched with NTP? I see no reason to assume it's a consequence of intrusion but I know nothing of these log entries so there's nothing I can say really.
       Short of a rootkit it is still possible that your machine has been compromised. Most tools, like tripwire, for detecting intrusion have to have been installed, configured and running before the attack. However, one record does exist of the binaries installed on your machine. That is the package receipts found in the /Library/Receipts directory. The actual data is stored in a binary format but Apple provides tools for producing roughly the data in a long listing from "ls."
       I've written a couple of scripts that access this data. One, pkggrep, just searches the filenames for a match with a regular expression you provide. However the other, pkgdiff, functions as sort of a "poor man's tripwire." I've put a tarball of these two scripts on the web at pkggrep.tar.gz if you're interested.
       The pkgdiff script takes any number of directories as arguments. It compares the contents of each directory with what the receipts say should be there and reports discrepancies. It checks the size of the files, the last modification date and permissions. There are options for turning off each of these comparisons. If you turn them all off, the script still reports missing files or files that weren't installed by an installer.
       There are problems. The script is looking at lots of information and so can take hours to run on huge directories. Thus, I recommend that you check one directory at a time and check the smallest first. Also, there are legitimate (or at least non-malicious) reasons for some of the attributes to change so false positives are common. For instance, I think updating prebinding can even change the size of a library. Thus, there are good reasons for turning off the comparisons when checking many directories.
    Gary
    ~~~~
       Two wrongs don't make a right, but three lefts do.

  • Advice for audio import and how do i find the item ID?

    Hi all,
    I am a bit stuck and hoping for a bit of help. i need to add voice over to my project but i am a bit stuck as to the best way to do this. My project is in Chinese and has Chinese captions. I don't speak any Chinese at all.
    In terms of the voice recording i don't know anyone that speaks Chinese so i am sending the text captions externally to get them recorded. As i don't speak Chinese i am a bit nervous about the import process and what the final output will sound like.
    In my export document i can see each caption has an item id - my audio files will come back as an individual recording for each caption, i am assuming they will name the files the same as the item id in the word doc.
    My question is - i have a slide with 4 captions - when i export the captions they are each assigned a unique item id - say the voice over person records each of these captions and then they are named with the item id - what is the most efficient way of importing them back in and assigning them to the correct caption? Is there a way of seeing the caption's item id within Captivate? if i could then i could check the caption's item id and then import the corresponding audio file to it. In the absecen of being able to see the item id how will i know which caption each audio fuile belongs to? i could try to decipher iot based on the caption's text and compare that to the text in the word doc but that will take forever and as i don't know any chinese is not very foolproof
    maybe i am doing this all wrong and there is an easier way??
    Please help !
    Thanks
    Deb

    If you printed the Network Configuration Page, then it SHOULD be on it. It's named 'Hardware Address(MAC)' on the page. If you don't find it there, which is highly unlikely and surprising, then look at the back of the printer for a white label with a Wireless and LAN symbol on it, and the Mac address will be there.
    But to be honest, Mac Filtering is not the best form of security for wireless networks. It can be easily bypassed\intruded by wi-fi network hackers. It's better to assign a WPA or WPA2 security with a WPA key longer than 13 characters. This is nearly impossible to crack currently. So if they can't find the WPA key, they can't connect to the network... which will render Mac Filtering completely useless.
    Cheers.
    Make it easier for other people to find solutions, by marking my answer with \'Accept as Solution\' if it solves your problem.
    Click on the BLUE KUDOS button on the left to say "Thanks"
    I am an ex-HP Employee.

  • How to determine column inches in a text frame with intersecting frames?

    I am trying to write a script to determine how much text would fit in a text frame before actually having the text. If the frame has no run-around areas intruding on the frame it is the simple depth of the frame. Is there an easy way to determine the area of the frame with the obstructed areas subtracted?

    Maybe you could fill text frame with placeholder text:
    myTextFrame.contents = TextFrameContents.placeholderText;
    Hope that helps.
    tomaxxi
    http://indisnip.wordpress.com/

Maybe you are looking for

  • Computer won't boot up after installing SIIG card

    Hey Everyone, I having problems with my SIIG FireWire 2-Port PCIe DV card that I've installed into my PowerMac G5 Quad. With the card installed the computer will not boot up, which is the same thing that happened with my previous two models of the ca

  • Why Mavericks 10.9.1 frequently & randomly crashes? Please Help! Here is a crash log...

    Hi guys, since I have updated to Mavericks 10.9 I have been  getting rundom frequent (up-to 5 in a day) crashes. After updating to 10.9.1 - my MacBook Air Late 2011 still crashes. 1.8 GHZ i7, 4 GB 1333 MHz DDR3 If any of you could help me to understa

  • Security implication of  'Allow Public File Upload' to Yes

    Hi I am concerned about setting 'Allow Public File Upload' to Yes. Per the help text "Select Yes to permit unauthenticated users to upload files in applications that provide file upload controls. Select No to prevent unauthenticated users from upload

  • I get an error when updating iPod...

    I've done everything the support tutorial has told me to do and nothing has worked. It used to be a (-36) error but now it just plain says the disk can't be read from or written. I'm tired and want my music, I hope I can fix this soon since I have a

  • Urgent helps needed on REP-1222 error

    Hi all, I have encounter error REP-1222 when trying to decrease one field in the report. Look like a bug, but just not sure how to resolve it. Any one got experience on this ? Btw, I'm using report 6i version 6.0.8.19.0. Thanks. Rgds Lim