I think someone has placed a malicious code Quick Time audio file on my Mac

I think someone has placed a malicious code audio file in a message and now I constantly hear a audio track of “hands clapping” constantly on my Mac – how do I get rid of this file or locate it so I can delete it please? It just plays on its own …. Totally unpredictable when it plays not at even or predictable times … I have searched in spotlight and it is the QuickTime ‘applause’ audio file that plays … can someone help? This is playing over everything while I’m trying to work...

Hi Tim,
"This is playing over everything while I’m trying to work..."
It's just your computers way of telling you you are doing a great job!
Joking aside, have you tried searching for the file? Have you used iMovie lately as I believe there is an applause file as one of the sound effects. This may be stuck playing in a loop.
Also, have you checked through your emails, to see if the attachment might exist in one of your emails?
I did also want to let you know that this is the Feedback About Discussions forum and your question would be more appropriately posted in either the QuickTime or Using Mac OS 10.5 Leopard forum. If you are having difficulty finding these forums read the top header to this forum for info about how to find correct forums.
post back with further comments or questions,
littleshoulders
edit: I see, after rereading your topic that you say you already searched for the file.
Message was edited by: littleshoulders

Similar Messages

  • HT201263 Ipad mini is locked as someone has put the wrong code in too many times will not restore

    Hi
    I have a ipad mini (my step daughter does) she was given it by her father, someone has tried to put the wrong code in too many times and now is disabled is there any way I can unlock it or take of to apple?

    Hey there Bungle,
    It sounds like your iPad is disabled due too a forgotten passcode. This article should help you get it back on track:
    iOS: Forgotten passcode or device disabled after entering wrong passcode
    http://support.apple.com/kb/ht1212
    The instructions are different depending on whether or not you have synced your iPad to your computer so be sure to follow the applicable instructions.
    Thank you for using Apple Support Communities.
    All the best,
    Sterling

  • "Error Result code = -43" AND "Audio file not found"

    In Garageband I was trying to  click Join, but kept getting "Error Result code = -43"
    What does this mean?
    Also, I thought saving the file and restarting Garageband would help, but upon re-opening the program BIG problem: the file (just this one, others are opening fine) has this error message upon opening "Audio file “07 I See the Light.aif” not found!"

    mcgregorsgal wrote:
    so do I have to basically start over?
    for that one recording, it looks like it.
    the error -43 is a system level error, so i HIGHLY doubt this will help, however you can ctrl-click the project file, choose Show Package Contents, open the media folder and preview any audio files in there to see if the missing file is there, but in all likelihood, you will need to re-record it

  • "Code " Quick time Pro

    Are there anyone who can tell me how I get my "Code"  for Quick Time Pro because I have a new computer, and forgot my CODE

    Click View Account....

  • Logged into my library..and saw a mysterious device ..even had a name think someone has hacked me what do I do??

    Yea that happened I saw the device looked at it clicked on it then it disappeared from the device list..I did not have my Ipod connected so this an american prayer person I believe has hacked my account..I went in pref..now how would I handle it ???

    Hmmm. what library are you refereing too? iTunes? You may have seen a shared music library? Were you on a wifi network?

  • I can't log into my Game Center because I think someone has changed my password and I can't change it because they have changed the email and date of birth so I can't change it back

    Pease help my because he could be changing my progress

    It sounds to me like your keyboard has been damaged and needs to be repaired or replaced.  Can you try an external keyboard?

  • I've Lost my iPhone somewhere and I think someone has picked it up and stolen it if they restore it by putting Into Dfu mode before they turn it on and use it after the restore will I still get an email from Find My IPhone  that its been turned on??

    It's really urgent that I know

    Doubtful.  The phone has to be turned on, have a data connection to the internet (wifi or cellular), and still have your iCloud settings intact in order to be tracked.  If it's put in recovery or DFU mode, this won't happen as your settings and data are erased.

  • HT1212 Grand daughter has entered wrong pass code enough times to get disabled for 222,247,878 minutes What do we do?

    My grandaughter has entered the wrong password so many times wrong, we are receiving  message that it is disabled for 222,247,876 minutes.  Is there anything I can do?

    Go into Recovery Mode per the instructions here and then do a Restore.  Everything except the password will be restored.  Connect via cable to the computer that you use for sync.  Be forewarned that it takes a long time.  From iTunes, select the iPad/iPod and then select the Summary tab.  Follow directions for Restore and be sure to say "yes" to the backup.  You will be warned that all data (apps, music, movies, etc.) will be erased but, as the Restore finishes, you will be asked if you wish the contents of the backup to be copied to the iPad/iPod.  Again, say "yes."
    At the end of the basic Restore, you will be asked if you wish to sync the iPad/iPod.  As before, say "yes."  Note that that sync selection will disappear and the Restore will end if you do not respond within a reasonable time.  If that happens, only the apps that are part of the IOS will appear on your device.  Corrective action is simple -  choose manual "Sync" from the bottom right of iTunes.

  • Okay how can I tell if someone has installed spyware on my phone or if they have accessed your phone records or history from another location

    I think someone has been going thru my phone or accessing my information from a different location other than in my phone itself is there anyway to tell if someone has installed spyware or accessed any of my information on my phone or from another location or from the phone itself

    The only way someone can install spyware on your iPhone is by hacking/jailbreaking the iPhone followed by installing the spyware from an unofficial source other than from the iTunes Store. This would require having physical access with the iPhone and a computer. Has someone had access to your iPhone with a computer without your knowledge?
    Someone could have access to your iMessages and iCloud photostream with another iOS device and with a Mac that supports iMessage (a PC could have access to your iCloud Photo Stream, not iMessages) if they know your iCloud account password and/or Apple ID password if your iCloud account and Apple ID are different.
    If someone has had access to your iPhone with a computer without your knowledge, you can always restore the iPhone with iTunes as a new iPhone or not from the iPhone's backup. If you think someone has access to your iCloud account, you can change the password for the account along with your security questions and answers.

  • IMac either or has been remotely accessed, has malicious code, is hacked and/or all of the aforementioned or something that I have not yet researched. With my health issues, my Mac keeps me from thinking about the pain and disability I have. Thank you.

    Hello,
    I'm giving it one more chance and then Mac goes into trash. My iMac is either remotely accessed, perhaps malicious code, hacked and/or all of the aforementioned. I am not savvy in these areas. Please read some of the many symptoms and if you can assist me -- I am beyond grateful.  If you want to say it is my fault because I allowed somebody to use my computer or other nonsense please do not waste my time or yours. This is serious and has been going on for a period of time that is longer then I can remember!
    I have a neighbor, lives in my apartment building, 'had' physical access to my iMac.  Shortly after this I started to have problems that beyond any nightmare I have ever heard of - whether it be Windows or Apple!  Please feel free to ask me any question(s) that might help me rid my iMac of this malicious act as the police have been useless -- say they do not have equipment to check my Mac. FBI can't b bothered.
    It is more then clear that a person(s) has access and has messed up the OS, among other terrible things.  He took over my Facebook account months ago, posted as though he was me. He also prevented me from getting back into FB and Yahoo to close those connected accounts.  Went to an Apple store, under protection of their router and removed FB/Yahoo accounts.  The pages that were showing at home turned out to be fake pages controlled by him. (Think they are called "defaced").
    Anytime I did a 7X or zero out clean install -- he was there before I even hooked up the router!!!
    It came to a point that I can no longer even get to the erase/Utility/install from my apartment so I took it to Apple more then once. Besides erase/install, I turned off ALL Sys Preferences that could alert him to Mac. The last time I received a gray Install CD and was told to take it out of the building and do another erase/install.  There is no sense of going through this until I know if/how to get rid of him.
    Also when I first sign on I ALWAYS get a 192.168.100.11.  I do NOT have a router. I then go to System Preferences to Network and click "renew DHCP" several times before I get an IP addy!  I am not savvy in this area but do feel that this is a major clue.
    Passwords have been changed, master password is not something I can access which prevents me updating, etc., etc.
    I will not bombard you with every detail as that would take several pages. I am beyond desperate. Will be happy to provide further details to serious responders only.
    Thank you.
    'REQUIRE ASSISTANCE'
    Heartfelt sympathy to the many family members, friends, people who loved Steve Jobs even though they never met him -- RIP Steve. You are missed.

    If you really believe that your system has been compromised, here's what you do:
    Disconnect your Mac from your cable modem;
    Back up any documents on your system that are important to you;
    Boot your Mac from the system installation disks that came with it (insert the disk, restart your Mac, and hold down the "c" key until you get the "spinning gear" icon);
    Choose a language and click the arrow button to continue;
    From the Utilities menu, choose Disk Utility;
    In Disk Utility, select your computer's hard drive;
    Click the "Erase" tab;
    Click the "Security Options" button and select to have it overwrite all the data on the hard drive;
    Click the "Erase" button and allow it to process;
    Once the "erase process has completed (it will take a while), reinstall Mac OS X.
    Or, if this is too much for you to accomplish on your own, take your system to an Apple Store and have them help you perform these steps. If your system was indeed compromised, this will remove any such hack. You can then set up a new user account for the computer, reinstall your applications (reinstall only from original disks or downloads from the company making the software) and documents, and reconnect to the Internet.
    Note that when you reconnect to the cable modem, you may still get an IP address starting with 198. This is normal with some cable modems and probably not a cause for concern. It will not be an indication that your system is still compromised; that will not be possible if you perform all the above steps.
    Regards.

  • Just found that someone has called a number with 317 area code numerous times and billed to my number.  How can this happen??

    Was wondering what was going with my time that I purchased and checked my usage and found over several months someone has been calling a number in 317 area code and was being billed to my number

    Every time I make a call it is announced how many minutes remains, I could not believe I was using this many minutes. I checked my usage and found that there were numerous (10's if not 100') calls made to a phone in the 317 area code, using up the most of my minutes over the last several months.
    I don't know any one in this area, (I looked it up online and if  I remember correctly, it is in Indiana)
    I will be glad to send you a copy of my usage.  I work for myself, it will be afterwhile when I can get back with you.
    Thanks so much for helping me
    Jerry

  • How will Find my iPhone app help me track my iphone if someone has disabled the location services which doesnt require an unlock code?

    How will Find my iPhone app help me track my iphone if someone has disabled the location services which doesnt require an unlock code?

    You can't, and the same if the thief turms off the phone.
    What to do if your iOS device is lost or stolen
    Reporting a lost or stolen Apple product

  • Deployment of JAVA-Patches with SUM failed, MOPZ has downloaded malicious code

    some time ago, we did an upgrade of our doublestack PI-System from NW-PI-700-SPS18 to NW-PI-731-SPS05.
    Now, i wanted to upgrade this PI-system from NW-PI-731-SPS05 to NW-PI-731-SPS07.
    with SUM 1.0 SP10 PL4 we are now failing in the Execution-phase (Downtime):
    Error in phase 5.6. execution (downtime) of the JAVA-Part
    F  ********************************************************************************
    F  *** ERROR => Node 'deployment' failed with exit code 67.
    F  ***
    F  *** Please see section 'Failures in the 'deploying offline components' phase'
    F  *** in SAP Note 1316652 for additional information and trouble shooting advice.
    F  ********************************************************************************
    and the instance could not start up anymore !?
    in sap-note 1316652 there is mentioned a separate sap-note 1550641 for this error
    http://service.sap.com/sap/support/notes/1316652
    in sap-note 1550641 - Update fails-Node 'deployment' failed with exit code 67.           
    http://service.sap.com/sap/support/notes/1550641
    Solution:
    A fix cannot be deployed as a patch, because the deployer itself is broken.
    The solution is to reset a back up state of the system, to download the new version of the stack from SAP Marketplace, and to rerun the update/upgrade procedure.
    i downloaded the patch-stack (with Solman MOPZ) some days ago,
    so MOPZ did download the malicious code of deployment components..... ?!
    so what to do?

    Hi,
    sorry for my late reply,
    but the whole story needs a lot of time (nearly 2 month) and finally ends successfully.
    first: (summary) the main-title of this thread is wrong,
    it was not MOPZ or Solman download, what caused this issue.
    the problem was caused by a remaining (old) sapxmltoolkit.jar in the java-bootstrap folder
    details are coming ...
    (all dates in yyyy-mm-dd)
    =========================================
    2014-05-16 at 13:04 CET: 
    SUM upgrade hangs with java-server did not start (in phase 5.2. Execution = downtime)
    i opend OSS-ticket with several details + logs attached and opened the connection to our system.
    SAP-Ticket, prio_Medium (because it is "only" a sandbox issue),
    2014-05-30 at 20:21 CET:
    1."sign-of-live" from sap-support,
    Asking for additional logfiles from the work-directory of the sap-system
    2014-06-02 at 11:14 CET:
    my Answer to the questions and adding the demanded logfiles.
    2014-06-02 at 21:57 CET:
    2.answer from SAP-support, asking to repeat the last SUM-step, to see, if the issue is still there
    2014-06-03 at 10:22 CET:
    my answer after repeating SUM-step and attaching new logfiles.
    2014-06-03 at 21:18 CET:
    3.answer from SAP-support, i should check if system is up and running, if hostname, port-no is correct.
    2014-06-03 at 10:22 CET:
    my answer: hostname + portnr are o.k. - but system still did not startup (java-server)
    2014-06-04 at 19:30 CET:
    4.answer from SAP-support, delivering an upload-URL, could not read attached splitted .zip-files of log-files
    2014-06-05 at 07:28 CET:
    i did collect all logfiles again and uploaded them to the 1.upload-URL
    2014-06-05 at 16:48 CET:
    5.answer from SAP-support, give hint to sap-note: 1550641 - Update fails-Node 'deployment' failed with exit code 67
    2014-06-06 at 10:17 CET:
    i answered that (in my opinion) the mentioned sap-note did not match the issue (only to NW-7.00) ,
    because i did not have to change anything, only i should do a restore from tape and start SUM from the beginning,
    i insisted in more and deeper investigations by SAP-support.
    2014-06-06 at 19:00 CET:
    6.answer of SAP-support: moving the ticket to the next support-level (developm.support)
    2014-06-09 at 10:11 CET:
    7.answer from SAP-support: asking for new submittion of logfiles of work-dir.
    2014-06-10 at 08:39 CET:
    asking for a new upload-URL because of large logfiles
    2014-06-10 at 17:31 CET:
    8.answer from SAP-support: providing an new upload-URL
    2014-06-10 at 17:53 CET:
    i did collect all logfiles again and uploaded them to the 2.upload-URL
    2014-06-12 at 09:07 CET:
    9.answer from SAP-support: asking for more details, listings of directory-content of ..../j2ee/cluster/...
    2014-06-12 at 10:23 CET:
    i did collect all dir-infos and attached a doc to the ticket
    2014-06-19 at 10:11 CET:
    10.answer from SAP-support: asking for WTS-connection to start investigate and debung on our systems
    2014-06-23 at 10:44 CET:
    i answered, and provided WTS-connection info
    2014-06-26 at 13:12 CET:
    11.answer from SAP-support: could not see a running SID-engine, no SAP-MC, no directory, no folder, where is the engine?
    2014-06-27 at 08:01 CET:
    i answered, and provided detailed server-info and WTS-connection info,
    remembering that SID is in SUM-downtime and java-server is not running, because could not be startet,
    2014-06-30 at 14:01 CET:
    12.answer from SAP-support: asking for an installed java6-sdk(jdk), the java6-jre is not enough to debug.
    2014-07-02 at 11:40 CET:
    my answer after installing java6-sdk on the WTS-server,
    2014-07-07 at 15:11 CET:
    13.answer from SAP-support: after debugging found an very old sapxmltoolkit.jar in the java-bootstrap folder
    moving the ticket to SUM-support - java-developm-support.
    2014-07-09 at 08:36 CET:
    14.answer from SAP-support: (SUM-support - java-developm-support) asking for attaching the SUM stack-xml file to the ticket.
    2014-07-09 at 14:32 CET:
    16.answer from SAP-support: asking to remove the sapxmltoolkit.jar from the java-bootstrap folder and restart SUM (repeat last step)
    2014-07-09 at 15:00 CET:
    i am happy to get the solution to this issue, 
    after removing the .jar file from java-bootstrap folder, SUM restart last step,
    the SUM-phase execution continues to run, java-server could start, ....
    .... finally SUM ended successfully.
    ==================================
    remarks:
    formerly, we did a copy of that mentioned sapxmltoolkit.jar to the java-bootstrap folder (in March 2013) because of investigation PI-processes
    after upgrading from NW-7.00 to NW-7.31, to get PI-system running after upgrade to NW-7.31
    but maybe that formerly issues were caused by other things, cache or so ...
    and since then (March 2013) we could start/stop that PI-system several times without any problem, only SUM-upgrade could not ......
    i really understand that investigating problems in SAP-software (e.g. SUM-process, java-startup ...) is not easy and could have many causes.
    but in summary this SUM-downtime was really large (55 days of downtime) , because of sandbox-system we want to investigate this time,
    to get the solution to this issue.
    if some SAP people want to look for speed-up options in the whole support-process, the OSS_ticket-no is:  ( 459757 / 2014 )
    Thanks to SAP-support (for the helpful solution)
    Christoph

  • Updated to Mavericks. Now theres tons of activity in my terminal and my activity monitor doesn't seem normal. I want to think someone's hacking me, but i need experienced help please!

    I spent all night trying to fix this. It seems to me that someone has been trying to hack into my system with all of the random codes/lines in my terminal and i have all of his foreign IP addresses. And now i get this strange message that popped up in my terminal. Idk what it entirely means? I would very appreciate if someone could just walk me through this. Thank you very much.
    First time poster. I have Macbook Pro. OSX. Just downloaded the new mavericks. I'm i have my firewall on. I stay secure. I run Netbarrier, Virusbarrier, IdentityScrubber.
    I know something is a little odd or just doesn't make since about my activity monitor. Then my WiFi was hacked last night and this person was writing tons lines of commands/codes that i found in my terminal and my activity monitor doesn't look normal,  and I've only been a mac owner for about a year now and i'm learning more and more but while trying to figure out what was going on this message popped up which concerned me the most. Any help would be most appreciated, thanks guys. I have my terminal full of his foreign ip addresses i noticed, and a lot of other commands and lines he wrote out that i definitely did not type myself. Can anyone give me a hand on this? Thanks
    --- 192.168.1.103 ping statistics ---
    10 packets transmitted, 0 packets received, 100.0% packet loss
    Extol:~ FBI$ who
    FBI      console  Nov  7 02:14
    FBI      ttys000  Nov  7 04:33
    Extol:~ FBI$ whois
    usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] [-p port] name ...
    Extol:~ FBI$ whois 192.168.1.103
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    # Query terms are ambiguous.  The query is assumed to be:
    #     "n 192.168.1.103"
    # Use "?" to get help.
    # The following results may also be obtained via:
    # http://whois.arin.net/rest/nets;q=192.168.1.103?showDetails=true&showARIN=false& ext=netref2
    NetRange:       192.168.0.0 - 192.168.255.255
    CIDR:           192.168.0.0/16
    OriginAS:
    NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
    NetHandle:      NET-192-168-0-0-1
    Parent:         NET-192-0-0-0-0
    NetType:        IANA Special Use
    Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
    Comment:
    Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
    Comment:
    Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
    Comment:        http://datatracker.ietf.org/doc/rfc1918
    RegDate:        1994-03-15
    Updated:        2013-08-30
    Ref:            http://whois.arin.net/rest/net/NET-192-168-0-0-1
    OrgName:        Internet Assigned Numbers Authority
    RegDate:
    Updated:        2012-08-31
    Ref:            http://whois.arin.net/rest/org/IANA
    OrgTechHandle: IANA-IP-ARIN
    OrgTechName:   Internet Corporation for Assigned Names and Number
    OrgTechPhone: 
    OrgTechEmail:
    OrgTechRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    OrgAbuseHandle: IANA-IP-ARIN
    OrgAbuseName:   Internet Corporation for Assigned Names and Number
    OrgAbusePhone
    OrgAbuseEmail: 
    OrgAbuseRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    Extol:~ FBI$
    Extol:~ FBI$ hosts
    -bash: hosts: command not found
    Extol:~ FBI$ who
    FBI      console  Nov  7 02:14
    FBI      ttys000  Nov  7 04:33
    Extol:~ FBI$ whois
    usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] [-p port] name ...
    Extol:~ FBI$ whois  192.168.0.0 - 192.168.255.255
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    # Query terms are ambiguous.  The query is assumed to be:
    #     "n 192.168.0.0"
    # Use "?" to get help.
    # The following results may also be obtained via:
    # http://whois.arin.net/rest/nets;q=192.168.0.0?showDetails=true&showARIN=false&ex t=netref2
    NetRange:       192.168.0.0 - 192.168.255.255
    CIDR:           192.168.0.0/16
    OriginAS:
    NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
    NetHandle:      NET-192-168-0-0-1
    Parent:         NET-192-0-0-0-0
    NetType:        IANA Special Use
    Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
    Comment:
    Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
    Comment:
    Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
    Comment:        http://datatracker.ietf.org/doc/rfc1918
    RegDate:        1994-03-15
    Updated:        2013-08-30
    Ref:            http://whois.arin.net/rest/net/NET-192-168-0-0-1
    OrgName:        Internet Assigned Numbers Authority
    OrgId:          IANA
    Updated:        2012-08-31
    Ref:            http://whois.arin.net/rest/org/IANA
    OrgTechHandle: IANA-IP-ARIN
    OrgTechName:   Internet Corporation for Assigned Names and Number
    OrgTechPhone: 
    OrgTechEmail
    OrgTechRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    OrgAbuseHandle: IANA-IP-ARIN
    OrgAbuseName:   Internet Corporation for Assigned Names and Number
    OrgAbusePhone: 
    OrgAbuseEmail:
    OrgAbuseRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    Whois Server Version 2.0
    Domain names in the .com and .net domains can now be registered
    with many different competing registrars. Go to http://www.internic.net
    for detailed information.
    No match for "-".
    >>> Last update of whois database: Thu, 07 Nov 2013 13:19:14 UTC <<<
    NOTICE: The expiration date displayed in this record is the date the
    registrar's sponsorship of the domain name registration in the registry is
    currently set to expire. This date does not necessarily reflect the expiration
    date of the domain name registrant's agreement with the sponsoring
    registrar.  Users may consult the sponsoring registrar's Whois database to
    view the registrar's reported date of expiration for this registration.
    TERMS OF USE: You are not authorized to access or query our Whois
    database through the use of electronic processes that are high-volume and
    automated except as reasonably necessary to register domain names or
    modify existing registrations; the Data in VeriSign Global Registry
    Services' ("VeriSign") Whois database is provided by VeriSign for
    information purposes only, and to assist persons in obtaining information
    about or related to a domain name registration record. VeriSign does not
    guarantee its accuracy. By submitting a Whois query, you agree to abide
    by the following terms of use: You agree that you may use this Data only
    for lawful purposes and that under no circumstances will you use this Data
    to: (1) allow, enable, or otherwise support the transmission of mass
    unsolicited, commercial advertising or solicitations via e-mail, telephone,
    or facsimile; or (2) enable high volume, automated, electronic processes
    that apply to VeriSign (or its computer systems). The compilation,
    repackaging, dissemination or other use of this Data is expressly
    prohibited without the prior written consent of VeriSign. You agree not to
    use electronic processes that are automated and high-volume to access or
    query the Whois database except as reasonably necessary to register
    domain names or modify existing registrations. VeriSign reserves the right
    to restrict your access to the Whois database in its sole discretion to ensure
    operational stability.  VeriSign may restrict or terminate your access to the
    Whois database for failure to abide by these terms of use. VeriSign
    reserves the right to modify these terms at any time.
    The Registry database contains ONLY .COM, .NET, .EDU domains and
    Registrars.
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    # Query terms are ambiguous.  The query is assumed to be:
    #     "n 192.168.255.255"
    # Use "?" to get help.
    # The following results may also be obtained via:
    # http://whois.arin.net/rest/nets;q=192.168.255.255?showDetails=true&showARIN=fals e&ext=netref2
    NetRange:       192.168.0.0 - 192.168.255.255
    CIDR:           192.168.0.0/16
    OriginAS:
    NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
    NetHandle:      NET-192-168-0-0-1
    Parent:         NET-192-0-0-0-0
    NetType:        IANA Special Use
    Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
    Comment:
    Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
    Comment:
    Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
    Comment:        http://datatracker.ietf.org/doc/rfc1918
    RegDate:        1994-03-15
    Updated:        2013-08-30
    Ref:            http://whois.arin.net/rest/net/NET-192-168-0-0-1
    OrgName:        Internet Assigned Numbers Authority
    OrgId:          IANA
    RegDate:
    Updated:        2012-08-31
    Ref:            http://whois.arin.net/rest/org/IANA
    OrgTechHandle: IANA-IP-ARIN
    OrgTechName:   Internet Corporation for Assigned Names and Number
    OrgTechPhone:
    OrgTechEmail
    OrgTechRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    OrgAbuseHandle: IANA-IP-ARIN
    OrgAbuseName:   Internet Corporation for Assigned Names and Number
    OrgAbusePhone: 
    OrgAbuseEmail: 
    OrgAbuseRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    <Personal Information Edited by Host>

    haha, so now i'm thinking. I'm learning the terminal as fast as i can but there are several lines of codes and commands in there that throws up red flags to me that i don't fully understand. It just looks fishy too me. It would be highly appreciated if someone could just check this out just to tell me that i don't need to worry about it. Or point me in the right direction. I just feel un easy about this. ha.

  • BB Link thinks it has a WiFi connection so backup won't run

    Summary: BB Link thinks that it has a WiFi connection when WiFi is switched off and phone is connected by USB.
    Computer: Dell E5550 OS Win 7, SP1, 64 bit.
    Link 1.2.3.56
    Phone: BB Q10, OS 10.2.1
    Problem:
    The phone is plugged in to a USB port and the computer responds by making a sound and installing two BB devices in Device Manager neither of which has a yellow question mark.  The phone pops up to say that it is now connected to the computer.  The WiFi in both computer and phone is still switched off by default.  The phone has been shown to work normally with Link in three other computers (32 & 64 bit)
    Link should start automatically but does not do so.  After Link is started manually, the phone then connects and disconnects in Link twice before finally establishing a connection.  Any new photos are then synchronised and are listed in Recent Activity in Link.  The phone is meanwhile charging, and the phone SD card and flash memory are mapped in Windows Explorer as drives Y: and Z:  Link displays in colour code the disposition of files in the phone memory on the device home screen.
    The next Link screen is Backup & Restore which displays in bold yellow "Device cannot be backed up or restored when connection is through WiFi"  WiFi on both phone and computer is still OFF!
    The Contacts / Calenders screen gives a similar message to the Backup & Restore screen and asks me to connect using USB as WiFi cannot be used for this function.  As far as I can see, USB is the only connection present.
    The Synced Media screen is OK as this will work with WiFi even though it is not switched on.
    Switching on the WiFi at this stage unsurprisingly changes nothing, but when it is then switched off, the phone disconnects from Link.
    I have uninstalled and re-installed Link countless times and also deleted and re-installed the device drivers in Device Manger about 3 times, but with no positive effect on the situation.  I still cannot backup to Link and have to pull out an old computer (which I would like to dump) for this purpose only.
    Hopefully, someone might have experienced this situation before?  I know that OS 10.3.1 might solve this problem as might a newer version of Link but right now these are not available to me.

    Yes, you are correct about the Intel wireless system used by Dell.  If you connect using the taskbar wireless symbol then you do have the opportunity to uncheck the Connect Automatically box.
    However, if you connect from Manage Wireless Networks, then you are also offered the opportunity to create a profile (or not).  To create a pofile appears to be the default.
    What Link has picked up on however is not clear at all so it appears that this problem may very well be computer specific.  The other strange aspect being that phone connection cannot happen unless I am logged onto BB ID.
    Many thanks for your suggestions.  I'll just have to wait to see if an upgrade can sort this out.  At least I can presently copy files using Explorer.

Maybe you are looking for