Identity theft and last 4 of social

I can't see hwo this would be enough for someone to steal your identity, but had the post office lose a piece of priority mail containing credit cards, PIN numbers, IRS documents, and things that contained last 4 of social. Canceled cards and PINS and asked for new ones already, but person still has my name, last 4 of social, address. This happened one week after my Barclaycard was also compromised so it hasn't been a fun time. Canceled and resissued however. Dont' want to do credit freeze because it could impact CLI's. Someone yesterday mentioned an Alert monitor service where you could get just alerts of any new changes in your credit report, rather than doinf whole reports or myfico (not pleased with the lag time on myfico). Any information on the alert service or thoughts about last 4 of social being out there would be appreciated. Thanks

Sorry to hear about this! You mention that the Post Office lost a piece of your mail and later say "but person still has my name, last 4 of social, address."  Do you mean that (a) you know for a certain that a bad guy has this and is misusing it, or (b) that you know for certain that some person has this (who may not be the sort to misuse it) or (c) there might be a person who has it.  I am guessing (c) is the case and you are just trying to cover yourself in case there really is a person who has it and he misuses it. The different scenarios have different options.  

Similar Messages

  • Identity Theft and Scam

    Honesty I don't know where else to write this, but people please beware. I just recently found got friend requests from a few "army generals" and they are definately scammers. These people used the names of a few famous army generals from all over the world. At first I didn't even notice and thought 'oh how lucky a general is interested in me', but after a day or two of chatting with them I started to notice the small details that were off. First of all their English was kind of off, they had grammar mistakes, spelling mistakes and their sentences sometimes didn't even make sense at all which is odd because apparently they are supposed to be from the USA. I then decided to reseach them online and found out a few websites where some women said that they also had those "generals" in their contact and that they were asking these women for money and threatening them as well as blackmailing them. Do you really think a well respected army general will ask a stranger for money and not even a huge amout, but a mere $300.
    So please be careful and be aware that there are scammers who pose themselves as some of the well respected people.
    If you do add them however, DO NOT believe a word they say, DO NOT share your personal information or your photos, believe me I've already made that mistake.
    Mod Edit: Edited post to comply with the Skype Community Guidelines and Skype Etiquette

    Sorry to hear about this! You mention that the Post Office lost a piece of your mail and later say "but person still has my name, last 4 of social, address."  Do you mean that (a) you know for a certain that a bad guy has this and is misusing it, or (b) that you know for certain that some person has this (who may not be the sort to misuse it) or (c) there might be a person who has it.  I am guessing (c) is the case and you are just trying to cover yourself in case there really is a person who has it and he misuses it. The different scenarios have different options.  

  • I am considering taking my MacBook on an overseas vacation. Am I exposed to identity theft if it is stolen and is there anything to do to avoid this?

    I am considering taking my MacBook on an overseas vacation. Am I exposed to identity theft if it is stolen and is there anything to do to avoid this?

    >Am I exposed to identity theft if it is stolen<
    I think you are in danger of theft even if you are in this country. There are many ways to protect your MacBook from theft but be aware that nothing is absolute.
    This is a good overview of hardware options:
    http://theandy.hubpages.com/hub/Protect-Your-Retina-Macbook-Pro-MacBook-Air-From -Theft-Part-1-Kensington-lock-alternatives
    and software:
    http://theandy.hubpages.com/hub/Protect-Your-Retina-Macbook-Pro-MacBook-Air-From -Theft-Part-2-Data-Protection-Tracing-A-Stolen-Computer
    Of course remove all personal information from your MacBook and use passwords as noted.
    Remove all links to personal accounts that you won't absolutely be needing on your trip.
    Depending on your insurance provider it might be possible to extend your coverage just for your vacation. If it were me I might think of pulling my current hard drive and reinstalling a bare bones drive that doesn't have all my normal links to bank accounts, PayPal et al.

  • Anybody else not a Verizon customer getting nowhere w/Verizon identity theft unit

    I am not a Verizon Wireless customer.  I was, but I changed over in 2011 because the coverage with another carrier was better than where we previously lived for 17 years.  We are middle aged, fiscally very conservative and sound, and expected no problems whatsoever when my husband decided to retire in June and for us to move out of state, selling our real property and buying our dream home in the place we choose to retire.  We had a regular monthly credit report company but last summer they stopped offering the low cost arrangement our credit card offered years ago.  We lost a family member after a six month decline and had no reason to believe anything was wrong.  My husband ordered up his report and score and was way up as we expected.  I then ordered mine and I fell off my chair (literally).  My score had dropped by one hundred points because someone opened a Verizon Wireless account last October in my name, ran up the account to more than a thousand dollars, and bailed.  Supposedly, it was sent to collections but since the phone seems to have been ordered in New York and I haven't lived there since 1970 (as a kid), I knew it wasn't me.  I went through all of the required steps, wrote my dispute out, sent proof of my police report, complained to the Federal Trade Commission, and spoke to a representative named Justin who confirmed that it was clear it was not my account (he could not legally give me more at that time but that should no longer apply).  I get an e-mail that gives me a report number and tells me to sit tight, basically.
    Crickets chirping.
    A few days ago, I get an e-mail from the previously very helpful Justin that says something to the effect of "oh, that's just a collection account.  All is good! Bye!!"  Wait, what?  I can't get the e-mail to let me reply so I wait for the new reports to come out, expecting that my fully documented case of identity theft will be resolved.
    It is now a month and when I ordered my three reports and score for the new quarter, voila!  MY SCORE ACTUALLY WENT DOWN MORE!!!!!!
    I am on my 4th call today, and taking screenshots every five minutes I wait.  After more than two hours of being lied to "your representative will be with you in a few brief moments), I am ready to go off the grid or start collecting names and contacts of those who are not customers of Verizon Wireless whose identity has been stolen because I believe we are not restricted from filing a class action suit because we have no contractual relationship with Verizon Wireless.
    Okay...after more than 30 minutes on call 4, I was patched through to the Fraud Department to a representative named Greg.  He patiently listened to my rant about how horrible their internal phone system is, he remained completely cool and calm, I calmed down, confirmed that I know he is not the problem nor can he effectuate any major changes, he took my number in case we were disconnected (which, surprisingly, we were not) and an hour later the fraudulent account has been closed out, my credit reports will be corrected, and I will receive information with which to pursue the harm the thief committed.
    There has to be an easier way and I will remind these companies that ignoring or ******* off the victims didn't do the Roman C. Church any good either.  It is unfair that there are those who seem to believe anything they can get away with is okay and that companies who employ people etc get ripped off, but as the collateral damage victim, I can't spread out my losses.  I urge Verizon Wireless to make it a priority to service all identity theft victims, especially since some of the thefts come from Verizon Wireless employees.  Otherwise, they are creeping ever closer to a huge, huge lawsuit.
    Thank you Greg at Verizon Wireless Fraud Division.

    I am sorry this happened to you. We found out today that the Galaxy phone my wife purchased for me and put 300.00 cash downpayment on was stolen by an employee. Of course calling does not do a thing. All they do is say sorry and hang up. I will find a way to get that money and then leave this company. It just stinks that they take the word of an employee (who by the way was not there two weeks later) and we spoke to the manager who said he would take care of it but did not.  We are out 300.00 and screwed I guess. WE WILL BE LEAVING THIS COMPANY.
    I know they don't care but it made me feel good to type in caps. I really do not care who is my carrier anymore, they cannot be as bad as this one,
    Bill Moore

  • Identity theft-Verizon corporate store employee opened an account in my name without my permission. It seems Verizon isn't willing to do anything to resolve it. Help!

    It’s a long story but I’ll try to keep it short and simple as much as possible.
    I went to the Verizon Wireless corporate store back in beginning of February 2014. After a credit check, I decided not to go with Verizon and left the store. About a week later, I received a letter from Verizon saying “Welcome to Verizon. Your new account… “. I called the customer service right away and was able to get the phone number,account number and other information. I was able to make a my verizon account and get a receipt for the service and device. Turns out, the new account was opened about 20 minutes after I left the store by “M” who helped me. The receipt had the time, employee’s name and register/terminal number that he used to open an account. He opened an account,added data service and got an Ellipsis tablet for free.(They were having a promotion at that time)
    Customer service rep told me that she can’t do anything other than closing the account and left me with a $83 bill which she couldn’t waive. She closed the account then I went to the corporate store right away.
    I spoke to the store manager “C”. I told him what happened and showed him the receipt. He went to the back of the store to talk to “M”,came back,talked to other employee(I overheard their conversation-he was saying what “M” told him made no sense to him) and told me that “M” will come talk to me to explain what happened shortly. I waited for 20 minutes or so for “M” to have a conversation but he never showed up. The store manager said that the account was opened by “accident”. He’ll look into it and give me a call in a day or two. It was hard to believe that a new account can be opened by “accident” but I took the store manager’s business card and left the store.
    2 days later,I didn’t hear from the store manager so I called him at the store. He said “Oh,I totally forgot. It’s been a busy week. I’ll call you back. Don’t worry, as soon as I get an update,you’ll be the first one to know.” That was the last time I got to speak to him. I’ve called him at the store many times,even called his cell phone which was on his business card. I’ve called many times and left many voice mail but he never got back to me. I called customer service many times but it took 20 minutes just to speak to the rep,then transferred to another rep,wait for another 20 minutes then get disconnected. After 6 or 7 tries, I finally gave up. It went absolutely nowhere.
    A week later, I decided to call the Verizon fraud department to file a complaint. The rep pulled the file and said that whoever at the store filed the report left out a lot of details and names. He also said that it looks like either they didn’t take it too seriously or someone was trying to cover up. According to him, the report is a joke. He said that he can’t do anything on his end I need to go to the store to resolve it.
    For the next two weeks, I called the store ,cell phone and left messages every 2-3 days but no luck.
    Two week later I found the number for the Verizon Security Department. I called them to file a complaint. The rep took my information and said he’ll call back within 48 hours. No case number given.
    3 days later, I still hadn’t heard from anyone,not even from the security department. I called the security department again. I explained that I filed a complaint but the rep couldn’t find the case. I filed a complaint again and was told that someone will be contacting me in a week.
    It’s been over 2 weeks but I still haven’t heard from anyone. A few days ago(3/31/14) I received the bill from Verizon in the mail.
    At this point, I can’t seem to get Verizon’s attention. I’ve already got the police report and spoke to the identity theft lawyer. I’m about to report to FTC,BBB and the attorney general. I’m also initiating paperwork in my local small claims court.
    It is very frustrating having to spend so much time just to trying to talk to someone from Verizon but I’m not taken seriously. I had to spend so much time contacting credit bureaus,researching how to handle the situation like this and other things I have to do to handle the situation. This is such a nightmare and very overwhelming. Not to mention my credit score dropped by 100 points right after this incident which got me denied for an apartment application and had to pay more security deposit.
    Please help. If anyone can give me an advice on the best way to handle this or to get Verizon’s attention, I’d really appreciate it.

    I am sorry this happened to you. We found out today that the Galaxy phone my wife purchased for me and put 300.00 cash downpayment on was stolen by an employee. Of course calling does not do a thing. All they do is say sorry and hang up. I will find a way to get that money and then leave this company. It just stinks that they take the word of an employee (who by the way was not there two weeks later) and we spoke to the manager who said he would take care of it but did not.  We are out 300.00 and screwed I guess. WE WILL BE LEAVING THIS COMPANY.
    I know they don't care but it made me feel good to type in caps. I really do not care who is my carrier anymore, they cannot be as bad as this one,
    Bill Moore

  • Excluded client problem - "Attempted to use IP Address assigned to another device" / "Identity Theft"

    Hi all
    Problem:
    Client gets excluded caused by "Identity Theft" (when looking in the controller) and "Attempted to use IP Address assigned to another device" (when looking in the WCS).
    Setup:
    Centrally placed WLAN Controller - The SSID and AP is in H-REAP mode, and the DHCP server locally is a ASA5505.
    Client:
    Samsung Galaxy Tap 10.1
    Other clients on the same site do not apeer to have this problem.
    The problem is peoridic.
    Other info:
    We have recently upgraded to 7.0.230 because the same type of client would get excluded with reason "unknown", and not be removed from the exclusion list - this apears to have been a bug in the WLC software.
    Now we have the reason, and the client will get removed from the exlusion list after the default 60 seconds, but then get excluded again.
    When doing a troupleshoot client from the WCS the following shows up:
    04/16/2012 12:10:32 CEST INFO 10.1.33.13 DHCP offer received,dhcp server set. 
    04/16/2012 12:10:32 CEST ERROR 10.1.33.13 Received DHCP ACK, could not update client state. 
    04/16/2012 12:10:32 CEST INFO 10.1.33.13 Received DHCP request, error processing packet.
    04/16/2012 12:10:42 CEST ERROR 10.1.33.13 De-authentication sent to client. slot 0 (claller apf_ms.c:5113)
    The question right now is:
    The "could not update client state" - is this the WLC not being able to update the client or is it the DHCP server ?

    As i tried to explain before, we have local switching at the remote site, not centralized for this SSID.
    And the DHCP server is on the same local VLAN.
    It works fine, but all of a sudden a client will get "stuck" in this error.
    If anyone wants to look, I have this debug output from the WLC.
    The debug starts from right after I have removed the client from the exclusion list.
    I can see in the ASA that the clients lease time in the DHCP server will get renewed duing this process to the default 3600 seconds.
    The clients MAC is :8c:77:12:ac:8c:3b
    The ASA inside interface is: 192.168.2.1 /24
    Any suggestions will be greatly appreciated.
    (WiSM-slot2-1) >*emWeb: Apr 17 10:09:31.613: 8c:77:12:ac:8c:3b apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 6, reasonCode 1
    *emWeb: Apr 17 10:09:31.613: 8c:77:12:ac:8c:3b Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
    *osapiBsnTimer: Apr 17 10:09:32.612: 8c:77:12:ac:8c:3b apfMsExpireCallback (apf_ms.c:609) Expiring Mobile!
    *apfReceiveTask: Apr 17 10:09:32.622: 8c:77:12:ac:8c:3b apfMsAssoStateDec
    *apfReceiveTask: Apr 17 10:09:32.622: 8c:77:12:ac:8c:3b apfMs1xStateDec
    *apfReceiveTask: Apr 17 10:09:32.622: 8c:77:12:ac:8c:3b Deleting mobile on AP 00:1d:a2:87:02:30(0)
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Adding mobile on LWAPP AP 00:1d:a2:87:02:30(0)
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Association received from mobile on AP 00:1d:a2:87:02:30
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b 0.0.0.0 START (0) Changing ACL 'none' (ACL ID 0) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1633)
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Applying site-specific IPv6 override for station 8c:77:12:ac:8c:3b - vapId 3, site 'PDA-GST-KNS-MED-ITV', interface 'dummy-itv-105'
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Applying IPv6 Interface Policy for station 8c:77:12:ac:8c:3b - vlan 199, interface id 13, interface 'dummy-itv-105'
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Applying site-specific override for station 8c:77:12:ac:8c:3b - vapId 3, site 'PDA-GST-KNS-MED-ITV', interface 'dummy-itv-105'
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b 0.0.0.0 START (0) Changing ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1633)
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b STA - rates (8): 130 132 139 150 36 48 72 108 0 0 0 0 0 0 0 0
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b STA - rates (12): 130 132 139 150 36 48 72 108 12 18 24 96 0 0 0 0
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Processing RSN IE type 48, length 20 for mobile 8c:77:12:ac:8c:3b
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b 0.0.0.0 START (0) Initializing policy
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state AUTHCHECK (2)
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state 8021X_REQD (3)
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b 0.0.0.0 8021X_REQD (3) DHCP Not required on AP 00:1d:a2:87:02:30 vapId 3 apVapId 3for this client
    *apfMsConnTask_0: Apr 17 10:09:36.655: 8c:77:12:ac:8c:3b Not Using WMM Compliance code qosCap 00
    *apfMsConnTask_0: Apr 17 10:09:36.656: 8c:77:12:ac:8c:3b 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:1d:a2:87:02:30 vapId 3 apVapId 3
    *apfMsConnTask_0: Apr 17 10:09:36.656: 8c:77:12:ac:8c:3b apfMsAssoStateInc
    *apfMsConnTask_0: Apr 17 10:09:36.656: 8c:77:12:ac:8c:3b apfPemAddUser2 (apf_policy.c:223) Changing state for mobile 8c:77:12:ac:8c:3b on AP 00:1d:a2:87:02:30 from Idle to Associated
    *apfMsConnTask_0: Apr 17 10:09:36.656: 8c:77:12:ac:8c:3b Stopping deletion of Mobile Station: (callerId: 48)
    *apfMsConnTask_0: Apr 17 10:09:36.656: 8c:77:12:ac:8c:3b Sending Assoc Response to station on BSSID 00:1d:a2:87:02:30 (status 0) ApVapId 3 Slot 0
    *apfMsConnTask_0: Apr 17 10:09:36.656: 8c:77:12:ac:8c:3b apfProcessAssocReq (apf_80211.c:5272) Changing state for mobile 8c:77:12:ac:8c:3b on AP 00:1d:a2:87:02:30 from Associated to Associated
    *apfMsConnTask_0: Apr 17 10:09:36.658: 8c:77:12:ac:8c:3b Updating AID for REAP AP Client 00:1d:a2:87:02:30 - AID ===> 2
    *dot1xMsgTask: Apr 17 10:09:36.660: 8c:77:12:ac:8c:3b Creating a PKC PMKID Cache entry for station 8c:77:12:ac:8c:3b (RSN 2)
    *dot1xMsgTask: Apr 17 10:09:36.660: 8c:77:12:ac:8c:3b Adding BSSID 00:1d:a2:87:02:32 to PMKID cache for station 8c:77:12:ac:8c:3b
    *dot1xMsgTask: Apr 17 10:09:36.661: New PMKID: (16)
    *dot1xMsgTask: Apr 17 10:09:36.661:      [0000] 1b 92 b6 05 89 09 d5 c7 45 82 72 72 6a f2 b6 7e
    *dot1xMsgTask: Apr 17 10:09:36.661: 8c:77:12:ac:8c:3b Initiating RSN PSK to mobile 8c:77:12:ac:8c:3b
    *dot1xMsgTask: Apr 17 10:09:36.661: 8c:77:12:ac:8c:3b dot1x - moving mobile 8c:77:12:ac:8c:3b into Force Auth state
    *dot1xMsgTask: Apr 17 10:09:36.661: 8c:77:12:ac:8c:3b Skipping EAP-Success to mobile 8c:77:12:ac:8c:3b
    *dot1xMsgTask: Apr 17 10:09:36.661: Including PMKID in M1  (16)
    *dot1xMsgTask: Apr 17 10:09:36.661:      [0000] 1b 92 b6 05 89 09 d5 c7 45 82 72 72 6a f2 b6 7e
    *dot1xMsgTask: Apr 17 10:09:36.661: 8c:77:12:ac:8c:3b Starting key exchange to mobile 8c:77:12:ac:8c:3b, data packets will be dropped
    *dot1xMsgTask: Apr 17 10:09:36.661: 8c:77:12:ac:8c:3b Sending EAPOL-Key Message to mobile 8c:77:12:ac:8c:3b
                                                                                                                  state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.674: 8c:77:12:ac:8c:3b Received EAPOL-Key from mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.674: 8c:77:12:ac:8c:3b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.674: 8c:77:12:ac:8c:3b Received EAPOL-key in PTK_START state (message 2) from mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.674: 8c:77:12:ac:8c:3b Stopping retransmission timer for mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.675: 8c:77:12:ac:8c:3b Sending EAPOL-Key Message to mobile 8c:77:12:ac:8c:3b
                                                                                                                        state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.681: 8c:77:12:ac:8c:3b Received EAPOL-Key from mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.681: 8c:77:12:ac:8c:3b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.681: 8c:77:12:ac:8c:3b Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 8c:77:12:ac:8c:3b
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.681: 8c:77:12:ac:8c:3b apfMs1xStateInc
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.681: 8c:77:12:ac:8c:3b 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state L2AUTHCOMPLETE (4)
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.682: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.682: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) DHCP Not required on AP 00:1d:a2:87:02:30 vapId 3 apVapId 3for this client
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.682: 8c:77:12:ac:8c:3b Not Using WMM Compliance code qosCap 00
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:1d:a2:87:02:30 vapId 3 apVapId 3
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) pemAdvanceState2 4817, Adding TMP rule
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) Adding Fast Path rule
      type = Airespace AP - Learn IP address
      on AP 00:1d:a2:87:02:30, slot 0, interface = 29, QOS = 0
      ACL Id = 255, Ju
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 5006  IPv6 Vlan = 199, IPv6 intf id = 13
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) Successfully plumbed mobile rule (ACL ID 255)
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state DHCP_REQD (7)
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.683: 8c:77:12:ac:8c:3b 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 4833, Adding TMP rule
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.028: 8c:77:12:ac:8c:3b 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
      type = Airespace AP - Learn IP address
      on AP 00:1d:a2:87:02:30, slot 0, interface = 29, QOS = 0
      ACL Id = 255, Jumb
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.684: 8c:77:12:ac:8c:3b 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 5006  IPv6 Vlan = 199, IPv6 intf id = 13
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.684: 8c:77:12:ac:8c:3b 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (ACL ID 255)
    *Dot1x_NW_MsgTask_0: Apr 17 10:09:36.684: 8c:77:12:ac:8c:3b Stopping retransmission timer for mobile 8c:77:12:ac:8c:3b
    *pemReceiveTask: Apr 17 10:09:36.689: 8c:77:12:ac:8c:3b 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
    *pemReceiveTask: Apr 17 10:09:36.695: 8c:77:12:ac:8c:3b 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
    *DHCP Proxy DTL Recv Task: Apr 17 10:09:36.831: 8c:77:12:ac:8c:3b DHCP received op BOOTREPLY (2) (len 325,vlan 0, port 29, encap 0xec03)
    *DHCP Proxy DTL Recv Task: Apr 17 10:09:36.831: 8c:77:12:ac:8c:3b DHCP setting server from ACK (server 192.168.2.1, yiaddr 192.168.2.13)
    *DHCP Proxy DTL Recv Task: Apr 17 10:09:36.853: 8c:77:12:ac:8c:3b apfBlacklistMobileStationEntry2 (apf_ms.c:4296) Changing state for mobile 8c:77:12:ac:8c:3b on AP 00:1d:a2:87:02:30 from Associated to Exclusion-list (1)
    *DHCP Proxy DTL Recv Task: Apr 17 10:09:36.853: 8c:77:12:ac:8c:3b Scheduling deletion of Mobile Station:  (callerId: 44) in 10 seconds
    *DHCP Proxy DTL Recv Task: Apr 17 10:09:36.854: 8c:77:12:ac:8c:3b DHCP failed to register IP 192.168.2.13 - dropping ACK

  • PBS NOVA identity theft article.

    This is why I went through the process of getting mine and my wife's credit frozen (http://community.spiceworks.com/topic/post/4801333).

    I thought I should probly share this, if nothing else maybe you can use for user training.
    http://www.pbs.org/wgbh/nova/next/tech/science-of-identity-theft/
    This topic first appeared in the Spiceworks Community

  • Cable theft and BT - what we're doing about it

    Hi Everyone
    We’ve sometimes had a few of you ask about cable theft which is a common problem not just for us, but for many other vital services such as rail and power.
    The thing is, cable theft has been increasing with the increasing price of copper and affects our customers from things like providing new lines, to causing delays if cable has been stolen and caused a fault, so we take it very seriously.
    We thought it would be good to give you an update on how we’re dealing with it and what you can do to help stop this crime.
    What are we doing to tackle this?
    We’re doing a number of things to make our network more secure, including using new technologies to help stop further attacks.
    Smart Water® is a forensically traceable invisible liquid. It’s applied to cable access points and can be detected on skin, clothing and on the cables themselves. Have a look at the pics below – there’s no getting away with that glow!
    Alarms are being fitted to cables
    We’re working with the government to shut down the routes thieves use to dispose of the stolen metals
    We’re working closely with local and national police, and have partnered with Crimestoppers to help bring criminals to justice. 
    How can you help?
    There are a few things that are indicators of suspicious activity, keep a look out for things like:
    Work being carried out in streets and on roads by people not wearing hi-visibility vests and using unmarked vans, flatbed trucks and 4x4 vehicles
    Removed or disturbed cable box covers in the pavement or at the side of the road
    Any sites where there is a large quantity of cable in an unusual place, egg. local scrap dealers
    Palls of unusual thick black smoke particularly seen in rural areas or an indication of unusual burning activity
    What should I do if I see something suspicious?
    If you see something suspicious and think it might be related to cable theft, please report it to your local police.  You don’t want that thief affecting your line! Or you can contact Crimestoppers on 0800 555 111. A reward is offered for information leading to a conviction.
    Thanks for supporting us on this and hopefully with your help, we can continue to track down what has been a growing problem for us all.
    Kerry
    Retired BTCare Community Manager - StephanieG and SeanD are your new Community Managers
    If you like a post, or want to say thanks for a helpful answer, please click on the Ratings star on the left-hand side of the post.
    If someone answers your question correctly please let other members know by clicking on ’Mark as Accepted Solution’.

    Last night about a mile of cable was stolen in Barns Green near horsham which has cut off my business for another week or so.  The same cable was stolen in May which almost caused the closure of my business - so who knows where we will be in a week!
    I had a potential good idea to help the problem though!
    The cables when they are stolen are generally cut at each manhole then dragged out of the conduit in short lengths.
    BT trunk cables are pressurised with air to prevent water ingress. 
    What about fitting a flexible bladder around each cable so the bladder sits in the middle of the run between manholes - this could even be attached to a pull-through cable rather than the trunk.
    The air pressure in the cable inflates the bladder against the walls of the conduit making it very difficult to pull the cable through.  To stop the bladder deflating when the cable is cut, the bladder is inflated through a one-way valve, constructed like a heart valve.  With no pressure in the cable, the air will stay in the bladder, but if a vacuum is applied to the cable, the pressure difference is enough to cause the valve to invert and allow air out.  The bladders would be made to slide over the cable outer to the desired location with a 'vampire tap' into the pressurised outer.
    OK, these would not stop the cable being cut - but it would make them very difficult to remove from the conduit.  They would also pin any smaller cables in place similarly.
    If mass produced out of something similar to inner-tube rubber I don't think they would be all that expensive compared to the copper itself.
    Drop me a line if you want to discuss the idea - I'm not claiming any IPR over it, I would just like to help stop the thefts and save businesses like mine!
    Si

  • Security & Privacy Identity theft / Account tak...

    This is emarquit again. I went to Security & Privacy >> Identity theft / Account takeove as you advised others and it takes you  in a circle with no means to report the fraud., which is why I wrote to you.. 

    emarquit wrote:
    This is emarquit again. I went to Security & Privacy >> Identity theft / Account takeove as you advised others and it takes you  in a circle with no means to report the fraud., which is why I wrote to you.. 
    you can also send an email directly to [email protected]  just use the same subject line Security & Privacy >> Identity theft / Account takeover.
    IF YOU FOUND OUR POST USEFUL THEN PLEASE GIVE "KUDOS". IF IT HELPED TO FIX YOUR ISSUE PLEASE MARK IT AS A "SOLUTION" TO HELP OTHERS. THANKS!
    ALTERNATIVE SKYPE DOWNLOAD LINKS | HOW TO RECORD SKYPE VIDEO CALLS | HOW TO HANDLE SUSPICIOS CALLS AND MESSAGES
    SEE MORE TIPS, TRICKS, TUTORIALS AND UPDATES in
    | skypefordummies.blogspot.com | 

  • Having you stop pestering me about openness. Have you not heard of identity theft. There is not enough security for "openness!"

    Having you stop pestering me about openness. Have you not heard of identity theft. There is not enough security for "openness!" Asking questions should be easier. This is too much going thru 4 pages to ask you one question. Why does firefox crash so often?
    == This happened ==
    A few times a week
    == a year ago.

    The questions are asked to collect information to analyze the problems you are experiencing. Otherwise we would see a lot of "It doesn't work" or "What is wrong with my Firefox" with no other details. There is no personal information requested. You can choose to leave an e-mail address so that you receive a notification when someone responds to your question; otherwise, you must search for your post when you return. With the thousands of questions received each week, searching the forum for your post when you return can be tedious, and sometimes unfruitful. The e-mail address you leave for notification is not accessible by us; the notifications are automated.
    <u>'''We are all uncompensated volunteers here; users helping other users.'''</u>
    Most crashes are caused by Extensions or Plugins. Sometimes crashes can be caused by malware or by something wrong on your system.
    <u>'''Firefox Safe Mode'''</u>
    You may need to use '''[[Safe Mode]]''' (click on "Safe Mode" and read) to localize the problem. Firefox Safe Mode is a diagnostic mode that disables Extensions and some other features of Firefox. If you are using a theme, switch to the DEFAULT theme: Tools > Add-ons > Themes <u>'''before'''</u> starting Safe Mode. When entering Safe Mode, do not check any items on the entry window, just click "Continue in Safe Mode". Test to see if the problem you are experiencing is corrected.
    See:
    '''[[Troubleshooting extensions and themes]]'''
    '''[[Troubleshooting plugins]]'''
    '''[[Basic Troubleshooting]]'''
    If the problem does not occur in Safe-mode then disable all of your Extensions and Plug-ins and then try to find which is causing it by enabling <u>'''one at a time'''</u> until the problem reappears. <u>'''You MUST close and restart Firefox after EACH change'''</u> via File > Restart Firefox (on Mac: Firefox > Quit). You can use "Disable all add-ons" on the Safe mode start window.

  • The difference between system restore and last good known configuration

    hi,
    what is the difference between system restore  and last good known configuration.
    in which situation you use system restore ,and in which situation you use last good known configuration.
    very short answer wil be enough.
    thanks
    johan
    h.david

    Last Known Good Configuration deals only with Starting Windows eg. a bad registry or incorrect driver is preventing Windows to start.It recovers the registry settings of HKEY_LOCAL_MACHINE\System\CurrentControlSet
    While System Restore uses restore points to return your system files and settings to an earlier point in time without affecting personal files. Restore points are created automatically every week, and just before significant system events, such as the installation
    of a program or device driver. You can also create a restore point manually.You can undone system restore but there is no such option in Last Known Good Configuration.
    Last Known Good Configuration is disabled in Windows 8 or,Windows 8.1 by default.
    Try using Last Known Good Configuration if you can't start Windows, but it started correctly the last time you turned on the computer.
    Try using System Restore to return the system to an earlier point in time when things worked correctly.
    S.Sengupta, Windows Entertainment and Connected Home MVP

  • I bought new Macbook Pro 13" around two months before .My Apple ID is working on all other things except app store . It is buffering for a lot of time and lastly coming on screen " can not connect to app store " Please help me

    I bought new Macbook Pro 13" around two months before .My Apple ID is working on all other things except app store . It is buffering for a lot of time and lastly coming on screen " can not connect to app store " Please help me

    Have you tried repairing disk permissions : iTunes download error -45054

  • I am trying to fill in a PDF online- there should be a submit button but it isn't showing. My partner has an identical Mac and can see the button- what do I change in system preferences to resolve?

    I am trying to fill in a PDF form online- there should be a submit button but it isn't showing. My partner has an identical Mac and can see the button when he opens the same page- what do I change in my systen system preferences to resolve this?

    You and your partner might have different browsers, different versions of the same browser, or most likely a fervent version of the PDF plug-in.
    See if just clicking on the Enter key sends the form in.

  • How to create report which includes records of current month and last 7 days of previous month.

    Hi Experts,
    I need to create a report which includes records of current month and last 7 days of previous month.
    I will get records of current month by this formula :- month({PROBSUMMARYM1.OPEN_TIME})=month(currentdate)
    Please tell me how to add the records of last 7 days of previous Month for the same report.
    Thanks in Advance.

    Hi Ajay,
    If you have more than a year data in your database then your formula will return wrong results. ie. If your data consist of 2012,2013,2014 data then below formula will return all 8th month data irrespective of year. So, you need to check year also here
    month({PROBSUMMARYM1.OPEN_TIME})=month(currentdate)  and
    Year({PROBSUMMARYM1.OPEN_TIME})=Year(currentdate)
    Now add Abhilash second statement in OR so, your formula should look like :
    (month({PROBSUMMARYM1.OPEN_TIME})=month(currentdate)  and
    Year({PROBSUMMARYM1.OPEN_TIME})=Year(currentdate))
    OR
    Date({PROBSUMMARYM1.OPEN_TIME}) IN [DateAdd('d',-7,Maximum(LastFullMonth)), Maximum(LastFullMonth)
    -Sastry

  • How can I display the first and last name using a paramater as employee ID?

    Hi SAP,
    I have a parameter that is called {? Employee ID}.   What I want to do is display the first and last name based on the employee ID value entered in {? Employee ID} in the page header of the report.  Right now, when I put the following formula in the page header only some pages get the right result while other pages dont....
    if table.employeeid = {? Employee ID} then
    table.firstname" "table.lastname
    It appears as though if the first record in the details section on the beginning of each page happens to be the employee under {? Employee ID} then it prints it correctly, if it isn't I get a null value in the page header.
    Anyone have any ideas?
    Z

    Hi Try this,
    Whileprintingrecords;
    if ={?EmpID} then
    Also check the option "Default values for null" in the formula editor.
    Regards,
    Vinay

Maybe you are looking for

  • How can I know the latency in a sub VI or routine (inline c node) in blackfin module?

    Hi, I want to control a transceiver using a BF-537. The two principal taks are programming the transceiver and send/receive data from transceiver. These operation are development with sub-VIs, little routine in C using inline c node, etc. However, I

  • How Do I turn off Text message on my MacBook Air

    My MacBook Air, my husband's Macbook Pro, and my Iphone4 are all linked and therefore my husband sees all my text. The problem is an educator I may be discussing something confidential, therefore how do I unlink his mac from my iphone. We do share th

  • HDMI audio works only with pavucontrol

    I am having a weird problem with my HDMI audio output. I can have sound only if I use pavucontrol to switch the per app output to HDMI. If I make HDMI as my default device, it would not work anymore until I delete .config/pulse and restart gdm. I mus

  • Mail merge like functionality

    Is there anyway to create a mail merge functionality in Apex. In the simplest form I need to create form letters, with variables that are populated such as, the variables are in upper case. Dear P1_CUSTOMER_NAME, We are contacting you about order P1_

  • Camera link on locked home screen

    Camera link on locked home screen - when clicked, doesn't direct me to camera, Button just 'bounces' and stays on locked screen