Illegal use of Key Logger

Help! I believe an ex boyfriend of mine has placed key logger on my computer. I already read about reinstall, which I may do if I can find the original discs for my computer, however, I'd like to prove key logger is even on the computer first. He has been stalking me. Can someone answer these questions?:
1. What key logger programs are out there for mac? Someone in a post earlier said there were only two. Is this true? I called Spector and they said the only thing I can do is hope it is their software, order their discs and do an uninstall. I hate to pay money for their discs when I don't even know if that is the software he used. Is there any way my of knowing?
2. This guy did have the opportunity to load something on the machine and he is computer savy. Especially with Macs. He was monitoring another computer (I caught him).
3. If I am no longer at the place where he is, is it still possible for him to continue monitoring this machine some 4 years later remotely if he did install a key logger, or do I have to be in the same house, same network, etc. It's been several years since I've seen him and I've moved since and have changed ISPs. Things have transpired that lead me to believe he may still be monitoring this computer.
4. Is there anyway to detect that a key logger is on the machine so I can prove it to the police before I delete everything and reinstall?
Any help is appreciated. I've spoken to a couple of apple techs who were unable to help me. I have OS X on this machine.
Thanks.
iMac   Mac OS X (10.3.9)  
iMac   Mac OS X (10.3.9)  

Hi Betty,
Thought of something else important you should do. Depending on ex boyfriend's computer abilities, he may also know your MAC (Media Access Control) address and/or IP address. So when you erase the hard drive and reinstall OS X, follow these steps.
1) When OS X has completed installing, it will reboot and bring you to the welcome login. You answer a few questions about your preferences, if you have an Apple ID, how you connect to the Internet and so on. After it's finished, it will finish booting to the desktop.
2) At this point, you want to disconnect from the Internet immediately. If you have a cable or DSL modem, either unplug it, or turn it off if it has an on/off switch. This will take you Mac offline as far as any outside intruders are concerned.
3) Open the System Preferences and click the Sharing icon. Click the Firewall tab and then click the button to turn the firewall on. Click the Advanced button on the same dialogue box. On the resulting sheet, turn on "Enable Stealth Mode". Click OK. Close the System Preferences.
4) Turn your cable or DSL modem back on. Now update the OS and reinstall your software.
If your ex has hacking software that he uses to access your computer remotely, having the firewall on will make it much harder for him to access your Mac. Even better, also purchase a VPN firewall enabled cable or DSL router. They're pretty cheap. Around $35 for a 5 port model. Rather than attaching the modem directly to your Mac, you plug it in to the WAN port of the router. Then you use a plain Ethernet cable from your Mac to one of the LAN ports on the router. Your Mac will see the Internet the same as before. What's different is that with a VPN firewall on the router, it's just about impossible for anyone on the outside to see your Mac, or any other computer connected to the router. All a hacker sees when they try to attack your computer is a fictitious "computer" generated by the VPN hardware.
I've got all of the computers in my house connected to such a router. We can all use the Internet at the same time with only one actual DSL modem. As proof to how strong a VPN firewall is, when we were just using dial-up to connect, it was imperative to have some sort of firewall software on the kid's Windows box. It would stop at least 3 attacks a week. With the VPN router in place, they don't even need the software on. No one can see their computer through it.

Similar Messages

  • Post Moved Illegal use of my broadband

    Post moved http://community.bt.com/t5/Other-BB-Queries/Illegal-use-of-my-broadband/td-p/606892
    If you want to say thanks for a helpful answer,please click on the Ratings star on the left-hand side If the reply answers your question then please mark as ’Mark as Accepted Solution’

    DS wrote:
    Andy_N wrote:
    DS wrote:
    pottyperson wrote:
     I doubt that other contributors will be able to offer a solution
    Well, as I mentioned before, if it's a HH2 and the rear of it is in view of the public, then every Thomas, Richard and Harry will be able to see the wireless key and make full use of the Internet.
    Hi.
    Although possible, that's not entirely true. If the user has altered the wireless key, then viewing the back of the hub will not help
    But how many out there in BT land actually do change it?
    BT only prompt the user to change the default admin password if and when they first access the hub.
    At least BT thought about the label design on the HH3, keeping it hidden until needed.
    I reckon hardly anyone would change the wireless key to be honest , but I wonder how many leave them in a window ...
    http://www.andyweb.co.uk/shortcuts
    http://www.andyweb.co.uk/pictures

  • Illegal use of keyword "SELECT"...

    Hi,
    I am new to TimesTen and using version 11.2 with Hibernate.
    I get the following error while running my application--
    *01 Feb 2011 12:03:29,201 [WARN] org.hibernate.util.JDBCExceptionReporter: SQL Error: 7025, SQLState: 37000*
    *01 Feb 2011 12:03:29,201 [ERROR] org.hibernate.util.JDBCExceptionReporter: [TimesTen][TimesTen 11.2.1.7.0 ODBC Driver][TimesTen]TT7025: Illegal use of reserved keyword "SELECT", character position: 459 -- file "ptSqlY.y", lineno 8158, procedure "reserved_word_or_syntax_error"*
    Would really appreciate some help as tyo how to fix this problem.

    I've spoken to various folks today about this. I'm not a Hibernate / TT dialect expert by any means. However, this SQL is a (sort of) documented restriction in TimesTen. This usage of SELECT is a 'derived table' and, unlike Oracle and many other databases, TimesTen currently only supports these in the FROM clause but not in other places such as, here, a projection list.
    So, it's not a bug but a limitation of our current SQL implementation.
    With regards to where it's coming from, based on the info that is provided, we think that the source of this SQL error is not directly from Hibernate or from the Hibernate dialect class that the application uses. We think this scalar subquery in the select list is defined in a Hibernate mapping document as something called a derived property.
    In Hibernate, Java object fields are usually mapped to table columns using a property element within the hibernate-mapping element like this:
    <hibernate-mapping>
    <class name="com.timesten.tptbmas.Tptbm" table="TPTBM">
    <composite-id name="key" class="com.timesten.tptbmas.TptbmPKey">
    <key-property name="vpn_id" column="vpn_id" />
    <key-property name="vpn_nb" column="vpn_nb"/>
    </composite-id>
    <property name="directory_nb" column="directory_nb"/>
    <property name="last_calling_party" column="last_calling_party"/>
    <property name="descr" column="descr"/>
    </class>
    </hibernate-mapping>
    This is the usual case, however, it is also possible to map Java object fields to 'derived' values from the database table. These 'derived' values are expressions in the select list instead of simple column references.
    A 'derived' property is defined in the property element using the 'formula' attribute.
    For example:
    <property name="descr" formula="'VPN ' || TO_CHAR (VPN_ID) || ' extension ' || TO_CHAR (VPN_NB)"/>
    The value of 'formula' is any valid SQL expression that can appear in the select list.
    Our belief is that you are defining a scalar subquery for 'formula'. For example:
    <property name="descr" formula="(SELECT COUNT (*) FROM DUAL)"/>
    And this generates the error when executed against TimesTen.
    The solution is to rewrite 'formula' using a select list expressions that TimesTen supports - or change things to avoid the need for a derived property in the select list.
    If this doesn't solve it, it's probably best to log an SR so we can obtain various files from you that we would need to look into it further.

  • How to set current row in table after use tab key on inputText

    Hello all,
    My first post .., I'm newbie in ADF and I will try to explain my problem.
    For the moment we use ADF 11g (11.1.1.4), in a jsff page I have a table with an inputText column.
    On the valueChangeListener of the inputText, I invoke a method in a viewScope bean which call an EJB method, make some services in the EJB on the line modified. After that I refresh the VO and the table (because others values on the line have been modified) and reset the focus on the same inputText modified by the user with javaScript because focus was lost after refresh.
    So far, everything works fine.
    When I use the arrow keys to change the selected row in the table, it's work fine (focus is still in the next or previous inputText), but if user try to use tab key to change the current line, the inputText on the next line have the focus but the current row of the table is not changed (I think it's normal).
    My question : how can I change the current row after tab key pressed in this case ?
    I don't know if it's really clear, not easy to explain, don't hesitate to ask more details.
    Thanks in advance.

    Frank Nimphius wrote:
    Hi,
    My question : how can I change the current row after tab key pressed in this case ?
    Use a client event to listen for the keyboard entry and intercept the tab. The use af:serverListener to call the server to set the rowKey on the table and issue a PPR for the table to re-paint
    See sample 11 on http://www.oracle.com/technetwork/developer-tools/adf/learnmore/index-101235.html#CodeCornerSamples
    to learn about how to use the client listener and server listener
    FrankHi,
    Thanks a lot for your advices, I used the client and server listener
    I used this code on the method call in order to change the selection after key tab pressed, I don't know if it can be easier, but it works.
              if (LOGGER.isDebugEnabled()) {
              LOGGER.debug("START changeSelectedRow");
              RowKeySet oldRowKeySet = myTable.getSelectedRowKeys(); // get oldRowKeySet
              if (oldRowKeySet == null) {
                   if (LOGGER.isDebugEnabled()) {
                        LOGGER.debug("oldRowKeySet is null");
                   return;
              RowKeySetImpl newRowKeySet = new RowKeySetImpl(); // The new RowKeySet use to change the selectedRow
              DCIteratorBinding bindingIterator = ADFUtils.findIterator(MY_ITERATOR);
              bindingIterator.setRangeSize(-1);
              // set the new index of the current row.
              int index = bindingIterator.getCurrentRowIndexInRange();
              if (index < bindingIterator.getAllRowsInRange().length - 1) {
                   index++;
              bindingIterator.setCurrentRowIndexInRange(index);
              // get the current row after changed the index
              Row currentRow = bindingIterator.getCurrentRow();
              if (currentRow != null) {
                   ArrayList nextLst = new ArrayList(1);
                   nextLst.add(currentRow.getKey());
                   newRowKeySet.add(nextLst);
                   // set the new selectedRow
                   myTable.setSelectedRowKeys(newRowKeySet);
                   SelectionEvent selectionEvent = new SelectionEvent(oldRowKeySet, newRowKeySet, myTable);
                   selectionEvent.queue();
                   AdfFacesContext.getCurrentInstance().addPartialTarget(myTable);
              if (LOGGER.isDebugEnabled()) {
                   LOGGER.debug("END changeSelectedRow");
    Best Regards
    Benjamin

  • Request for key-logger check -- followed instructions from old threads

    Hi everyone,
    This is my first post on this site.  I've become worried about malware installed on my computer (credit card info was stolen last week).  After reading several related posts I am hopeful that I don't actually have a key-logger installed on my computer (since I don't think anyone around me installed malicious software, and it seems unlikely a website could install it without my consent), but I would like to be sure.
    I have followed instructions posted by Linc, and generated this output in terminal:
    --------Terminal output--------
    Test 1 output:
    Test 2 output:
    com.microsoft.office.licensing.helper
    com.google.keystone.daemon
    com.adobe.fpsaud
    Test 3 output:
    com.google.keystone.system.agent
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae
    com.adobe.AAM.Scheduler-1.0
    Test 4 output:
    /Library/Components:
    /Library/Extensions:
    /Library/Frameworks:
    AEProfiling.framework
    AERegistration.framework
    Adobe AIR.framework
    AudioMixEngine.framework
    NyxAudioAnalysis.framework
    PluginManager.framework
    Python.framework
    iTunesLibrary.framework
    /Library/Input Methods:
    /Library/Internet Plug-Ins:
    AdobePDFViewer.plugin
    AdobePDFViewerNPAPI.plugin
    AmazonMP3DownloaderPlugin101736.plugin
    CitrixICAClientPlugIn.plugin
    Flash Player.plugin
    JavaAppletPlugin.plugin
    Mathematica.plugin
    Quartz Composer.webplugin
    QuickTime Plugin.plugin
    SharePointBrowserPlugin.plugin
    SharePointWebKitPlugin.webplugin
    Silverlight.plugin
    flashplayer.xpt
    googletalkbrowserplugin.plugin
    npgtpo3dautoplugin.plugin
    nsIQTScriptablePlugin.xpt
    o1dbrowserplugin.plugin
    /Library/Keyboard Layouts:
    /Library/LaunchAgents:
    com.adobe.AAM.Updater-1.0.plist
    com.google.keystone.agent.plist
    /Library/LaunchDaemons:
    com.adobe.fpsaud.plist
    com.apple.remotepairtool.plist
    com.google.keystone.daemon.plist
    com.microsoft.office.licensing.helper.plist
    /Library/PreferencePanes:
    Flash Player.prefPane
    TeXDistPrefPane.prefPane
    /Library/PrivilegedHelperTools:
    com.microsoft.office.licensing.helper
    /Library/QuickLook:
    iWork.qlgenerator
    /Library/QuickTime:
    AppleIntermediateCodec.component
    AppleMPEG2Codec.component
    /Library/ScriptingAdditions:
    /Library/Spotlight:
    Microsoft Office.mdimporter
    Wolfram Notebook.mdimporter
    iWork.mdimporter
    /Library/StartupItems:
    /etc/mach_init.d:
    /etc/mach_init_per_login_session.d:
    /etc/mach_init_per_user.d:
    Library/Address Book Plug-Ins:
    SkypeABDialer.bundle
    SkypeABSMS.bundle
    Library/Fonts:
    Library/Input Methods:
    .localized
    Library/Internet Plug-Ins:
    .DS_Store
    Google Earth Web Plug-in.plugin
    WebEx64.plugin
    Library/Keyboard Layouts:
    Library/LaunchAgents:
    com.adobe.AAM.Updater-1.0.plist
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
    com.apple.AddressBook.ScheduledSync.PHXCardDAVSource.3D2FB447-CF7A-4D6C-B796-C91 08A0F0174.plist
    Library/PreferencePanes:
    Test 5 output:
    iTunesHelper, Dropbox, AdobeResourceSynchronizer, Popup
    --------end Terminal output--------
    I've found several other threads with different suggestions for rooting out and eliminating key-loggers. Is this step (above) sufficient, or is there more I should do?  I just read stuff on the flashback virus (on this forum) and followed some Terminal prompts.  I don't think I have it, but I do think I'm getting paranoid now.
    Thanks

    There are many, many possible ways for your credit card number to get stolen. Malware on your Mac, while possible, is the most unlikely. So unlikely that I would not consider it without a good reason.
    As to the question of how to detect a keylogger... that's very difficult. You can detect known malware fairly easily, with a good anti-virus program. However, no current Mac malware incorporates a keylogger. Most includes a backdoor of some kind, which could be used by a hacker to install a keylogger remotely, if you were infected. Alternately, someone malicious with physical access to your computer could also install a keylogger.
    Here's the issue... when you have someone consciously installing a keylogger on your machine, you can't really ever be sure you've detected it. It could be disguised as something legit. It could even replace a system component. Someone with a lot of experience might be able to locate the keylogger, using various methods. You could try to install something like Little Snitch, to intercept any transmissions that software might make... but if someone's already got a backdoor (or physical access) allowing them to install a keylogger, what's to stop them from disabling Little Snitch?
    Bottom line, there's really no reason to believe you have a keylogger on your Mac. However, if you should, at some point in the future, become convinced that you have a keylogger, the only true solution will be to erase the hard drive and reinstall everything from scratch.

  • I believe I have a key logger or spyware on my computer

    I believe I have a key logger or spyware on my computer.  Any help?

    Helpful Links Regarding Malware Problems
    If you are having an immediate problem with ads popping up see The Safe Mac » Adware Removal Guide and AdwareMedic.
    Open Safari, select Preferences from the Safari menu. Click on Extensions icon in the toolbar. Disable all Extensions. If this stops your problem, then re-enable them one by one until the problem returns. Now remove that extension as it is causing the problem.
    The following comes from user stevejobsfan0123. I have made minor changes to adapt to this presentation.
    Fix Some Browser Pop-ups That Take Over Safari.
    Common pop-ups include a message saying the government has seized your computer and you must pay to have it released (often called "Moneypak"), or a phony message saying that your computer has been infected, and you need to call a tech support number (sometimes claiming to be Apple) to get it resolved. First, understand that these pop-ups are not caused by a virus and your computer has not been affected. This "hijack" is limited to your web browser. Also understand that these messages are scams, so do not pay any money, call the listed number, or provide any personal information. This article will outline the solution to dismiss the pop-up.
    Quit Safari
    Usually, these pop-ups will not go away by either clicking "OK" or "Cancel." Furthermore, several menus in the menu bar may become disabled and show in gray, including the option to quit Safari. You will likely have to force quit Safari. To do this, press Command + option + esc, select Safari, and press Force Quit.
    Relaunch Safari
    If you relaunch Safari, the page will reopen. To prevent this from happening, hold down the 'Shift' key while opening Safari. This will prevent windows from the last time Safari was running from reopening.
    This will not work in all cases. The shift key must be held at the right time, and in some cases, even if done correctly, the window reappears. In these circumstances, after force quitting Safari, turn off Wi-Fi or disconnect Ethernet, depending on how you connect to the Internet. Then relaunch Safari normally. It will try to reload the malicious webpage, but without a connection, it won't be able to. Navigate away from that page by entering a different URL, i.e. www.apple.com, and trying to load it. Now you can reconnect to the Internet, and the page you entered will appear rather than the malicious one.
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
      Mac OS X Snow Leopard and malware detection
      OS X Lion- Protect your Mac from malware
      OS X Mountain Lion- Protect your Mac from malware
      OS X Mavericks- Protect your Mac from malware
      About file quarantine in OS X
    If you require anti-virus protection Thomas Reed recommends using ClamXAV. (Thank you to Thomas Reed for this recommendation.)
    From user Joe Bailey comes this equally useful advice:
    The facts are:
    1. There is no anti-malware software that can detect 100% of the malware out there.
    2. There is no anti-malware that can detect everything targeting the Mac.
    3. The very best way to prevent the most attacks is for you as the user to be aware that
         the most successful malware attacks rely on very sophisticated social engineering
         techniques preying on human avarice, ****, and fear.
    4. Internet popups saying the FBI, NSA, Microsoft, your ISP has detected malware on
        your computer is intended to entice you to install their malware thinking it is a
        protection against malware.
    5. Some of the anti-malware products on the market are worse than the malware
        from which they purport to protect you.
    6. Be cautious where you go on the internet.
    7. Only download anything from sites you know are safe.
    8. Avoid links you receive in email, always be suspicious even if you get something
        you think is from a friend, but you were not expecting.
    9. If there is any question in your mind, then assume it is malware.

  • Illegal use of LONG datatype error message when i create materialized view

    Hello to all
    I want create read only materialized view replication environment two of our tables have LONG datatype when i create materialized view against on them
    I recieve this error message
    CREATE MATERIALIZED VIEW MDB.TOAD_PLAN_TABLE TABLESPACE aramis REFRESH FORCE WITH ROWID AS SELECT * FROM MDB.TOAD_PLAN_TABLE@arahisto
    Error report:
    SQL Error: ORA-00997: illegal use of LONG datatype
    00997. 00000 - "illegal use of LONG datatype"
    Do you know any resort solution for it?
    thanks

    You can not use longs in materialized views over a database link, you can however take a part of a long over to a materialized view.
    I have gotten this to work in the past l had to create a PL/SQL function that you can use to extract the character data from the long column and use that to
    as part of the function you will need to pass in the columns of the table that will identify the unique records so you can pick out the long column
    example function
    -- you will need to make sure this funtion is in the remote location as you can not select longs accross a DB LINK.
    CREATE OR REPLACE FUNCTION MDB.TOAD_PLAN_LONG_CONV
    (pass in the primary key columns for the table)
    RETURN VARCHAR2
    IS
    v_long VARCHAR2(32767) ;
    BEGIN
    BEGIN
    -- need to select the long column into the PL/SQL variable
    SELECT long_column
    INTO v_long
    FROM MDB.TOAD_PLAN_TABLE
    WHERE key_columns = passed columns ;
    EXCEPTION
    WHEN OTHERS THEN
    IF SQLCODE = '-01406' THEN
    NULL ;
    ELSE
    RAISE ;
    END IF ;
    END ;
    RETURN SUBSTR(v_long,1,4000) ;
    END ;
    Then when you create the materialized view utilize that function on the long column.
    create or replace materialized view MDB.TOAD_PLAN_TABLE TABLESPACE aramis REFRESH FORCE WITH ROWID
    AS
    SELECT column1, .... columnx,
    MDB.TOAD_PLAN_LONG_CONV@arahisto (primary key column list) as long_column_name
    FROM MDB.TOAD_PLAN_TABLE@arahisto ;
    See if this will work for you? Keep in mind however this solution will not get the entire long column only as much as a PL/SQL variable will hold of it.
    Mike

  • I think my Pro has a bespoke key logger/spyware installed

    Hi,
    I think my macbook has either a key logger and/or some form of spyware installed. I doubt it will be an off the shelf application - the person suspected is a developer and has a high level of skills. I am okay using terminal with instructions, and have followed the steps to look for the known programmes. Can anyone suggest how I can look to determine if there is some form of bespoke programme installed?
    Many thanks

    This would be highly unlikely, but given your concern see the following:
    Helpful Links Regarding Malware Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
              Mac OS X Snow Leopard and malware detection
              OS X Lion- Protect your Mac from malware
              OS X Mountain Lion- Protect your Mac from malware
              About file quarantine in OS X
    If you require anti-virus protection I recommend using VirusBarrier Express 1.1.6 or Dr.Web Light both from the App Store. They're both free, and since they're from the App Store, they won't destabilize the system. (Thank you to Thomas Reed for these recommendations.)

  • Key Logger App For Accountability Purposes?

    Hello, I was wondering if there is a key logger app available for a non-jailbroken iPhone for accountability purposes?  The current accountability apps are not good (Covenant Eyes, X3 Watch etc....) because they only monitor the browser they have you install (Covenant Eyes Browser).  The rest of the iPhone is not monitored.  I am a young adult and would like the option to be fully accountable on the iPhone without having to block iPhone features such as Safari.  Thanks.

    Meg St._Clair wrote:
    desertsquirrel wrote:
    "Access to the core functions of the phone necessary to do so would itself require compromising the security of the phone.", when in reality it would not compromise the security of the phone.  The core functions would be accessed, but the phone would remain secure. 
    That makes absolutely no sense. Access to the core functions of the phone would most definitely compromise security. I'm not sure what universe you live in where that would not be the case. Your faith in these theoretical companies that could be trusted with this access is touching, though. 
    Android phones, which do allow such access, have revealed a number of serious vulnerabilities recently. Start your reading here:
    http://www.symantec.com/connect/blogs/android-vulnerability-allows-app-hijacking
    It would compromise security if used for that purpose yes.  Just like if someone takes your phone with malicious purposes, say steal your credit card information, instead of a family member or friend borrowing it to show you a funny video. Your sarcasm is unseeded and misplaced.  These, "theoretical companies", are actually real companies.  With these companies, "there has not been any abuses of privileges on Mac, PC, or Android devices.  You think the companies would all of a sudden decide to abuse the iPhone when they could have done so already with other operating systems?   
    You missed a very important part in the article that you posted. "We have added detection logic for the vulnerable condition to our backend Norton Mobile Insight systems and, out of four million applications, have not yet discovered malicious usage of the vulnerability."  Bring it up again if there is ever anything that is actually happening, instead of just the possibility of something being breached. It looks like you would have bought into Symantec's ploy to sell you their product.

  • Possible Key Logger

    Hey guys. I have reason to believe there is a key logger on my computer. I play the game, World of Warcraft. Recently my account was broken into. They messed a lot of things up. They also had access to my e-mail.
    I changed all my passwords from computers at my college as soon as I found out. I have yet to type a password on my computer now. I just copy and paste them when I need to check my e-mail, or play the game.
    I am normally pretty safe with my computer I thought. I always have my firewall turned on. At the time, I did not have an anti virus installed however. Many times people suggest people couple key loggers with addons downloaded for the game. I think its very possible thats where it came from. I deleted all the addons for the game I had. I ran Symantec/Norton anti-virus. It didn't come up with anything, but there were quite a few files it "didnt have permission to check." Most of these seemed like normal mac files, but I am a little frightened by it. I got the noscript addon for firefox to hopefully maybe prevent it i nthe future
    I guess my question is- how can I be sure there is a key logger. What is a good way to get rid of it. Does doing an archive and install work, or should I just reformat.
    Any help is greatly appreciated. Thanks

    Do you typically run your computer as an administrator? That's really not good when "sharing" your computer with the world. Apple recommends not casually using the computer administrator account unless actually administrating. Playing games is not an administrative task, AFAIK.
    Scan your computer from MacScan website.
    Install LittleSnitch. This will alert you of a keylogger, but if there is one, it's too late. If you have a keylogger installed, presume the worst. All personal data are compromised.
    Never play games online that let others use or access your computer unless you are prepared for an intrusion.
    Your best bet is to use your TM backup and restore your system to a time prior to this event.
    And if you have been the victim of an attack, protect your identity with one of hte available services.

  • The problem I have since I upgraded to Mavericks version 10.9.1 The problem appears only with Mail not with other programs, not even with my browser. When I try to zoom the text of an e-mail I received or sent , I can no longer use the keys Command   to e

    the problem I have since I upgraded to Mavericks version 10.9.1
    The problem appears only with Mail not with other programs, not even with my browser.
    When I try to zoom the text of an e-mail I received or sent , I can no longer use the keys Command + to enlarge the text, although I can reduce it with Command -.
    As I have a problem with my eyes, This is a serious matter for me.
    When I write an e-mail, if I select text and press Command +, it just displaces the text to the right.
    Now, my husband has a USB keyboard. If he connects it to my computer, his regular Command + does not work either, but  he uses the extended keyboard, then it works. Unfortunately, he needs it for a musical application which does not work with a wireless keyboard.

    Firefox 3.6.4 and 3.6.6 use a process called, "plugin-container.exe" which was using up most of my CPU when I opened up multiple tabs that contained Adobe Flash files, and caused Firefox to lock up.
    My solution was to use Firefox 3.5.10 which you can get from the Mozilla website at [http://www.mozilla.com/en-US/firefox/all-older.html]
    I am using Adobe Flash 10.1.53.64 without any problem in this version of Firefox. Check the release notes, I believe it contains all the latest security fixes in "Firefox 3.6.4".
    Hopefully, they will fix Firefox 3.6 in the next version (e.g. Firefox 3.6.7), until then you should probably use "Firefox 3.5.10".

  • How about use partial key to loop at a hashed table?

    Such as I want to loop a Internal table of BSID according to BKPF.
    data itab_bsid type hashed table of BSID with unique key bukrs belnr gjahr buzid.
    Loop at itab_bsid where bukrs = wa_bkpf-bukrs
                              and    belnr  = wa_bkpf-belnr
                              and    gjahr  = wa_bkpf-gjahr.
    endloop.
    I know if you use all key to access this hashed table ,it is certainly quick, and my question is when i use partial key of this internal hashed table to loop it, how about its performance.
    Another question is in this case(BSID have many many record) , Sorted table and Hashed table , Which is better in performance.

    You can't cast b/w data reference which l_tax is and object reference which l_o_tax_code is.
    osref is a generic object type and you store a reference to some object in it, right? So the question is: what kind of object you store there? Please note - this must be an object reference , not data reference .
    i.e
    "here goes some class
    class zcl_spfli definition.
    endclass.
    class zcl_spfli implementation.
    endclass.
    "here is an OBJECT REFERENCE for it, (so I refer to a class) i.e persistent object to table SPFLI
    data oref_spfli type ref to zcl_spfli.
    "but here I have a DATA REFERENCE (so I refer to some data object) i.e DDIC structure SPFLI
    data dref_spfli type ref to spfli.
    So my OSREF can hold only oref_spfli but it not intended for dref_spfli . That's why you get this syntax error. Once you have stored reference to zcl_spfli in osref then you will be able to dereference it and access this object's attributes.
    data: osref type osref.
    create object osref_spfli.
    osref = osref_spfli.
    "now osref holds reference to object, you can deference it
    oref_spfli ?= osref.
    osref_spfli->some_attribute = ....
    OSREFTAB is just a table whose line is of type OSREF (so can hold multiple object references - one in each line).
    Regards
    Marcin

  • Today I tried to shutdown my computer and a window popped up saying that my computer could not shut down because the mail application was open, it wouldn't close, so I used a key combination to force mail to quit and now I can't log in. Help?

    Okay, so I have been having trouble with my mail application all week. The window refused to open and would not quit. Today, I tried to shut down my mac and a pop up window told me that I was unable to shutdown because mail was open. After using a key combination, I successfully was able to quit mail with force quit. Then I was able to shut down with out a problem. However, upon rebooting, my computer refused to let me loggin. I put in my password correctly but then the rainbow pinwheel showed up and stalled for a minute and then my screen flashed and the gray screen reappeared, expecting a password. I tried turning it off and back on again with no luck. I also reset my password after reading a similar discussion, but I still can't log in. How can I fix this?

    Startup - Gray, Blue or White screen at boot, w/spinner/progress bar
    Startup Issues - Resolve
    Startup Issues - Resolve (2)
    Avast! Uninstall

  • COPA reporting using costing keys

    Hi,
    I am using costing keys to access the different cost estimates in COPA. I have done the necessary configuration - created valuation strategy and assigned a point of valuation and assigned two costying keys - one for current and one for future costs. I have also mapped my value fields to each cost component. I mapped the one value field twice (representing each costing key) to each cost component.
    My question is, when it comes to reporting, how do I show the values seperately that correspond to each costing key? Since I have the same value field being valued with current and future cost estimates, how are these shown separately in the COPA report? Or do I have to use two different value fields per cost component?
    Much Appreciated

    Just read the SAP documentation which says that you need to enter different value fields for the different costing keys (up to six).
    Thanks to those who attempted.

  • By default, on a mac keyboard F3 lets you see all the open apps and the such. However, I changed it so that I use those keys for keyboard shortcuts; But i'd like the normal F3 key to still work without me having to press FN.

    By default, on a mac keyboard F3 lets you see all the open apps and the such. However, I changed it so that I use those keys for keyboard shortcuts; But i'd like the normal F3 key to still work without me having to press FN.

    rajlego,
    in the Keyboard pane of System Preferences, select the Shortcuts tab, and then select Mission Control on the left-hand side. On the right-hand side, make sure that the Mission Control checkbox is checked, double-click on its current key combination (by default “^↑”) so that the key combination is highlighted, and then press the F3 button — that will set its shortcut to be F3. You can now press F3 to bring up Mission Control without needing to also press the Fn button.

Maybe you are looking for

  • Enable "dynamic date calculation" variable type

    When saving reporting date/period in a report variant, we may use "dynamic date calculation" to specific date as selection parameter.  But the "Dynamic date calculation" is not visible in some ABAP reports - only "Table Variable from TVARVC"  type is

  • Migration PI 2.1 to 2.2 results in Error

    Hello all, trying to migrate PI 2.1 to 2.2 (performing backup on PI 2.1, fresh install PI 2.2, restore PI 2.1 backup in PI 2.2) after starting services we got following error in WEBUI "Error in getting data from server. Make sure you have connectivit

  • Smart Install - vstack vlan other then vlan 1

    Hello people Has anybody managed to get smart install working on a vlan other then vlan 1? Our setup would be: DHCP  - Local director TFTP  - ekstern server Management vlan 209 My issue is that when I connect the client switch to a normal trunk "sw m

  • Like between prepayment invoice and standard invoice

    link between prepayment invoice and standard invoice in AP and link between credit memo and standard invoice in ap

  • Safari don't open website - he ever wants using google search site

    I wish to open a Website with Safari - everytime i type in an address safari open Google The function "open address or search in Google" is terrible - how i can switch off this sh.t function and can only open an address?????