Is it possible for hacker to hijack remote files ?

I have a iMac running OS X 10.4.9. I have a 50 MB of important file. I want to know if there are ways hackers can grab that file ? If it is possible, how long does it take them to successfully get their hand on that file ?(i.e. copy the file to their computer over the internet)
Also, i would love to hear some advice on how setting up the security on my iMac to prevent unauthorized access (i.e. set up firewall, block unwanted port, etc ... )
How do i know if my computer is compromised ?
Thanks for reading.
iMac 20' inch   Mac OS X (10.4.9)  

Don't run windows, don't share, and don't hookup to the internet. Otherwise, read the help files and browse http://www.apple.com/macosx/features/security/ If you really want to get into the business, download and read: Mac OS X Security Configuration Guide (OPTION-click on the link and it'll download to your download folder).
G4 450 MP Gigabit   Mac OS X (10.4.9)  

Similar Messages

  • Is it possible for me to extract a file from my ipad through a comoputer without having to put in my ipad password

    I have forgotten my ipad password and now i cannot get to the file i need, which is a play write that is due as a school assignment on 16/06/14
    Need help urgently!
    Help would be much apreciated

    If you sync with iTunes, you may be able to restore the iPad using the computer that you sync with in order to restore the device and you may not lose anything at all.
    Take a look at this.
    iOS: Forgot passcode or device disabled - Apple Support
    If that doesn't work, there is no built in way to extract files from the iPad anyway. A third party software would be needed to do that.
    I have never used this, but I have seen it discussed on the forum.
    iPhone Backup Extractor for Windows and Mac - Recover ...

  • Is it possible for your iphone to be hacked so that someone can text message people in your contacts (and send pictures)? If so can you trace the hack and how can you stop it?

    Is it possible for your iphone to be hacked?so that someone can text message people in your contacts (and send pictures)? If so can you trace the hack and how can you stop it?

    As has been said, the iPhone itself can't be hacked this way, as far as anyone currently knows.
    Your Apple ID is another story. Any kind of online accounts can be hacked, and Apple IDs are no exception. If someone hacks your Apple ID, they could see all the data in the associated iCloud account, such as contacts, and could send those contacts texts that would appear to come from you. If that were to happen, you should see an alert on your other devices that your Apple ID is being used with Messages on a new device.
    If you have not seen that alert, it's unlikely that this problem is occurring due to such a hack. In that case, it would be more likely that either someone has gotten their hands on your phone, or some other Apple device registered to your Apple ID, and has used it to send that message. Or that the person claiming you sent a picture is lying for some reason.
    If you believe your Apple ID may have been hacked, you should change your password immediately (at appleid.apple.com). You should also seriously consider enabling two-factor authentication on your Apple ID.

  • Is it possible for my email to be hacked through my phone and pictures to be sent

    Is it possible for my iPhone to be hacked and messages to be sent out through my email attaching pictures to the sent message?

    Not unless your phone is jailbroken. It is possible for email to be hacked, but not directly on the phone, it would be through the server. Of course, if someone had possession of your device, they could get into your mail.

  • Is it possible for your iphone to be hacked so that someone can text message people in your contacts (and send pictures)? If so can you trace the hack

    Is it possible for your iphone to be hacked so that someone can text message people in your contacts (and send pictures)? If so can you trace the hack and how can you stop it?

    Ugh I am not doing any of those things.
    I do have alot of issues with my email getting hacked often, could that have anything to do with it?
    I also do not believe my phone is jailbroken but to be honest I am not very smart with this.
    Basically text messages (inappropriate) were sent to a person in my contacts...and a text message conversation was had for about 30 that I had no idea was even going on. I noticed it on my ipad later (they are synced and normally recieve all the same messages etc). The conversation then just ended out of no where.
    Very odd...and I am nervous that someone has control over my phone.

  • How to use the same services-config for the local and remote servers.

    My flex project works fine using the below but when I upload my flash file to the server I doesn't work, all the relative paths and files are the same execpt the remote one is a linux server.
    <?xml version="1.0" encoding="UTF-8"?>
    <services-config>
        <services>
            <service id="amfphp-flashremoting-service"
                class="flex.messaging.services.RemotingService"
                messageTypes="flex.messaging.messages.RemotingMessage">
                <destination id="amfphp">
                    <channels>
                        <channel ref="my-amfphp"/>
                    </channels>
                    <properties>
                        <source>*</source>
                    </properties>
                </destination>
            </service>
        </services>
        <channels>
        <channel-definition id="my-amfphp" class="mx.messaging.channels.AMFChannel">
            <endpoint uri="http://localhost/domainn.org/amfphp/gateway.php" class="flex.messaging.endpoints.AMFEndpoint"/>
        </channel-definition>
        </channels>
    </services-config>
    I think the problem  is the line
            <endpoint uri="http://localhost/domainn.org/amfphp/gateway.php" class="flex.messaging.endpoints.AMFEndpoint"/>
    but I'm not sure how to use the same services-config for the local and remote servers.

    paul.williams wrote:
    You are confusing "served from a web-server" with "compiled on a web-server". Served from a web-server means you are downloading a file from the web-server, it does not necessarily mean that the files has been generated / compiled on the server.
    The server.name and server.port tokens are replaced at runtime (ie. on the client when the swf has been downloaded and is running) not compile time (ie. while mxmlc / ant / wet-tier compiler is running). You do not need to compile on the server to take advantage of this.
    Hi Paul,
    In Flex, there is feature that lets developer to put all service-config.xml file configuration information into swf file. with
    -services=path/to/services-config.xml
    IF
    services-config.xml
    have tokens in it and user have not specified additional
    -context-root
    and this swf file is not served from web-app-server (like tomcat for example) than it will not work,
    Flash player have no possible way to replace token values of service-config.xml file durring runtime if that service-config.xml file have been baked into swf file during compilation,
    for example during development you can launch your swf file from your browser with file// protocol and still be able to access blazeDS services if
    -services=path/to/services-config.xml
    have been specified durring compilation.
    I dont know any better way to exmplain this, but in summary there is two places that you can tell swf  about service confogiration,
    1) pass -services=path/to/services-config.xml  parameter to compiler this way you tell swf file up front about all that good stuff,
    or 2) you put that file on the webserver( in this case, yes you should have replacement tokens in that file) and they will be repaced at runtime .

  • Is it possible for a process to participate in two separate clusters

    Is it possible for a process to participate in two separate clusters? For example if our application would like to get market data in one cluster that has a separate multicast address, and post order in another.

    The easiest way for a client to access multiple clusters is via Coherence*Extend:
         http://wiki.tangosol.com/display/COH33UG/Configuring+and+Using+Coherence*Extend
         The client would not be a member of the cluster, instead it would connect to the cluster via a proxy node that is in the cluster. Using <remote-cache-scheme>, you can configure a cache to point to one proxy (in cluster A) and have another cache point to another proxy (in cluster B.)
         Thanks,
         Patrick Peralta

  • Is it possible someone hacks my iphone and steal info when i am in wifi network ??

    I am an iPhone users and i am fearing of someone at workplace , they know technology more than i do , i posted the question above if someone can answer my question plz.
    i am worrying there is an application that allows people hack my iphone and have been known it at workplace when i am in wifi network ?
    thanks for your feedback
    tonytran365

    Is your device jailbroken?  If so, it's possible.
    If the device is not jailbroken, it is not possible for the device to be hacked.

  • I wonder if it is possible to hack the iphone. because a friend received a bad message me and I never send the messenger .. Is  someone please help me understand?

    I wonder if it is possible to hack the iphone? because a friend received a bad message me and i never send the messenger. is someone please help me

    It wasn't your iPhone that was hacked, but your email account (or
    messaging account) that was hacked. Immediately change all your
    passwords for such accounts.

  • Is it possible for an ipad camera  to have a virus?

    On my ipad a message opened it said your " ipad camara has 3 virus,If you want to remove this virus you can click below" it also said  if you don't do this your ipad camera photos might be hacked .is it possible for an ipad camera to have a virus please respond and leave tips to remove this virus

    This is just a website scam that's going around right now. It cannot infect you in any way.
    Some people have reported being directed to the App Store to download a particular camera app. If you are, do not download it. It cannot infect you with anything, but you don't want to reward the scammers by downloading their app. If you downloaded the app and paid money for it, contact Apple to dispute the charge.

  • Is it possible for the Touch to work with Airport and play music wirelessly

    Is it possible for the Touch to transmit music via the Airport Extreme to my Hi Fi?

    No. But you can use it as a remote control for a current Mac - AirTunes -Airport Express setup with Remote Buddy (link). 
    The Airport Extreme Base Station doesn't have an audio facility:
    http://www.ifelix.co.uk/tech/1301.html
    regards
    mrtotes
    Message was edited by: mrtotes: Thanks Deggie!!! Must concentrate more and not have so many tabs open! RSully. When you car has stopped moving you keep it that way using a....
    Message was edited by: mrtotes

  • Is it possible for JMF to monitor RTCP packet from another application?

    Hello Everybody.
    I'm developing an application that will gather statistics in Live Streaming transmissions.
    For that, I'll get bandwidth use and RTCP packets so I can put in a graphic packet loss and other relevant data that are put into RTCP Packet.
    I wanted to know if it's possible for JMF to monitor an existing stream (not created by the Java program), so I can use in my application (Java-based).
    Thanks a lot for the attention.
    Cheers,
    Bentow.

    Bentow wrote:
    And, what about a class that it have in the com.sun.media.rtp package? RTCPPacket?
    It doesn't have any docs about it. The problem is the the parent type is Packet, but different than the one, that in this case is used by the JPCAP. :(Like I said, JMF has the code in there to parse RTCP packets. But they aren't a peice of JMF you're supposed to be using. You'll just have to hack and slash to try to get something working with it. ;-)

  • Is it possible for apple support to locate the last location of an iPad when it was online? We list an iPad and it shows offline on the iCloud find app.

    Is it possible for Apple to provide the last location of an iPad when it was online. We lost an iPad and it is showing offline on iCloud find app.

    If the iPad was running iOS 7, the thief/finder will not ever be able to use it.
    iCloud: Find My iPhone Activation Lock in iOS 7
    http://support.apple.com/kb/HT5818
    Apple (and no one else) can not assist (with serial number or iCloud) in finding a lost or stolen iPad.
    Report to police along with serial number. Change all your passwords.
    These links may be helpful.
    How to Track and Report Stolen iPad
    http://www.ipadastic.com/tutorials/how-to-track-and-report-stolen-ipad
    Reporting a lost or stolen Apple product
    http://support.apple.com/kb/ht2526
    What to do if your iOS device is lost or stolen
    http://support.apple.com/kb/HT5668
    How to Find a Missing iPad with FindMyiPad
    http://www.dummies.com/how-to/content/how-to-find-a-missing-ipad-with-findmyipad .html
    iCloud: Locate your device on a map
    http://support.apple.com/kb/PH2698
    iCloud: Lost Mode - Lock and Trace
    http://support.apple.com/kb/PH2700
    iCloud: Remotely Erase your device
    http://support.apple.com/kb/PH2701
    Report Stolen iPad Tips and iPad Theft Prevention
    http://www.stolen-property.com/report-stolen-ipad.php
    General steps to follow for a Stolen iPad
    http://stolen-ipad.com/
    How to recover a lost or stolen iPad
    http://ipadhelp.com/ipad-help/how-to-recover-a-lost-or-stolen-ipad/
    How to Find a Stolen iPad
    http://www.ehow.com/how_7586429_stolen-ipad.html
    What NOT to do if your iPhone or iPad is lost or stolen
    http://www.tomahaiku.com/what-not-to-do-if-your-iphone-or-ipad-lost-or-stolen/
    Apple Product Lost or Stolen
    http://sites.google.com/site/appleclubfhs/support/advice-and-articles/lost-or-st Len
    Oops! iForgot My New iPad On the Plane; Now What?
    http://online.wsj.com/article/SB10001424052702303459004577362194012634000.html
    If you don't know your lost/stolen iPad's serial number, use the instructions below. The S/N is also on the iPad's box.
    How to Find Your iPad Serial Number
    http://www.ipadastic.com/tutorials/how-to-find-your-ipad-serial-number
    iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number
    http://support.apple.com/kb/HT4061
    Check the serial number (located on back/bottom) in this lost/stolen iPad database. However, most owners are not aware of this database and don’t enter the serial number.
    Stolen iPad Database
    http://www.stolenlostfound.org/online-stolen-ipad-database
    Also do a search, using the serial number, on your local Craig’s List. Some users list the serial number of a stolen iPad to thwart the sale of a stolen device.
     Cheers, Tom

  • Is it possible for an iPhone to become compromised?

    I accidently clicked on a sketchy link to a website in a message from a social media app. The link opened up in Safari and was just blank.  I just want to know if it would be possible for my phone to be hacked. And if so, what can I do to remove any malware. Thank you.

    not unless it's jail broken
    the whole app store way iOS handle things mean that you can only! get new software into the device
    from app store not from websites not from mails software include malware

  • PO 'No goods receipt possible for purchase order'

    Hi gurus!
    While trying to make Confirmation of a PO in the SRM Portal the user is getting the error 'No goods receipt possible for purchase order'
    The scenario used is Classic, so PO is replicated directly to the R/3 system.
    Any idea why this is happening?
    Thanks a lot!

    Hi, thanks for the quick reply!
    Where i can check the Item category?
    I found a field called 'subitem category' but it's blank
    with this possible values:
    1 Variant                               
    2 Discount in kind: inclusive bonus qty.
    3 Empties                               
    4 Discount in kind: exclusive bonus qty.
    5 Prepack item                          
    6 Display item                          
    7 Set item                              
    8 Interchangeable items (IBU: A&D)      
    9 Pre-packing (SLS items)               
    H GT Bill of Material, Header Relevant  
    I GT Bill of Material, Item Relevant    
    About PO type i think it's EC (doc_type?), in R/3 is shown as EBP PO
    I checked in backend system, in the item details > Delivery and the 'Goods Receipt' is checked.

Maybe you are looking for

  • 0FI_AR_4 Initilaization issues

    Hi All, I was going thru messages on and found quite a few messages on this the below was the the closest to our issue. We have around 5 million records to be pulled. 0FI_AR_4 - Slow Sequential Read in ECC on Initial Load Also iIdid read that we have

  • IPhone 4 does not detect anything on Bluetooth

    My iPhone 4 has appearantly a glitch in hardware...??? I turn on bluetooth and it can search for devices till the battery runs out and that's it. I don't think that this is a software error, as there are plenty of iP4's amongst my friends who don't e

  • Disk will not install

    I purchased a new computer and disk will not work read to install product

  • E71 Memory Full Problem

    Hi, I have brand new Nokia E71 White with latest firmware available on NSU (110.07.127, 09-10-2008). After few days of using it I found out that I cannot use "HELP" option from Nokia main menu and trying to realize what is the problem I discovered th

  • Moving around au-plugins on the interface

    Hey all, wanted to know if there is a way to move au-plugins around once they are pulled up on the screen, blocking my veiw & workflow. Any help would be great. Thanks, Jim.