KeyChain Hack

Hi Guys,
Last week I recieved a received a spam message (that I thought was legit, from a friend). Not long after I begain to notice some very odd
behaviour from my iPhone 3Gs (I was on 4.3.3). My passwords all disappeared, networks were forgotten, my title bar would change, and it would take
about 12-15 minutes to boot up (!!!). Anyways, this weekend I finally got around to upgrading to iOS 5.0.1, and think I have got rid of the KeyChain malware,
but I had notice after the restore my iTunes password was not working. When I reset it, I logged in and found all of my credits (about $25 worth) were gone!
(very glad I didn't have a CC on file!!)
Anyways, how can I contact Apple to get them to investigate all activity on my account after a certain date?
Obviously I'd like to get the credit back, but given how simply my phone was hijacked, I'm extremely reluctant to purchase more..
Cheers,
G-9629410

Your phone was not hijacked unless it was jailbroken, your computer was. There is no known malware for unhacked iPhones. Email iTunes Store support about the credit, and change ALL of your passwords after running a full virus scan on your computer.
If it WAS jailbroken then it might have been infected, but you took the risk jailbreaking it. http://support.apple.com/kb/HT3743

Similar Messages

  • I have a macbook air.. Can someone hack my keychain access through an email download attachment link?

    I own a Macbook air.. I have just recently went into my gmail account and opened an email from a person that was interested in buying an item that I was selling from craigslist. The email sounded legit, not like a scam.. I usually can spot those out. So then I happen to notice an attachment download link at the bottom, like it was a picture or something. So I opened it, and all of a sudden this "set of keys icon" popped up and starting showing all of my passwords, and certficates, and files from my computer... i went and googled what the keys meant, and it is my computer keychain access.. Which stores and backs up all of my login in passwords and informtion, and administrative options for the computer.. What I am wondering is why would this have opened up as soon as I opened a random email? Am I being hacked for all of my login information, and passwords? Can he access all of what this "Keychain access" is showing me? I am kind of scared and nervous now, because I have never since I have owned this laptop, seen this kind of thing before, expecially opening it up in an email. Please someone, can you give me answers to my concerns. Thank You. Julia.

    That was an S/MIME cryptographic signature. The Keychain Access application opened so you could add the sender's public key to your keychain. It's not hacking.

  • My keychain appears to be hacked and is not letting me sign in into iCloud on my mac

    Hi, my computer suddenly restarted, and when I started using it I realized that it logged me out from icloud and mail, and my saved passwords were all deleted. I tried restoring the software, created anoher apple id, but the problems are still there. Every time I try to log into icloud, it appears a message that says "keychain "login" cannot be foud to store. 1001356192". I also tried restoring keychain from the application utility, but it also didn't work. Thank you.

    You don't have a PPC Mac.  10.8.4 only runs on Intel Macs.    I've requested this post get moved so someone can answer your question who would know.  PPC is shorthand for PowerPC, the processor found on pre-2006 Macs.

  • I need to erase the contents of my phone and restore to factory settings. Does anybody know how to save your texts so you don't lose them?  Can I back those up to iCloud?  My phone was very likely hacked (Apple's advice was to call the police!)

    "I need to erase the contents of my phone and restore to factory settings. Does anybody know how to save your texts so you don't lose them?  Can I back those up to iCloud?  My phone was very likely hacked (Apple's advice was to call the police!)"
    That was all I could put in the initial "box."  Then it brought me to this page with instructions on how to write a good sentence.
    Proceeding ...
    After going back and forth between Apple, AT&T and the police (all telling me to go to the other two) I took AT&Ts suggestion and got a new number. One tech warned against doing a backup, especially on my Mac, saying if my phone had been hacked then whatever bug was there would then invade my computer. But nobody knows how to determine if the phone has been hacked or a virus was planted there. Unfortunately I know who would have reason to do such a thing and all I can say is that he is at the top technologically and could easily do it. Almost impossible to prove, however.
    So I need to preserve my text messages and my emails as well. I backed up my photos to that Microsoft product (One-Drive) and it froze (Surprise, Surprise) with four short videos to go, and no way of stopping that (when I tried it crashed repeatedly) so I'm in crisis mode here.
    Help ...
    Running 8.0 on 5S
    Thanks!

    Betty I don't know if you fixed your hacking problem but I feel your pain. I've seen some strange things going on between my iMac and my iPhone and Apple has told me the same thing, call the police which I have done. The hackers have stole 500.00 out of my checking account have access to every internet account I use and no matter how often I change the password their right back on the account. I closed my FB account 3 times only to have someone reopen it. Right now I've got a link in my reading list (Safari) that if I click on it, it allows me to log onto my FB account anonymously.
    I've seen a green folder come out of no where while I was trying to delete my passwords out of keychain when that green folder was put into the key chain I was immediately locked out. I than went into system preferences to try to make changes to my security settings, when I clicked on the icon it wouldn't open. I've seen log files of automator receiving commands and sending out my personal information thats on my computer.
    I have a legitamate program called iExplorer that allows you to look at the contents of your iPhone back ups and saw a transaction someone made at the Apple store for some full length movies, some albums, ibooks and other apps but when I called the iTunes store and they said none of those items were showing up on my account. If their not on my account how can they be on my iPhone 6? One day someone was using my gmail account and unknowingly used google maps to search for an Italian restaurant, than a Mexican restaurant than a coffee shop and their search showed up on my iPhone but I didn't have my gmail account installed on my iPhone 6. Using my computer I logged onto my gmail account and looked at the maps history and sure enough there were the searches when I'd hover my curser over the link it gave me the longitude and latitude of the where the hacker was when he was using google maps. I know whoever reads this thinks Im crazy but I've documented everything and can prove the things that I have mentioned in this post actually happened.
    One day I had my laptop (pc) and my iMac next to each other as I was using both. when I clicked on airport it showed that my laptop and my iMac had made a connection and were actually communicating with each other. I know I didn't do it I don't know how. The iMac was logged into my iCloud account while my laptop wasn't. I have formatted my iPhone at least a dozen times, Apple and an Apple retailer have formatted my hard drive not to mention the numerous times I have formatted it but the hackers keep getting on my devices. Im formatting my lap top at this very second because during the course of the night I left the ethernet cable plugged into it and they locked me out of my c: drive, and configured the system so I can't download any updates from Microsoft, overtime I type in www.microsoft.com it changes to ww38.microsoft.com which takes me to a blank page. I right clicked on the page I was redirected to and read the java script and couldn't believe that someone had actually configured Internet Explorer to redirect me to a blank page when I tried to go to Microsoft. Apples answer to all this is there was nothing wrong with my iPhone or my iMac and if I thought there was a problem to call the police which I have done.
    Theres no doubt the hackers are reading this while I type it or will read it and I simply don't care anymore. I no longer email anyone, don't use my iCloud account and have taken precautions to protect my credit but if I ever find out who has invaded my privacy to this extreme the police are going to want to talk to me because Im going to hurt them like they've never been hurt before

  • My girlfriends ex left this Mac computer behind on PURPOSE!  Can her ex still operate this computer?  I don't know the default keychain password or how to find it

    Ok...so I am REALLY new to this whole Mac thing and my girlfriend knows less than I do about computers and phones, etc.  but I have been using her Mac computer and thought how cool it was until I synced my iphone to it and all of her ex's apps went on my phone so then I tried to find out how to get her ex's name and info off the computer and realized that just because the log in name is my girlfriends name...the computers name and all HIDDEN passwords and HIDDEN dates of when things have been changed.
    Can this person have access to anything I have done on that computer?
    How do I find the default keychain login?
    How can I assure she cannot get any files or ANYTHING off this computer?
    My girlfriend doesn't really want to lose her files like photos and iTunes but I am assuming since my girlfriend wasn't really ever the one "truly" logging in....
    I don't know.
    Need help for dummies here!

    They were together living in this house for 7 years.  My girlfriend purchases the Mac.  Her girlfriend sets up the Mac.  They mutually break up and her girlfriend says "I put the computer in YOUR name" so don't worry... Go ahead and use it.  When I say she left it behind on purpose what I mean is the computer is in the ex's name bc she PUT it in her name ...like all the cloud stuff.  And sub accounts are in my gf's name...like ....user login.  But my gfs not really the administrator of this computer and her ex has 3 macs of her own that I (THINK) are attached to this "system".
    I am SO new at this that I JUST created an account on this website to try to get help.  I own a business and have been using this computer not knowing that my girlfriend isn't the one who set her own computer up.  I know nothing about a Mac.  I don't know if someone who has another Mac on the system can transfer files?  I have been logging onto the computer under my gf's user name and password just to access what in my mind is known as the regular Internet.  My gmail...my business email login...passwords...bank account, ect.
    I just want to ensure she can't access MY stuff.  I don't care about HER stuff!
    I'm not a hacker!  ****....I didn't even know how to open up a new tab on the freaking thing until just a few months ago!  Lol

  • How do i make Keychain stop asking for my PW when I launch Entourage?

    I have really never had to do anything with Keychain, ever since I started using OSX back in the 10.2.x days.
    I just used my computer. No problem; it's a Mac!   I kind of had a vague idea what Keychain was, but i really never interacted with it.
    Same was true when I upgraded my non-Intel Powerbook from 10.3.9 to 10.5.8.  Things went fine, for over a year.
    But I recently had occasion to wipe my HD and reinstall 10.5.8.
    Now, keychain asks for my login admin password every time I launch Entourage.
    And no matter how many times i type it in, it never remembers.
    That's a pain, and I have no clue how to make it stop doing that.
    When I open the Keychain access utility and click on Help to try and learn what Keychain is all about, nothing happens.  That's no help!
    When I run Keychain Repair, it says everything is verified, and repair says there's nothing to repair.
    Within the keychain access utility, i see a list of references to many of the passwords that I entered over the past several years and the sites I used them on.
    Are all those passwords with their matching URLs stored somewhere on my Mac?  I have always religiously NOT done this, for obvious reasons. 
    Makes me kind of uneasy, 'encrypted' or not.  I'm always skeptical of the "trust me..." approach to computer security.
    (If hackers can hack into the Defense Dept., the average Mac would seem to be a piece of cake.)
    ...Altho I suppose that could be a good argument for having DoD switch over to Macs....:-)
    Anyway, keychain for me is a mystery wrapped in an enigma, and it has now become a bit of an annoyance and an inconvenience.
    Whenever I need annoyances and inconveniences, I can always get those at work...on my Windows PC.
    So how do I get Keychain to stop asking me for my Admin username/password every time I launch Entourage?

    Hello,
    >Are all those passwords with their matching URLs stored somewhere on my Mac?
    Yes, that IS the Keychain.
    Mac OS X 10.4: Keychain Access asks for keychain "login" after changing login password...
    http://support.apple.com/kb/HT1631
    Resetting your keychain in Mac OS X...
    If Keychain First Aid finds an issue that it cannot repair, or if you do not know your keychain password, you may need to reset your keychain.
    http://support.apple.com/kb/TS1544
    And finally...
    Keychain is no longer able to update itself when I upgrade an application...
    http://unsanity.org/archives/2007_01.php
    >Makes me kind of uneasy, 'encrypted' or not.  I'm always skeptical of the "trust me..." approach to computer security.
    But if it didn't you be bothered to put in hundrefds of usernames & Passwords a day most likely.

  • Think my email has been hacked need help??

    i use outlook web page to check my emails but yester day i had delivery failures which was unusual as i didnt send anything.. i went to log in today and it said there is somebody trying to use my email aswell
    does anybody know how this has happened?? is it anything to do with malware?
    and how do i stopit from happening
    thanks in advance

    Your mail account has almost certainly been hacked on the server, not on your computer, unless someone has had access to the latter.
    Log in to the mail server's web interface and change the password. If you use the same password for any other accounts, change those passwords too, and make them all different. Internet passwords should be random strings of at least 10 characters. You most likely don't need to, and should not be able to, remember them. They should be saved in your keychain and backed up with the rest of your data.
    One way to generate a secure password is the following. Triple-click anywhere the line below on this page to select it:
    openssl rand -base64 10 | cut -c-14 | open -f -a TextEdit
    Copy the selected line to the clipboard (command-C). Launch the Terminal application and paste into the window that opens (command-V). A string of 14 random characters will appear in a TextEdit window. Use that string, or a substring, as the password. To generate another random string, press the up-arrow key and then the return key with the Terminal window active. You can then quit Terminal.
    If the compromised account is on Gmail, then changing the password may not be enough. Follow all of Google'sinstructions to secure it.

  • Was my computer hacked into?

    I was away from my computer for several hours while there was a party at my house. When I came back, my computer had restarted which I thought was odd. I looked at the time and it was the current time. Normally, it states the last time that I was using the computer. I went into the console and looked at times and saw that it had been accessed or maybe not. It was not normal. Can anyone tell me what went on with my computer? Did someone break into my computer. I've copied and pasted from the console but I have no idea what anything means. Any help would be apprecaited.
    May 27 17:55:25 Bills-MacBook applepushserviced[55]: <APSCourier: 0x107d34900>: Stream error occurred for <APSTCPStream: 0x107d456a0>: The operation couldn’t be completed. (kCFErrorDomainCFNetwork error 2.)
    May 27 17:55:25: --- last message repeated 1 time ---
    May 27 17:55:25 Bills-MacBook Contactizer Helper[217]: >>> check unfired alarms... 2012-05-27 06:03:22 +0000
    May 27 17:55:25: --- last message repeated 1 time ---
    May 27 17:55:25 Bills-MacBook Contactizer Helper[217]: >>> check unfired alarms... 2012-05-27 08:55:25 +0000
    May 27 17:55:25: --- last message repeated 1 time ---
    May 27 17:55:25 Bills-MacBook UserEventAgent[11]: CaptiveNetworkSupport:CaptivePublishState:1211 en1 - PreProbe
    May 27 17:55:25 Bills-MacBook configd[14]: network configuration changed.
    May 27 17:56:00 localhost bootlog[0]: BOOT_TIME 1338108960 0
    May 27 17:56:26 localhost fseventsd[13]: event logs in /.fseventsd out of sync with volume. destroying old logs. (2331617 25 2331676)
    May 27 17:56:04 localhost com.apple.launchd[1]: *** launchd[1] has started up. ***
    May 27 17:56:26 localhost com.apple.launchd[1] (com.apple.sandboxd): Unknown value for key POSIXSpawnType: Interactive
    May 27 17:56:34 localhost com.apple.launchd[1] (com.smithmicro.schedulerdaemon[55]): posix_spawn("/Library/Smith Micro/Common/schedulerdaemon", ...): No such file or directory
    May 27 17:56:35 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon[56]): posix_spawn("/Library/Intego/virusbarrier.bundle/Contents/MacOS/virusbarriers", ...): No such file or directory
    May 27 17:56:35 localhost com.apple.launchd[1] (com.smithmicro.schedulerdaemon[55]): Exited with code: 1
    May 27 17:56:35 localhost com.apple.launchd[1] (com.smithmicro.schedulerdaemon): Throttling respawn: Will start in 10 seconds
    May 27 17:56:35 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon[57]): posix_spawn("/Library/Intego/virusbarrier.bundle/Contents/MacOS/tool_launcher", ...): No such file or directory
    May 27 17:56:35 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon[56]): Exited with code: 1
    May 27 17:56:35 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon): Throttling respawn: Will start in 10 seconds
    May 27 17:56:35 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon[57]): Exited with code: 1
    May 27 17:56:35 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon): Throttling respawn: Will start in 10 seconds
    May 27 17:56:35 localhost com.apple.ucupdate.plist[25]: ucupdate: Checked 1 update, no match found.
    May 27 17:56:35 localhost com.apple.pfctl[34]: No ALTQ support in kernel
    May 27 17:56:35 localhost com.apple.pfctl[34]: ALTQ related functions disabled
    May 27 17:56:36 localhost fseventsd[13]: implementation_register_rpc: implementation_added_client() => 22
    May 27 17:56:36 localhost com.apple.UserEventAgent-System[11]: 2012-05-27 17:56 UserEventAgent[11] (CarbonCore.framework) FSEventStreamStart: register_with_server: ERROR: f2d_register_rpc() => (null) (-21)
    May 27 17:56:36 localhost UserEventAgent[11]: starting CaptiveNetworkSupport as SystemEventAgent built Jun 13 2011 17:29:21
    May 27 17:56:36 localhost UserEventAgent[11]: CaptiveNetworkSupport:CreateInterfaceWatchList:2788 WiFi Devices Found.
    May 27 17:56:36 localhost UserEventAgent[11]: CaptiveNetworkSupport:CaptivePublishState:1211 en1 - PreProbe
    May 27 17:56:36 localhost UserEventAgent[11]: CaptiveNetworkSupport:CaptiveSCRebuildCache:81 Failed to get service order
    May 27 17:56:47: --- last message repeated 1 time ---
    May 27 17:56:36 localhost UserEventAgent[11]: CaptiveNetworkSupport:CaptivePublishState:1211 en1 - PreProbe
    May 27 17:56:36 localhost UserEventAgent[11]: CaptiveNetworkSupport:CaptiveSCRebuildCache:81 Failed to get service order
    May 27 17:56:47: --- last message repeated 1 time ---
    May 27 17:56:36 localhost UserEventAgent[11]: CertsKeychainMonitor: configuring
    May 27 17:56:37 localhost com.apple.kextd[10]: Can't load /System/Library/Extensions/ManyCamDriver.kext - no code for running kernel's architecture.
    May 27 17:56:37 localhost com.apple.kextd[10]: Load com.manycamllc.driver.ManyCamDriver failed; removing personalities from kernel.
    May 27 17:56:37 localhost com.apple.launchd[1] (com.smithmicro.schedulerdaemon): Throttling respawn: Will start in 8 seconds
    May 27 17:56:37 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon): Throttling respawn: Will start in 8 seconds
    May 27 17:56:37 localhost com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon): Throttling respawn: Will start in 8 seconds
    May 27 17:56:39 localhost com.apple.usbmuxd[24]: usbmuxd-268.5 on Jan  5 2012 at 03:34:01, running 64 bit
    May 27 17:56:39 localhost mDNSResponder[37]: mDNSResponder mDNSResponder-320.14.0 (Nov 16 2011 01:16:56) starting OSXVers 11
    May 27 17:56:43 localhost mds[36]: (Normal) FMW: FMW 0 0
    May 27 17:56:53 localhost systemkeychain[81]: done file: /var/run/systemkeychaincheck.done
    May 27 17:56:53 localhost mDNSResponder[37]: D2D_IPC: Loaded
    May 27 17:56:53 localhost mDNSResponder[37]: D2DInitialize succeeded
    May 27 17:56:53 localhost UserEventAgent[11]: ServermgrdRegistration cannot load config data
    May 27 17:56:54 localhost fseventsd[13]: implementation_register_rpc: implementation_added_client() => 22
    May 27 17:56:54 localhost com.apple.xpchelper.00000000-0000-0000-0000-000000000000[74]: 2012-05-27 17:56 xpchelper[74] (CarbonCore.framework) FSEventStreamStart: register_with_server: ERROR: f2d_register_rpc() => (null) (-21)
    May 27 17:56:54 localhost airportd[73]: _processDLILEvent: en1 attached (down)
    May 27 17:56:54 localhost UserEventAgent[11]: CaptiveNetworkSupport:CaptiveSCRebuildCache:81 Failed to get service order
    May 27 17:56:54: --- last message repeated 1 time ---
    May 27 17:56:54 localhost UserEventAgent[11]: CaptiveNetworkSupport:CaptivePublishState:1211 en1 - PreProbe
    May 27 17:56:55 localhost configd[16]: bootp_session_transmit: bpf_write(en1) failed: Network is down (50)
    May 27 17:56:55 localhost configd[16]: DHCP en1: INIT transmit failed
    May 27 17:56:55 localhost configd[16]: network configuration changed.
    May 27 17:56:55 Bills-MacBook configd[16]: setting hostname to "Bills-MacBook.local"
    May 27 17:56:57 Bills-MacBook com.apple.SystemStarter[26]: Starting ProTec6b Daemon
    May 27 17:56:57 Bills-MacBook com.apple.SystemStarter[26]: Starting ProTec6 Server
    May 27 17:56:57 Bills-MacBook fseventsd[13]: log dir: /.fseventsd getting new uuid: CB5F171C-7F8F-436E-9045-B6518A992710
    May 27 17:56:57 Bills-MacBook UserEventAgent[11]: get_backup_share_points no AFP
    May 27 17:56:57 Bills-MacBook loginwindow[39]: Login Window Application Started
    May 27 17:56:57 Bills-MacBook netbiosd[95]: Unable to start NetBIOS name service:
    May 27 17:56:58 Bills-MacBook rpcsvchost[119]: sandbox_init: com.apple.msrpc.netlogon.sb succeeded
    May 27 17:56:59 Bills-MacBook Nalpeirond6[106]: /Library/StartupItems/ProTec6/Nalpeirond6: daemon has successfully started
    May 27 17:56:59 Bills-MacBook Nalpeirond6b[104]: /Library/StartupItems/ProTec6b/Nalpeirond6b: daemon has successfully started
    May 27 17:57:00 Bills-MacBook loginwindow[39]: **DMPROXY** Found `/System/Library/CoreServices/DMProxy'.
    May 27 17:57:01 Bills-MacBook com.apple.launchctl.LoginWindow[135]: com.apple.findmymacmessenger: Already loaded
    May 27 17:57:01 Bills-MacBook loginwindow[39]: Login Window Started Security Agent
    May 27 17:57:01 Bills-MacBook airportd[73]: _doAutoJoin: Already associated to “Bill Hunter's Guest Network”. Bailing on auto-join.
    May 27 17:57:01 Bills-MacBook SecurityAgent[142]: Echo enabled
    May 27 17:57:02 Bills-MacBook WindowServer[113]: kCGErrorFailure: Set a breakpoint @ CGErrorBreakpoint() to catch errors as they are logged.
    May 27 17:57:02 Bills-MacBook mds[36]: (/.Spotlight-V100/Store-V2/6707F1C6-8C95-4BF4-A95E-07731C5920A1)(Error) IndexPath in openReverseStore:Successfully recovered from shadow with state d00d0dd0
    May 27 17:57:04 Bills-MacBook configd[16]: network configuration changed.
    May 27 17:57:04 Bills-MacBook UserEventAgent[11]: CaptiveNetworkSupport:CaptivePublishState:1211 en1 - Probe
    May 27 17:57:04 Bills-MacBook UserEventAgent[11]: CaptiveNetworkSupport:CNSPreferencesBuildSSIDLookup:278 ssidLookup:
    May 27 17:57:04 Bills-MacBook UserEventAgent[11]:   flypdx
    May 27 17:57:04 Bills-MacBook UserEventAgent[11]:       0 : com.apple.cnstest
    May 27 17:57:04 Bills-MacBook UserEventAgent[11]: CaptiveNetworkSupport:CaptiveStartDetect:2343 Bypassing probe on Bill Hunter's Guest Network because it is protected and not on the exception list
    May 27 17:57:04 Bills-MacBook UserEventAgent[11]: CaptiveNetworkSupport:CaptivePublishState:1211 en1 - Unknown
    May 27 17:57:04 Bills-MacBook configd[16]: network configuration changed.
    May 27 17:57:05 Bills-MacBook ntpd[20]: proto: precision = 1.000 usec
    May 27 17:57:06 Bills-MacBook UserEventAgent[11]: CertsKeychainMonitor: ready to process keychain & timer events
    May 27 17:57:16 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:31: --- last message repeated 4 times ---
    May 27 17:57:31 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:57:31 Bills-MacBook SecurityAgent[142]: kCGErrorFailure: Set a breakpoint @ CGErrorBreakpoint() to catch errors as they are logged.
    May 27 17:57:31 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:31 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:57:33: --- last message repeated 1 time ---
    May 27 17:57:33 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:36 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:57:36 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:38 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:57:38 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:38 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon[178]): posix_spawn("/Library/Intego/virusbarrier.bundle/Contents/MacOS/tool_launcher", ...): No such file or directory
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.smithmicro.schedulerdaemon[179]): posix_spawn("/Library/Smith Micro/Common/schedulerdaemon", ...): No such file or directory
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon[180]): posix_spawn("/Library/Intego/virusbarrier.bundle/Contents/MacOS/virusbarriers", ...): No such file or directory
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon[178]): Exited with code: 1
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon): Throttling respawn: Will start in 10 seconds
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.smithmicro.schedulerdaemon[179]): Exited with code: 1
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.smithmicro.schedulerdaemon): Throttling respawn: Will start in 10 seconds
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon[180]): Exited with code: 1
    May 27 17:58:15 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon): Throttling respawn: Will start in 10 seconds
    May 27 17:59:03 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:03 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:05 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:05 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:10 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:10 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:29 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:29 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:37 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:37 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:39 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:39 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:42 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:42 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:43 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:43 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:45 Bills-MacBook SecurityAgent[142]: kCGErrorInvalidOperation: CGSOrderWindowList
    May 27 17:59:46 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon[225]): posix_spawn("/Library/Intego/virusbarrier.bundle/Contents/MacOS/virusbarriers", ...): No such file or directory
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.smithmicro.schedulerdaemon[226]): posix_spawn("/Library/Smith Micro/Common/schedulerdaemon", ...): No such file or directory
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon[227]): posix_spawn("/Library/Intego/virusbarrier.bundle/Contents/MacOS/tool_launcher", ...): No such file or directory
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon[225]): Exited with code: 1
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.scanner.daemon): Throttling respawn: Will start in 10 seconds
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.smithmicro.schedulerdaemon[226]): Exited with code: 1
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.smithmicro.schedulerdaemon): Throttling respawn: Will start in 10 seconds
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon[227]): Exited with code: 1
    May 27 17:59:56 Bills-MacBook com.apple.launchd[1] (com.intego.VirusBarrierX6.daemon): Throttling respawn: Will start in 10 seconds
    May 27 21:30:31 Bills-MacBook UserEventAgent[11]:
    May 27 14:56:19 Bills-MacBook loginwindow[40]: in pam_sm_setcred(): Done cleanup4
    May 27 17:56:42 localhost com.apple.SecurityServer[29]: Session 100000 created
    May 27 17:56:53 localhost com.apple.SecurityServer[29]: Entering service
    May 27 17:56:53 localhost com.apple.SecurityServer[29]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [11] for authorization created by '/usr/libexec/UserEventAgent' [11]
    May 27 17:57:01 Bills-MacBook com.apple.SecurityServer[29]: Session 100005 created
    May 27 17:57:01 Bills-MacBook loginwindow[39]: Login Window Started Security Agent
    May 27 17:57:01 Bills-MacBook SecurityAgent[142]: Echo enabled
    May 27 17:57:16 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:16 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:19 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:19 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:21 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:21 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:23 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:23 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:25 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:25 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:31 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:31 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:33 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:33 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:36 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:36 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:57:38 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:57:38 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:58:49 Bills-MacBook com.apple.SecurityServer[29]: Session 100008 created
    May 27 17:59:03 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:03 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:05 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:05 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:10 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:10 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:29 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:29 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:37 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:37 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:39 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:39 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:42 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:42 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:43 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:43 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 17:59:46 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got ruser: (null)
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got service: authorization
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): No authentication authority returned
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in od_principal_for_user(): failed: 7
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Done cleanup3
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Kerberos 5 refuses you
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): OpenDirectory - The authtok is incorrect.
    May 27 17:59:46 Bills-MacBook authorizationhost[160]: Failed to authenticate user <brdhunter1> (error: 9).
    May 27 21:30:34 Bills-MacBook com.apple.SecurityServer[29]: Session 100007 created
    May 27 21:30:52 Bills-MacBook SecurityAgent[142]: User info context values set for brdhunter1
    May 27 21:30:52 Bills-MacBook authorizationhost[160]: in pam_sm_authenticate(): Got user: brdhunter1

    Didn't read all your post, no real reason to. Do you have a Login password set that you have to type in every time you start or wake your Mac from sleep?
    If not whether or not your system was hacked doesn't really matter. Without a Login password set that you have to type in every time you start or wake your Mac what do expect. It is Wide open for anyone to access it at anytime. Convenience for you = access for someone that would do you harm.
    Good Luck.

  • Keychain Hangs the System

    When I got my brand new iMac with Retina Display I decided to use the fresh install of Yosemite and just transfer my files over thunderbolt from my laptop. I figured this would clean things up. But I've been plagued with issues since getting this computer -- issues I haven't seen on any Mac I've ever owned. I've had to clean restore this machine 4 times already.
    Here's what happens.
    At some point after being fine for a week, Keychain decides it's process is going to hang. This shows itself in two places:
    Safari hangs on autofill to the point that I have to disable autofill entirely
    Authentication in System Preferences (clicking the little lock) returns an "Authenticating" message next to the icon but never opens the password dialog
    I'm not sure what to do. My system isn't abnormal and I'm not screwing around in the keychain at all. I've tried:
    leaving iCloud Keychain access turned off,
    tried it on,
    manually transferred Keychain info from my other computer.
    Keychain repairs don't do anything... thinks it's all fine.
    But I can't use autofill (not a big deal since I use a 3rd party password manager anyway), and I can't unlock menus in System Preferences... and that's the biggie.
    Has anyone else run into this or have any ideas?

    Of course not, I've been hacking at OSes long enough to know that conflicts from Library preference and support files are not good. I allowed every transferred app to reinstate its Library preferences on first run.
    In any case, I did some more digging and it seems CloudKit was caching some inconsistencies. Removing its caches fixed the issue as described in this thread.
    Glad I know what the issue is now.

  • HELP! My mums computer is being hacked?

    I am not a genius but do think I can tell that my mums macbookpro has got a viris or is being hacked. Lots of strange things have been happening to itand it i getting on my nerves.
    Strange things that have happend:
    (in order of time they took place)
    1. Background changed to defalt mavericks one
    2. Background changed to plane light blue and when I went to change it told my the name of the background was ?
    3. My mum was buying an itunes card for me on itunes and It told her to type in all her creidit card info (she never has to because on keychain)
    4. This morning her computer told me that someone else was useing our ip address (i know the router didint have anything to do because we have never                  touched it and its fine on my macbookpro)
    I know it doesnt seem like much but it should not be happening!!!!
    IF YOU KNOW WHATS GOING ON OR HOWTO FIX IT PLEASE HELP ME

    Background changed to plane light blue
    If the desktop picture always reverts to a plain blue background, one of your login items may be causing the problem. The "TeamViewer" application can have this effect; see this thread. If it's not that in your case, rule out all other third-party login items as possible causes.

  • What happens if I reset my keychains to default?

    I can't remember my password for them and was wondering what would happen if I reset them? Any help is appreciated, thanks.

    Your keychain password is your user account admin password. If you don't remember the latter:
    Forgot Your Account Password
    For Lion, Mountain Lion, or Mavericks
        Boot to the Recovery HD:
    Restart the computer and after the chime press and hold down the COMMAND and R keys until the menu screen appears. Alternatively, restart the computer and after the chime press and hold down the OPTION key until the boot manager screen appears. Select the Recovery HD and click on the downward pointing arrow button.
         When the menubar appears select Terminal from the Utilities menu.
         Enter resetpassword at the prompt and press RETURN. Follow
         instructions in the dialog window that will appear.
         Or see:
           Reset a Mac OS X 10.7 Lion Password
           OS X Mountain Lion- Reset a login password,
           OS X Mavericks- Solve password problems,
           OS X Lion- Apple ID can be used to reset your user account password.
    For Snow Leopard and earlier with installer DVD
         Mac OS X 10.6- If you forget your administrator password,
         OS X- Changing or resetting an account password (Snow Leopard and earlier).
    For Snow Leopard and earlier without installer DVD
        How to reset your Mac OS X password without an installer disc | MacYourself
        Reset OS X Password Without an OS X CD — Tech News and Analysis
        How To Create A New Administrator Account - Hack Mac
    Tutorial: Resolving Keychain Issues
    If you can't access your keychain, or forget your password If you can't get into your keychain file because you've forgotten your password or the keychain file appears to be corrupt, there are a couple of options.
    First, if you've forgotten your password, you can use the "Keychain First Aid" utility to make the keychain password the same as the login password. This can be accomplished via the following process:
      1. Open Keychain Access (located in Applications/Utilities)
      2. Go to the "Keychain Access" menu and select "Preferences"
      3. Click the "First Aid" tab
      4. Make sure the "Synchronize login keychain password" box is checked
      5. Close the Preferences window
      6. Go to the "Keychain Access" menu and select "Keychain First Aid"
      7. Enter your username and password
      8. Click the "Repair" button
    The second option is to completely delete your keychain then recreate it. This routine is useful if your keychain appears to be corrupt or otherwise inaccessible. This can be accomplished as follows:
      1. Launch Keychain Access (located in Applications/Utilities)
      2. Click "Show Keychains" in the lower-left corner of the window.
      3. Select the problematic keychain from the left-hand pane.
      4. Navigate to the "File" menu and select "Delete Keychain '(name of keychain)'"
      5. Check all options for deletion and press "OK"
      6. Create a new keychain by going to the "File" menu, then "New" and selecting
          "New Keychain"
      7. You can now make this keychain your default if you desire by selecting it, then
          going to the "File" menu and selecting "Make '(name of keychain)' Default"
    Login as root and perform repair In some cases, problems with keychains can only be resolved when logged in as the root user.
    First, you want to enable the root user:
      1. OS X Mountain Lion: Enable and disable the root user
      2. OS X Lion: Enable and disable the root user
      3. Mac OS X 10.6: Enabling the root user
      4. Enabling and using the "root" user in Mac OS X
    After enabling the root user, and logging in under this account, again open Keychain Access. First attempt repairs using Keychain First Aid, and failing that, delete then recreate the keychain as described above while logged in as root.
    Persistently asked for stored passwords If you are persistently asked for passwords in various applications that you have specified should be remembered in a keychain, your "login" keychain may not be active for one reason or another.
    Navigate to ~/Library/Keychains/ (this is the Library folder inside your user's home folder). Find the file named "login.keychain" and double-click it.
    Failing that, select the "login" keychain within the Keychain Access application and make sure it is the default keychain by going to the "File" menu and selecting "Make 'Login' Default"
    Turn off Keychain synchronization in applications having problems If specific applications are experiencing issues when accessing password-protected material, the Keychain may be to blame.
    The above comes from an article published on MacFixit.com.

  • Keychain hassles

    I just bought a new MacPro. I wanted to change the short name for the new computer so when I migrated the data from the old Mac (G5 dual 2.7) I had the old user account change it's name during the transfer to my new preferred short name. Great, my new user short name has access to all the stuff that I used with the old short name, however the short name is still the name in keychain and whenever I check mail or go online I have to type in my admin password. It has not given me the option to "allow always".
    Do I need to reset my keychain or delete it? Everything works but it's just a hassle to always need to use my password. I have used Keychain first aid and have set the keychain preferences sync login password and to set loign keychain as default. What's next? Amd why do they make it impossible to reset your short name?????? I really hope they change this system in leopard. It's quite a hassle.

    Where I live, the public library system went online so you can renew books, place items on hold, etc. This works well, save for the fact that every time you want to sign in, you must enter a 14-digit account number and a PIN code. I wanted these saved in my keychain, but Safari never offered.
    So I looked into it a bit more. The page source for the login screen specified AUTOCOMPLETE="off" in the form tag. This seems to tell Safari to keep your keychain out of the picture.
    I can understand why the library did this. They use the same web site on the public terminals in the library itself, so if your password got saved on a public machine, the next guy could check stuff out in your name.
    From home, however, this is a total aggravation. I can't remember all those digits, so help me, and it's a bother to have to fish out my library card and transcribe them time and time again. Safari should include an advanced usage feature wherein you can override the default behaviour, at least for specific web sites and with a proper warning.
    For now, though, I was relieved to find some merciful soul has posted a hack to keep Safari from recognizing AUTOCOMPLETE in a tag:
    http://magicpubs.com/mac/software/autocomplete/
    It was written for Tiger, but I have used it successfully in Leopard with Safari 3.
    A word of warning, however. While it may not matter much for the local library, I would not store a bank password in the default keychain for security reasons. (Mine is in a separate keychain which locks itself after several minutes.) Having to enter a password to access bank accounts is always a good idea, even if it's the master password for your keychain rather than the web site password itself.

  • Microsoft support for MacOffice 2011 referred me to Geeks, which proceeded to take over my computer, found dozens of hacker messages, then signed me up for a year of Geeks support

    I am running a new (January 2015) iMacx with a fusion 1 terabyte HD and Yosemite. I had to buy a new MacOffice 2011 because the one on my MacBook was not allowed to transfer over. That was when the trouble began. Word would not load so IO phoned Microsoft Support which babbled a bit then said their consultant would help;. That was Geeks. They needed access to my computer and I was fool enough to do it. They showed me dozens of pages of hacker intrusions including lots originating from foreign countries, then said they could clear it up, get rid of the malware and viruses. Took nearly 2 hours. When it was over the iMac worked better, MacOffice loaded fine. But then I started getting warnings from Apple saying someone had my secret logon and was accessing iCloud on their new iPhone. Geeks called the next morning to see how things were going,. I told them and - same routine, into my computer. This time I said I did not want iCloud, iTunes, i-anything.They assured me they took everything out. The mystery accesses continued for another couple days until I went into Keychain Access and deleted everything that had to do with iCloud and the rest of the i-'s, then I deleted all the RSA private keys that seemed unfamiliar. I also changed all my passwords figuring it was clearly Geeks doing it as the Apple warnings said that some of these accesses using my passwords was to a Geeks web site address. Now everything is solid for the first time. No more warnings from Apple, but very frequent shutdowns of Word and Excel.

    First, you need to call your bank and credit cards and tell them too. They will cancel every bank and credit card you have and give you new ones. They will probably put you on a fraud watch too. They will also refund any money you've given to the scammers.
    Then, contact Apple Support using any method here: http://www.apple.com/support/
    Tell them what happened and let them help you resolve your information on their end. Once you get your new credit card information you will have to get everything setup again.
    Finally, you will need make sure you have a good backup. I suggest using Time Machine. If you don't already have a backup, you will need to purchase an external hard drive at least as large as all of your current drives. Then, boot into your recovery volume (OS X: About OS X Recovery - Apple Support), erase your hard drive and reinstall OS X. Migrate only your user documents from your backup, no applications. Then, manually reinstall all applications that you didn't purchase through the Mac App Store.
    These scams are getting more and more common. In the past, I have been reluctant to suggest erasing your hard drive. I think that just victimizes people all over again. But I don't know what else to suggest. Supposedly, these scammers are only after money, but what you describe is really a worst-case identity-theft scenario. I wish I had some better solution for you, but I don't.

  • Don't "Remember this password in my keychain."?

    Is there a way to make it the default to not have the "Remember this password in my keychain" checkbox checked everytime? I never want the password to be saved in my keychain, but everytime it comes up, the box is checked. It's a pain unchecking it every single time I log into my Server Preferences. Can't my OS just understand that I don't want to save it? I looked in the Keychain Access preferences but didn't know if anything in there had anything to do with my problem. Please help. This is driving me insane!

    Look in your Keychain for a password related to your network. Use Keychain Access. It is located in the /Applications/Utilities folder. If there is a network entry in the "System" keychain for your personal WPA2 network, delete it. If not there, are you absolutely positively certain that WPA2 is currently active on your wireless gateway? Does your home network show up under the Airport menubar item with a padlock? On 10.6, and probably 10.5, too, if you option-click on the Airport menubar item, the security algorithm will be shown for the network to which you are currently affiliated (also, if you hover your mouse over other in-range network names, you will get a popup that shows their security algorithms).
    To answer your other question, storing passwords in your keychain for things like your wireless network or your email passwords versus not storing them there -- well, they are as secure as your user login password on your computer in conjunction with how secure the computer is physically. From a security standpoint, you are probably at a bigger risk having your network hacked if you have a weak password - or encryption is inadvertently turned off altogether so you have an open network when you think it's running WPA2. Or inadvertently set to WEP which has been demonstrated to be hacked in like 40 seconds with programs available on the internet (e.g., aircrack). Many routers come with a pretty strong WPA2 password preset for you right out of the box. Also, if you don't need to turn on Sharing Services (e.g., file sharing, screen sharing, remote login, etc.), then don't turn 'em on.

  • Hacked email. PW reset. Constant requests for passwords come up in several apps.

    MacBook 2.16 GHz Intel Core 2 Duo. 3 GB 667 MHz DDR2 SDRAM. OS 10.7.5.
    After XXXXXXX@bellsouth email was hacked I got pw reset and email receipt/send is fixed (except for these pw request popups).
    Constant requests for passwords come up during use of different pieces of sw, incl all those listed below:
    "syncdefaultsd wants to use the xxxxxxxxx keychain"
    and
    "SafariDAVclient wants to use the xxxxxxxxx keychain"
    and
    "ICAL wants to use the xxxxxxxxx keychain"
    and
    "AddressBookSourceSink wants to use the xxxxxxxxx keychain"
    and
    "Messaging Agent wants to use the xxxxxxxxx keychain"
    and
    "ICAL can't login to your XXXXXXX account because your password may be incorrect",
    where xxxxxxxxx is consistent.
    I thought I had fixed this in Keychain but evidently I have not. Putting the passwords in does not 'keep' them in place.
    Any help with how to basically 'start over' with keychain and eliminate this annoying, constant problem?
    Thank you ahead of time.

    Hello, Madgreyhair.
    Try these articles to see if it will correct the Keychain issue. 
    Mac OS X 10.7: Solving problems with keychains
    http://support.apple.com/kb/PH7296
    Resetting your keychain in Mac OS X
    http://support.apple.com/kb/TS1544
    Hope this helps,
    Jason H. 

Maybe you are looking for

  • Finder sidebar not updating with applications open/save dialog boxes

    Hi all, I've searched the threads and can't seem to find an answer to this recurring issue that I'm having. I save folders to current projects in the Finder sidebar. However, I find that when I try to find those sidebar folders from within the open/s

  • ITunes Account Access

    I canceled an email address tied to an iTunes account.  In security questions, I entered my birthday and it's rejecting my submission.  Is there anything else I can do to get access to the account?  Answer another security question?  Thank you!

  • How do we connect two databases in Oracle other than Database Link?

    Good Morning, How do we connect two databases in Oracle other than Database Link? I am using Oracle 10g, I heard that we can connect two database in Oracle through ODBC. Is it possible? How? Thanks Nihar

  • SRM Middleware

    Hi     Please let me know the Middleware Configuration settings and some inportant tables in SRM. Thnaks Mukesh Kumar

  • Why do the apps on my 4th Generation iPod Touch continuously crash over and over?

    I first turned on my 8GB white iPod touch, 4th generation, on 12/25/2011. For the most part, my ipod has worked flawlessly. I have never had a problem with it. But, in the past couple of days since christmas, the apps have started to crash over and o