My iTouch 4g may have been hacked without my knowledge

About 1-2 weeks ago I brought in my iTouch into work like I normally do and connect to the wireless network. About 30 minutes later I noticed that I was no longer connecting to the wifi. When I went down to my company's IT department, they had stated that they had blocked my MAC address due to suspicious activity. It turns out that it had been trying to send out packets to an IP address of 62.219.7.91 towards the R.I.P.E. Network, which I found out later was Israel. So I took it home, saved my pictures and recorded videos from it, then reformatted it. As of Tuesday of this week I had my MAC address removed from banning from the wifi network. As of this morning, I attempted to log back onto the network but found that I was banned again.
I can't seem to figure out what in the world is causing this. I did a routine scan of malware and viruses last night on my computer that I connect it to and did not find anything that would compromise it. The only thing different than yesterday afternoon when I was not banned from the network was the fact that I downloaded an update to the Weather Channel app. I checked the multi-tasking area (double clicked the home button) and found that it was not running. The only things that I had running at the time was Settings, Twitter, App Store (with one update holding for Pandora) and the default weather app.
My IT department is kinda slow in getting back to me because they have other important things to take care of than my itouch, so I do not know what the logs hold yet. I am pretty sure that it will be the same results.
I have contacted Apple about this and inquired if there is some way for them to scan my itouch for any viruses or malware. Unfortunately the only suggestion that they have is for me to reformat it and load one app at a time and see if my IT department blocks me again.
Unfortunately my IT department has stated that I am on my own on this.
So I guess it comes down to this, is there any recommendations for either a malware scanning program for the itouch or a recommendation on what can detect when my itouch is reaching out to another ip address so i can troubleshoot and disable one app at a time?
I apologize in advance for the long description. I'm really not sure where to go from here. Kind of feel like my security is at stake here in that I'm wondering if the information on my itouch is being sent out (passwords, etc.). I don't want to reformat my itouch every day, but it seems like that is the only solution for this. I'm pretty sure my IT department won't keep adding my MAC address back to the wireless network.
Any and all ideas are welcome. Thank You!

I did after I entered in the last reply. Thanks so much for your help. I ended up using wireshark network analyzer over the weekend and found nothing out of the ordinary except for bonjour services ip address. I pretty much had everything running all day long for the entire weekend. I think that the second time they blocked me they probably changed their mind and decided it was better to just block me without confirming if there really was a problem. Still haven't heard anything back from them. I think I'll never know what in the world happened the first time.
But anyway, thanks again for your help!
PS- still think it would be awesome if Apple had some sort of scanning utility for the ipod products.

Similar Messages

  • I may have been hacked. How do I reinstall operating system of my imac 4

    I may have been hacked. How do I reinstall operating system of my imac version 10.7.5

    Install or Reinstall Lion/Mountain Lion from Scratch
    Be sure you backup your files to an external drive or second internal drive because the following procedure will remove everything from the hard drive.
    Boot to the Recovery HD:
    Restart the computer and after the chime press and hold down the COMMAND and R keys until the menu screen appears. Alternatively, restart the computer and after the chime press and hold down the OPTION key until the boot manager screen appears. Select the Recovery HD and click on the downward pointing arrow button.
    Erase the hard drive:
      1. Select Disk Utility from the main menu and click on the Continue button.
      2. After DU loads select your startup volume (usually Macintosh HD) from the
          left side list. Click on the Erase tab in the DU main window.
      3. Set the format type to Mac OS Extended (Journaled.) Optionally, click on
            the Security button and set the Zero Data option to one-pass. Click on
          the Erase button and wait until the process has completed.
      4. Quit DU and return to the main menu.
    Reinstall Lion/Mountain Lion: Select Reinstall Lion/Mountain Lion and click on the Install button.
    Note: You will need an active Internet connection. I suggest using Ethernet if possible
                because it is three times faster than wireless.

  • I have a feeling my personal Apple Laptop computer activities may be  being monitored.  I feel my Apple Laptop may have been hacked into.  I noticed suspicious item in my wastebasket that I did not remove or know what it means ("roaming password..")

    I replaced my and my family's electronic phones and computers with Apple products due to their superior security capabilities, and the intgrity of their workforce.  Thus I come to you for help with a serious concern in hopes that you can help me.
    Possible Hack into my personal Apple Laptop
    I have a feeling my Apple Laptop has been hacked into and is being monitored.  Today I noticed that an old HP printer that we removed from our wireless setup was still connected. In my attempt to remove the old one I noticed that as I was trying to do so it seemed my actions were being shadowed and both of my printer icons (old and new printer) dissapeared. Anyway I looked in the wastebasket and noticed the following item which I had never noticed before: "roaming_password_for_1475_txt_webarchive" in the trash. As it looked suspicious I restored it onto my desktop to open it and research it and it had information on it saying, To remove the DOCOMO interTouch Cable turn on the wireless network conection on your computer....."  It had text giving my username and password for roaming - I could not copy or pirnt the information from my desktop, so I took a copy and video of it via my Apple cell phone.
    Possible Hack into my personal Apple Cell Phone:
    I have noticed that when I am on phone calls with certain people, my phone will emit a loud long beep.  I am involved with protecting jobs through a union, and am concerned that the county I work for may have had one of their IT people hack into my phone, etc...
    Can you please help me with this? PLEASE.
    With appreciation
    Martha Booker
    <Personal Information Edited by Host>

    I replaced my and my family's electronic phones and computers with Apple products due to their superior security capabilities, and the intgrity of their workforce.  Thus I come to you for help with a serious concern in hopes that you can help me.
    Possible Hack into my personal Apple Laptop
    I have a feeling my Apple Laptop has been hacked into and is being monitored.  Today I noticed that an old HP printer that we removed from our wireless setup was still connected. In my attempt to remove the old one I noticed that as I was trying to do so it seemed my actions were being shadowed and both of my printer icons (old and new printer) dissapeared. Anyway I looked in the wastebasket and noticed the following item which I had never noticed before: "roaming_password_for_1475_txt_webarchive" in the trash. As it looked suspicious I restored it onto my desktop to open it and research it and it had information on it saying, To remove the DOCOMO interTouch Cable turn on the wireless network conection on your computer....."  It had text giving my username and password for roaming - I could not copy or pirnt the information from my desktop, so I took a copy and video of it via my Apple cell phone.
    Possible Hack into my personal Apple Cell Phone:
    I have noticed that when I am on phone calls with certain people, my phone will emit a loud long beep.  I am involved with protecting jobs through a union, and am concerned that the county I work for may have had one of their IT people hack into my phone, etc...
    Can you please help me with this? PLEASE.
    With appreciation
    Martha Booker
    <Personal Information Edited by Host>

  • How do I get a list of past transactions?  My account may have been hacked.

    Hi,
    I just noticed that someone has charged up almost $300 in charges in my iTunes account. This could be my son, or someone may have hacked in. How do I get a listing of what these charges were for?
    Thanks,
    Dan

    Did you notify your credit card company/bank and dispute these charges?
    Did you remove yoru CC info from the iTunes store?
    I leave my CC info blank until I want to make a purchase, I add it, make the purchase then immediately remove it.
    The iphone goes on ebay today along with all the apps.
    Why?
    Note that the apps cannot be resold.
    They are linked directly to the iTunes account they were purchased with.
    Note that simply getting rid of th eiPhone will not prevent your son (or whoever) from using the iTnues acount to purchase

  • I can no longer receive e-mail messages through my @mac/@me account. I can still send e-mail messages, though. I believe there may have been recent attempts to hack into my account. I have changed my password, but wonder how to start receiving mail again?

    I can no longer receive e-mail messages through my @mac/@me account, though I still seem to be able to send messages. I believe there may have been recent attempts to hack into my Mail account (my LinkedIn and Facebook accounts were both hacked three days ago and a scam/phishing message sent to my contacts, and I know there was at least an attempt made to hack into one of my e-mail accounts). I have already changed my Apple password, but how do I start receiving mail again?
    (And I should also say that I'm a little surprised there was no alert from Apple of suspicious activity on my account, if such was the case. Instead, when I logged into my account via Mobile Me three days ago I noticed that all messages in my inbox were gone as well as all of my contacts. I assume this was related to the current problem.)
    Thanks for all responses.

    The problem has been solved with the help of a MobileMe online counsellor. My MobileMe account had in fact been hacked into and the fraudster had been redirecting my e-mail messages to a phony account that he controlled. We took the forward off and reset all my passwords and security questions, which solved the immediate problem.
    Thx.

  • How can I see website data from itouch 4th generation?  My 8 yr old may have been on inappropriate sites and I need to see the data from website data stored on the itouch.

    How can I see website data from itouch 4th generation?  My 8 yr old may have been on inappropriate sites and I need to see the data from website data stored on the itouch.

    There is no way to see where he has been.
    Go into Settings > General > Restrictions > Safari and turn it off. Then add the MacGruff browser from the app store. After that go back to Restrictions and turn off the ability to add apps.

  • Is My apache http file okay? Could have been hacked?????Why would 12.34.56.78:80 be the listening address I don't have any AT&T Services12

    I believe my apache server could have been hacked.  Is there a member of the community that could take a look at the paste of my http.conf file.  Thanks so much
    # Mac OS X / Mac OS X Server
    # The <IfDefine> blocks segregate server-specific directives
    # and also directives that only apply when Web Sharing or
    # server Web Service (as opposed to other services that need Apache) is on.
    # The launchd plist sets appropriate Define parameters.
    # Generally, desktop has no vhosts and server does; server has added modules,
    # custom virtual hosts are only activated when Web Service is on, and
    # default document root and personal web sites at ~username are only
    # activated when Web Sharing is on.
    # This is the main Apache HTTP server configuration file.  It contains the
    # configuration directives that give the server its instructions.
    # See <URL:http://httpd.apache.org/docs/2.2> for detailed information.
    # In particular, see
    # <URL:http://httpd.apache.org/docs/2.2/mod/directives.html>
    # for a discussion of each configuration directive.
    # Do NOT simply read the instructions in here without understanding
    # what they do.  They're here only as hints or reminders.  If you are unsure
    # consult the online docs. You have been warned. 
    # Configuration and logfile names: If the filenames you specify for many
    # of the server's control files begin with "/" (or "drive:/" for Win32), the
    # server will use that explicit path.  If the filenames do *not* begin
    # with "/", the value of ServerRoot is prepended -- so "log/foo_log"
    # with ServerRoot set to "/usr" will be interpreted by the
    # server as "/usr/log/foo_log".
    # ServerRoot: The top of the directory tree under which the server's
    # configuration, error, and log files are kept.
    # Do not add a slash at the end of the directory path.  If you point
    # ServerRoot at a non-local disk, be sure to point the LockFile directive
    # at a local disk.  If you wish to share the same ServerRoot for multiple
    # httpd daemons, you will need to change at least LockFile and PidFile.
    ServerRoot "/usr"
    # Listen: Allows you to bind Apache to specific IP addresses and/or
    # ports, instead of the default. See also the <VirtualHost>
    # directive.
    # Change this to Listen on specific IP addresses as shown below to
    # prevent Apache from glomming onto all bound IP addresses.
    #Listen 12.34.56.78:80
    <IfDefine !MACOSXSERVER>
    Listen 80
    </IfDefine>
    # Dynamic Shared Object (DSO) Support
    # To be able to use the functionality of a module which was built as a DSO you
    # have to place corresponding `LoadModule' lines at this location so the
    # directives contained in it are actually available _before_ they are used.
    # Statically compiled modules (those listed by `httpd -l') do not need
    # to be loaded here.
    # Example:
    # LoadModule foo_module modules/mod_foo.so
    LoadModule authn_file_module libexec/apache2/mod_authn_file.so
    LoadModule authz_host_module libexec/apache2/mod_authz_host.so
    LoadModule cache_module libexec/apache2/mod_cache.so
    LoadModule disk_cache_module libexec/apache2/mod_disk_cache.so
    LoadModule dumpio_module libexec/apache2/mod_dumpio.so
    LoadModule reqtimeout_module libexec/apache2/mod_reqtimeout.so
    LoadModule ext_filter_module libexec/apache2/mod_ext_filter.so
    LoadModule include_module libexec/apache2/mod_include.so
    LoadModule filter_module libexec/apache2/mod_filter.so
    LoadModule substitute_module libexec/apache2/mod_substitute.so
    LoadModule deflate_module libexec/apache2/mod_deflate.so
    LoadModule log_config_module libexec/apache2/mod_log_config.so
    LoadModule log_forensic_module libexec/apache2/mod_log_forensic.so
    LoadModule logio_module libexec/apache2/mod_logio.so
    LoadModule env_module libexec/apache2/mod_env.so
    LoadModule mime_magic_module libexec/apache2/mod_mime_magic.so
    LoadModule cern_meta_module libexec/apache2/mod_cern_meta.so
    LoadModule expires_module libexec/apache2/mod_expires.so
    LoadModule headers_module libexec/apache2/mod_headers.so
    LoadModule ident_module libexec/apache2/mod_ident.so
    LoadModule usertrack_module libexec/apache2/mod_usertrack.so
    #LoadModule unique_id_module libexec/apache2/mod_unique_id.so
    LoadModule setenvif_module libexec/apache2/mod_setenvif.so
    LoadModule version_module libexec/apache2/mod_version.so
    LoadModule proxy_module libexec/apache2/mod_proxy.so
    LoadModule proxy_http_module libexec/apache2/mod_proxy_http.so
    LoadModule proxy_scgi_module libexec/apache2/mod_proxy_scgi.so
    LoadModule proxy_balancer_module libexec/apache2/mod_proxy_balancer.so
    LoadModule ssl_module libexec/apache2/mod_ssl.so
    LoadModule mime_module libexec/apache2/mod_mime.so
    LoadModule dav_module libexec/apache2/mod_dav.so
    LoadModule autoindex_module libexec/apache2/mod_autoindex.so
    LoadModule asis_module libexec/apache2/mod_asis.so
    LoadModule info_module libexec/apache2/mod_info.so
    LoadModule cgi_module libexec/apache2/mod_cgi.so
    LoadModule dav_fs_module libexec/apache2/mod_dav_fs.so
    LoadModule vhost_alias_module libexec/apache2/mod_vhost_alias.so
    LoadModule negotiation_module libexec/apache2/mod_negotiation.so
    LoadModule dir_module libexec/apache2/mod_dir.so
    LoadModule imagemap_module libexec/apache2/mod_imagemap.so
    LoadModule actions_module libexec/apache2/mod_actions.so
    LoadModule speling_module libexec/apache2/mod_speling.so
    LoadModule alias_module libexec/apache2/mod_alias.so
    LoadModule rewrite_module libexec/apache2/mod_rewrite.so
    LoadModule php5_module libexec/apache2/libphp5.so
    #Apple specific modules
    LoadModule apple_userdir_module libexec/apache2/mod_userdir_apple.so
    LoadModule bonjour_module libexec/apache2/mod_bonjour.so
    <IfDefine !MACOSXSERVER>
    LoadModule authn_dbm_module libexec/apache2/mod_authn_dbm.so
    LoadModule authn_anon_module libexec/apache2/mod_authn_anon.so
    LoadModule authn_dbd_module libexec/apache2/mod_authn_dbd.so
    LoadModule authn_default_module libexec/apache2/mod_authn_default.so
    LoadModule auth_basic_module libexec/apache2/mod_auth_basic.so
    LoadModule auth_digest_module libexec/apache2/mod_auth_digest.so
    LoadModule authz_groupfile_module libexec/apache2/mod_authz_groupfile.so
    LoadModule authz_user_module libexec/apache2/mod_authz_user.so
    LoadModule authz_dbm_module libexec/apache2/mod_authz_dbm.so
    LoadModule authz_owner_module libexec/apache2/mod_authz_owner.so
    LoadModule authz_default_module libexec/apache2/mod_authz_default.so
    LoadModule mem_cache_module libexec/apache2/mod_mem_cache.so
    LoadModule dbd_module libexec/apache2/mod_dbd.so
    LoadModule proxy_connect_module libexec/apache2/mod_proxy_connect.so
    LoadModule proxy_ftp_module libexec/apache2/mod_proxy_ftp.so
    LoadModule proxy_ajp_module libexec/apache2/mod_proxy_ajp.so
    LoadModule status_module libexec/apache2/mod_status.so
    </IfDefine>
    <IfDefine MACOSXSERVER>
    LoadModule hfs_apple_module libexec/apache2/mod_hfs_apple.so
    #LoadModule auth_digest_apple_module libexec/apache2/mod_auth_digest_apple.so
    #LoadModule encoding_module libexec/apache2/mod_encoding.so
    #LoadModule jk_module libexec/apache2/mod_jk.so
    LoadModule apple_auth_module libexec/apache2/mod_auth_apple.so
    LoadModule spnego_auth_module libexec/apache2/mod_spnego_apple.so
    LoadModule apple_digest_module libexec/apache2/mod_digest_apple.so
    #LoadModule python_module libexec/apache2/mod_python.so
    LoadModule xsendfile_module libexec/apache2/mod_xsendfile.so
    LoadModule apple_status_module libexec/apache2/mod_status_apple.so
    </IfDefine>
    # If you wish httpd to run as a different user or group, you must run
    # httpd as root initially and it will switch. 
    # User/Group: The name (or #number) of the user/group to run httpd as.
    # It is usually good practice to create a dedicated user and group for
    # running httpd, as with most system services.
    User _www
    Group _www
    # 'Main' server configuration
    # The directives in this section set up the values used by the 'main'
    # server, which responds to any requests that aren't handled by a
    # <VirtualHost> definition.  These values also provide defaults for
    # any <VirtualHost> containers you may define later in the file.
    # All of these directives may appear inside <VirtualHost> containers,
    # in which case these default settings will be overridden for the
    # virtual host being defined.
    # ServerAdmin: Your address, where problems with the server should be
    # e-mailed.  This address appears on some server-generated pages, such
    # as error documents.  e.g. [email protected]
    ServerAdmin [email protected]
    # ServerName gives the name and port that the server uses to identify itself.
    # This can often be determined automatically, but we recommend you specify
    # it explicitly to prevent problems during startup.
    # If your host doesn't have a registered DNS name, enter its IP address here.
    #ServerName www.example.com:80
    <IfDefine MACOSXSERVER>
    DocumentRoot /var/empty
    <IfModule mod_auth_digest_apple.c>
            BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
    </IfModule>
    <IfModule mod_headers.c>
            Header add MS-Author-Via "DAV"
            RequestHeader set X_FORWARDED_PROTO 'https' env=https
            RequestHeader set X_FORWARDED_PROTO 'http' env=!https
    </IfModule>
    <IfModule mod_encoding.c>
            EncodingEngine on
            NormalizeUsername on
            DefaultClientEncoding UTF-8
    # Windows XP?
            AddClientEncoding "Microsoft-WebDAV-MiniRedir/" MSUTF-8
    # Windows 2K SP2 with .NET
            AddClientEncoding "(Microsoft .* DAV\$)" MSUTF-8
    # Windows 2K SP2/Windows XP
            AddClientEncoding "(Microsoft .* DAV 1.1)" CP932
    # Windows XP?
            AddClientEncoding "Microsoft-WebDAV*" CP932
    # RealPlayer
            AddClientEncoding "RMA/*" CP932
    # MacOS X webdavfs
            AddClientEncoding "WebDAVFS" UTF-8
    # cadaver
            AddClientEncoding "cadaver/" EUC-JP
    </IfModule>
    <Directory /usr/share/web>
        AllowOverride None
        Options MultiViews FollowSymlinks
        Order allow,deny
        Allow from all
        Header Set Cache-Control no-cache
    </Directory>
    Alias /webmail /usr/share/web/webmail.html
    Alias /changepassword /usr/share/web/changepassword.html
    Alias /profilemanager /usr/share/web/profilemanager.html
    Alias /webcal /usr/share/web/webcal.html
    </IfDefine>
    <IfDefine !MACOSXSERVER>
    <IfDefine WEBSHARING_ON>
    # DocumentRoot: The directory out of which you will serve your
    # documents. By default, all requests are taken from this directory, but
    # symbolic links and aliases may be used to point to other locations.
    DocumentRoot "/Library/WebServer/Documents"
    # Each directory to which Apache has access can be configured with respect
    # to which services and features are allowed and/or disabled in that
    # directory (and its subdirectories).
    # First, we configure the "default" to be a very restrictive set of
    # features. 
    <Directory />
        Options FollowSymLinks
        AllowOverride None
        Order deny,allow
        Deny from all
    </Directory>
    # Note that from this point forward you must specifically allow
    # particular features to be enabled - so if something's not working as
    # you might expect, make sure that you have specifically enabled it
    # below.
    # This should be changed to whatever you set DocumentRoot to.
    <Directory "/Library/WebServer/Documents">
        # Possible values for the Options directive are "None", "All",
        # or any combination of:
        #   Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
        # Note that "MultiViews" must be named *explicitly* --- "Options All"
        # doesn't give it to you.
        # The Options directive is both complicated and important.  Please see
        # http://httpd.apache.org/docs/2.2/mod/core.html#options
        # for more information.
        Options Indexes FollowSymLinks MultiViews
        # AllowOverride controls what directives may be placed in .htaccess files.
        # It can be "All", "None", or any combination of the keywords:
        #   Options FileInfo AuthConfig Limit
        AllowOverride None
        # Controls who can get stuff from this server.
        Order allow,deny
        Allow from all
    </Directory>
    # DirectoryIndex: sets the file that Apache will serve if a directory
    # is requested.
    <IfModule dir_module>
        DirectoryIndex index.html
    </IfModule>
    </IfDefine>
    </IfDefine>
    # The following lines prevent .htaccess and .htpasswd files from being
    # viewed by Web clients.
    <FilesMatch "^\.([Hh][Tt]|[Dd][Ss]_[Ss])">
        Order allow,deny
        Deny from all
        Satisfy All
    </FilesMatch>
    # Apple specific filesystem protection.
    <Files "rsrc">
        Order allow,deny
        Deny from all
        Satisfy All
    </Files>
    <DirectoryMatch ".*\.\.namedfork">
        Order allow,deny
        Deny from all
        Satisfy All
    </DirectoryMatch>
    # ErrorLog: The location of the error log file.
    # If you do not specify an ErrorLog directive within a <VirtualHost>
    # container, error messages relating to that virtual host will be
    # logged here.  If you *do* define an error logfile for a <VirtualHost>
    # container, that host's errors will be logged there and not here.
    ErrorLog "/private/var/log/apache2/error_log"
    # LogLevel: Control the number of messages logged to the error_log.
    # Possible values include: debug, info, notice, warn, error, crit,
    # alert, emerg.
    LogLevel warn
    <IfModule log_config_module>
        # The following directives define some format nicknames for use with
        # a CustomLog directive (see below).
        LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
        LogFormat "%v %h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combinedvhost
        LogFormat "%h %l %u %t \"%r\" %>s %b" common
        LogFormat "%v %h %l %u %t \"%r\" %>s %b" commonvhost
        <IfModule logio_module>
          # You need to enable mod_logio.c to use %I and %O
          LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
          LogFormat "%v %h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinediovhost
        </IfModule>
        # The location and format of the access logfile (Common Logfile Format).
        # If you do not define any access logfiles within a <VirtualHost>
        # container, they will be logged here.  Contrariwise, if you *do*
        # define per-<VirtualHost> access logfiles, transactions will be
        # logged therein and *not* in this file.
        CustomLog "/private/var/log/apache2/access_log" common
        # If you prefer a logfile with access, agent, and referer information
        # (Combined Logfile Format) you can use the following directive.
        #CustomLog "/private/var/log/apache2/access_log" combined
    </IfModule>
    <IfModule alias_module>
        # Redirect: Allows you to tell clients about documents that used to
        # exist in your server's namespace, but do not anymore. The client
        # will make a new request for the document at its new location.
        # Example:
        # Redirect permanent /foo http://www.example.com/bar
        # Alias: Maps web paths into filesystem paths and is used to
        # access content that does not live under the DocumentRoot.
        # Example:
        # Alias /webpath /full/filesystem/path
        # If you include a trailing / on /webpath then the server will
        # require it to be present in the URL.  You will also likely
        # need to provide a <Directory> section to allow access to
        # the filesystem path.
        # ScriptAlias: This controls which directories contain server scripts.
        # ScriptAliases are essentially the same as Aliases, except that
        # documents in the target directory are treated as applications and
        # run by the server when requested rather than as documents sent to the
        # client.  The same rules about trailing "/" apply to ScriptAlias
        # directives as to Alias.
        ScriptAliasMatch ^/cgi-bin/((?!(?i:webobjects)).*$) "/Library/WebServer/CGI-Executables/$1"
    </IfModule>
    <IfModule cgid_module>
        # ScriptSock: On threaded servers, designate the path to the UNIX
        # socket used to communicate with the CGI daemon of mod_cgid.
        #Scriptsock /private/var/run/cgisock
    </IfModule>
    # "/Library/WebServer/CGI-Executables" should be changed to whatever your ScriptAliased
    # CGI directory exists, if you have that configured.
    <Directory "/Library/WebServer/CGI-Executables">
        AllowOverride None
        Options None
        Order allow,deny
        Allow from all
    </Directory>
    # DefaultType: the default MIME type the server will use for a document
    # if it cannot otherwise determine one, such as from filename extensions.
    # If your server contains mostly text or HTML documents, "text/plain" is
    # a good value.  If most of your content is binary, such as applications
    # or images, you may want to use "application/octet-stream" instead to
    # keep browsers from trying to display binary files as though they are
    # text.
    DefaultType text/plain
    <IfModule mime_module>
        # TypesConfig points to the file containing the list of mappings from
        # filename extension to MIME-type.
        TypesConfig /private/etc/apache2/mime.types
        # AddType allows you to add to or override the MIME configuration
        # file specified in TypesConfig for specific file types.
        #AddType application/x-gzip .tgz
        # AddEncoding allows you to have certain browsers uncompress
        # information on the fly. Note: Not all browsers support this.
        #AddEncoding x-compress .Z
        #AddEncoding x-gzip .gz .tgz
        # If the AddEncoding directives above are commented-out, then you
        # probably should define those extensions to indicate media types:
        AddType application/x-compress .Z
        AddType application/x-gzip .gz .tgz
        # AddHandler allows you to map certain file extensions to "handlers":
        # actions unrelated to filetype. These can be either built into the server
        # or added with the Action directive (see below)
        # To use CGI scripts outside of ScriptAliased directories:
        # (You will also need to add "ExecCGI" to the "Options" directive.)
        #AddHandler cgi-script .cgi
        # For type maps (negotiated resources):
        #AddHandler type-map var
        # Filters allow you to process content before it is sent to the client.
        # To parse .shtml files for server-side includes (SSI):
        # (You will also need to add "Includes" to the "Options" directive.)
        #AddType text/html .shtml
        #AddOutputFilter INCLUDES .shtml
    </IfModule>
    # The mod_mime_magic module allows the server to use various hints from the
    # contents of the file itself to determine its type.  The MIMEMagicFile
    # directive tells the module where the hint definitions are located.
    #MIMEMagicFile /private/etc/apache2/magic
    # Customizable error responses come in three flavors:
    # 1) plain text 2) local redirects 3) external redirects
    # Some examples:
    #ErrorDocument 500 "The server made a boo boo."
    #ErrorDocument 404 /missing.html
    #ErrorDocument 404 "/cgi-bin/missing_handler.pl"
    #ErrorDocument 402 http://www.example.com/subscription_info.html
    # EnableMMAP and EnableSendfile: On systems that support it,
    # memory-mapping or the sendfile syscall is used to deliver
    # files.  This usually improves server performance, but must
    # be turned off when serving from networked-mounted
    # filesystems or if support for these functions is otherwise
    # broken on your system.
    #EnableMMAP off
    #EnableSendfile off
    TraceEnable off
    # Supplemental configuration
    # The configuration files in the /private/etc/apache2/extra/ directory can be
    # included to add extra features or to modify the default configuration of
    # the server, or you may simply copy their contents here and change as
    # necessary.
    # Server-pool management (MPM prefork specific)
    StartServers 1
    MinSpareServers 1
    MaxSpareServers 1
    # ServerLimit and MaxClients support n% syntax which sets them to a
    # fraction of the current RLIMIT_NPROC limit.
    ServerLimit 50%
    MaxClients 50%
    ListenBackLog 512
    MaxRequestsPerChild 100000
    # Timeout: The number of seconds before receives and sends time out.
    Timeout 300
    # KeepAlive: Whether or not to allow persistent connections (more than
    # one request per connection). Set to "Off" to deactivate.
    KeepAlive On
    # KeepAliveTimeout: Number of seconds to wait for the next request from the
    # same client on the same connection.
    KeepAliveTimeout 15
    # MaxKeepAliveRequests: The maximum number of requests to allow
    # during a persistent connection. Set to 0 to allow an unlimited amount.
    # We recommend you leave this number high, for maximum performance.
    MaxKeepAliveRequests 100
    # UseCanonicalName: Determines how Apache constructs self-referencing
    # URLs and the SERVER_NAME and SERVER_PORT variables.
    # When set "Off", Apache will use the Hostname and Port supplied
    # by the client.  When set "On", Apache will use the value of the
    # ServerName directive.
    UseCanonicalName Off
    # AccessFileName: The name of the file to look for in each directory
    # for additional configuration directives.  See also the AllowOverride
    # directive.
    AccessFileName .htaccess
    # ServerTokens
    # This directive configures what you return as the Server HTTP response
    # Header. The default is 'Full' which sends information about the OS-Type
    # and compiled in modules.
    # Set to one of:  Full | OS | Minor | Minimal | Major | Prod
    # where Full conveys the most information, and Prod the least.
    ServerTokens Full
    # Optionally add a line containing the server version and virtual host
    # name to server-generated pages (internal error documents, FTP directory
    # listings, mod_status and mod_info output etc., but not CGI generated
    # documents or custom error documents).
    # Set to "EMail" to also include a mailto: link to the ServerAdmin.
    # Set to one of:  On | Off | EMail
    ServerSignature On
    # HostnameLookups: Log the names of clients or just their IP addresses
    # e.g., www.apache.org (on) or 204.62.129.132 (off).
    # The default is off because it'd be overall better for the net if people
    # had to knowingly turn this feature on, since enabling it means that
    # each client request will result in AT LEAST one lookup request to the
    # nameserver.
    HostnameLookups Off
    # PidFile: The file in which the server should record its process
    # identification number when it starts.
    PidFile /var/run/httpd.pid
    # The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
    LockFile "/private/var/log/apache2/accept.lock"
    <IfModule mod_rewrite.c>
        RewriteLock /var/log/apache2/rewrite.lock
    </IfModule>
    # Language settings
    Include /private/etc/apache2/extra/httpd-languages.conf
    <IfDefine WEBSHARING_ON>
    # Multi    -language error messages
    #Include /private/etc/apache2/extra/httpd-multilang-errordoc.conf
    # Fancy directory listings
    Include /private/etc/apache2/extra/httpd-autoindex.conf
    # User home directories
    Include /private/etc/apache2/extra/httpd-userdir.conf
    # Real-time info on requests and configuration
    #Include /private/etc/apache2/extra/httpd-info.conf
    # Virtual hosts
    #Include /private/etc/apache2/extra/httpd-vhosts.conf
    # Local access to the Apache HTTP Server Manual
    Include /private/etc/apache2/extra/httpd-manual.conf
    # Distributed authoring and versioning (WebDAV)
    #Include /private/etc/apache2/extra/httpd-dav.conf
    </IfDefine>
    # Secure (SSL/TLS) connections
    <IfDefine !MACOSXSERVER>
    #Include /private/etc/apache2/extra/httpd-ssl.conf
    </IfDefine>
    <IfDefine MACOSXSERVER>
    <IfModule mod_ssl.c>
            SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
            SSLPassPhraseDialog exec:/etc/apache2/getsslpassphrase
            SSLSessionCache shmcb:/var/run/ssl_scache(512000)
            SSLSessionCacheTimeout 300
            SSLMutex file:/var/run/ssl_mutex
            SSLRandomSeed startup builtin
            SSLRandomSeed connect builtin
            AddType application/x-x509-ca-cert crt
            AddType application/x-pkcs7-crl crl
    </IfModule>
    </IfDefine>
    <IfModule mod_jk.c>
            JKWorkersFile /etc/apache2/workers.properties
            JKLogFile /var/log/apache2/mod_jk.log
            JkShmFile /var/log/apache2/jk-runtime-status
    </IfModule>
    <IfModule php5_module>
        AddType application/x-httpd-php .php
        AddType application/x-httpd-php-source .phps
        <IfModule dir_module>
            DirectoryIndex index.html index.php
        </IfModule>
    </IfModule>
    <IfDefine !MACOSXSERVER>
        Include /etc/apache2/other/*.conf
    </IfDefine>
    <IfDefine MACOSXSERVER>
        <IfDefine WEBSERVICE_ON>
            Include /etc/apache2/sites/*.conf
        </IfDefine>
        <IfDefine !WEBSERVICE_ON>
            Include /etc/apache2/sites/virtual_host_global.conf
            Include /etc/apache2/sites/*_.conf
            Include /etc/apache2/sites/*__shadow.conf
        </IfDefine>
    </IfDefine>

    That's a comment in the file. It has no effect at all.

  • Hi Apple support, my name is Derek Turner and I have been hacked through a friend's email account and I wish to know if 1. I can clean my email list of names and account with software and 2. How is it possible to delete emails that are still coming back

    Hi! My name is Derek Turner and I have been hacked through a friend's email message to me which I opened unsuspecting any danger.  Initially, he sent me an 'attention' or warning email with a link which I tried to open but it could not be opened, so I left it not knowing what it was all about at the time.  Later, I received another email from him (probably the hacker) and opened a 'not very pleasant' web site.  It did not twig with me at the time as I am a bit new to this type of thing but when I mentioned it to my wife she immediately said that I had been 'hacked'.  By this time it was too late, and it infected all my email addresses!  I would be grateful if you may know if there is software that I can use to clean up my email account and if there is anything for iPad minis that can prevent this happening in future? (Malware, Firewall?).  I am also getting emails back that relate to the hacker and I cannot 'delete' them from my iPad, only on my PC!  Any suggestions?
    Thank you for your time regarding this matter,
    Derek Turner,( a very new iPad mini user!)

    Hi,
    I don't think that can be solved by any advice the regular posters could post here.
    I would go back to Apple and explain the situation (again).
    I would also consider closing the account (Apple rarely seem to do this as accounts are never deleted but just closed).
    I understand this may cause issues for things purchased in iTunes and the App Store which my include Restoring the OS at some point.
    8:20 pm      Tuesday; September 16, 2014
    ​  iMac 2.5Ghz i5 2011 (Mavericks 10.9)
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb (Snow Leopard 10.6.8)
     Mac OS X (10.6.8),
     Couple of iPhones and an iPad

  • My imessages have been hacked and recovery email changed and I can't delete it! (with pic)

    My iMessages have been hacked and the hacker entered his email as the recovery email with security questions I can't answer. I contacted Apple support and went through the 24 hour process of changing my info so that I could get into the account, but his email address is still the recovery address and it does not give me the option to delete it. I've added alternate emails that can be deleted, but it will not let me change or delete the recovery email. I can change phones and passwords a million times, but if he can just recover my password what am I supposed to do? I have turned iMessage off on my phone (as well as the gps) but I would really like help in deleting that recovery email if anyone has any bright ideas! The pic below shows the only place in all of the settings that his email address shows up anywhere! Any help is very very very appreciated.

    Hi,
    I don't think that can be solved by any advice the regular posters could post here.
    I would go back to Apple and explain the situation (again).
    I would also consider closing the account (Apple rarely seem to do this as accounts are never deleted but just closed).
    I understand this may cause issues for things purchased in iTunes and the App Store which my include Restoring the OS at some point.
    8:20 pm      Tuesday; September 16, 2014
    ​  iMac 2.5Ghz i5 2011 (Mavericks 10.9)
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb (Snow Leopard 10.6.8)
     Mac OS X (10.6.8),
     Couple of iPhones and an iPad

  • I gave my old MacBook Pro away and no longer have access to it. I didn't think to deauthorize it first. I DO NOT want it to have access to all music in my iCloud or any music that may have been downloaded sinceI gave away the computer. It now belongs to m

    I gave my old MacBook Pro away and no longer have access to it. I didn't think to deauthorize it first. I DO NOT want it to have access to all music in my iCloud or any music that may have been downloaded sinceI gave away the computer. It now belongs to my teenage daughter,who has since been in my WI-FI area and knows that code. I had EVERYTHING removed from the computer before I gave it to her (long story), but since I hadn't deauthorized the Mac,I'm assuming even without the itunes password the iCloud material would had loaded onto her computer.My iCloud had somehow included personal voice mails under Unknown Artist that I did not want on there or shared. How can I deauthorize the Mac Laptop without having the machine available to do it on? Change the iTunes/iCloud password? I should now have my desktop computer, new PC (Aspire) laptop,Ipod Touch, and if possible my Evo 3D as well as my boyfriend's Samsung smartphone being able to access the iCloud account/library--whatever it is called. HELP

    Thanks, I appreciate the help.  I think this is one of the problems Apple is creating by changing the OS so often. I had fomer colleagues at [a major aerospace contractor] who told me that so many original files were ultimately lost because of the deadly change in the "Save As" operation that they are now afraid of every OS update. Apple has badly damaged their support base with that very prominent company (they won't update now until they've fully examined and understand changes in the pre-conditioned nature of OS computer functions), and they are a whole lot less enthaled with Mac-related equipment/software. Can't blame them, I too used orginal files that way (as easy-to-use templates), and lost some important files before I realized what was happening (to late to revert). Companies should not have to retrain employees each time an OS gets an update, it's can be very expensive several different ways. They learned a painful lesson with that one. And because I'm now retired and don't use multiple devices, I need iCloud like I need a hole in the head... but I'm told there's no way to keep Apple out of my computer. Fortunately, because of major problems when initially installing Mountain Lion, one hold-over of the hardware/software damage I experienced was that iCloud can no longer access my computer even though everything else is working fine again. That was the only "good luck" I had as a result of that expensive nightmare.

  • Row cannot be located for updating. Some values may have been changed...

    Hello,
    I have a legacy application written in VB6 and using Oracle OLEDB Provider (version 9 and updated to the last ones from oracle site)
    I've a problem during insert of a record using recordset method (AddNew).
    The returned message is "Row cannot be located for updating. Some values may have been changed since it was last read. "
    I know that problem is caused by a Before Insert trigger that I CANNOT change.
    Trigger does not change any primary key values !!!. It put only some default values on other not rilevant columns.
    I tried to use the recordset Property option "Update Criteria" = adCriteriaKey without success !
    I had same problem with SQL Server but i solved putting into the trigger SET NOCOUNT ON.
    I think problem is related to the fact that ADO tries to calculate number of affected rows and for doing that it use a where clause built on the changed columns but using values it had on the client.
    Other important info:
    Cursor = adUseClient (and i cannot adUseServer)
    Provider= MSDAORA (version 9.2...)
    Oracle server = 9.1
    Trigger causing problem = BEFORE INSERT (for each row)
    Thanks in advance
    Luigi

    Hello,
    I have a legacy application written in VB6 and using Oracle OLEDB Provider (version 9 and updated to the last ones from oracle site)
    I've a problem during insert of a record using recordset method (AddNew).
    The returned message is "Row cannot be located for updating. Some values may have been changed since it was last read. "
    I know that problem is caused by a Before Insert trigger that I CANNOT change.
    Trigger does not change any primary key values !!!. It put only some default values on other not rilevant columns.
    I tried to use the recordset Property option "Update Criteria" = adCriteriaKey without success !
    I had same problem with SQL Server but i solved putting into the trigger SET NOCOUNT ON.
    I think problem is related to the fact that ADO tries to calculate number of affected rows and for doing that it use a where clause built on the changed columns but using values it had on the client.
    Other important info:
    Cursor = adUseClient (and i cannot adUseServer)
    Provider= MSDAORA (version 9.2...)
    Oracle server = 9.1
    Trigger causing problem = BEFORE INSERT (for each row)
    Thanks in advance
    Luigi

  • My computer has become much slower and may have been infected.  Is there any course of action I can take in solving this problem?

    my computer has become much slower and may have been infected.  Is there any course of action I can take in solving this problem?

    If this started happening without your having made any changes and without a warning of low disk space, then it's likely that the startup drive, or some other hardware component, is failing. Back up all data immediately, then run Apple Diagnostics or the Apple Hardware Test.
    Even if the test is negative, you should make a "Genius" appointment at an Apple Store to have the machine tested more thoroughly.

  • InfoPath cannot load the view. The view may have been modifed to contain unsupported HTML such as frames.

    Hi,
    I'm running InfoPath 2013 Designer and I'm experiencing a very annoying bug. Whenever I try to open a Infopath file I get the error, "InfoPath cannot load the view. The view may have been modifed to contain unsupported HTML such as frames."
    Sometimes it opens without a problem but most the time I get this error message. The strange thing is that I can create a new form without any frames, save it and then when I go to open it have the same problem. I've tried reinstalling InfoPath but it didn't
    help.
    Please help!!!
    Thanks in Advance,
    Mark Elliott
    Windows 7 Home Premium 64 bit; Internet Explorer 11; Office 2013 Pro

    Has anybody figured this out? I have the same problem.  InfoPath 2013 will not open any files from one computer which all work from another computer with the same version of InfoPath so this basically rules out file corruption. (The files are in
    a network share).  Both computer have InfoPath 2013. If I reboot the computer in question it will sometimes work then goes back to the error. 
    The only difference between this computer an all the others is that this one has a bunch of Office 2010 updates since it has SharePoint 2010 designer installed, (not office).  I did try to uninstall the updates but the problem has not been resolved. 
    This is the second time this happens.  Last time I had to completely remove Office 2013 & SharePoint designer then used the Windows rollback feature and finally reinstall office 2013.  Everything worked great until I installed SharePoint 2010
    designer then after a few updates the problem resurfaced.
    This is really annoying, I cant believe its not happening to more people.
    Ben
    ** Update **
    The problem went away although I am not 100% sure why. I decided to provide additional information in case someone has the same issue.  I deleted the Digital Certificate that I had previously requested from our domain server. Now suddenly everything
    is working. Like I said before, I'm not sure if this was the cause/fix but if you are having the same problem perhaps you can try the same thing and provide some feedback to possibly help others.
    I would like to thanks anyone who spent time on this.
    **Update**
    The problem came back. At this point I suspect either an update or something with Visual Studios 2012. My forms are heavy on custom code so I must be doing something wrong. I doubt it was an update since it would be happening to more people
     Again, I am able to open the same file from another computer with the only difference being that the other PC does not have Visual Studio 2012

  • SP2-0915: Cookies may have been disabled

    Hi folks: I am getting an error "SP2-0915: Cookies may have been disabled" when I try to run a query using iSLQ*Plus. My configuration is the following:
    Browser: Netscape 7.1 or IE 6.0 SP1
    O/S: Windows 2K Workstation SP4
    Oracle Database: Oracle 9i Personal running on my local workstation.
    HTTP Server: Oracle Apache HTTP server
    Through iSQL*Plus, I can login to any of my database instances (e.g. scott or HR) without any problem. I can't execute any queries!
    I have modified all my settings in both NS and IE to accept all cookies, and followed all the steps in every readme file etc. that I can find related to the setup & configuration of iSLQ*Plus. I have search far and wide (including Metalink, Google web and groups) and have nothing that helps... I would be most grateful to anyone who can assist me in solving this problem. Many thanks in advance!

    Hi Alison, thanks again for your reply. As it turns out, the problem was caused by my Zone Alarms Pro firewall. Once I shutdown ZA, iSQLPlus worked perfectly. I had tried all sorts of different settings in ZA, one at a time, but nothing made any difference. I had even changed a couple of settings in my Norton AV 2003 but that didn't help either. When I go to use iSQLPlus now, I do a ipconfig /release to release my current IP (so I am not connect to the 'net) and then shutdown ZA. I have a few ideas on what the conflict is between ZA and running iSQLPlus but thats for another day S
    with regards, Pete Neilson

  • Infected, please help! "Warning! You have excessive popups. Windows may have been infected.

    Hello. My computer has been incredibly slow and I have continuously been getting a pop up which states "Warning! You have excessive popups. Windows may have been infected. Please call 1-855-412-1786 for immediate support!" I have done some research and it seems like it is some type of trojan? I am a college student and really don't have the money to take my computer in, does anyone know how I can fix this? Thank you!

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. All it does is to collect information about the state of the computer. That information goes nowhere unless you choose to share it. However, you should be cautious about running any kind of program (not just a shell script) at the behest of a stranger. If you have doubts, search this site for other discussions in which this procedure has been followed without any report of ill effects. If you can't satisfy yourself that the instructions are safe, don't follow them. Ask for other options.
    Here's a summary of what you need to do, if you choose to proceed:
    Copy a line of text in this window to the Clipboard.
    Paste into the window of another application.
    Wait for the test to run. It usually takes a few minutes.
    Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    4. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    5. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    6. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts 51 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' \*AutoCad \*dropbox \*GoogleDr\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB com.apple.AirPortBaseStationAgent 464843899 );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */  /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;5p;6p;8p;12p;' ' {sub(/^ +/,"")};NR==6;NR==13&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { print "'${p[41]}'";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$|'${p[41]}'/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/root/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1000) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/ { next;} /(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { print "'${p[41]}'.plist\t'${p[42]}'";if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[9]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/ { next;} /%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]" "$1;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n  "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n  [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n  ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' ' /^ +B/{ s/.+= |(-[0-9]+)?\.s.+//g;p;} ' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' 's/0/Off/p' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil PlistBuddy whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '-c Print /L*/P*/loginw*' '-c Print L*/P*/*loginit*' '-c Print L*/Saf*/*/E*.plist' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' '-c Print\ :'${p[35]}' 2>&1' '-c Print\ :Label 2>&1' '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,In,iTu,Keyb,Mail/B,P*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t /S*/L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' -i4TCP:0-1023 com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' );N1=${#c2[@]};for j in {0..8};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;A2 0 $((N1+1)) 2;C0;A1 0 $N1 1;C0;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D13 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D22 4 4 50 0;D13 14 3 49 5;D12 26 48 59 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    7. Launch the built-in Terminal application in any of the following ways:
    Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    8. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    9. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    10. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    11. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    12. When you post the results, you might see the message, "You have included content in your post that is not permitted." It means that the forum software has misidentified something in the post as a violation of the rules. If that happens, please post the test results on Pastebin, then post a link here to the page you created.
    Note: This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

Maybe you are looking for