Real or a spoof

I have been having trouble using my new dynadock 3575 and the video - operating system is Vista home Premium 64 bit.
Contact Toshiba about 6 weeks ago and today i received an email from yousendit with a file to solve the problem.  I have a policy of not opening files i do not know.  Anyone out their know if this is real or not?
< http://rcpt.yousendit.com/685589418/f5ce6c0f93320a​d4b71021aad8af6895
I could not find it on the website.
message in header is
Dynadock update video driver
very unusual -

I looked at the file, Avira Antivirus did NOT detect a virus.  And opening the file with a text editor shows the Displaylink name hidden int he text, and  I saw a license agreement.  So that seemed fine.
But on the other hand if this is from Toshiba, why not put it on the Toshiba website?  That seems suspicious.  And why not send an email from Toshiba letting you know about it.  That seems suspicious.
Not like Toshiba at all...
Maybe this will show up on the Toshiba site soon?
Did some more digging.  That driver version shows up on a French site with a mention of WHQL, which is Microsofts certification program.
Also that exact file, with slightly different name shows up here - http://sewelldirect.com/USB-to-DVI-External-Video-​Card-High-Resolution_specs.asp
I checked the driver listed at the bottom of that page and they are a exact match with the link you provided, bit or bit byte for byte.  So if you trust sewelldirect.com then the file seems legit.
This signature left intentionally blank.

Similar Messages

  • IP spoofing.....possible? how? to which extent?

    Hi everybody!
    Thanks for your time in advance. Is IP spoofing possible in JAVA? If so how....can somebody give me a scenario? Also please let me know in detail that can i also hide the IP of my ISP or hosting server(i.e. where the application resides & executes)....
    I'll appreciate each & every detail. But i don't want to have answer of 1 or 2 lines please on this forum. If you really want to help me then do it in detail.
    Have a nice time.
    Attiq.

    This URL might help you: http://www.goto.info.waseda.ac.jp/~fujii/jpcap/index.html
    It is java wrapper roung standart unix library libcap - it allow programmers to write spoofed packets. Using this library you bypass tcp stack and you are responsible for creating valid ARP, IP ... TCP or UDP headers.
    Actually spoofing is just rewriting of ip headers with another - not valid IP. But if you send such packet you will not receive ANY reply - so actually you can't do real communication with spoofed packets.
    You may look at some security forums for more details.

  • Is this Phishing or for real?

    Received a message that looks like it came from the iTunes Store. I went to the iTunes Store, clicked on "Check for available Downloads", and entered my AppleID. It seems all media has already been downloaded. Has anyone else seen this? Is this just another Phishing Expedition? Lot of posts about hacked iTunes accounts these days. Thanks.
    "Dear XXXXX,
    Thank you for your recent video purchase on the iTunes Store.
    You may have experienced a grey or black screen while viewing your purchased
    video(s). Apple regrets any inconvenience caused by this issue and has placed a
    new copy of your video purchase(s) in your download queue, free of charge. To
    begin downloading, click this link:
    https://phobos.apple.com/WebObjects/MZFinance.woa/wa/checkForPurchases
    Alternately, you can open iTunes and choose Check for Available Downloads from
    the Store menu.
    Sincerely,
    iTunes Store Customer Support
    http://www.apple.com/support/itunes/ww"

    Howdy,
    I also did get a similar email to the 2nd one (cdboehmer's post) indicated in this , however, in my case, it was in English as it should be, and it is real. In my case, it was apparently a notification regarding Apples Sale's information, which I do only rarely log into and I do have an account with due to my affiliation with Apple.
    Of course, It's always good to be on the safe side, and ask if your not sure it's a a fake, say, here on these forums or where ever you can get some good advice, and remember, if you get an email with a 'link', instead, you can always type in a URL manually, instead of clicking on a link that may or may not take you to where it looks like it will take you, but could be a fake made to look like the real site to fake you out.
    Some applications also will show you the REAL underlying URL for the link, if you hover the mouse over the URL/link for a few seconds, and if it's not going to the right place but some other bogus web site, then it is most likely phishing/spam/UCE, etc...
    I was also able to validate in the email headers that it did come from Apple (although that too can be spoofed and could be lies).
    In this particular case, it's legit.
    The original and real email:
    ==============================================================
    From: [email protected]
    Subject: First notification:your Apple account has been inactive
    Please log in to your Apple account to avoid deactivation
    Our records indicate that your account has been inactive for 90 days. To keep your account active, you need to log into your account at least once every 90 days.
    To avoid repeating the registration process, please log into at portal.apple.com
    (the link here is: https://portal.apple.com/, which is real.)
    Thank you,
    Apple
    ==============================================================
    Hope that helps,
    Cheers,
    Daniel Feldman
    =======================
    MacMind
    Certified Member of the
    Apple Consultants Network
    Apple Certified (ACHDS)
    <edited by host>
    =======================

  • Changing MAC address (spoofing)

    Hello,
    I want to change the MAC address on a Mac Book Pro running OS X Leopard utilizing the command:
    +sudo ifconfig en0 lladdra 00:11:22:33:44:55+
    Even though the command does not give a warning, nor an error message, the MAC is not changed. In Tiger, it the same command did just fine.
    How do I enable MAC address Spoofing on OS X Leo? Is there any parameter to send to the Kernel?
    Mh.
    For somewhat ever reason, MAC address spoofing for the wireless interface (en1) still seems to work!?
    Makes me fell confused:-)
    Help strongly appreciated!
    Thanks,
    Chris

    This is how it works on my machine. Note the change of MAC address and because I am using DHCP it changes the IP address also. I have changed the MAC address in this info so as not to use my real one. So I am now running on the new MAC address. It will revert to the original on reboot, you would need a script to change it every time you restart the computer. Not sure why but this does not work on the airport.
    This is a nice exercise but why do you would you want to change it?
    regards
    Last login: Tue Oct 27 13:42:53 on console
    Computer-name-iMac:~ username$ ifconfig en0
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1492
    inet 192.168.0.2 netmask 0xffffff00 broadcast 192.168.0.255
    ether 00:1e:c2:aa:bb:06
    < cut>
    Computer-name-iMac:~ username$ sudo ifconfig en0 lladdr 00:1e:c2:aa:bb:07
    Computer-name-iMac:~ username$ sudo ifconfig en0 down
    Computer-name-iMac:~ username$ sudo ifconfig en0 up
    Computer-name-iMac:~ username$ ifconfig en0
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1492
    inet 192.168.0.3 netmask 0xffffff00 broadcast 192.168.0.255
    ether 00:1e:c2:aa:bb:07
    media: 100baseTX <full-duplex,flow-control> status: active
    <cut>
    Computer-name-iMac:~ username$

  • Load-balancing of transparent cache + IP spoofing + RTSP + MMS not working

    We have already in production an architecture with load-balancing of
    transparent cache + ip spoofing.
    We are unable to do the same for streaming flows (MMS and RTSP).
    We are doing PBR from our core network (2 * C6K) to redirect port 80, 554 and
    1755 toward CSS boxes, same in our access router (2* Ciso7200).
    In this config desired flows are redirected toward the CSS.
    Then CSS should load balance the traffic toward our BlueCoat proxy-cache farm.
    It's working fine for HTTP but we are unable to make it works for MMS and
    RTSP.
    Note that we are requiered to use ECMP to perform IP Spoofing on the CSS, meaning we need 4 routes for each client subnet (one route toward upstream C6K, and 3 routes for each proxy cache). We use acl to get rid off looping condition.
    Anyone who has already put in place Load-balancing of Streaming transparent cache + IP spoofing could give us some hint.
    Many thanks.
    Regards,
    Pierre Viennet

    Gilles, thanks for your input.
    Here where we are at with streaming implementation:
    - HTTP on all type off client is working
    - RTSP: TCP 554 with Real Media client is working
    - RTSP: TCP 554 with WMP not working, but it's due to a bug in Bluecoat implementation, the proxy send an error when he see a request with ( User-Agent: WMPlayer ) for RTSP content.
    - MMS: TCP 1755 not working with IP spoofing enable on the proxy but OK without IP spoofing...
    - UDP 554: not working
    - UDP 1755: not working
    I fully understand the limitation for UDP traffic.
    But I don't see why it's not working for MMS over TCP traffic.
    Note that I have the exact same configuration for RTSP and MMS.
    Why is it not working for MMS with IP spoofing? Are you aware of a difference on the way CSS handle MMS flows? or a specificity of the MMS protocol?
    Below what we can see on the different equipement when trying to launch a MMS over TCP Stream:
    c6k-Faaa#sh mls ip source 195.83.182.72
    Displaying Netflow entries in Supervisor Earl
    DstIP SrcIP Prot:SrcPort:DstPort Src i/f:AdjPtr
    Pkts Bytes Age LastSeen Attributes
    202.3.225.5 195.83.182.72 tcp :1755 :1504 0 : 0
    3 124 17 18:58:12 L3 - Dynamic
    202.3.225.5 195.83.182.72 tcp :1755 :1527 0 : 0
    2 84 3 18:58:20 L3 - Dynamic
    202.3.225.5 195.83.182.72 tcp :554 :1503 0 : 0
    4 360 17 18:58:06 L3 - Dynamic
    c6k-Faaa#
    CSS11503_CORE1# sho flows 202.3.225.5 | grep 1755
    202.3.225.5 38531 195.83.182.72 1755 0.0.0.0 TCP
    2/3 2/1
    202.3.225.5 1527 195.83.182.72 1755 195.83.182.72 TCP
    2/7 2/3
    CSS11503_CORE1# sho flows 202.3.225.5 | grep 1755
    202.3.225.5 38531 195.83.182.72 1755 0.0.0.0 TCP
    2/3 2/1
    202.3.225.5 1527 195.83.182.72 1755 195.83.182.72 TCP
    2/7 2/3
    CSS11503_CORE1# sho flows 202.3.225.5 | grep 1755
    202.3.225.5 38531 195.83.182.72 1755 0.0.0.0 TCP
    2/3 2/1
    202.3.225.5 1527 195.83.182.72 1755 195.83.182.72 TCP
    2/7 2/3
    CSS11503_CORE1#
    TCP 192.168.4.19:1491 195.83.182.72:554 TIME_WAIT
    TCP 192.168.4.19:1492 195.83.182.72:554 TIME_WAIT
    TCP 192.168.4.19:1493 195.83.182.72:1755 TIME_WAIT
    TCP 192.168.4.19:1502 195.83.182.72:554 TIME_WAIT
    TCP 192.168.4.19:1503 195.83.182.72:554 TIME_WAIT
    TCP 192.168.4.19:1504 195.83.182.72:1755 TIME_WAIT
    TCP 192.168.4.19:1525 195.83.182.72:554 TIME_WAIT
    TCP 192.168.4.19:1526 195.83.182.72:554 TIME_WAIT
    TCP 192.168.4.19:1527 195.83.182.72:1755 TIME_WAIT
    Many Thanks for your input.
    Pierre Viennet.

  • Real time threat detection

    Hello,
    To make real time detection more effective,
    how to find the Cisco device alert pattern for real time detection of attack?
    For example, SQL slammer worm, Cisco IDS will fire its related/specific signature. For any Trojan activity IDS will fire specific signature.
    But how to find a signature patter, or packet pattern for session hijack, ip spoofing and other IP based attacks? (not related to applications)
    Is there any knowledge source, which can show traffic/packet pattern generated by IP based attacks/protocol behavior in attack? What kind of alerts for what kind of attack, sequence of alerts, etc.
    I am using netForensics for real time threat detection; I want to make some rules which will match the IP behavior/IDS signature generation pattern in progressing attack.
    I am looking for such kind of knowledge base, if any one have experience in this please help me out.
    Regards
    Kapish

    hi, that was a cool link.
    But it didnt show any information on attack progress, stages of attack and alert pattern that normal Cisco IDS will generate for the same.
    I am looking for deep analytical information, which will show me how to correlate alerts manually. I am using netForensics, I want to make rules in it for IDS and PIX using my understanding to find attack at its point of progress.
    regards
    Kapish

  • My mac and iPhone 6  has been hacked! foresure! Antivirus sentinel pro from apple store detected apr or arp spoofing, thereafter Antivirus protection also got hacked, I turn network monitoring on they turn off like 3 times then they close Antivirus

    my mac and iPhone 6  has been hacked! foresure! Antivirus sentinel pro from apple store detected apr or arp spoofing, thereafter Antivirus protection also got hacked, I turn network monitoring on they turn off everytime then they close Antivirus for good, also Google.com is being imitated and not showing a true certificate (apr spoofing)?.these guys r good! I erased and reinstall Yosemite changed all passwords even on the wifi...could be wifi sniffing? I got Kaspersky hoping to use virtual keyboard for passwords and Kaspersky is comprised too..the virtual keyboard doesn't work it freezes up not allowing me to enter password. So I Uninstall and reinstall Kaspersky, so now I have problem with reinstall that doesn't work, then way later that day it is reinstalled..not over yet..that virtual keyboard now pops up randomly wanting me to use password? seems like they can copy anything real fast for i have to enter info like 2 or 3 times, never had that problem before. I'm thinking about going old school with paper docs and checks..yes technology ***...too vulnerable. .on the news they said 97% of businesses are hacked! can someone help me to counter this attack? thx
    Message was edited by: technologysux

    You have not been hacked. Get rid of all that antivirus. It is just making your life harder.

  • Spoofing IP and this scenario with standard ACL

    I have got Router R1 with two Fast Ethernets (e0 and e1),,,,network 172.168.2.0 connected to e0, network 172.168.1.0 connected to e1.
    If I want to black all IP spoofing attacks, that originating on the 172.168.1.0 network using a spoofed address outside the 172.168.1.0 range from being sent into the 172.168.2.0 network.
    However, all other traffic must be permitted.
    The access that has been applied to e1 as input filter is :
    Access-list 1 permit 172.168.1.0 0.0.0.255
    How does the access-list 1 can distinguish between the real ip address (belong to network 172.168.1.0) from the spoofing one,,,,because as we know that the spoofing ip, impersonate the real ip address

    You are correct; the router cannot distinguish between a genuine packet sourced from 172.168.1.x and a spoofed one.
    However, spoofing like this limits the options of the spoofers to merely a DoS attack as the return path will not be reachable. They cannot make a connection to your destination network.
    You could take a look at the Cisco Security Products (IPS) if you need more extensive filtering of packets.
    Regards,
    Leo

  • How an I prevent spoofed email using IronPort C160?

    As part of Security Awareness training and testing we contracted a company called knowbe4 to initiate some random spoofed e-mail tests into our domain.  Normally I would have figured this would fail because when email comes into the C160 and it has our @domainname.com on it, it needs to validate the DKIM signature, and if it was not sent from our organization, IronPort would not have signed it, correct?
    Anyway the security awareness organization was able to successfully send an e-mail inbound and make it appear as if it came from [email protected] (which we do not have a mailbox with that name, but I'm sure he certainly could have done research and used our real CEO's email address.).  In Outlook it does appear as [email protected] in the from box, but when you search message tracking for emails coming from that address you get nothing.  Upon further inspection of the e-mail headers, the message actually came from bounces+78188-4be9-username=[email protected]  So it matched policy DEFAULT for inbound mail policies and eventually it was successfully signed with domain key profile and DKIM profile matching [email protected], then queued for delivery.
    How can an email arriving from one server "morph" into another?  Is there some sort of vulnerability that this organization is taking advantage of, perhaps some kind of active script that the IronPort ends up acting upon to alter the email address and sign it so it passes through?  This was a test today, but we need to plug this hole because the bad guys are going to use this technique to make phishing emails look legitimate coming from internal users.

    I use knowbe4 as well, great phishing test templates, and what I found to work best to fight Domain spoofing are the following:
    - Implement DMARC/SPF/DKIM DNS records and keys - You will want to set these to passive initially. I personally recommend using dmarcian.com they have tools to help with implementation. Initially you will just want to be in monitor mode then start suggesting actions that gateways should take based on your DNS records. (This will protect your domain from being spoofed to gateway or provider that has DMARC/SPF/DKIM enabled)
    - Maintain your DNS SPF records (these are to used to help you authorize who can send emails from as your domains)
    - Here is a good how-to video for configuring your appliance to block domain spoofing. You will want to add any providers you want to allow to spoof such as ADP, training, and other third party vendors that generally spoof your domain to send emails to your employees. https://supportforums.cisco.com/video/11932126/configure-spoof-protection-exception-lists
    - Create a second mail flow policy similar to your allowspoof one, but turn off spam filtering, I called mine KnowBe4.
    - Create a new HAT and call that KnowBe4 and point it to the new policy. Add all the Knowbe4 or who ever your phishing simulation provider is to this HAT table. I suggest adding a description so you will know which ones to delete later on.
    You should now have taking care of e-mail spoofing, you will want to monitor this closely. Also if you are using Email Encryption you need to make sure the vendor's (even if using Cisco) gateways are added to your SPF record and your HAT table AllowSpoof list.
    Finally I would recommend enabling DMARC feature in your appliance, this will help filter out and report to email providers and gateways who is spoofing their domains, it will also increase your filtering power, but it does not stop all spam just one more thing to eliminate low hanging fruit.
    Knowbe4's test phish is a good way to test for spoofing, and your employees.

  • How can the IP-address be faked ('spoofed') when online?

    How can the IP-address be faked ('spoofed') when online?

    It depends on what you're trying to do.
    As mentioned, if you want a response, you have to have a valid IP address so that the remote system knows where to send the reply. If you're trying to hide your real IP address, though, then you can pas your traffic through a proxy server of some kind.
    In this setup your machine sends its traffic (e.g. a web page request) to the proxy server. That proxy server then relays the requests on your behalf and the server sees (and replies to) the proxy server's address. The proxy then relays the response back to you.
    In this case the remote server sees the proxy's address and not yours. However, the proxy server knows your address and may or may not log it.
    There are numerous open proxy servers on the internet - many of them used for nefarious reasons, but they're not hard to find.

  • Changing (spoofing) my MAC address?

    Does anybody know how to do this in Snow Leopard?
    I can only find info on how to spoof earlier versions online. Does anyone know how to spoof the MAC address on a Mac running OS X 10.6?
    Thanks

    This is how it works on my machine. Note the change of MAC address and because I am using DHCP it changes the IP address also. I have changed the MAC address in this info so as not to use my real one. So I am now running on the new MAC address. It will revert to the original on reboot, you would need a script to change it every time you restart the computer. Not sure why but this does not work on the airport.
    This is a nice exercise but why do you would you want to change it?
    regards
    Last login: Tue Oct 27 13:42:53 on console
    Computer-name-iMac:~ username$ ifconfig en0
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1492
    inet 192.168.0.2 netmask 0xffffff00 broadcast 192.168.0.255
    ether 00:1e:c2:aa:bb:06
    < cut>
    Computer-name-iMac:~ username$ sudo ifconfig en0 lladdr 00:1e:c2:aa:bb:07
    Computer-name-iMac:~ username$ sudo ifconfig en0 down
    Computer-name-iMac:~ username$ sudo ifconfig en0 up
    Computer-name-iMac:~ username$ ifconfig en0
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1492
    inet 192.168.0.3 netmask 0xffffff00 broadcast 192.168.0.255
    ether 00:1e:c2:aa:bb:07
    media: 100baseTX <full-duplex,flow-control> status: active
    <cut>
    Computer-name-iMac:~ username$

  • Spoofed caller id to get round anonymous block

    I have Caller Reject activated on my line, and anonymous calls are successfully rejected.
    However I'm now seeing a marked increase in spoofed caller IDs and answerphone messages about all sorts of offers. There are very few real UK numbers relating to these messages. It's possible that the calls originate overseas, but at least one identity has been 4444444444, so I doubt that's real.
    There's no great hardship because I simply delete the message; and if I'm actually at home and see a spoofed caller ID then I let the machine answer the call.
    I haven't been able to find anything about whether BT or Ofcom consider this abuse of caller ID to be a problem. Is there an official position on this? It would appear very difficult to do anything about, because the number is useless and the automated message is designed to be listened to live rather than responded to later: there's no real contact number included.
    (It may also be relevant that I'm registered with TPS, but I'm not ex-directory.)

    I have Caller Reject activated on my line, and anonymous calls are successfully rejected.
    However I'm now seeing a marked increase in spoofed caller IDs and answerphone messages about all sorts of offers. There are very few real UK numbers relating to these messages. It's possible that the calls originate overseas, but at least one identity has been 4444444444, so I doubt that's real.
    There's no great hardship because I simply delete the message; and if I'm actually at home and see a spoofed caller ID then I let the machine answer the call.
    I haven't been able to find anything about whether BT or Ofcom consider this abuse of caller ID to be a problem. Is there an official position on this? It would appear very difficult to do anything about, because the number is useless and the automated message is designed to be listened to live rather than responded to later: there's no real contact number included.
    (It may also be relevant that I'm registered with TPS, but I'm not ex-directory.)

  • IronPort Encyrption and Spoofing?

    We just recently deployed two IronPort IEA boxes. With our current configuration external recipients can login to our IEA boxes to send encrypted e-mail. When they use the "Automatically Blind Carbon Copy Me" option the system will send an e-mail to their real mail account so that they have a record of the e-mail.
    The problem that I am just now learning about is some of the recipients e-mail systems block these e-mails because we are spoofing their e-mail domain.
    Is there a "best practice" to apply here? I am currently advising the recipients to have their IT staff whitelist our IP addressess for spoofing but wanted to see what everyone else thinks.
    Thanks...

    Jason- Some mail gateways are configured to check SPF records and others block inbound mail with domain spoofing. Its a tough task to get the bcc messages through. I'm sure some other folks in the forum might have a work around (temp).
    Since you host your own keys (IEA) with push method (envelopes), why not use the manage messages section on the left pane for external users to retrieve their sent mail?
    Cheers,
    Kishore

  • How do I use Garageband for iPad with a real amp?

    I play with a guy down the street who has a couple of amps set up. The one I use is kind of limited in it's tonal qualities. In my twenties and thirties I would have no problem hauling my own amp down there to get my tones dialed in, but I'm forty freakin' seven and too old for that!  When I have tried to plug the iPad into my amp at home, I get terrible feedback.  I used to have a Rockman (remember those?) and I could take it with me and plug into any guitar amp set to clean and be good to go, how do I do that with my iPad and Garageband?
    I'm using a no name "y" cord with the 1/8" three ringed input into the ipad and a 1/8 stereo and 1/4 inch outputs-all sounds great on headphones, and with computer speakers, but need to plug into a real guitar amp.
    I am using a 50 watt Yamaha to test and am having no luck at all.  I know it has to do with impedance, but I am not very versed in how to get around it. 
    Thanks in advance!

    Okay, after fiddling around some more, I’m able to get–some-settings to work.    1) set the real amp to clean settings (duh).  Keep the volume on the low side (double duh). 2) stick to the smaller amps from the “clean and “processed” groups ofpresets. 
    The only way (so far) I’ve found to get some crunch is by turning the gain up on the GB amp you’re using,but only to a point, then I got feedback again. 
    Also, my “y” cord does have a name, it’s a GriffinTechnologies GuitarConnect Cable. I haven’t tried any of the other devices, so I can’t say if the feedbackwould be less irksome on other devices, but I kind of doubt it.

  • How to cause them to associate my Case Number 185689167 with the real phone number I need to be called at:

    I purchased a one year subscription to Acrobat Pro, and after installation on my MacBook, in the LaunchPad (aside from the normal Adobe Acrobat Pro, Acrobat Distiller, and Forms Central for Acrobat) a folder containing two icons.  The first was (I forgot the name) and the second entitled AAMLauncherUtil.  Shortly after installation I ran the AAMLauncher Util, and it downloaded and "updated" Acrobat Pro and installed Creative Cloud.  I was told by some person in Tech Support that I didn't need these two additional icons in LaunchPad, and I could just drag them to the trash.
    The folder would not go in the Trash, so I dragged them out of the folder and then the one whose name I don't remember was able to go to the Trash, but not the AAMLauncherUtil icon.
    I called Tech Support again, and got a technician whose name I will withhold, but although he tried to solve the problem, basically he was clueless and I could hear him asking other people in the background what to do and they were giving him suggestions, mucking around my library and deleting anything that sounded like it was associated with AAMLaucher, and in the end all he succeeded in doing was making my Creative Cloud not work anymore and produce messages that it was corrupted and had to be removed and reinstalled.  Finally he gave up and said that he was referring my Case 185689167 to the next level higher of tech support, who would call me within 24 hours.  Of course they never did that so I called Apple Support and a representative there went way beyond what he needed to do and we were able to uninstall and reinstall Creative Cloud and make it work again, although the AAMLaucherUtil icon remains there.  Currently, it doesn't update anything like it did the first time I ran it, or act like it is trying to update anything, but it does open Creative Cloud if you have closed it. 
    Several days later (not the promised 24 hours) I got an email from my Voicemail Service with a  transcribed message from Adobe Tech Support saying that they had tried to call me... at the number listed in my subscription payment details... NOT at the number I had told them to call me at, and since I am 7000 miles away from my billing number I didn't get the call.  The message requested me to call them back.  I did so, and the message on the VRU said I would have to wait approximately 30 minutes. Two and one half hours later (not 30 minutes) someone answered who was not Second Level Tech Support, and reiterated that it was not possible to transfer me to them, and he would note that I had called back and they would call me within 24 hours.... yeah right.  By then after waiting all that time to speak to someone I was so mad that I forgot to mention the correct number to call me at... although I had mentioned it previously.  Several days later (not 24 hours) they called the wrong number again, and when I didn't answer it then sent me an email that they were considering the case solved and closing it, and I could reopen it within 14 days. 
    I then called back and this time waiting 3 hours on hold, and the person who I spoke with (whose name I withhold for now) said he would reopen the case and they would call me within 24 hours... again he couldn't transfer me to them.  Again I forgot to reiterate the correct phone number that I had told them the first time since I was so mad about waiting 3 hours on hold.
    The next day, I realized that I had not reiterated the correct phone number, and I went into my account settings and changed the phone number in both places it exists, and then tried calling back to make sure they would call the correct phone number.  This time I waited on hold for 4 hours, and finally gave up without ever being able to speak to a person.
    The next day... still no call even to the wrong number since my Voice Mail would have informed me it there was a call.... I called Sales since that seemed to be the only way to talk to a real person, and screamed at them about this issue and was informed they couldn't do anything about Tech Support, or about associating my phone number with my case number, but he would put me in the queue for tech support since nobody was in the queue so they should call me back right away. 
    I did get a call in a few minutes, which said "If Valued Customer is available, press 1" so I pressed 1 and it went to music.  I then waited for 15 minutes of music with no answer, after which I got an email from my Voicemail Service transcribing the message saying:
    "Reschedule this call back for a later time press three to cancel this call back press nine. Your response was not recognized. Please try again. When valued customer is on the line press one to speak to a support specialist. If you need time to get valued customer on the line press two. To reschedule this call back for a later time press three to cancel this call back press nine. Your response was not recognized. Please try again. When valued customer is on the line press one to speak to a support specialist. If you need time to get valued customer on the line press two. To reschedule this call back for a later time press three to cancel this call back press nine."
    ... more. Please listen to your voicemail for the remainder of this message.
    They can't recognize me pressing 1?????  So who know... I was listening to music but did that mean I was really ever going to reach a real person, or was the Voicemail message correct and I would be listening to music forever?
    So this morning I tried calling again only to receive message the the Tech Support Telephone Lines were down for scheduled maintenance until August 10th... I tried chatting... that is offline also.
    Is there a way to associate my actual phone number with my case number... maybe somebody from Adobe actually reads these diatribes?  I need to be called at or after 17:00 Pacific time.... I was told the hours are on Pacific Time.... although  one representative who I was trying to coordinate the timing of the call with was very confused about the time zones. He was trying to tell me that the current time was 09:00 Pacific Time, which I knew to be wrong, and he finally admitted, after I challenged him to look on www.timeanddate.com, that it was  09:00 in Bangalore, and Pacific time was 20:00.

    Thanks for your answer TSN!
    I did try Chat yesterday and it didn't work.... said unavailable.  I'll will try it again. 
    I do understand that this is a Community Forum, but it appears that some Adobe staff persons do read and respond to some messages, so since all other avenues of contact seem to not work, I thought I would try this just in case somebody from Adobe happened to read it and could do something.
    A secondary reason I posted the whole explanation is that I thought maybe somebody else had experienced this issue as well and might comment on it.
    As for it being a problem or not, maybe it is not.  Adobe did work when I installed it.  When I invoked that icon "AAMLauncherUtil" the first time, it updated Acrobat Pro and Installed Creative Cloud (which the original trial subscription had not installed).
    I then noticed that these two icons didn't seem to do anything useful.  The first time I called and was able to connect to support, the rather poor attitude person who answered just said to delete both icons in the folder... that they weren't needed.  When I found that one of them could be deleted and not the other one "AAMLauncherUtil" could not be deleted, and since the tech support person had suggested deleting them both, I called back.
    The next rather clueless person in tech support spent a lot of time trying to help get rid of it, but couldn't.  When he was mucking around in the "Library" he deleted everything named "AAMLauncherUtil" from the Library (but left some stuff I would have imagined could have been deleted like references to my previous trial subscription.
    After he got done, Creative Cloud no longer worked and he couldn't figure out how to fix it... we were getting messages the Creative Cloud was corrupted and needed to be uninstalled.  He said he was going to refer the problem to a  higher level tech support, and that he couldn't transfer me there... they would have to call me which would be in 24 hours.
    The next day (since the higher level tech support failed to call back) I called Apple Support, and they helped me find a Creative Cloud Uninstaller and we ran that and re-downloaded and installed Creative Cloud again.
    I would expect from the name "AAMLauncherUtil" that this icon would Launch Adobe Application Manager and perhaps try to update my product(s) like it did the first time, OR report that my software is up to date... as most other software update attempts would do.  However what it really does now when I invoke the "AAMLauncherUtil" icon is just to open Creative Cloud just as if I had clicked on the icon in the top menu bar of my Apple Menu Bar.  The Apple person suggested that MAYBE it is supposed to do that if you have shut down Creative Cloud for some reason, and want to start it up again without restarting the computer.  Maybe that is so, but if it is, then I would have expected that they would have renamed the icon to Creative Cloud or something more descriptive of what it is supposed to do.
    As is is now, I am not sure if it is a leftover remnant of my original updated installation that should have gone away when I updated and it installed Creative Cloud, or if everyone else running Adobe Acrobat Pro XI has this icon in their Launchpad as well and it is supposed to be there for some unknown reason to perform some unknown function.
    After all that happened, I did update Creative Cloud, but that was within Creative Cloud itself when it reported having an update available, and not using the "AAMLauncherUtil" icon at all, so that would appear to negate it's possible update functionality wouldn't it?
    Assuming you are using a Mac, do you have such an icon in LaunchPad?
    Thanks for your help!

Maybe you are looking for

  • How to reassign new chart of accounts to company code

    I created company code, assigned fiscal year K4 to 4040 co. code. Later on I created Open/Close Posting period/Assign Company code to Fiscal Year. I prepared new chart of accounts 4040 for Canadian company. When I tried to assign 4040 chart of accoun

  • Blanket Po

    Hi All,    I created Blanket PO, for service material ( With Account Assi u2013 U and Item Cat. - B). But at the time of saving  i got ERROR,  Invoice receive indicator is set we can't save it. When i un-check this indicator in item detail under Invo

  • Why doesn't iPhoto backup as easily as iTunes?

    iTunes will span across several DVDs while backing up my data. But iPhoto, from what I understand, does not support a feature like this. Don't I have to go into my iPhoto library and actually copy the folder? Or am I missing something in how iPhoto b

  • Cprojects and Activity Management i CRM

    Hi, I have asked the same question below CRM without luck, so now I'm trying this forum... Has anyone of you explored whether there exist possibilities for triggering activies (CRM Activity Management) by doing changes in cProjects, e.g. changing sta

  • Paid sub for unlimited and Skype have put on other...

    I have account to call 41 countries, paid my subs but skype have credited to my general skype pay account, So now I pay to call landlines overseas, does nor come out of my 41 countries account, can you help please, username [Removed for privacy], Mon