Someone's hijacking my bandwidth!

I have a little app called Menu Meters, which allows you to see the vital stats of your computer in your menu bar. The network monitor is showing that data is being downloaded through my AirPort at a constant stream of approximately 200 KB/second, sometimes more. I've quickly downloaded another little app called Net Monitor, and its more useful accompaniment Net Monitor Sidekick, but I don't understand much of what they're telling me. Net Monitor Sidekick shows a list of IPs and addresses, some in red and some in black, most of which I don't recognise. I've ordered them by "In Speed". login.keycom.co.uk, the address of my ISP that I have to login to every time I want to use the internet (yes, I'm at university) is downloading at 145 KB/s through port 1451, storage5.badongo.com is downloading at 110 KB/s through a private port, and so on. Doing whois and lookup on these addresses either come up with "refused" or a bunch of stuff I don't understand. This is very worrying - who knows what these people are doing to my computer? And they're using up so much bandwidth, all the time!
On a related note, I've noticed that my iSight camera sometimes comes on randomly - any clues as to why this is? Is it just a glitch, or is someone taking pictures of me remotely while I work? :S Virus scans have come up with nothing...
Any help or advice would be much appreciated.

Bacchus,
You mentioned being connected to the univ network. Assuming your connected via a RJ45 ( fat telephone type connector ) ethernet cable and not wireless, what you state could be true.
But only if the univ is using older shared ethernet hubs or coax cable network, and not current switched ethernet hubs.
The reason being, shared ethernet hubs ( or coax cable ) networks flood the local (lan) network because that shared networks doesn't know exactly what port on what switch your computer is connected to. So it floods all ports and then every computer on that lan has to look at EVERY packet on the net to see if its for it or not, if it not it trashes the packet and waits for the next packet.
If your on a shared net, what you report can be true, massive bandwidth usages, even if you are not sending or receiving anything. If in a few rooms down, someone is downloading files and your on the same lan network, your system will assign resources to EVERY packet on that network to see ifs for you or not.
Comcast networks uses shared lan networks, AT&T dsl does not. Try looking/browsing for other computers/printers on your shared networks and you'll see others on that local lan network.
AT&T uses a dedicated link from your house to the Central Office (CO) to a multiplexor. Switched hubs keep a map of what computers are attached to which ports and will only send packets destined for you.
Now if you really think someone is one your machine, find the Terminal in Utilities directory and open the terminal and type is ;
hostname% who
this will report all the users logged onto your machine at that time.
example below
hostname:~ username$ who
miked console Oct 9 12:59
miked ttyp1 Oct 9 13:00
debbym ttyp2 Oct 9 14:10
two users are logged in miked, and debbym
Check the command 'last' for past users that have logged into your mac.
example below
hostname:~ username$ last
miked ttyp2 Thu Oct 9 14:10 still logged in
debbym ttyp2 Thu Oct 9 14:10 - 14:10 (00:00)
miked ttyp1 Thu Oct 9 13:00 still logged in
miked ttyp1 Thu Oct 9 13:00 - 13:00 (00:00)
miked console hostname.local Thu Oct 9 12:59 still logged in
reboot ~ Thu Oct 9 12:57
shutdown ~ Thu Oct 9 09:27
miked ttyp1 Thu Oct 9 09:12 - shutdown (00:15)
miked ttyp1 Thu Oct 9 09:12 - 09:12 (00:00)
miked console hostname.local Thu Oct 9 09:11 - 09:27 (00:15)
reboot ~ Thu Oct 9 09:11
shutdown ~ Wed Oct 8 11:49
Good luck

Similar Messages

  • Someone has hijacked my email and is sending links to all of my contacts!

    Just got online to find I have 38 failure notices from emails I didn't send. In a copy of each message, there is a link at the bottom for something I've never heard of, and it appears that someone is sending these links in my name to everyone on my contact list. What should I do???

    Hi Robin!
    I'm sorry to hear that.
    Unfortunately this is the Firefox support forum and you will need to find help in your email provider.
    For now, I will recommend you to change the password of your email address. I can't give you the specific steps because that changes from provider to provider.
    Best,
    Ibai

  • Is someone Hijacking my webserver? I see Scrape: HTTP status code: 302

    Hi,
    I was recently looking at my console log, and noticed that I am getting many of these identical lines a day in the log file.
    Scrape: HTTP status code: 302
    Scrape: redirected URL: 218.5.72.126:8085
    The IP address is nothing to do with me.. I don't know who it is.
    I have found some information saying that someone has Hijacked my website.
    Does anyone know how I can stop this, or what I can do, or what I should do, or what it really means ?
    I don't really know what's going on, but it does not sound like something I should ignore.
    Thanks for your help,
    Keith.
    iMac 20" Intel, MacBook Pro C2D, MacMini Intel   Mac OS X (10.4.9)  
      Mac OS X (10.4.9)  

    Do you use a DNS forwarding or web forwarding service? Are you using 'proper' DNS at your end?
    Do any of your FTP or SSH logs indicate that someone has logged in using your details? Do you have any .htaccess files in your directory tree? If so, can you copy their contents here.
    A 302 error comes about during the last transaction on your server during a page delivery request. It would make sense that someone has gained entry to your server (somehow) and deposited a .htaccess file which is now doing the redirection. Some (unscrupulous) "Directories" do this to get themselves ranked higher up in search engines so you may want to check any code that they have asked you to place on your site to "help" you.
    StuG

  • My iPhone keeps calling someone I don't know

    Hi all,
    I have gotten three very irate calls from someone who's called ID is from Ohio.  He said my phone has called him over 40 times today.  I have no idea who this person is, and my call list shows no outgoing calls from anyone outside my contact list.
    What's going on here?  Is it possible someone has "hijacked" my number and is spam calling people from somewhere else in the country?  It apparently is my number that keeps calling him (he called me back, so he obviously has my number) but my call list shows nothing.
    What gives?

    I have received 3 phone calls today from people asking me to stop calling them.  I never dialed their number on my iphone, and there are no outgoing numbers to these numbers in my phone history.  The strangers are calling from Pennsylvannia, Colorado, and a No ID number.  Any thoughts?

  • Hotmail account hijacked???

    Hi. I am new to this forum and I hope someone can help me. I opened up my Hotmail account today and found 12 undeliverable messages to people on my contact list that contained spam from China. Someone has hijacked my Hotmail account (I think) and sent this to everyone on my list. At least 6 of my contacts opened the message and infected their own computer and contact lists. I know this because the same spam was sent back to me via one of their email addresses. My husband (a diehard PC user) insists that there is a worm on my computer that has caused this problem and believes that I probably got it from an infected email (I am extremely careful what I open. I do not take/use my MacBook outside of my home and we have firewalls installed on my computer and on our home network. I suspect my account was hijacked when (during a two day power outage) I accessed my hotmail account at the public library (I logged out of my account & cleaned the browser history).
    Is it possible that I do indeed have a worm installed on my computer? Has this happened to anyone else and does anyone know how to make it stop? I am concerned because it appears that I have transferred this mess to many, many people including hundreds of people on a contact list from my daughter's dance school. I have changed my hotmail password and security question but I am concerned that there may be something on my computer that could jeopardize the financial info on our network. Any help would be appreciated! Thanks in advance.

    It is possible that the library computer was infected before you used it. It then sent your login info to the person who infected it. That person could then log into your account and send the virus to all your contacts. Now that you changed your password, your hotmail account should be safe.
    I seriously doubt that your Mac is infected. OS X is very different from Windows... a Windows virus will not affect OS X and visa versa. Since Window is what 98% of computers run, that is what most viruses are made to infect.
    The infecter might spoof your e-mail address (use your email address as the from address even though a different account is actually sending the email), but basically the damage has been done and there isn't much you can do about it.
    To keep this from happening in the future you should only use computers or Wi-Fi networks that are known to be safe if you are doing anything online that requires a password.

  • Someone is using my email address and sending virus emails how can I stop this happening?

    Someone has hijacked my address book and is sending virus infected mail using my email address to other people in my address book. How do I get rid of this hacker from my Mac, and how do I prevent this happening again.

    Your mail account has almost certainly been hacked on the server, not on your computer, unless someone has had access to the latter.
    Log in to the mail server's web interface and change the password. If you use the same password for any other accounts, change those passwords too, and make them all different. Internet passwords should be random strings of at least 10 characters. You most likely don't need to, and should not be able to, remember them. They should be saved in your keychain and backed up with the rest of your data.
    One way to generate a secure password is the following. Triple-click anywhere the line below to select it:
    openssl rand -base64 10 | cut -c-14 | open -f -a TextEdit
    Copy the selected line to the clipboard (command-C). Launch the Terminal application and paste into the window that opens (command-V). A string of 14 random characters will appear in a TextEdit window. Use that string, or a substring, as the password. To generate another random string, press the up-arrow key and then the return key with the Terminal window active. You can then quit Terminal.
    If the compromised account is on Gmail, then changing the password may not be enough. Follow all of Google'sinstructions to secure it.

  • How do I move from the 3/23 to the 6/28 iPod updater?

    I have an iPod that I got a couple weeks ago, which came with the 3/23 1.1.1 iPod software. I now see that there is a 1.1.2 version available, but the instructions on the web for moving to the new iPod updater are not very specific. Here are the instructions from the web page and my questions with it:
    To install and open the iPod Updater:
    1. Open iPodsetup.exe on the iPod + iTunes CD or from the web download at www.apple.com/ipod.
    When I open ipodsetup.exe from the CD, it asks for a language (the title bar says that this is the 3/23 updater), runs for a while, then asks me if I want to completely remove the application. The directions say nothing about uninstaling the previous version. Is this what I need to do?
    2. Connect your iPod to your computer. If you are using USB, make sure iPod is connected to a high-power USB port on your computer. Be aware that USB keyboards and non-powered USB hubs generally do not have high-power USB ports.
    Do I need to have the new updater installed before I do this? What about iTunes - can it be running during this or must it be shut down? Remember, iTunes will start as soon as I plug in the iPod.
    3. Run iPod Updater 2006-06-28.exe from Start\All Programs\iPod\iPod Updater 2006-06-28.
    There won't be such a thing if I have done nothing but uninstall the 3/23 updater. Nothing here says to run the program that was downloaded from the Web. Am I supposed to run this downloaded program now?
    4. When iPod Updater opens, click Update or Restore.
    So, what is the exact procedure for Windows XP here?

    I would have posted this earlier, but someone was hijacking the secure login site ("*.112.2o7.net" was domain for their security certificate), so I couldn't login. Anyway, I got the updater installed properly, but as I suspected, there were a few gotchas that I evidently successfully navigated. Here's what I did (and again, this is on Windows XP):
    1. Downloaded the updater program.
    2. Shut down iTunes.
    3. Double-clicked on the downloaded program. It asked me for the language, then did a bunch of stuff.
    4. At the end of the install, it told me I needed to reboot, so I did.
    5. After reboot, I logged in again, and I got a popup saying that it needed to install some more stuff. I forget if I had to click on anything or not, but I let it go.
    6. WARNING! I never got a confirmation that it was finished - I just let it go for about 5 minutes and made sure there was no disk activity (i.e. my system was completely finished booting).
    7. I plugged in my iPod. After about 30 seconds of disk activity, I got a popup saying that my iPod was at 1.1.1 and needed to be updated. WARNING! This was not the same as the popup that it shows where you have a choice of update or restore - it was a different popup. In any case, I clicked the only button there was (I think it was labeled "OK").
    8. After another 30 seconds or so, I got the window that it shows in the instructions, which told me that my iPod was at 1.1.1, and giving me a choice for either update or restore. I cicked on "update."
    9. My iPod screen turned on, but showed the Apple logo. Then the iPod disconected itself from the USB (I got the two tones (high, then low) that mean something was unplugged from my laptop's USB port). WARNING! Don't touch anything while this is going on!
    10. After about 30 seconds, the iPod connected itself again (I got the two tones (low, then high) that mean something was plugged into the USB port). After a while, the Apple logo was showing on the iPod screen, but with a progress bar on the bottom. I waited until it was finished.
    11. The window came back on my laptop saying that my iPod was at 1.1.2, and the "update" buton was greyed out.
    12. At this point, I don't remember if I unplugged my iPod and plugged it back in or not (I know I would not have if the "Do not disconnect" screen was showing. In any case, after this the iPod was showing the "Do not disconnect" screen, but iTunes was not coming up. I started iTunes manually, and it did not see the iPod.
    13. WARNING! I had to run the "Safely eject hardware" wizard to disconnect the iPod (that made the "Do not disconnect" screen disappear, and then I rebooted my laptop again. This is a safe way to recover from the situation where you can't get the "Do not disconnect" screen to go away.
    14. After rebooting again, the iPod and iTunes worked fine.
    So, despite what the directions say, you do NOT need your original CD. Also, you must be patient. I think these problems being reported here are because people are getting impatient, or think the update is done when it isn't. *Once you start actually updating the iPod, you must wait until the window comes up saying that your iPod is at the new software level, and then you will probably need to reboot again.*
    Sorry for the length of this post, but I think it's important for many people to see exactly what to expect.

  • Has anyone else had a problem with receiving password reset authenticate emails to the email its supposed to go to but doesn't??

    I cant sign on to my main Itunes account so i try to authenticate by security question but its not a familiar one, its one that i have never used on anything but i go along and try every birthday in my huge family and nadda...so i try to go the way of the email authentication,this is where it gets a little more interesting...I send it off and it says ok go get it and i go and look and nothing. now i try this several different times and same thing but i have a reciept from 11/11/11 for music i purchased just 3 days earlier, but now its not working, so i try to get a reset on another account, another email address, still connected but not used and i send off the authentication and SLA-BAM...its right there in a spilt second. so whats the problem. I'm no expert, but theres something rotten in Denmark! I only got to get to where i actually got an email off to costumer support and that was a maze of redirects that really just confused the issue, AOL costumers call ! 800 BLAH BLAH to have the AOL overseas operator tell me I am an IDIOT for thinking AOL and ITUNES where in anyway connected likethat and i would have to contact Itunes support....I DID....THAT WHO TLD ME TO CALL YOU!!! Am i missing something...you cant make the best stuff in life up...the real shut is the funniest....I am sitting here just shaking my head...luckily I'm well balanced and basically a Whatever type but its baffling to me how some things can get so confusing by trying to make it user friendly. just have an american person at the end of a small pay line at the worst to talk to a living breathing being, instead of a computer that doesn't give you an option to just bypass and go to a person,no you have to try to reason with the machine to get what you want...lol i need some decaf, thanks A S C for a forum to vent, Keep Fighting The Good Fight! Cya

    If you aren't receiving password reset emails and your security questions don't work, someone has hijacked your account.
    This happened to me.
    You need to use Expresslane to contact iTunes support to regain access to your account ASAP.

  • Has anyone ever had a problem with usage calualtor not working, got a data over charge

    Been keeping track of my data usage from the general folder in settings. This past month I went over 3G's and when I tally up their recordings to mine it does not add up. Anyone else notice this problem.tks

    If you aren't receiving password reset emails and your security questions don't work, someone has hijacked your account.
    This happened to me.
    You need to use Expresslane to contact iTunes support to regain access to your account ASAP.

  • Is there any resources about how to write ADT?

    I know the adt is actrually abstract data type.
    but in our exam there are question about how to transfer java coding to adt
    I search internet there is books about adt in usa. but not accseable in malaysia
    there seemed no norm or free introduction site on help write or transfer coding to adt, is it?

    If you mean ADT as in <http://www.nist.gov/dads/HTML/abstractDataType.html>, and it isn't a computer science term that someone has hijacked to mean something different (eg 'assert' in java, 'action semantics' in UML), then by most of the collections classes are examples of ADTs; for example java.util.List is the ADT, java.util.ArrayList an implementation thereof.
    I'm not sure what you mean 'transfer coding to adt'; are you trying to create a mathematical description of your program to prove theorems about it, or are you using ADT more loosely and want advise on interfaces and enforcing pre- and post-conditions on your implementation methods?
    Pete

  • "INSERT ALL" bug

    Hello,
    Recently we have migrated from Oracle 9iR2 on Windows to Oracle 10.2.0.1 on 64-bit Linux. However, one of our scripts stopped working.
    Consider the following:
    INSERT ALL
    INTO Queries_Raw (q_type)
    VALUES (dummy)           
    SELECT dummy
    FROM DUAL
    where 0 = 1
    This query raises an "ORA-03113: End-of-file on communication channel". The Oracle DUMP file contains something like this:
    *** SESSION ID:(104.165) 2008-06-11 13:22:48.109
    Exception signal: 11 (SIGSEGV), code: 1 (Address not mapped to object), addr: 0x48, PC: [0x19428df, kksfbc()+5175]
    *** 2008-06-11 13:22:48.132
    ksedmp: internal or fatal error
    ORA-07445: exception encountered: core dump [kksfbc()+5175] [SIGSEGV] [Address not mapped to object] [0x000000048] [] []
    So obviously this is an internal error. As I mentioned, everything worked perfectly in Oracle 9i. Moreover, I noticed that the problem is related to an "AFTER INSERT" trigger on the target table (Queries_Raw). When I disable the trigger, the operation is executed with no error!!! This is very strange because the trigger does nothing special - all its code has been commented.
    Note: My actual INSERT statement is more complex and includes a couple of tables. I simplified it just to test and see what causes the error.
    So, did anyone face with such a problem? Is it a bug or is it some kind of restriction in Oracle 10g? I am now trying to register and open an account in metalink to contact the support but it will take some time. Until then any help would be appreciated!
    Thanks in advance.
    Best regards,
    Anna

    Bug 6317878 - Dump [kksfbc] from INSERT ALL with TRIGGER for certain datatypes
    [snip metalink contents]
    Patch 6317878 corrects this error.
    Message was edited by:
    Dave Hemming
    Shocked - Shocked! - that someone would hijack my account to paste metalink content.

  • What is "owner-pc-vaio". its in my shared column in Finder. would another computer using my wifi show up in the shared column?

    what is "owner-pc-vaio". its in my shared column in Finder. would another computer using my wifi show up in the shared column?

    If you're in a hotel, school, or someplace with public WiFi access, you'll see a list of all other computers on the network. 
    As opposed to the answers above, with or without sharing on, you will see others on the network and they can see you.  As long as you have sharing off, and even then, they'd not have unrestricted acces unless you disabled all password access, they can see you but they can't do anything.
    If you're on your own private network, someone is stealing your bandwidth.  Since it's a piece of junk Windows computer, you can find out how to send them a nasty virus over a LAN. 

  • IACu00B4s in Customer Namespace

    Dear all,
    I am running a problem migration IAC´s in Customer Namespace and external ITS to internal ITS.
    Example:
    In our SAP 4.7.1 we have IAC Services called /abc/xyz (/abc/ is our customer namespace registered at SAP). While publishing to external ITS the slash (/) is converted to Tilde (~) because slash has a different meaning in URL´s of course. So now I want to publish my IAC´s in ECC 6.0 using TA SE80 and publish to internal. The system tells me success but no service is created in ICF. I can´t even create a service /abc/xyz nor abcxyz in ICF by hand because of the special characters / and ~.
    So please can anyone tell me how to create my services in ICF?
    Kind regards
    Roman Becker

    Hi Roman,
    I am not an namespace expert, but as far as I know namespaces are reflected in the ICF tree by additional nodes in the hierachy. Lets look at BSP or ITS services: below /sap/bc/gui or /sap/bc/bsp you find the "sap" namespace node. Beside this node you should create your own namespace if you bought a namespace from SAP. In case of an ITS service this would be in your example /sap/bc/gui/abc/xyz or if you want to do it as SAP for its  own ITS services /sap/bc/gui/abc/its/xyz. As far as I know there is currently no protection of namespaces implemented in the ICF as they are known from other SAP development tools. So someone could hijack your namespace in the ICF which could lead to a name clash.
    Best regards,
    Klaus

  • Flash header question

    Hi, Ive been doing Photoshop work for some time and am now looking into doing some flash for my website. If you look at my header on my site http://www.monsterfishing.co.uk it is a Jpeg at the momment for the title. What I want to know is that if i replace the header with flash is there away that I can add code so that if someone has a low bandwidth connection it would not load the flash and use the Jpeg image instead. The reason being is I know how bad it is waiting for flash to load on some websites when bandwidth is limited and it would be good to give people the option upon loading. Any Ideas?

    I am speaking out of my league, but if there is a way of detecting bandwidth of a user, it is not likely built into Flash or HTML to be able to detect that.  You would probably need to use some server side scripting to test the connection speed.
    Flash content can be very efficiently designed, to the point of even carrying less weight than a jpeg file... it all depends what you want to put into it.  Too many people get carried away adding things into the file that could be better added dynamically or not used at all.  Flash files tend to blow up when you add images and sounds and videos into them.  Otherwise they are usually very light loads.

  • URL query string block?

    I was asked recently if there is a way to "block" the potential for someone to hijack a SWF by spoofing a variable via a URL query string.
    For example, if there was a path variable hardcoded in the SWF that is pointing to data XML file, but someone found your path variable and typed in:
    http://www.mysite.com/myFlash.swf?dataFile=maliciousdata.xml
    That could change the variable in the SWF correct? Is there a way to block this behavior? Maybe a trick? Was thinking of delaying the declaration of the variable in the SWF in order to "void" anything coming in via the query string but want to know if there are other methods that could be used.
    Thanks!

    Hi,
    in the old (AS1) days, url variables could become program variables. With AS3, you need to specifically retrieve them from an object
    Of course, if you create your swf to do that (perhaps to see different data files during testing), someone else could abuse the feature

Maybe you are looking for

  • Using a camcorder to record video and an interface to capture the audio

    Here is what I am trying to do: Use my camcorder to record the video and use a mic connected to an audio interface to record the audio portion of the video. Here is how my set up looks like: I have an M-Audio firewire audio interface connected to my

  • File to Proxy scenario message failed in ECC with staus SYSFAIL

    Hi All, We are working on File to proxy scenario,  PI  able to send message successfully to ECC, but  In ECC , message got  stuck in queues with the status 'SYSFAIL', when I read the error message it is showing Address Invalid. when I run the LUW, it

  • YouTube Problem With Flash

    Ever since I downloaded the latest Flash version...Version: 9,0,115,0 I cannot upload videos to YouTube. When I get to the upload page and click UPLOAD it just sits on connecting forever. And if I let it sit there for an hour or so it will eventually

  • Service entry and Acceptance without service PO

    Hi, Is it possible to create Service entry sheet and service Acceptance without service PO ? if yes Please suggest the Steps. Regards, Rani

  • RFC Structure

    Hi All, Actually, I am working on FILE->XI->RFC scenerio.The custom Function module created is the merging of 3 BAPIS which is used at the receiving end.But ,the Custom Function Module is having the response structure also while I need to work on Asy