Tango Text Virus?

Today I received an odd text message from some "Tango Text" app from an unkown number. It read something about how the app was free and to check out its URL to get more information. I have never even heard of, let alone used such an app. Little did I know I received a text from a friend asking me what the app was. When I asked about it they said I sent them the identical text message I received from earlier. This supposed text message did not show up in imessage in the conversation between me and my friend.
Has anyone else had this problem?

Yosemite Dog wrote:
Hit me with an unsolicited text & virus that forced-open messaging on my iphone, then forced open their spam text message.
Tango will steal contacts from your address book to SPAM them all.
Unless your iPhone is jailbroken, then it's not a virus.
Just delete the app.

Similar Messages

  • SAP Webservice returning HTML response instead of SOAP

    <br>Hi,
    I want to call a webservice created from an SAP function in SAP 6.40.
    When I test this webservice with the TCPGateway tool, if no application exception occured, I receive the correct response : the <b>SOAP</b> response message:
    <soap-env:Envelope xmlns:soap-env="http://schemas.xmlsoap.org/soap/envelope/">
       <soap-env:Body>
          <n0:ZWsCreateWagonResponse xmlns:n0="urn:sap-com:document:sap:soap:functions:mc-style">
          </n0:ZWsCreateWagonResponse>
       </soap-env:Body>
    </soap-env:Envelope>
    <br>But if an application exception occured in the web service, I receive the response message in <b>HTML</b> :
    500 Internal Server Error
    Error when processing your request
    What has happened?
    The URL .../sap/bc/srt/rfc/sap/z_ws_create_wagon was not called due to an error.
    The following error text was processed in the system LSD : Exception condition "ALREADY_EXISTS" raised.
    The termination type was: RABAX_STATE
    The ABAP call stack was:
    Function: Z_WS_CREATE_WAGON of program SAPLZ_WS_HU
    Form: EXECUTE of program CL_SRG_RFC_PROXY_CONTEXT ---- CP
    Form: IF_SOAP_APPLICATION_RT EXEC_PROCESSING of program CL_SOAP_APPLICATION_RFC ---- CP
    Form: EXEC_PROCESSING of program CL_SOAP_RUNTIME_SERVER ---- CP
    Form: EXECUTE_PROCESSING of program CL_SOAP_RUNTIME_ROOT ---- CP
    Form: EXECUTE_PROCESSING of program CL_SOAP_RUNTIME_SERVER ---- CP
    Form: EXEC_PROCESSING of program CL_SOAP_TRANSPORT_EXTENSN_ROOTCP
    Form: EXEC_PROCESSING of program CL_SOAP_HTTP_EXTENSION ---- CP
    Form: HANDLE_REQUEST of program CL_SOAP_TRANSPORT_EXTENSN_ROOTCP
    Form: HANDLE_REQUEST of program CL_SOAP_HTTP_EXTENSION ---- CP
    <br>When I call the web service in XI with a SOAP Receiver Adapter, I get the following exception (in case of application exception but also when no application exception occured) :
    com.sap.aii.af.ra.ms.api.DeliveryException:
    <br>invalid content type for SOAP: TEXT/HTML
    So, my questions:
    - how to receive a SOAP response instead of an HTML response in case of application exception in the web service ?
    - why do I get an Invalid content type exception when the response is well a SOAP response ?
    <br><br>Thanks in advance,
    Laurence

    Thanks for your response, Sandro.
    The webservice which I use has been modified. Now if it throws an exception, I receive well a SOAP message :
    <soap-env:Envelope xmlns:soap-env="http://schemas.xmlsoap.org/soap/envelope/">
       <soap-env:Body>
          <soap-env:Fault>
             <faultcode>soap-env:Client</faultcode>
             <faultstring xml:lang="en">ALREADY_EXISTS</faultstring>
             <detail>
                <n0:Z_WS_CREATE_WAGON.Exception xmlns:n0="urn:sap-com:document:sap:rfc:functions">
                   <Name>ALREADY_EXISTS</Name>
                   <Text>Virus scan profile /SIHTTP/HTTP_UPLOAD is not active</Text>
                   <Message>
                      <ID>VSCAN</ID>
                      <Number>033</Number>
                   </Message>
                </n0:Z_WS_CREATE_WAGON.Exception>
             </detail>
          </soap-env:Fault>
       </soap-env:Body>
    </soap-env:Envelope>
    About the exception managing :<br>
    - In my integration process, I include the send step in a block, with property <i>Exceptions</i> =
    ALREADY_EXISTS
    - In the send step, in property <i>Exceptions</i>, I add <i>System Error</i>
    ALREADY_EXISTS
    - I insert an <i>Exception Branch</i> in the new block, <i>Exception Handler</i>
    ALREADY_EXISTS
    Is that correct?
    Do I need to use Fault messages?
    And how do I get the error message ?
    <br>In transaction ST22, I have no dump.
    <br>If it is a problem of exception managing, why do I get also the error (<i>com.sap.aii.af.ra.ms.api.DeliveryException: invalid content type for SOAP: TEXT/HTML</i>) when all is right in the web service call ?
    Regards,
    Laurence

  • Response struct of SOAP in particular case (in 9i AS Soap Server)

    In Oracle9i AS Soap Server,
    If the method is void type, which type of response struct will
    be sent from 9i Soap Server?
    1) Omit the response struct.
    2) Return a response struct with dummy value.

    Thanks for your response, Sandro.
    The webservice which I use has been modified. Now if it throws an exception, I receive well a SOAP message :
    <soap-env:Envelope xmlns:soap-env="http://schemas.xmlsoap.org/soap/envelope/">
       <soap-env:Body>
          <soap-env:Fault>
             <faultcode>soap-env:Client</faultcode>
             <faultstring xml:lang="en">ALREADY_EXISTS</faultstring>
             <detail>
                <n0:Z_WS_CREATE_WAGON.Exception xmlns:n0="urn:sap-com:document:sap:rfc:functions">
                   <Name>ALREADY_EXISTS</Name>
                   <Text>Virus scan profile /SIHTTP/HTTP_UPLOAD is not active</Text>
                   <Message>
                      <ID>VSCAN</ID>
                      <Number>033</Number>
                   </Message>
                </n0:Z_WS_CREATE_WAGON.Exception>
             </detail>
          </soap-env:Fault>
       </soap-env:Body>
    </soap-env:Envelope>
    About the exception managing :<br>
    - In my integration process, I include the send step in a block, with property <i>Exceptions</i> =
    ALREADY_EXISTS
    - In the send step, in property <i>Exceptions</i>, I add <i>System Error</i>
    ALREADY_EXISTS
    - I insert an <i>Exception Branch</i> in the new block, <i>Exception Handler</i>
    ALREADY_EXISTS
    Is that correct?
    Do I need to use Fault messages?
    And how do I get the error message ?
    <br>In transaction ST22, I have no dump.
    <br>If it is a problem of exception managing, why do I get also the error (<i>com.sap.aii.af.ra.ms.api.DeliveryException: invalid content type for SOAP: TEXT/HTML</i>) when all is right in the web service call ?
    Regards,
    Laurence

  • The text 'Not Virus Scanned' is prepended to my subject lines

    In iCloud (mac.com) messages I send,   the text
    "[Not Virus Scanned]" - it is being pre-pended to the subject line.
    I hope that someone in the Apple/iCloud operations facility will actually look at what your
    systems are doing. And I hope it is not the user named  "Winston Churchill".
    Background:
    Back in August 2012, someone asked whether Apple was virus scanning emails:
    John W 1980
    Aug 8, 2012 4:12 PM 
    I reveived a password protected pdf by email. The subject line was marked [Not Virus Scanned]. Was this mark applied by the iCloud server?
    iCloud 
    This solved my question by Winston Churchill  on Aug 8, 2012 4:28 PM 
    Welcome to the Apple Community.
    No, it wasn't added by Apple
    See the answer in context 
    I have attached an email header (edited for privacy) to show this:
    "Oracle Communications Messaging Server" running on st11p00mm-asmtp004.mac.com
    Which is handling the messages, is running Fsecure Proofpoint, or something that is claiming to
    be - SO apparently iCloud IS doing virus scanning, and has chosen to corrupt our Email subject lines
    rather than simply stick to the conventional behavior of using SMTP headers to flag virus scan status.
    The outgoing subject was   "Re: ...."
    after passing through
    st11p00mm-asmtp004.mac.com ([17.172.81.3])
    (Oracle Communications Messaging Server 7u4-23.01(7.0.4.23.0) 64bit (built Aug
    10 2011)) with ESMTPSA id <[email protected]>
    Which IS an Apple system,
    the subject reads 
    [Not Virus Scanned] Re: ....
    What else is Apple editing on the email it handles?
    Return-path: <[email protected]>
    Received: from st11p00mm-asmtp004.mac.com ([17.172.81.3])
    by ms02552.mac.com (Oracle Communications Messaging Server 7u4-26.01
    (7.0.4.26.0) 64bit (built Jul 13 2012))
    with ESMTP id <[email protected]> for [email protected]; Thu,
    10 Jan 2013 19:40:24 +0000 (GMT)
    Original-recipient: rfc822;[email protected]
    Received: from [xxx.xxx.xxx.xxx]
    (cpe-xxx-xxx-xxx-xxx-.rr.com [xxx.xxx.xxx.xxx])
    by st11p00mm-asmtp004.mac.com
    (Oracle Communications Messaging Server 7u4-23.01(7.0.4.23.0) 64bit (built Aug
    10 2011)) with ESMTPSA id <[email protected]> for
    [email protected] (ORCPT [email protected]); Thu,
    10 Jan 2013 19:40:24 +0000 (GMT)
    X-Proofpoint-Virus-Version: vendor=fsecure
    engine=2.50.10432:5.9.8327,1.0.431,0.0.0000
    definitions=2013-01-10_09:2013-01-10,2013-01-10,1970-01-01 signatures=0
    X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0
    ipscore=0 suspectscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam
    adjust=0 reason=mlx scancount=1 engine=6.0.2-1203120001
    definitions=main-1301100166
    References: <[email protected]>
    <[email protected]>
    In-reply-to: <[email protected]>
    MIME-version: 1.0 (Apple Message framework v1085)
    Message-id: <[email protected]>
    Content-type: multipart/mixed; boundary=Apple-Mail-20--564984355
    From: XXX <[email protected]>
    Date: Thu, 10 Jan 2013 11:40:21 -0800
    To: YYY <[email protected]>
    X-Mailer: Apple Mail (2.1085)
    Subject: [Not Virus Scanned] Re: ....
    ---- end of attachment ----

    We're all just users here. Neither Apple nor anyone from the 'iCloud operations facility' monitors these posts.
    Nobody here has any inside knowledge of under what circumstances any emails are 'edited' (if in fact they are) by any email systems between sender and recipient.
    In 12 years of using Apple's email systems I have never seen a single email subject changed. However prepending text is not 'corruption'. Corruption means the data is unreadable/inaccessible. Adding a few extra characters does not make the subject unreadable.
    All responsible email providers scan email for viruses. From Google searches it appears that such a message is added by some virus scanners to the subject only when an email attachment cannot be read (such as a password protected file, or a deeply nested zip file) and it serves as a warning to the recipient to exercise caution before opening the email. How many users routinely check SMTP headers before opening potentially damaging emails?

  • Can't get rid of text enhance virus

    text enhance is doing my head in.
    I've disabled every extension, cleared the cookies, but it will not go away.
    The only extensions I have are:
    adban 2.3.1
    adblock plus 2.6.3
    norton toolbar 2014.7.3.12
    norton vulnerability protection 12.2.0.5 - 1
    updated adblocker for firefox 110.7.7
    webmail adblocker 4.25
    Please help, almost every word on every page is affected by this virus and I'm about to throw my laptop out the window.
    Regards, Alan

    Create a new profile as a test to check if your current profile is causing the problems. <br>
    See '''Creating a profile''':
    *https://support.mozilla.org/kb/profile-manager-create-and-remove-firefox-profiles
    *http://kb.mozillazine.org/Standard_diagnostic_-_Firefox#Profile_issues
    If the new profile works then you can transfer files from a previously used profile to the new profile, but be cautious not to copy corrupted files to avoid carrying over the problem <br>
    '''Profile Backup and Restore'''
    *http://kb.mozillazine.org/Profile_backup
    *https://support.mozilla.org/en-US/kb/back-and-restore-information-firefox-profiles
    *http://kb.mozillazine.org/Transferring_data_to_a_new_profile_-_Firefox

  • I have received text messages from mailer-daemon. Do not use my 4S for email. Is it a virus?

    I have received 2 text message from 'mailer-daemon'  I do not use my 4S for email. Is it a virus?

    No

  • Do I have a virus on my Iphone 3GS?  (Swedish scam text message)

    I Clicked on the link that got on text that said I´d won a free present? For mer information see http://www.dn.se/ekonomi/teknik/bluff-sms-installerar-spionprogram
    Is there any way I can virus scan for trojans?

    Hoongdaren wrote:
    Hi, can you help my how to clear my iPhone 3GS virus ???
    As noted above, there are no viruses that can affect an unjailbroken iPhone. If your iPhone is jailbroken, we cant help you. If it is not jailbroken, you don't have a virus. What is going wrong with your phone that is causing you to believe you have a virus?

  • How to remove a virus that is reported to be in the text animation files of Captivate 8

    The virus protection program ClamAV is reporting a virus Swf.Exploit.CVE_2014_0564-2 exploit. in several of the Captivate program files that are located in the programs/Adobe folder (some of the text animations swf files, interaction files, and widget files- there are several text animation files that are not infected). How can I remove this virus. I found out in other forums that many other people experience the same issue. But I could not find a resolution yet.
    The scan reported that the following files were infected:
    C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Blade.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Blue_Aura.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Blurrywave.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Cascade_Dive.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Catapult.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Cloning.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\DePlume.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Elliptical.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Fade_In.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Feather.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Fillin_Blanks.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Flashlight.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Flight.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Flowright.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Fly_Away.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Fog_Lifted.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Futbol.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Giftwrap.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Green_Globe.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Gridright.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Hori_Scan.swf: swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\illusion.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Leading_Star.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Light_Passage.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Matador.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Mini_Starburst.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Modflare.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Multi_Wake.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Ornaments.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Paradigm.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Passby.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Pastel_Prism.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Pivot.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Prismflow.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Pythagorean.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Raindrops.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Red_Hot_Skew.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Reflect.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Rotate_Left.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Shufflecards.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Sidestep.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Slant_Slide_Blinds.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Sliced.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Sliding.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Slidingblinds.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Spindle.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Spintop.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Square_Roll.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Starburst.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Stuff_It.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Swingstack.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Take_Two.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Topsy_Turvy.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Tossup.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Trailing_Light.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Transition.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Trans_Pivot.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Trickle_In.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Turnabout.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Twinkle.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Twinkle_Trail.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Twirl_flip.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Typing Text With Sound.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Typing Text.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Wake.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Waltz.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Waveripple.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Whimsy.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
    C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Windblown.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Windmill.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Wizard.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\TextAnimations\Zoomout.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
    C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Interactions\Digital Timer.wdgt: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Interactions\hangman.wdgt: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Interactions\hourglass.wdgt: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Interactions\memoryGame.wdgt: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Widgets\emailIcon.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Widgets\pocastIcon.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Widgets\print.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Widgets\videoIcon.swf: Swf.Exploit.CVE_2014_0564-2 FOUND
      C:\Program Files\Adobe\Adobe Captivate 8 x64\Gallery\Widgets\volumeControl.swf: Swf.Exploit.CVE_2014_0564-2 FOUND

    Here is an update on this issue. Maybe it will help someone else. After many months of working with Adobe support, they finally helped me to remove all viruses from my computer. This included Adobe Captivate cleaning up their Captivate 8 code and removing the Swf.Exploit.CVE_2014_0564-2 virus from their Captivate program files. As my research showed, the danger with this virus is that it seems to be dormant until a visit to a website that activates it and then it can destroy all your data (that terrified me when I read that and I made sure I had lots of backups in the Cloud). I got lucky and it did not get activated.
    As it turns out, it's not only the text animation files but also the widget animation files. Following is the final correspondence with Adobe. I hope the links work too.
    These are the fixed program files that Adobe uploaded for me to access https://www.dropbox.com/sh/cyelu2yvkc0f521/AADRYR3X0n3nM7lmIUNMQokWa?dl=0. However, do not use the "text animations folder", there was a little bug left and they sent me a replacement for the text animations here https://www.dropbox.com/sh/ymen27rrba75mc2/AABwsQjCmxdQHvkSx5Kjybo_a?dl=0
    These are the steps they had me take and it worked for me.
    Download and extract the SWF Animations from the TextAnimations folder
    Take a back-up of the old animations which are located at “<Captivate Installation Dir>\Gallery\TextAnimations\” and “<Captivate Installation Dir>\Gallery\Widgets\”
    Replace the existing animations with the new ones in the same folder
    Open your Captivate project and delete all the old animations which were inserted, and then close Captivate.
    Even though the animations have been deleted, Captivate still holds them as internal resources. Hence, the following tool must be run :
    Download and extract the files in the CCFix folder(Win 32-bit or Win 64-bit)
    Place AdobeCaptivateFix.exe, CleanResources.bat and CPProjectsNSlides.dll in the Installation folder of Captivate 8.1
    Run CleanResources.bat
    Captivate opens in a special mode, where you get a file browser.
    Choose the files to be fixed and proceed. The fixed cptx files will be placed in the same location as the original. A “_fixed” suffix is added to the new cptx.
    Captivate automatically exits after this.Your file is now fixed.
    Now open the fixed project and replace all the deleted text animations with the new ones.
    I scanned my computer with ClamWin again and it still found the virus. This time it was in the Captivate Cache. Maybe it was from fixing the old files. I deleted all Captivate Cache files and I no longer got a positive Swf.Exploit.CVE_2014_0564-2 found report from ClamWin. YIPPPIEEEEE!
    It took almost 200 hours of effort to repair infected files. What I don't understand is how Adobe can have a virus in their Captivate program files and then make us fix the infected files manually. I have asked them to write a program to fix infected files (how hard can that be to automate the steps they gave me?). I never got a response.  That seems really sad.

  • IPhone hacked or virus!  Text messages gone and phone freezing!

    CALL APPLE SUPPORT ASAP IF YOU HAVE THIS ISSUE!!!!  They don't respond to these discussions!
    (800) MY-IPHONE (800-694-7466)
    My wife and I woke up this morning with a text message on both our iPhone 5 and 4s (running on Sprint) for $10 for Microsoft Office.  We did not click on the text, but our text message app crashed.  Then our texts disappeared and reappeared after rebooting, and we deleted the suspicious text but could not access any of our other texts.
    It has been hours later and we can't text and our messages are there and then gone, our phone keeps on freezing on other apps, and my iPhone 5 screen is flickering.  We both received another $10 Microsoft Office text and were able to delete it again. 
    We have rebooted, turned off, let the phone rest 30 minutes off, etc. and our phones are still worthless.  They appear to work for a while and then start acting up again.
    I called Apple  (800) MY-IPHONE (800-694-7466) and spoke to a senior customer assistant, Brittney, who said I was the only person reporting this problem.  I told her there were threads here with the exact same issues and she told me they don't respond to problems reported here since it is just a discussion board and only do something if you call them. She suggested for me to do a full restore to factory setting on my phone but showed no real concern why this happened to our phones... 
    Our phones either have been hacked or have a virus and this is a huge issue!  If you have this problem, please call Apple ASAP.

    breckenridge4daze wrote:
    Virus contamination of a non-jailbroken iPhone hasn't been documented yet- that doesn't guarantee impossibility.
    No, it doesn't. But it's highly unlikely that is what happened.
    A single text message should not result in a crashing of the Messaging app, nor freezing of the entire phone, nor automatic shutdown as it's resulted in at least seven people within the forum today.
    There are/were several documented bugs that could cause EXACTLY that behavior when receiving a malformed text message.
    Note that none of this constitutes "infection" of the phone, or "hacking" as in unauthorized accessing of information by a third party.

  • I am getting strange numeric symbols or tiles instead of text when using Firefox. Repeated reloads and virus scans have not fixed it. I can't find a patch. Help! I hate IE!

    Each time I open Firefox, I get blocks or tiles of numbers for each character instead of text. The tiles appear as composites of four digits, stacked two by two. At some websites, normal text does appear in boxes but mostly as this numeric gibberish. The functionality of the Firefox software does not seem to have been affected. But if I can't read it, I can't use it.

    Try to set the pref <b>gfx.font_rendering.directwrite.use_gdi_table_loading</b> to <i>false</i> on the <b>about:config</b> page.
    To open the <i>about:config</i> page, type <b>about:config</b> in the location (address) bar and press the "<i>Enter</i>" key, just like you type the url of a website to open a website.<br />
    If you see a warning then you can confirm that you want to access that page.<br />
    *Use the Filter bar at to top of the about:config page to locate a preference more easily.
    *Preferences that have been modified show as bold(user set).
    *Preferences can be reset to the default or changed via the right-click context menu.

  • Is there a new virus that affects Firefox? My browser is fine for a while and then the text will disappear, also some of the control buttons.

    This has been going on at least 3 months with the browser. The back arrow will disappear, sometimes the text completely disappears, sometimes you can see it but its unreadable, looks like the letters are missing pixels. Sometimes the images get corrupted with black pixelation. If you quit and restart it goes away, for a while.
    The problem seems to be affecting my online games as well. I play "Steampunk Tower" on Yahoo!'s free game tab and it always crashes my machine hard, as in abruptly shuts down the system with no warning. This is not the only game to be affected.
    I have both McAfee and Norton 360 and they find nothing when I scan, but they can only detect what they know about so I'm looking for something new and unreported. Or maybe an update failed or has corrupted a file, I don't know. I do know that its very irritating and I'd like to fix it, if possible.

    hello, maybe that's an issue with hardware acceleration - please try [[Upgrade your graphics drivers to use hardware acceleration and WebGL|updating your graphics driver]], or in case this doesn't solve the issue or there is no new version available at the moment, disable hardware acceleration in ''firefox > options > advanced > general''.

  • VZW to VZW text messages have call back number in every message after Tango update

    First of all I want to say how much I appreciate VZW rolling out the WP updates in a timely manner for once (is this the first time they've ever done so, for any phone?), even with the outdated technology (or just the one device), and I'm sure it'll keep us WP faithfulls happy for a little while longer. However I do have an issue with the latest update because it seems like VZW has been affected in such a way that now I have a "Call back at xxx-xxx-xxxx" after every text message received from a Verizon customer. At first I thought it was my friends and family telling me to call them back, and I did (to some degree of annoyance caused me and others) and now its just a plain nuisance. Some web perusing resulted in a few others having the same issue and only on verizon so far
    I know who's texting me at any given time because their names are displayed on top and if I want to call them all I have to do is tap the name (and if no name then the number is so displayed), so displaying "call back at" so and so is just unnecessary and only serves to clutter up an otherwise clean nested message history/interface. So my question is there a way to disable this (which I have yet to find) or does VZW know about this error and plan to fix it, hopefully very soon? Or is this an issue with microsoft?

    I found the answer to this problem.  I think it depends on what kind of phone you have, but I was able to turn off the CB# in the messages.  I have a Samsung Stratosphere.  I was able to go into Messaging, then the menu icon, then choose Settings.  Under the settings there was a choice called Callback enabled.  I was able to to uncheck this choice and now my callback number no longer shows up.  Hope this helps everyone!

  • A friend just texted me and said that my computer has a virus because it is sending emails.She told me to change my passwords on my email act. (which I did) and on m Facebook acct. which I did.  She said that I should run a virus scan on my computer.

    I have a Macbook Air.  How do I check to see if I have a virus.

    The following from the User Tips section of the forum has some good advice: Viruses, Trojans, Malware - and other aspects of Internet Security
    I don't know if it is discussed in there, but every case recently where I have been receiving spam emails from friends of mine has been due to the password on their email account being hacked rather than from any malware on their Mac or PC computer.

  • How do I get my GUI back, alot of my sites are just text now.

    After upgrading to Ver 9.0.1, all of my email sites ( Digitalpath, Hotmail and Aol) and a lot of other sites (Amazon, Download, Ancestry) are now text based.

    Make sure that you allow pages to choose their colors and that you haven't enabled High Contrast in the Accessibility settings.
    *Tools > Options > Content : Fonts & Colors > Colors : [X] "Allow pages to choose their own colors, instead of my selections above"
    *http://kb.mozillazine.org/Website_colors_are_wrong
    *http://kb.mozillazine.org/Websites_look_wrong
    If images are missing then check that you aren't blocking images from some domains.
    *Check that images are enabled: Tools > Options > Content: [X] Load images automatically
    *Check the exceptions in "Tools > Options > Content: Load Images > Exceptions"
    *Check the "Tools > Page Info > Media" tab for blocked images (scroll through all the images with the cursor Down key).
    If an image in the list is grayed and there is a check-mark in the box "<i>Block Images from...</i>" then remove that mark to unblock the images from that domain.
    There are also extensions (Tools > Add-ons > Extensions) and security software (firewall, anti-virus) that can block images.
    *https://support.mozilla.org/kb/Troubleshooting+extensions+and+themes
    *http://kb.mozillazine.org/Images_or_animations_do_not_load
    *https://support.mozilla.org/kb/Images+or+animations+do+not+show

  • How to open text URL in the new tab

    Hi guys,
    We know that when we click on a hyperlink it will directly open the linked web site, e.g.
    www.bing.com
    But sometimes we may find some URL in plain text that we couldn't click on it, e.g. www.bing.com
    I'll have to select the URL and copy&paste it to a new tab to open it, this is time wasting.
    The time IE 9 came out, I found a wonderful add-on, Open URL in New Tab (with Preview)
    This will do the trick to open the text URL in the new tab by right click on it.
    http://www.iegallery.com/us/addons/detail.aspx?id=3614
    But I don't like two things of it.
    1st, it will try to preview the web site when I using it which is undesired.
    2nd, it will open the link through another site and then jump back to the link I need to open. But I'd like to open the link directly. Which will open the link more quickly also save my time.
    Questions:
    Is there any other way to open the plain text URL directly? I mean without copy and past it to another page.
    It would be great if I can open the URL by dragging it like the other...

    Is there any other way to open the plain text URL directly? I mean without copy and past it to another page.
    In these forums?  If you are using the NNTP Bridge you could view your message in your News reader's Plain text mode and then see that your two examples worked equivalently.   <eg>
    Otherwise, in general, I agree there are some pretty obvious "accelerators" which could have been provided.  
    I suspect much of the problem will be due to "security".   E.g. Windows used to have a functionality called text scraps, where you could select some text and drag and drop it just about anywhere to create a scrap file.   That's
    not working for me any more either.   If it were we could at least drag it to the Address bar and press Enter...
    http://technet.microsoft.com/en-us/magazine/2008.02.windowsconfidential.aspx
    (Microsoft search for
       text scraps
    <quote>
    virus writers loved this
    </quote>
    QED

Maybe you are looking for