Victim of hitech

Hi there, I think that I´m a victim of the image and sound technology. Why? I own a Sony MicroMv camcorder IP 210 that use the editing software Movie shaker, based on Quick Time 5, only. Now I both an Ipod photo, that´s based in Itunes with QuickTime 6 or superior only. There´s a conflict here. I need to choose one or another to use. I need help to the solution of this. tks. robson

Hello,
Your acount has been hacked. You should change both your Skype account and e-mail passwords immediately and that of your PayPal account. The ONLY way in which an account can be hacked is by the hacker either knowing (or "cracking") your password. For this reason Skype doesn't reimburse any assets lost due to an account being hacked.  You could also contact Paypal
TIME ZONE - US EASTERN. LOCATION - PHILADELPHIA, PA, USA.
I recommend that you always run the latest Skype version: Windows & Mac
If my advice helped to fix your issue please mark it as a solution to help others.
Please note that I generally don't respond to unsolicited Private Messages. Thank you.

Similar Messages

  • What is the safest way to learn whether or not my MacBookPro has fallen victim to DNSChanger?

    Hundreds of Thousands Losing the Internet in July?
    I didn't know if anyone else had heard about this, but the following article was recently published in the Denver Post.  Since the Denver Post usually checks this type of stuff out pretty thoroughly, I was wondering if anyone at Apple had heard anything about this event.  I don't use Microsoft or Internet Explorer, so I am hoping that my computer probably won't be affected.  But I was wondering if this was the sort of thing which other Apple customers ought to be learning about.
    FROM THE DENVER POST
    http://www.denverpost.com/breakingnews/ci_20444978/hundreds-thousands-may-lose-i nternet-july
    Hundreds of thousands may lose Internet in July
    LOLITA C. BALDOR Associated Press News Fuze
    Posted:
    DenverPost.com
    WASHINGTON—For computer users, a few mouse clicks could mean the difference between staying online and losing Internet connections this summer.
    Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down.
    The FBI is encouraging users to visit a website run by its security partner, http://www.dcwg.org, that will inform them whether they're infected and explain how to fix the problem. After July 9, infected users won't be able to connect to the Internet.
    Most victims don't even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.
    Last November, the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.
    "We started to realize that we might have a little bit of a problem on our hands because ... if we just pulled the plug on their criminal infrastructure and threw everybody in jail, the victims of this were going to be without Internet service," said Tom Grasso, an FBI supervisory special agent. "The average user would open up Internet Explorer and get 'page not found' and think the Internet is broken."
    On the night of the arrests, the agency brought in Paul Vixie, chairman and founder of Internet Systems Consortium, to install two Internet servers to take the place of the truckload of impounded rogue servers that infected computers were using. Federal officials planned to keep their servers online until March, giving everyone opportunity to clean their computers. But it wasn't enough time. A federal judge in New York extended the deadline until July.
    Now, said Grasso, "the full court press is on to get people to address this problem." And it's up to computer users to check their PCs.
    This is what happened:
    Hackers infected a network of probably more than 570,000 computers worldwide. They took advantage of vulnerabilities in the Microsoft Windows operating system to install malicious software on the victim computers. This turned off antivirus updates and changed the way the computers reconcile website addresses behind the scenes on the Internet's domain name system.
    The DNS system is a network of servers that translates a web address—such as www.ap.org— into the numerical addresses that computers use. Victim computers were reprogrammed to use rogue DNS servers owned by the attackers. This allowed the attackers to redirect computers to fraudulent versions of any website.
    The hackers earned profits from advertisements that appeared on websites that victims were tricked into visiting. The scam netted the hackers at least $14 million, according to the FBI. It also made thousands of computers reliant on the rogue servers for their Internet browsing.
    When the FBI and others arrested six Estonians last November, the agency replaced the rogue servers with Vixie's clean ones. Installing and running the two substitute servers for eight months is costing the federal government about $87,000.
    The number of victims is hard to pinpoint, but the FBI believes that on the day of the arrests, at least 568,000 unique Internet addresses were using the rogue servers. Five months later, FBI estimates that the number is down to at least 360,000. The U.S. has the most, about 85,000, federal authorities said. Other countries with more than 20,000 each include Italy, India, England and Germany. Smaller numbers are online in Spain, France, Canada, China and Mexico.
    Vixie said most of the victims are probably individual home users, rather than corporations that have technology staffs who routinely check the computers.
    FBI officials said they organized an unusual system to avoid any appearance of government intrusion into the Internet or private computers. And while this is the first time the FBI used it, it won't be the last.
    "This is the future of what we will be doing," said Eric Strom, a unit chief in the FBI's Cyber Division. "Until there is a change in legal system, both inside and outside the United States, to get up to speed with the cyber problem, we will have to go down these paths, trail-blazing if you will, on these types of investigations."
    Now, he said, every time the agency gets near the end of a cyber case, "we get to the point where we say, how are we going to do this, how are we going to clean the system" without creating a bigger mess than before.
      

    I have Windows capability but have never used it.  I can't imagine anyone using anything other than Pages for Word Processing, etc.  I use Safari and Firefox for Browsing.  I use Safari primarily and Firefox occassionally.  I have not used Internet Explorer for years and years.  In fact, I was sort of surprised when I learned that some people do still use Internet Explorer. 
    I wasn't sure whether or not there was an Ultra-Safe way to go about checking to discover whether or not Apple Users had to worry about a problem with this particular bug.  
    Although there IS a link provided in the Denver Post's on-line version of this particular news article, I hated to click on a strange link - even if it was provided by the local newspaper.  It is just as easy for the local newspaper to be fooled by bogus links as it is for anyone else to be fooled. 
    My understanding from friends is that there are a whole lot of local newspapers - all across the country - who are currently running this news article - or an article very similar to it. 
    So it would seem to me that a whole lot of Apple users all across the country might suddenly be wondering whether or not they have anything to worry about - and whether or not there was an Ultra-Safe way for Apple users to check all of this out. 
    I contacted my service provider about this issue but, so far, have not heard anything back from them.
    Thanks for the response.
    Sincerely,
    Hannah

  • HT201303 Has anyone experienced being a victim of GNU Emacs Api Emulations hacking thru URL's - Feeds - Email - Redirect - Data Scrabling and more? We are unable to stop them because they are super users. They come back and do more damage. Help Please.

    We have been compromised within our businesses from an empolyee that was terminated with GNU Emac Api enulation program that has infiltrated all of our brand new Apple Computers. We made a decision to move to Mac's this year because of all our businesses being internet based and we are in several different platforms that require many different passcodes, email address, bank accounts, etc. It is not one seamless system that would address one email, password, bank account, etc.
    Eacy time we change one segment of our business unit to move to the next one to fix, we go back to check the previous one that we changed and they have already been in the accounts and changed them so that we have to redo them.
    The information is so broad and wide that the only way I know to ask this first questions - has anyone had this happen to them? We have seeked many avenues with law, experts, reformating our 2 momth old systems 2-3 times each and start over. They are the super users of this program and we can not get them out by changing passwords, accounts, etc. They have everything we do and make sure they keep changing it as we work on the next segment. They have cost our small business thousands of dollars already.
    I am a victim of something that even the local forenic authority is stumped because they don't know where to start. We are not a banking instutition or 100 million dollar company to get the help we need. We don't want to find hackers like they have done to us, we want to get them stopped and get us back on track to start getting our businesses rebuilt.
    Lots of stuff, but WE ARE BEGGING for HELP.
    Apple Support today spent 3 hours with us on the phone and our suppot representative was awesome, but they also said it was big and we need to reach out to the Apple community to see if they heard of anything like this crime. They are in the URL's, RSS Feeds and ghosting everything we do.
    I was told by our local Mac support that this was done by someone that was highly sophicated and they did not know many people that could do this type of damage. I can't image that someone in the Apple community would not know of someone that can assist. The one security company we contacted was around $25,000 to fix this aweful crime.
    We just want them stopped and put in jail so we can go back to business before it destoys us completely.  They even installed emacs on all of our Iphone and androids. WE are being taped, video recorded and eery key stroke is recored. They are only taking us down in middle America.
    Anyone have any ideas? Thank you.

    Hi AP_In_Surbiton,
    I am really sorry that you have had so much trouble getting your Caller ID up and going.  I'll be happy to help you out with this and get it working for you.
    Could you drop me in an email please? Use the 'contact us' form in my forum profile under the 'about me' section. You can find it by clicking on my username.
    Thx
    Craig
    BTCare Community Mod
    If we have asked you to email us with your details, please make sure you are logged in to the forum, otherwise you will not be able to see our ‘Contact Us’ link within our profiles.
    We are sorry but we are unable to deal with service/account queries via the private message(PM) function so please don't PM your account info, we need to deal with this via our email account :-)”
    td-p/30">Ratings star on the left-hand side of the post.
    If someone answers your question correctly please let other members know by clicking on ’Mark as Accepted Solution’.

  • My beloved MacBook Pro (mid 2010) has been the victim of water damage.

    My beloved MacBook Pro (mid 2010) has been the victim of some water damage.  They cleaned and dried it out at Apple.  Now it turns on, the fan runs, the Apple logo screen pops up, and then it shuts down immediately.  Is this repairable, aside from the $1200 flat rate repair, or am I SOL?  Any ideas where to start or troubleshoot?  Any diagnoses?

    It is better to spend money on a new MacBook Air or MacBook Pro.
    Liquid damage is progressive.
    Best.

  • Is there something that needs to be done in response to deadlock victims?

    So, Friday I got a report by one user about an unusual error seen. It appeared to be a one time error that went away when the page refreshed.
    I went to the logs, tried to find an associated message to see if there were actions to take.
    (Boy, I wish there were a series of books for SP admins that covered all the event and ULS log entries and what action to take to resolve them)
    When I got onto one of the farm servers to look at logs, the event log had a number of unusual warnings and errors.
    I am taking a look at some of these to see if there is something that needs to be done.
    One of the errors - which has occurred 3 times in December - is related to the search software. One says "Foundation Search" and the other two say "Server Search".
    So, are these the kinds of things that an admin should just ignore at this noise level (3 in 2 weeks) or is there something that should be done?
    The warning is 57 and says that a database error occurred - a transaction was deadlocked on lock resources with another process and was chosen as the deadlock victim.
    The first 2 times the application was Search_Service_Application, while the most recent occurrence was
    'Search_index_file_on_the_search_server'.

    Hi Iwvirden,
    Deadlocks on SharePoint databases may cause performance issues in SharePoint.
    So if the error occurs on SharePoint content databases and occurs many times, then you need to troubleshoot this issue in SQL:
    http://blogs.msdn.com/b/grahamk/archive/2009/06/15/troubleshooting-sql-server-deadlocks-and-performance-when-running-sharepoint.aspx
    http://blogs.technet.com/b/christwe/archive/2014/02/06/what-can-i-do-about-the-deadlocks.aspx
    If the deadlocks occur on Search databases, then you can ignore them if there are not too many errors.
    http://blogs.msdn.com/b/sharepoint_strategery/archive/2014/02/10/sharepoint-search-and-deadlocks-in-sql-server.aspx
    By the way, the errors about search displayed in the ULS log should be checked as these errors may influence your search function.
    Best regards.
    Thanks
    Victoria Xia
    TechNet Community Support

  • I was a victim of the snatch thief, I wanted to know if all my details including all the pictures in my phone are being protected. are all If not how or what must I do to block an individual or individuals using my details?

    I was a victim of the snatch thief, I wanted to know if my details in phone including pictures are all protected? if not what must I do to stop them being use? I purchased music from I tunes store, is my credit details is safe? what about the songs, how to get them back? would them be store in my apple ID?

    Only way the thief can access the store is with your Apple ID password.
    You can redownload your songs when you get a new phone, and set up your Apple ID on it.
    It would be a good idea to go online and change your Apple ID password, and any other passwords you had set.

  • I am the VICTIM of Remote Deployment. HOW do I get out of it??

    I acquired the hacker in January.  In February both of my computers were destroyed.  I removed ALL forms of networking from my house -- TWC, all of my routers and adapters, etc.
    I went to Best Buy and bought a new computer, then another, then 2 more -- all getting hit with a prefab image upon getting close to my doorway.
    I am losing my home, etc, because I haven't been able to work in months.  This hacker finds me at the library, and wherever else I try to work, and he messes withmy typing, stalls my screen, empties my USBs.
    I believe I am the victim of remote deploymet, but how do I find where it is coming from?
    I used my (corrupt) Gateway recovery disks the other day and watched how ActiveX and other rd tools were listed.
    PLEASE, this has been going on for too long.  After  i gave up on computers, my house was entered nearly every day.  The police literally think I am insane. 
    What can I do???
    Warm regards,
    Angel

    Please call me directly at 919-637-0017. 
    I can't be sure to get logged on these days, but the answer to this question may possibly give me my LIFE back!
    None

  • Deadlock victim while concurrent users...

    Hello-
    I'm using Weblogic 6.1 SP3 and SQL Server 2000. In our application user create
    packages...When concurrent users click at the same time to create the package,
    application gets an error.
    Create Package Functionality Overview: we've got the table called pt_package(package_id,
    package_name, create_date, user_id). it has got relevant entity bean(PackageBean)
    and we call ejbCreate...that go into the table and generete the maximum id and
    then assign/create the package and write the details to the table.
    Err Clip from console:
    PackageBean : ejbCreate : java.sql.SQLException: [Microsoft][SQLServer 2000 Driv
    er for JDBC][SQLServer]Transaction (Process ID 69) was deadlocked on lock resour
    ces with another process and has been chosen as the deadlock victim. Rerun the
    t
    ransaction.
    Created Package Id : 3175
    ====> InterviewSession: createUniquePackage Remote Exception..
    java.rmi.RemoteException: EJB Exception:; nested exception is:
    javax.ejb.EJBException: ejbCreate: [Microsoft][SQLServer 2000 Driver for
    JDBC][SQLServer]Transaction (Process ID 69) was deadlocked on lock resources
    wi
    th another process and has been chosen as the deadlock victim. Rerun the transac
    tion.
    javax.ejb.EJBException: ejbCreate: [Microsoft][SQLServer 2000 Driver for JDBC][S
    QLServer]Transaction (Process ID 69) was deadlocked on lock resources with anoth
    er process and has been chosen as the deadlock victim. Rerun the transaction.
    at ejb.entity.Package.PackageBean.ejbCreate(PackageBean.java:173)
    at ejb.entity.Package.PackageBean_sf9ki2_Impl.ejbCreate(PackageBean_sf9k
    i2_Impl.java:197)
    at java.lang.reflect.Method.invoke(Native Method)
    at weblogic.ejb20.manager.DBManager.create(DBManager.java:519)
    at weblogic.ejb20.manager.DBManager.remoteCreate(DBManager.java:489)
    at weblogic.ejb20.internal.EntityEJBHome.create(EntityEJBHome.java:190)
    at ejb.entity.Package.PackageBean_sf9ki2_HomeImpl.create(PackageBean_sf9
    ki2_HomeImpl.java:116)
    at ejb.session.InterviewSessionBean.createUniquePackage(InterviewSession
    Bean.java:2035)
    at ejb.session.InterviewSessionBean_834tdn_EOImpl.createUniquePackage(In
    terviewSessionBean_834tdn_EOImpl.java:4856)
    at ejb.session.InterviewSessionBean_834tdn_EOImpl_WLSkel.invoke(Unknown
    Source)
    at weblogic.rmi.internal.BasicServerRef.invoke(BasicServerRef.java:305)
    at weblogic.rmi.internal.BasicServerRef.handleRequest(BasicServerRef.jav
    a:274)
    at weblogic.rmi.internal.BasicServerRef.dispatch(BasicServerRef.java:167
    at weblogic.rmi.internal.ServerRequest.sendOneWayRaw(ServerRequest.java:
    92)
    at weblogic.rmi.internal.ServerRequest.sendReceive(ServerRequest.java:11
    2)
    at weblogic.rmi.internal.BasicRemoteRef.invoke(BasicRemoteRef.java:136)
    at weblogic.rmi.internal.ProxyStub.invoke(ProxyStub.java:35)
    at $Proxy174.createUniquePackage(Unknown Source)
    at jsp_servlet._ppro._interview.__sitecheck._jspService(__sitecheck.java
    :192)
    at weblogic.servlet.jsp.JspBase.service(JspBase.java:27)
    at weblogic.servlet.internal.ServletStubImpl.invokeServlet(ServletStubIm
    pl.java:265)
    at weblogic.servlet.internal.ServletStubImpl.invokeServlet(ServletStubIm
    pl.java:200)
    at weblogic.servlet.internal.WebAppServletContext.invokeServlet(WebAppSe
    rvletContext.java:2546)
    at weblogic.servlet.internal.ServletRequestImpl.execute(ServletRequestIm
    pl.java:2260)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:139)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:120)
    If you have any idea abt this, please let me know. I read bea documents, where
    it says its due to insufficient number of connection. But I'm not very positive
    abt it. Cause we conducted the test on our develeopement server as we had initial
    5 connection and 15 as a max number of connection. We were only 4 person to test
    that...Still we got the same err.......???
    Thanx,
    Ashish

    Ashish wrote:
    Hello-
    I'm using Weblogic 6.1 SP3 and SQL Server 2000. In our application user create
    packages...When concurrent users click at the same time to create the package,
    application gets an error.
    Create Package Functionality Overview: we've got the table called pt_package(package_id,
    package_name, create_date, user_id). it has got relevant entity bean(PackageBean)
    and we call ejbCreate...that go into the table and generete the maximum id and
    then assign/create the package and write the details to the table.
    Err Clip from console:
    PackageBean : ejbCreate : java.sql.SQLException: [Microsoft][SQLServer 2000 Driv
    er for JDBC][SQLServer]Transaction (Process ID 69) was deadlocked on lock resour
    ces with another process and has been chosen as the deadlock victim. Rerun the
    transaction.
    If you have any idea abt this, please let me know. I read bea documents, where
    it says its due to insufficient number of connection. But I'm not very positive
    abt it. Cause we conducted the test on our develeopement server as we had initial
    5 connection and 15 as a max number of connection. We were only 4 person to test
    that...Still we got the same err.......???Hi Ashsish. This Exception is coming directly from the DBMS itself, and has nothing to do
    with weblogic. The issue is a DBMS deadlock, where one DBMS client has locked some
    page or database resource (let's call it resource A), and is going to try to lock some other
    resource B. Some other DBMS client has already locked resource B, and now wants
    to lock resource A. These two DBMS clients are deadlocked, and the DBMS recognises this,
    and chooses to kill one client's transaction in order to at least let the other survive.
    You should go over your tranasaction logic and DBMS locking to identify the locks
    involved in the deadlock, and then decide if you can alter your logic to ensure that
    every transaction locks A first, then B. It may also be an artifact of page-level locking,
    where one tx may inadvertantly lock logically unrelated data, just because it is on the
    same page as the logically relevant stuff.
    Joe Weinstein.
    >
    >
    Thanx,
    Ashish

  • Another victim of huge amounts of data being used, is downgrading a solution?

    I too am one of the latest victims of skyrocketing data usage on my 2 week old iPhone 4. I randomly got a text from AT&T this morning stating that I had used 65% of my 200MB data plan in just 10 DAYS. I am on wifi for 80% of the day and at work I only check FB, twitter, and the occasional email that comes through on 3G but otherwise it's all wifi. I've read wifi isn't running when it's asleep so maybe that's the problem. I deleted my iCloud account and made my phone ancient by only getting calls. Many of you say this started with iOS5 so I was thinking that downgrading may not even be an option but a necessity. AT&T can't help at all since the data used is "consistent" yet I had 3 Blackberries and my brother's Blackberry Curve ever go/went near 100MB, and this is from the latest Blackberry phones. I still have time to return the phone and get a new one but I'm hooked on it and don't want to lose it, it's just frustrating to go through this. Has anyone successfully downgraded the OS and noticed anything?

    How many email accounts are you accessing with the iPhone's Mail app?
    Any accounts that support push access for received messages?
    If not, is Fetch set to automatically check the account or accounts for new messages?
    If the answer is yes to either question and your iPhone is not connected to a power source the entire time it is in range of an available wi-fi network the iPhone has access to or is not being actively used the entire time it is connected to an available wi-fi network, connection with the wi-fi network will be dropped. If Cellular Data is enabled, your iPhone will use the cellular data or internet network to download emails in that situation. If you have Notifcations enabled for any apps, notifications received will be downloaded via the carrier's cellular data or internet network. If your employer email account is an Exchange account, push access is supported with an Exchange account for recevied messages and for contacts and calendar events. You can turn Push access off for email but if Fetch is set to automatic, the account will be checked for new messages and new messages will be downloaded when the iPhone is not actively being used. which will be over the cellular network unless the iPhone remains connected to a power source the entire time it is connected to an available wi-fi network.
    If your employer email account is an Exchange account, that is likely the culprit. Turn Push access off for received messages for starters and use Fetch set to automatic or manually.

  • Deadlock victim to the server

    Hi, all-
    One of my users got a red error message at the bottom of her screen when adding an order.  She could not write down all of it before the message disappeared, but she got "deadlock victim to the server".   SAP did not add her order at this point.  She then waited a bit and hit Add again - it then took the order.
    What does this message mean?  Should I be concerned? 
    Thanks,
    Shelby

    Hi Shelby ,
    If I were you ,I would be concerned .
    I am not sure where to troubleshoot but I would sugeest you to start from sql server
    1.Sql server - database -has it increased significantly
    if it is shrink the database - use Admininstrative guide
    2.  If it start occuring , detach and attach your database
    3. Make sure your sql server service is started automatically
    4. Also issue might be coming from addon if you have some .
    Before you do anything ,please make sure you have a full backup  and test it in your environment .
    Thank you
    Bishal

  • Reader for Mac 10.8.5. Downloading message is in chinese How do I stop this? Am I a victim of an Safari or Adobe vulnerability?

    Reader for Mac 10.8.5. Downloading message is in chinese How do I stop this? Am I a victim of an Safari or Adobe vulnerability?

    Don't know about downloading message. There seems to be a strange error in something which gives you a message in Japanese when trying to view a PDF from Safari.
    The message means "To view this file, first launch (open, start) Adobe Reader (the app, from Applications) and accept the license agreement, then quit".

  • VICTIM of technology

    guyz im pretty sure im just a victim of technology that your company and marketing advertise it and i think all people here who posting the problem in forum is the victim U better think about that!!

    Hello,
    Your acount has been hacked. You should change both your Skype account and e-mail passwords immediately and that of your PayPal account. The ONLY way in which an account can be hacked is by the hacker either knowing (or "cracking") your password. For this reason Skype doesn't reimburse any assets lost due to an account being hacked.  You could also contact Paypal
    TIME ZONE - US EASTERN. LOCATION - PHILADELPHIA, PA, USA.
    I recommend that you always run the latest Skype version: Windows & Mac
    If my advice helped to fix your issue please mark it as a solution to help others.
    Please note that I generally don't respond to unsolicited Private Messages. Thank you.

  • Victim of unauthorised activity

    I have been a victim of unauthorised activity it seems in Taiwan whereby the hackers have taken up three subscriptions costing me a total of £33. I would greatly appreciate if could redeem this amount by crediting my PayPal account.
    Thanks
    askyriacou
    Solved!
    Go to Solution.

    Hello,
    Your acount has been hacked. You should change both your Skype account and e-mail passwords immediately and that of your PayPal account. The ONLY way in which an account can be hacked is by the hacker either knowing (or "cracking") your password. For this reason Skype doesn't reimburse any assets lost due to an account being hacked.  You could also contact Paypal
    TIME ZONE - US EASTERN. LOCATION - PHILADELPHIA, PA, USA.
    I recommend that you always run the latest Skype version: Windows & Mac
    If my advice helped to fix your issue please mark it as a solution to help others.
    Please note that I generally don't respond to unsolicited Private Messages. Thank you.

  • IPS sensor event reporting showing source ip 10.5.5.5 victim ip 0.0.0.0- does 0.0.0.0 mean a broadcast?

    We have a internal node  in the environment and  our IPS is catching in the event logs stating it is sending traffic to victim ip 0.0.0.0.  I am assuming that 0.0.0.0 means a broadcast, is this correct?

    No, 0.0.0.0 is used as a summary address. If the signature was a port scan for example, the victim IP addresses may be too numerous to list, so Cisco uses the 0.0.0.0 address to indicate that is has summarized multiple addresses into that field.
    - Bob

  • I am victim in the third world

    hello to you ; i have big problem after buying an old iphone 5 from guy in market , buy it 250euros after us it 2 days it was blocked with apple ID and password ; how can i do ?

    You may see yourself as a "victim", but by purchasing gray (or black) market phones, you're actually participating in and perpetuating a criminal enterprise.
    There are a large number of stolen phones sold on the gray market. Why? Because you're willing to buy them to save yourself some money in an attempt to get something you normally couldn't (or wouldn't) pay for from a legitimate source.
    You are not a victim, you are part of the problem.
    Learn a lesson from this. There aint no such thing as a free lunch.

Maybe you are looking for