Virus, or okay someting that piggybacks from my system, detected

Hi,
I just received a note in my e mail box that a W32/mytob.dam!zip virus was sent from my .mac account to a computer. through a search of the forums, I understand that " a mac can't get a virus but it can transfer one though e mail attachments"
since I cannot remember sending an attachment lately, I find it strange.
Anyhooo....
I'm downloading ClamXav as we speak, but a problem that I also discover is that my Virex 7.5 is disabled in 10.4.3. grrrrr why that? and how can I reactivate it?
also, how do I get rid of this "low risk ( according to McAffe)" W32/mytob thing once I find it?
thanks and take it easy,
BBP/BR

yeah adrian I hear Ya...
breaking up editing to look for some stupid worm or whatever is not my idea of fun.....
but in any case just ran ClamXav on my iBook and it seemed fine, now I'm gonna work thru my Pwrbk.
But the Virex situation is inconvenient. it was a bundled part of my Pwrbk when I got it with 10.3
back in my PC days, I was fanatical abotu virus scanning. ( as You are probably aware with good reason) found something new every other week in my mailbox.
and although in the nirvana of Macland we don't get threse nasty things, it's kinda like saying "oh I don't have herpes, I'm just a carrier"
thanks for Your input. anyone else got advice/2 cents to put in?
BBP?BR

Similar Messages

  • To retain the same file name in target(File) that coming from source system(AS2).

    Hi All,
    I have a requirement to send the two file from the third party system(GXS) to SAP ECC via SAP PI(version - 7.4). We are using AS2 adapter at the sender side to pick the file and using File Adapter to place the file in ECC.
    Its a pass through scenarion(No ESR part is used).
    Requirement:
    We are going to get 2 files ->Example:  one from Axis and another one from ICICI -> each bank file will have a file name ->
    We have to post the file at the target system with the same name as source file name, the source file name could come dynamically(with diff time stamp).
    Please let me know, Is it possible to achieve the above requirement(we have to retain the file name in target that coming from source system) with Sender AS2 adapter, If yes then please suggest the best approach.
    Regards,
    Pradeep Bawlia

    Hi Guys,
    The above requirement is solved now.
    Solution - I used java mapping for extracting the same source file name and assignning the same to the target system.
    Code:
    public class ExtractFileName_ASMA extends AbstractTransformation{
    public void transform(TransformationInput in, TransformationOutput out) throws StreamTransformationException  
    DynamicConfiguration conf=in.getDynamicConfiguration();
    DynamicConfigurationKey key_AS2FileNmae = DynamicConfigurationKey.create("http://sap.com/xi/XI/AS2/AS2", "AS2Filename");
    DynamicConfigurationKey key_FileNmae = DynamicConfigurationKey.create("http:/"+"/sap.com/xi/XI/System/File", "FileName");
    String As2FileName=conf.get(key_AS2FileNmae);
    conf.put(key_FileNmae, As2FileName);
    try{
    byte b[]=new byte[in.getInputPayload().getInputStream().available()];
    in.getInputPayload().getInputStream().read(b);
    out.getOutputPayload().getOutputStream().write(b);
    catch(Exception e)
    2. Another solution we can use the graphical mapping and need to use the dynamic config UDF at mapping level to acheive this requirement but here is one drawback - we need to do content conversion is this case.
    In case of Java mapping, no need to play with source file.
    WITHOUT USING ESR, WE CAN NOT ACHEIVE THIS REQUIREMENT.
    Regards,
    Pradeep Bawlia

  • My service tag give me download links that other from my system inpiron 3000

    Hello ive Dell 3000 15.6 and cant install 2 drivers from my unique service tag page.
    the bad drivers is for SMBUS & USB , without those there as a lot of freezes and blue screens (usb issue)
    tried to get answers by phone and cant.
    hope for some help

    any idea what to do ? maybe service tag needed

  • Creating Support Messages from Satellite System without SolMan user account

    Hi
    We are having some problems with users "creating support message" from our ECC system  to SolMan, if the user does not have a user account in Solution Manager.
    It is not correct, that users from Satellite systems can create support messages from these systems, without the user having an account in Solution Manager? And that the user is identified by the business partner for the user, that must exist in the Solution Manager system ?
    We have set up the RFC for the supportmessages between SolMan and the ECC system as trusted RFC, with the "Current user" as the user, but how should this be set up, if the user does not have an account in the Solution Manager system. If we enter a user with the right authorizations in the RFC, will the messages that come through not just appear as created by that user, instead of the ECC user and corresponding business partner ?
    Regards
    Lars

    Hi,
    you can use the use the user for the RFC-Connection in that case. I have customizied a similar scenario. In my scenario the System from which the message was created, is the business partner (SOLD-TO-PARTY). For that you have to create a communication user (i.e SOLMAN<SYSID>). In TA SM59 in the satellite-system you assign this user for the connection. (Don't forget to assign the user to the role "SAP_SV_FDB_NOTIF_BC_ADMIN"). Now, it schould be possible to create messages from the satellite system to the solution manager. Additionally you should create business-partner for each user of the satellite system, by using TA DSWP>EDIT>CREATE BUSINESS PARTNER.
    With this TA, it is easy to create BP for each satellite system.
    Best regards
    Marc

  • I have a jailbroked iphone,and  it seems that it has some viruses how can I remove them from my iphone?

    I have a jailbroked iphone,and it seems that it has some viruses how can I remove them from my iphone?

    You have viruses because you jailbroke your phone, and now you're probably spreading them to other phones. Nice.
    Jailbroken phones are generally bricked for good. Throw it away, it's junk.

  • I have a virus on my iPad that sends out bogus emails to everyone in my contact list. I don't know where it came from (email, apps not from iTunes, etc) but it sits somewhere on my iPad. Does anyone know of a scanning app that will find and eliminate it?

    I have a virus on my iPad that sends out bogus emails (no subj and an URL that goes nowhere) to everyone in my contact list. I don't know how it got on my machine (email, non-iTunes apps, etc.) Does any one know of a scanning app that can find this virus and eliminate it? I have an iPad version 3 (WIFI) with 6.0.2 IOS. This scanner should be capable of running on my iPhone as well -- just in case it made it to to my other IOS machine. Thanks for your help! Steve

    The chances that it's a virus on your iPad or iPhone is very slim. Who is your mail provider? it's far more likely that your address has been spoofed and it's your mail service that has been compromised not your iDevice. I know my Yahoo mail was hacked and people in my address book received spam mails that I didn't send.
    have you changed the address on your e-mail account?

  • I was told by comcast that we had a computer in the house with a malware virus, they even said that they were going to terminate our service if we did not get it fixed. Now this week we hear that there is a trojan malware virus, how do we get rid of it?

    I was told by comcast that we had a computer in the house with a malware virus, they even said that they were going to terminate our service if we did not get it fixed. Now this week we hear that there is a trojan malware virus, how do we get rid of it?

    Hello,
    Flashback - Detect and remove the uprising Mac OS X Trojan...
    http://www.mac-and-i.net/2012/04/flashback-detect-and-remove-uprising.html
    In order to avoid detection, the installer will first look for the presence of some antivirus tools and other utilities that might be present on a power user's system, which according to F-Secure include the following:
    /Library/Little Snitch
    /Developer/Applications/Xcode.app/Contents/MacOS/Xcode
    /Applications/VirusBarrier X6.app
    /Applications/iAntiVirus/iAntiVirus.app
    /Applications/avast!.app
    /Applications/ClamXav.app
    /Applications/HTTPScoop.app
    /Applications/Packet Peeper.app
    If these tools are found, then the malware deletes itself in an attempt to prevent detection by those who have the means and capability to do so. Many malware programs use this behavior, as was seen in others such as the Tsunami malware bot.
    http://reviews.cnet.com/8301-13727_7-57410096-263/how-to-remove-the-flashback-ma lware-from-os-x/
    http://x704.net/bbs/viewtopic.php?f=8&t=5844&p=70660#p70660
    Check now whether your Mac is infected by Backdoor.Flashback.39!
    http://public.dev.drweb.com/april/

  • Is it okay to delete SymSecondaryLaunch from my Log in at startup Items in System Preferences?  I no longer use any Norton products.

    Is it okay to delete SymSecondaryLaunch from my Log in at startup Items in System Preferences?  I no longer use any Norton products.  I have no clue what SymSecondaryLaunch does but it appears to be related to Symantec.

    You are not required to have any login items so yes, you can safely remove. However some applications will continue to add it's self back until completely uninstalled. You might have to download an install to get an uninstaller.
    http://www.symantec.com/business/support/index?page=content&id=TECH103489
    It's possible you have other old software that is running parts. Download EtreCheck and paste results here for help troubleshooting.
    http://www.etresoft.com/etrecheck

  • HT4061 I think I have a virus, yesterday I opened this message from verizon about me owning 1,000 to them. and today I have 8 messages from someone on my ipad. how can I tell or fix my ipad of this virus?

    I think I have a virus, yesterday I got an email from Verizon that I own $1000 and I tried to open it and now I have 8 emails from the same sender. DO I have a virus and what should I do to clean my ipad?

    Chances are your iPad is fine. when you clicked on that e-mail, you confirmed to them 'hey, real person' so now Mr Spammer is working towards his 'make money from home' quota of spam by sending you multiple e-mails. You can block him - I'm not sure what e-mail client you're using so no idea for exact instructions, but you'll probably need to do this on a computer not via the iPad) and you could report him....wouldn't hold my breath that the report will actually accomplish anything beyond the person being blocked.
    The iPad's operating system is different from the OS of a PC or Mac. Viruses written for one can't run on the others. (and iPads dont' get viruses in the strictest definition of the term, malicious programs that propogate themselves across the operating system)
    The down side, even if you block this person, they know your address is a 'live' one so you'll need to be alert and aware because I'm sure more spam and phising mails are on their way.
    If you did enter ANY info, make calls and start changing passwords ASAP.

  • What do i do if while replacing my iphone 4s screen i lost one of the screws on the inside near the camera? am i okay without that screw or what should i do?

    I was replacing my cracked screen on my iphone 4s and while unscrewing one of the screws it fell out and i cant find it. It was the upper screw near the camera on the EFM shield and antenna clip. I was wanting to know whether i would be okay without that screw or what i should do?

    A couple of things I would suggest. If you have a friend with a broken iPhone of the same type, they might be willing to let you take it apart to get the missing screw. Or, if you bought the replacement screen from one of the reputable online sources (as opposed to some fly-by-night ebay vendor), then you might want to contact them and see if they will sell you the single screw for some minimal price.

  • I, too, keeping getting a pop up when in Safari that is from "tap-security.rubicon....  I saw the suggestion to turn off all extensions, but this didn't help.  What next can be done?

    I read that several other people have been bothered by a drop down message talking about a bad certificate and perhaps non secure site when working in Safari.  I, too, keeping getting this pop up when in Safari that is from "tap-security.rubicon....  I saw the suggestion to turn off all extensions, but this didn't help.  What next can be done?

    Helpful Links Regarding Malware Problems
    If you are having an immediate problem with ads popping up see The Safe Mac » Adware Removal Guide, AdwareMedic, or Remove unwanted adware that displays pop-up ads and graphics on your Mac - Apple Support.
    Open Safari, select Preferences from the Safari menu. Click on Extensions icon in the toolbar. Disable all Extensions. If this stops your problem, then re-enable them one by one until the problem returns. Now remove that extension as it is causing the problem.
    The following comes from user stevejobsfan0123. I have made minor changes to adapt to this presentation.
    Fix Some Browser Pop-ups That Take Over Safari.
    Common pop-ups include a message saying the government has seized your computer and you must pay to have it released (often called "Moneypak"), or a phony message saying that your computer has been infected, and you need to call a tech support number (sometimes claiming to be Apple) to get it resolved. First, understand that these pop-ups are not caused by a virus and your computer has not been affected. This "hijack" is limited to your web browser. Also understand that these messages are scams, so do not pay any money, call the listed number, or provide any personal information. This article will outline the solution to dismiss the pop-up.
    Quit Safari
    Usually, these pop-ups will not go away by either clicking "OK" or "Cancel." Furthermore, several menus in the menu bar may become disabled and show in gray, including the option to quit Safari. You will likely have to force quit Safari. To do this, press Command + option + esc, select Safari, and press Force Quit.
    Relaunch Safari
    If you relaunch Safari, the page will reopen. To prevent this from happening, hold down the 'Shift' key while opening Safari. This will prevent windows from the last time Safari was running from reopening.
    This will not work in all cases. The shift key must be held at the right time, and in some cases, even if done correctly, the window reappears. In these circumstances, after force quitting Safari, turn off Wi-Fi or disconnect Ethernet, depending on how you connect to the Internet. Then relaunch Safari normally. It will try to reload the malicious webpage, but without a connection, it won't be able to. Navigate away from that page by entering a different URL, i.e. www.apple.com, and trying to load it. Now you can reconnect to the Internet, and the page you entered will appear rather than the malicious one.
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
      Mac OS X Snow Leopard and malware detection
      OS X Lion- Protect your Mac from malware
      OS X Mountain Lion- Protect your Mac from malware
      OS X Mavericks- Protect your Mac from malware
      About file quarantine in OS X
    If you require anti-virus protection Thomas Reed recommends using ClamXAV. (Thank you to Thomas Reed for this recommendation.)

  • Hi, i am trying to open and view a report that comes from another server with different odbc connection

    hi, i am trying to open and view a report that comes from another server with different odbc connection
    i created a crystal report for a mysql database on my machine and everything works great
    but we have other reports that come from other machines with different odbc connection
    and this its not working when opens the report asks for credentials
    and i cannot use the remote ip for these reports that come from other machine
    question
    if i cannot connect to remote ip to open the report
    for each report i have to create a database the report database on my machine and then open the report ?
    or there is some other way to open the report ?
    i am using visual studio 2013 and mysql and
       <add key="MYSQLODBCDRIVER" value="{MySQL ODBC 5.3 UNICODE Driver}"/>
    thanks

    short
    i have a report that it was created on another server with a specific dsn
    now i am trying to open the report on my machine
    the database from the other server does not exist on my machine
    the server machine where the report was created the ip its not accessible
    question ?
    can i open the report on my machine or its impossible ?
    thanks

  • I have hierarchy data in R/3 side how will i load that data from R/3 to BW

    Hi all,
    i have my hierarchy data in the R/3 side how will i load that data from  R/3 to BW side
    Regard
    Kiran Kumar

    Hi Kiran,
    Here is the procedure:
    1.      In the Data Warehousing Workbench under Modeling, select the InfoSource tree.
    2.      Select the InfoSource (with direct update) for the InfoObject, to which you want to load the hierarchy.
    3.      Choose Additional Functions® Create Transfer Rules from the context menu of the hierarchy table object for the InfoObject. The Assign Source System dialog box appears.
    4.      Select the source system from which the hierarchy is to be loaded. The InfoSource maintenance screen appears.
    ○       If the DataSource only supports the transfer method IDoc, then only the transfer structure is displayed (tab page DataSource/Transfer Structure).
    ○       If the DataSource also supports transfer method PSA, you can maintain the transfer rules (tab page Transfer Rules).
    If it is possible and useful, we recommend that you use the transfer method PSA and set the indicator Expand Leaf Values and Node InfoObjects. You can then also load hierarchies with characteristics whose node name has a length >32.
    5.      Save your entries and go back. The InfoSource tree for the Data Warehousing Workbench is displayed.
    6.      Choose Create InfoPackage from the context menu (see Maintaining InfoPackages). The Create InfoPackage dialog box appears.
    7.      Enter the description for the InfoPackage. Select the DataSource (data element Hierarchies) that you require and confirm your entries.
    8.      On the Tab Page: Hierarchy Selection, select the hierarchy that you want to load into your BI system.
    Specify if the hierarchy should be automatically activated after loading or be marked for activation.
    Select an update method (Full Update, Insert Subtree, Update Subtree).
    If you want to load a hierarchy from an external system with BAPI functionality, make BAPI-specific restrictions, if necessary.
    9.      If you want to load a hierarchy from a flat file, maintain the tab page: external data.
    10.      Maintain the tab page: processing.
    11.      Maintain the tab page: updating.
    12.      To schedule the InfoPackage, you have the following options:
    ○       (Manually) in the scheduler, see Scheduling InfoPackages
    ○       (Automatically) using a process chain (see Loading Hierarchies Using a Process Chain)
    When you upload hierarchies, the system carries out a consistency check, making sure that the hierarchy structure is correct. Error messages are logged in the Monitor. You can get technical details about the error and how to correct it in the long text for the respective message.
    For more info visit this help pages on SAP Help:
    http://help.sap.com/saphelp_nw04s/helpdata/en/80/1a6729e07211d2acb80000e829fbfe/frameset.htm
    http://help.sap.com/saphelp_nw04s/helpdata/en/3d/320e3d89195c59e10000000a114084/frameset.htm
    http://help.sap.com/saphelp_nw04/helpdata/en/80/1a6729e07211d2acb80000e829fbfe/frameset.htm
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/4dae0795-0501-0010-cc96-fe3a9e8959dc
    Cheers,
    Habeeb

  • One Time Flat File load in a Cube that extracts from ECC

    Hi,
    I have a cube that is already extracting data from ECC on a daily basis. I am asked to load some historical data into the cube from their legacy system. My question is, how do i prepare that file from the legacy system to match the fields in the Cube? What are the technicalities that i need to look at?
    For Example:
    0MATERIAL in the Cube:  Material Number in the Flat File
    ZAMOUNT in the Cube: Cost of Product in the Flat File
    How do I arrange to match these?
    Thanks

    Hi
    Create DS and enter the required objects
    Preview the Data
    Create Transformations (Map DS fields to Targets Objects - direct assignemnt)
    Create Infopack and extract data upto PSA
    Create DTP and run - it will extract data from PSA to Target
    No of Heade rows to be ignored : 1
    File type : CSV
    Data seperator : ;
    Escape Sign: "
    Thanks,

  • How to install elements 9 on a mac book pro? i click install icon but cannot start because it sais that is from unidentified developer

    how to install elements 9 on a mac book pro? i click install icon but cannot start because it sais that is from unidentified developer
    any suggestions?

    Mac Unidentified Developer Issue
    Here's how to open apps that apple should not be blocking: 
    http://www.imore.com/how-open-apps-unidentified-developer-os-x-mountain-lion

Maybe you are looking for

  • How to install the lion if had an intel duo, it will be work? (black macbook only)

    hello there i need any help, i just want to know how to do with black macbook. so, i bought someone who owner with this black macbook from online. i received the macbook from the delivered and my boyfriend sets the upgrade for the lion osx for this b

  • 2007 Mac mini Mavericks upgrade?

    Hi, coming from the list of machines eligible for OS X Mavericks, my Mac mini is not included. However, the AppStore says I can. Do I make the upgrade or it will not proceed? Thanks. Maybe somebody out there already did upgrade not on the list.

  • CVI - linking vendor and customer to the same BP

    Hi all, I'm working in a scenario where the CVI (Customer Vendor synchronizing with Business Partners) works in the direction Vendor/Customer to BP. This means that the user creates a vendor or a customer (within the AP/AR modules) and the system cre

  • Broadcast Images Missing in EP

    I am trying to broadcast (distribute) a BW web report into EP (we are using EP6, BW3.5 both on sp15) I have run into a number of problems: 1. Distributing as an Independent HTML file (.mht), some of the images are not displayed. Eg I have a report wh

  • Number of Asm failuregroup disks needed

    hi guys, guys can ane one tell me...for normal and high redundancy how many failure groups have to configured and how many disks can stay in each failure group please