Was safari hacked 8/20/13?

Was Safari hacked today 8/20/13? Every time I try to open it (4times now) I get a pop-up saying Congratulations! You are  the winner for August 20, Select a prize, enter email yadda yadda. I have force quit and cleared history and temp internet files 3 times and acreen captured the link. What can I do to get rid of this? I had to send this from my iPad because I cannot open Apple support on my mac.

Have you tried a complete reset of Safari (File menu -> Reset)? You may have a cookie or other stored file directing your browser to that site. Or your router may have been compromised - what's called "DNS poisoning" - and needs to be reset.
Hope this helps.

Similar Messages

  • My email address was recently hacked and they have changed all my passwords. Is there a way i can delete an ICloud account on my phone, mac and Ipad without putting the password in as i do not know this?

    Hi
    My outlook account was recently hacked and they have changed my passwords, secret questions and my information meaning i am unable to access this account. I have the hacked account set up on icloud for all of three apple devices. I have been reading online that to change or delete an account i need to login, or turn find my iphone off which i cannot do without the password!
    I would be really grateful if anyone knew a way i could sort this out to fully delete the old icould account.
    Thanks very much!

    Contact the Apple account security team for your country and request assistance: Apple ID: Contacting Apple for help with Apple ID account security.  If you can prove your identity to them, they can reset the password and help you regain control of the account.

  • My daughter used her friends apple account to login on her ipad and then the mother of her friend thought it was being hacked and consequently tracked the ipad and my daughter lost all her photos.  Can we get these back?

    My daughter used her friends apple account to login on her ipad and then the mother of her friend thought it was being hacked and consequently tracked the ipad and my daughter lost all her photos.  Can we get these back?

    Your iOS device backup only includes data and settings stored on your device. It doesn’t include data already stored in iCloud, for example contacts, calendars, bookmarks, mail messages, notes, shared photo albums, iCloud Photo Library beta, My Photo Stream, and documents you save in iCloud using iOS apps and Mac apps.

  • HT3231 I use Migration Assistant to transfer data from my old MacBook to a new MacBook Pro. Both run OSX 10.7.4  This was done wirelessly. Now Safari won't run on my Pro. It was Safari 6 on the MacBook, but is now Safari 5.1.6 on the Pro. Could this be th

    Safari 5.1.6 won't run on my Pro. It was Safari 6 on the MacBook I transfered the data from. Could this be the problem, and if so, how do I up grade to Safari 6? I can't seem to find any help.

    Lion should be running Safari 6. Try Software update. Or apply the Lion 10.7.4 Combo installer:
    http://support.apple.com/kb/DL1524

  • Was I hacked? Got this msg out of nowhere:

    Was I hacked? Got this msg out of nowhere: "The system extension “//System/Library/Extensions/AppleUSBEthernetHost.kext” was installed improperly and cannot be used. Please try reinstalling it, or contact the product’s vendor for an update."  I was on my home wifi, watching hulu, not plugged in to anything. I don't know what this is in reference to. Everything kept running as usual... any help would be appreciated!

    No you were not hacked.
    Re: AppleUSBEthernetHost.kext error on installing iTunes update

  • I can't activate my phone after reformatting it. My old appleID can't unlock the phone after it was been hacked and erase information inside

    I am having dilemma after reformatting my iPhone 5 and I can't get through the re-activation page. It requires me to log-in using my old apple ID which I abandoned 2 years ago after it was been hacked. Apparently, I was able to retrieve my old Apple ID and iCloud, however, the purchased items, downloaded apps, the linked device ("find my iphone app" to link) and other information were wiped out. I reset the password several times to see whether it helps, but still shows error message "Apple ID cannot be used to unlock this phone".
    Any advices and help to get through?

    Also I have not done anything to the phone ever since I bought it, so I assume that it's locked?

  • Just received a receipt from itunes for omething I did not purchase- was itunes hacked?

    Was itunes hacked? This morning I had a receipt from itunes for a magazine subscription I did not purchase. Anyone else have this problem?

    Is it a valid email from Apple, not a phishing attempt ? You can check the purchase history on your account via you Mac's iTunes via the Store > View Account menu option - there should be a Purchase History section with a 'see all' link to the right of it, click on that and you should then see a list of your account's purchases (the most recent purchase is above the list).
    You can check to see if you have any auto-renewing subscriptions : http://support.apple.com/kb/HT4098

  • Was i hacked? documents were opened when on an open network!

    I recently noticed that documents were opened when I was on an open internet network (the library!).  I know I did NOT open those documents.  Was I hacked?  Should I still be concerned?  What should I do?  Thanks.
    I have a Mac with OS X 10.6.8

    Your friends could have done whatever they wanted with the computer, but none of the changes you mention is evidence of "hacking," whatever you mean by that.

  • I received (and opened) a mail from a friend, it contained a link that I could not open ( I tried, though) . It was a hacked message, she later apologized.. Can my iPad2 be affected? please advise

    I received ( and opened, because I knew her address as safe) a mail from  friend, it contained a link that I tried to open, but it could not.
    It was clear it was a hacked email, she then apologized..could my iPad2 be affected by this? Please advise, thank you.

    You SHOULD be safe. The iPad's operating system is different from PC or Mac ones, and most viruses and malware are written to infect PC's or Mac's.
    If, for example, that link led to an .exe file the iOS can't run that so it does nothing.

  • I was just hacked into my facebook account for about a thousand  dollars and I called I tunes and of course you know what happened there  how do I try to get my money back?

    I was just hacked into my facebook account for account for a thousand dollars

    I agree. This is a 100% facebook problem, but then you need to watch what you have associated with ANY social media site. As little as possible is best.

  • Help, my ipad wont turn off and the screen is blank with the circle that goes around and around. Should i let the battery die? Was I hacked?

    Help! My ipad wont turn off and wont open a screen. Just blank with the circle going round and around. was I hacked? Should I let the battery die? I am lame at this stuff.

    Have you tried holding down the power and the home buttons until the slider bar shows up to shut down the iPad?

  • Was I hacked through Safari or what!

    I noticed my safari and my Macbook pro getting slow, after I down loaded seemingly safe applications, that I decided to trash after 24 hrs use..
    Try soft reset , did not help , so I went to erase disc and reinstall from time capsule. took 10 hrs.
    Strange thing , then, happened.  I left my desk with my macbook pro on log off mode , to come back the next day to open safari,
    found loads of my personal files opened !! , mostly are photos, IDs, and bank stuff…, then looked into history and found these items ,
    but could not tell the time they were opened…
    This left me with creepy feeling, and almost certain i was hacked, I jumped to my firewall and turn it back ON…
    I DO NOT KNOW WHAT DO NEXT.. HOW CAN FIND THE CUPRIT FILE AND DELETE IT…, IT IS QUITE POSSIBLE IT IS ALSO ON MY TIME CAPSULE, SINCE I BACKED FROM IT…
    HELP PLEASE ANYONE.

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can read it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB com.apple.AirPortBaseStationAgent 464843899 51 );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */   /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;5p;6p;8p;12p;' ' {sub(/^ +/,"")};NR==6;NR==13&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { print "'${p[41]}'";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$|'${p[41]}'/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/ { next;} /(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { print "'${p[41]}'.plist\t'${p[42]}'";if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/ { next;} /%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]" "$1;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' '" L*/P*/*loginit*' 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,In,iTu,Keyb,Mail/B,P*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t /S*/L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' -i4TCP:0-1023 com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;A2 0 $((N1+1)) 2;C0;A1 0 $N1 1;C0;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D13 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • My safari hacked...I fixed it..

    Last night, 3/26/15, my safari screen was taken over by someone posing from Mac... it said to call a number and keep repeating a message that my computer has been compromised.. I force quit and restarted but message kept coming up but with different # to call... I search for answers on my iPhone then opened chrome which worked for answers ..   Someone said to open safari again... then turn off wifi... then reopen safari...I couldn't remember what the person said to do after that.. but I was able to get into my history in safari and clear my history for the past 2 days... walla!  I cleared the message and ran a utility dr and restart computer.. so far so good... no messages from those hackers.. ..hope this was a permanent fix...
    Is there a real adware from Mac for our macbrook pro?   I don't believe anyone any more... I do look for "hpps"  I look for the "s" for security at the end... the pop up screen did not have the "s"..
    Good luck everyone...

    You weren't hacked. It's a JavaScript trick to keep your browser locked to that page. What you did was all that needs to be done. There are hundreds of similar posts on these forums.
    Yes, there is real adware. To date, it has been harmless, just extremely annoying. AV software (if you have it, and you really don't need it) will not recognize adware as something to detect or remove since it isn't an actual threat. If you do get any adware installed, you can either follow Apple's manual instructions for removing it, or use the free automated tool, AdwareMedic. Though AdwareMedic requires Lion or later. Manual removal is your only real option in Snow Leopard or older.

  • All data is wiped from my iphone after internet was serverely hacked, hence transfered to my iphone and everyone elses iphones in the house

    Our internet was hacked really bad, whatever virus/ trojan it was, my two housemates & I didnt realise straight away, by then we had synced our iphones to itunes on our computers, it wasnt long before we noticed our iphones acting strange, they would freeze up, bombing out, our computers were worse, it got through the anti-viruses, activated our web cams & mics. Then one of my housemates got a settings message window pop up on his iphone screen saying "I will put it all back if you give me what I want", we freaked, we had no idea what it meant. The other iphones were telling us to sync to itunes.. We sync to itunes again, then about half an hr apart of each other- each of our phones turned themselves off, we turn them on again.... and discovered all data, apps, messages, photo's, everything completely wiped clean- gone. Most of the programs on our computers had been changed, all data on itunes was gone, we just couldnt believe what had happened.
    I never did a back up- I trusted the iphones, I didnt think that i needed to. I had tried again to sync to Itunes after I uninstalled Itunes & reinstalled it again on my main computer but nothing. I thought that I better not try syncing it to my laptop then.
    I have uninstalled most programs in my laptop & tried to clear out any dodgey data i could find. I have left what iphone files that I could find in there, but I cant tell which iphone/ apple data is what nor can I read any of it.
    I have seen on other sites there are programs or tools to try and retrieve data, but I dont trust the internet, I'm not risking being hacked again by downloading from sites I dont know.
    Can someone please PLEASE  advise me some kind of instructions as to how to retrieve my iphone data out of my laptop??
    **I'm wondering if this Apple site will publish this, because I have never found anything on the net where people have had a hack as bad as ours, so it makes me wonder if there are people out there who do talk about bad hacks- if they're story ever gets published or is our hack "1 in a million!".

    Syncing your phone will restore the iTunes content to your phone. I suspect the content has not actually been deleted from your phone, just not visible due to a glitch(it's happened before). Re-syncing will fix things.

  • Is it possible to get hacked by pressing on a link in a email that i got and am pretty sure was a hacker?

    got an email from what looked like it was pay pal telling me that my payment to such and such has gone thru only prob was i didn't buy anything .. so i clicked on the item description to see what it was thinking maybe my husband got something... turns out he hasn't so i checked my pay pal a/c which seems to be fine .. no such invoice exists... so my question is ... did i open myself to a hacker by opening the link ??? how can i check my iMac ??
    thanks

    Your iMac is pretty safe from Apple's Security as the experts here will tell you. However it is possible to get malware etc. but very unlikely. I have got similar e-mails from pay pal, UPS, Credit cards ( even got one from ez-paid tolls) etc. Be sure to never give them any personal information. Don't click on any attachment or open the emails for 100% security from these so call legal outfits. Always go direct to pay pal or others web site and sign in to check your account. These things are usually phishing for personal info and will not affect your iMac. If you had a Windows Machine you may very well get something from virus to malware. Of course we could all have troubles from the this stuff but your iMac is very safe. I have never gotten anything.

Maybe you are looking for