Who is spying on me ?

Hi
Little Snitch constantly tells me that NMDB or NATD (and a few other of that type) are trying to connect to IP numbers. More info tells me that they originate from usr/sbin/....
What is this and should I allow these connections on a permanent basis so that LS stops asking me about them ? Or is someone spying on me ?

Have a look what ip's they are trying to direct too, they are probably just part of a runnning network process, nmdb, is usually related to samba on the local network, natd is short for "Network Address Translation daemon" it's a BSD daemon that runs in the background, and as the name suggests translates ip addresses.
You can try denying them, and then if something stops working you will know to allow them again.

Similar Messages

  • How can I detect spyware or keylogger programs directly installed on my computer?

    Hello,
    I have a serious problem. My ex had physical access to my MacBook Air and I believe he installed either spyware or a key logger program directly on my computer, as he had administrative access. It could be a program like WebWatcher or Spector Pro. There are a number of programs that allow someone to install this software by downloading it from the internet directly onto your computer.
    Unfortunately, I'm a physician whose been involved in reaserch which has classified information on it. It never occurred to me that someone would do something like this, but I am very worried that he has installed something. I recently installed MacScan and Little Snitch to determine if anything was detected.
    MacScan Displayed the following:
    Last Spware Scan Run on: Sat 4/26/14 01:15 am
    Spyware Detected on Last Scan: 0
    Total Spyware Detected in all Scans: 148
    I'm unsure if what was detected by Mac Scan were simply cookies.
    I also tried Linc Davis' suggestion and here are my results:
    Re: Detect spyware and determine who is spying on my imac 
    Apr 26, 2014 8:49 AM (in response to Linc Davis)
    Hello Linc,
    This time it asked for my password and I got:
    Last login: Sat Apr 26 11:45:48 on ttys000
    Olivias-MacBook-Air:~ MD$ kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'
    at.obdev.nke.LittleSnitch (4050)
    Olivias-MacBook-Air:~ MD$ sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfi x|x)/{print $3}'
    Password:
    com.oracle.java.Helper-Tool
    com.microsoft.office.licensing.helper
    com.google.keystone.daemon
    com.adobe.fpsaud
    at.obdev.littlesnitchd
    Olivias-MacBook-Air:~ MD$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'
    com.microsoft.autoupdate.fba.42800
    com.microsoft.Office365Service.30128
    com.microsoft.Word.27840
    com.bodymedia.BodyMedia-SYNC.35760
    com.linebreak.CloudAppMacOSX.48784
    com.oracle.java.Java-Updater
    com.google.keystone.system.agent
    at.obdev.LittleSnitchUIAgent
    com.genieo.completer.update
    com.genieo.completer.download
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae
    Olivias-MacBook-Air:~ MD$ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null
    /Library/Components:
    /Library/Extensions:
    ATTOCelerityFC8.kext
    ATTOExpressSASHBA2.kext
    ATTOExpressSASRAID2.kext
    ArcMSR.kext
    CalDigitHDProDrv.kext
    HighPointIOP.kext
    HighPointRR.kext
    LittleSnitch.kext
    PromiseSTEX.kext
    SoftRAID.kext
    /Library/Frameworks:
    AEProfiling.framework
    AERegistration.framework
    Adobe AIR.framework
    AudioMixEngine.framework
    EWSMac.framework
    NyxAudioAnalysis.framework
    PluginManager.framework
    iTunesLibrary.framework
    /Library/Input Methods:
    /Library/Internet Plug-Ins:
    AdobePDFViewer.plugin
    AdobePDFViewerNPAPI.plugin
    AmazonMP3DownloaderPlugin101750.plugin
    Default Browser.plugin
    Flash Player.plugin
    JavaAppletPlugin.plugin
    Quartz Composer.webplugin
    QuickTime Plugin.plugin
    SharePointBrowserPlugin.plugin
    SharePointWebKitPlugin.webplugin
    Silverlight.plugin
    Unity Web Player.plugin
    flashplayer.xpt
    googletalkbrowserplugin.plugin
    nsIQTScriptablePlugin.xpt
    o1dbrowserplugin.plugin
    /Library/Keyboard Layouts:
    /Library/LaunchAgents:
    at.obdev.LittleSnitchUIAgent.plist
    com.google.keystone.agent.plist
    com.oracle.java.Java-Updater.plist
    /Library/LaunchDaemons:
    at.obdev.littlesnitchd.plist
    com.adobe.fpsaud.plist
    com.google.keystone.daemon.plist
    com.microsoft.office.licensing.helper.plist
    com.oracle.java.Helper-Tool.plist
    /Library/PreferencePanes:
    BodyMedia SYNC.prefPane
    Flash Player.prefPane
    JavaControlPanel.prefPane
    /Library/PrivilegedHelperTools:
    com.microsoft.office.licensing.helper
    /Library/QuickLook:
    iBooksAuthor.qlgenerator
    iWork.qlgenerator
    /Library/QuickTime:
    AppleIntermediateCodec.component
    AppleMPEG2Codec.component
    /Library/ScriptingAdditions:
    /Library/Spotlight:
    Microsoft Office.mdimporter
    iBooksAuthor.mdimporter
    iWork.mdimporter
    /Library/StartupItems:
    /etc/mach_init.d:
    /etc/mach_init_per_login_session.d:
    /etc/mach_init_per_user.d:
    Library/Address Book Plug-Ins:
    SkypeABDialer.bundle
    SkypeABSMS.bundle
    YMsgrCallABPlugin.bundle
    YMsgrMsnABPlugin.bundle
    YMsgrSmsABPlugin.bundle
    YMsgrYimABPlugin.bundle
    Library/Fonts:
    Library/Frameworks:
    EWSMac.framework
    Library/Input Methods:
    .localized
    Library/Internet Accounts:
    V1
    Library/Internet Plug-Ins:
    Library/Keyboard Layouts:
    Library/LaunchAgents:
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
    com.apple.CSConfigDotMacCert-ph.dio.....@me.com-SharedServices.Agent.plist
    com.genieo.completer.download.plist
    com.genieo.completer.update.plist
    Library/PreferencePanes:
    Library/Services:
    .localized
    Olivias-MacBook-Air:~ MD$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null
    iTunesHelper, Yahoo! Messenger, Dropbox, Cloud, AdobeResourceSynchronizer, BodyMedia SYNC, TuneupMyMac
    Olivias-MacBook-Air:~ MD$
    CAN ANYONE HELP ME?
    Thank you so much.

    I am adding information from Webwatcher's own site:
    Q. Is WebWatcher easy to use?
    A. Yes. WebWatcher is very easy to use and you can begin monitoring immediately without having to read a lengthy manual. Our web based interface is user-friendly and can be conveniently accessed from any computer in the world with an Internet connection.
    Q. How does WebWatcher compare to other monitoring software?
    A. It's the most powerful and intuitive tool on the market. As the only web-based program, WebWatcher ensures the security of your data while providing you with the flexibility to monitor any computer from anywhere in the world. While some products email data, email is NOT a secure means of transporting information. Anything sent by email is extremely vulnerable, and can be seen by dozens of people before it reaches its destination. WebWatcher, however, uses 128-bit encryption guaranteeing the safety and security of your information.
    Q. Is WebWatcher PC or Mac compatible?
    A. WebWatcher is PC compatible, as well as Mac OS X compatible.
    Q. Is WebWatcher truly invisible?
    A. Absolutely! WebWatcher is 100% invisible. It doesn't run as a service, it doesn't appear in the list of running processes and there are no visible files that can be seen. Not only does WebWatcher work invisibly, but it's also friendly with all known firewall software and hardware allowing you to gather the information you need without raising any red flags.
    Q. How will I know WebWatcher is working?
    A. Just login to your secure online account to see the recorded data. Or you can enter the hotkey sequence on the monitored computer to view the WebWatcher status panel.
    Q. If I buy WebWatcher now, how soon will I receive the software?
    A. Immediately. Within minutes you'll receive a confirmation email that contains the username and password needed to download WebWatcher.
    Q. How do I install WebWatcher?
    A. Within minutes of completing your purchase, you'll receive an email with a link to the Setup Wizard. Just follow the onscreen instructions. Once the Setup Wizard is complete you'll receive a link to download the software. Important: you can complete the Setup Wizard from any computer, but the SOFTWARE MUST BE INSTALLED ON THE COMPUTER YOU WISH TO MONITOR.
    Q. Do I install WebWatcher on my computer or on the computer I want to monitor?
    A. The Setup Wizard can be installed on any computer, but the actual monitoring software must be installed on the computer you wish to monitor. Since WebWatcher is web based, you won't have to download the software onto the computer you'll use for viewing the recorded information.
    Q. Can I use different computers to check what's been recorded?
    A. Yes. Once the software is installed on the computer you wish to monitor, you can view the data from any computer in the world with Internet access.
    Q. Do WebWatcher icons or messages appear on my computer or on the monitored computer?
    A. No. Since WebWatcher runs invisibly, no icons or messages will appear on your computer or on the monitored computer.
    Q. Will WebWatcher email the recorded information to me?
    A. No. Email isn't secure for transmitting information. Any program that emails your data puts your private information at serious risk. WebWatcher offers the only web based monitoring system of its kind. We use 128-bit encryption to ensure the highest level of data security.
    Q. How do I retrieve the information that WebWatcher has recorded?
    A. Just log into our secure web based interface from any computer in the world with a standard web browser. Visit our demo to see actual screenshots of the program.
    Q. Will WebWatcher work on a laptop?
    A. Yes. WebWatcher will record computer activities and upload the data to your account when the monitored computer is reconnected to the Internet.
    Q. Does WebWatcher record emails?
    A. Yes. WebWatcher records emails and you'll be able to see the subject of the email, who sent it, who received it, the time and date email is sent and received, the contents and any attachments. Our email recorder is compatible with all of the most popular email programs including web based email.
    Q. Does WebWatcher record IMs?
    A. Yes. WebWatcher records instant messages. Our software is compatible with all of the most popular instant message programs including AOL Instant Messenger (AIM), MSN Messenger, Windows Messenger and Yahoo Messenger.
    Q. Does WebWatcher record websites visited?
    A. Yes. WebWatcher records websites visited. With just a click, you'll be able to visit the exact website visited and see what was viewed including searches performed.
    Q. Can WebWatcher block websites?
    A. Yes. WebWatcher can both block websites and record websites. When it encounters an Alert Word on a site, it can block that page or take a screenshot for later review. You can also block specific URL addresses.
    Q. Does WebWatcher have a keylogger?
    A. Yes. Our invisible key logger records every keystroke, even when a user is offline.
    Q. Do I need one license for every computer that I wish to monitor?
    A. Yes. An individual license is required for every computer that you wish to monitor. We offervolume discounts for multi-license purchases.

  • How Can I Find Out If Someone Is Spying On My Macbook?

    How can I find out if someone is spying on my macbook?  It's about 5  years old and I think someone is remotely controlling it even though my remote management and screen sharing is always off in the Sharing panel in Systems Preferences.   I don't SHARE anything willingly!  My screen shakes up and down or sometimes it just falls a few inches and I keep losing my place.  This only happens while I am on the internet.  The arrow icon for the mouse also behaves erratically at times, as if it is being controlled by someone else.  And I have people stalking me who seem to know what I buy on the internet and where I am going when I use google maps, ect....   How do I get rid of remote desktop from a MAC 10.6.8  or trace the idiots doing this to me??? 
    Thanks.

    I think it may be more of an issue with the startup disk rather than spyware.
    Launch Disk Utility located in HD > Applications > Utillities
    Select the startup disk on the left then select the First Aid tab.
    Click:  Verify Disk  (not Verify Disk Permissions)
    If DU reports errors, start up from your Mac install disc to make repairs.
    Instructions here >  Mac OS X 10.6: Reinstalling Mac OS X

  • How to get the measurement data from IMU using SBRIO through SPI?

    Hi All,
    I’am trying to use the SPI communication protocol to realize the bridge between my Vectornav VN100 IMU chip and the LABView through the SBRIO 9602. I amended the SPI sample code from NI website based on my own device and configuration. It compiled and ran well. The problem is the IMU we are using need a 16 bytes command and it will give back a response containing the measurement data. But it seems that with the code I have, I can only send an at most 32 bits command once. Hope anyone who has experience in IMU implementation on LABView could give me some help! Thanks a lot!
    Nick

    Kyle,
    Thank you very much!
    I attached the amended program and the Manual Sheet of the IMU I am using.
    Since I only need to one port, I just amended the configuration for port 1 and adjusted the code for my device. 
    I think the problem exist in the data sending mechanism, you can check the requirement out in P12 and P13 of the manual sheet.
    Best Regards!
    Nick
    Attachments:
    Vectornav VN100.pdf ‏1774 KB
    spi_dual_port_example.zip ‏755 KB

  • How can you tell if someone is spying on your iPad?

    Trying to determine if someone is spying on my iPad where they can see emails, apps, websites visited, get personal info.  THanks for the help.

    Tracking someone who's snooping on your iDevices is simple. Super simple. Simply clear everything you don't want seen. Web pages, browser history, texts, emails and phone call log. Then double click your home button. Turn off all of your background programs right before you lock or allow your device to auto lock and BOOM! The trap is set. If you suspect a nosy significant other of snooping this will catch them. When you get back to your device and double click your home button it will show you everything that they looked at. It's totally stealth and totally free.

  • WHO IS this TRUSTED INSTALLER?

    There is no explaination of his/her identity in the properties and I'm usually locked out of the files owned by this user...AND why does he block me out of suddenly newly appointed executionable programs that just appear in my processes?  They are usually
    suspicious looking so I look at the properties and I'm locked out (even though I am an administrator) so I must go through the sometimes un-nerving process of changing ownership and/or deleting "him"...if the process was explained in the properties
    a little better, this would help.  These things get in/past my private firewall daily and it bothers me.  Too much spying crap going on.  And ever time I run a malwarebytes scan there is ALWAYS a search file from IE that pops up as a PUP. I
    don't even use IE at all and I've blocked it in my firewall (?why? who the H is speedbit and do search and why do they change or infiltrate my startpage search engine???) due to my mistrust in the privacy I get when using them.  All of the trojans, worms,
    spyware and malware have come directly from Microsoft.  Why is that and why don't they require my permission to install programs and processes on my computer...and, no they are not coming from updates.
    please address this question clearly and directly and honestly as I'm quite tired of the deception I feel is going on between my computers operating system and my protective programming I'm suppose to feel safe with.

    Thank you for your reply Lewis but yes, I am daily aware of everything going on in regards to new programs, processes etc.  I have Norton Insight and online protection, use malwarebytes and PrivateFirewall.  I have seen AVG try to install itself
    through stealthmode applications but caught it.  I never install anything from 3rd parties and always verify the site before using it.  (ie Adobe updates for instance, I never check the McAvee box nor do I accept toolbars or any ASK products etc
    etc).  Verifiable ?  when the Norton or Malwarebytes detail screen shows the name of the PUP it will show the path as well and this is how I know where it came from.  Usually an IE search program which is really sneaky because I do not even
    use IE yet it gets in anyway.
    My question at hand though is who is this TrustedInstaller and can I edit him off of my properties to allow myself access without it affecting my computer.  I usually notice him/her as owner of MS products that are in the hidden mode and have a lock
    on the icon.  I often notice them when they appear suddenly in a process that wasn't there previously (ie: SPI32.EXE  OR SPA.EXE WHICH IS SPEEDBIT SEARCH ENGINE FOR IE)  GOOGLE is getting to be the same way in so far as introducing new programs
    and processes that are not requested or scheduled...Sorry Lewis but I come from a different generation and have seen the days of respect and privacy and understanding and I believe these companies just assume my generation are too uninvolved to notice. 
    You need to be more assertive with your questions and concerns maybe. Don't let anyone just tell you "it's ok, that just the way it is"  ASK WHY!!!!

  • What are the Binoculars in the address bar, amI being spyed upon?

    Sometimes but not always, a little pair of binoculars appear at the beginning of the address bar at the top of the display screen. Does this mean someone is spying on me? I have run virus scans but nothing shows up!

    Hello,
    '''Try Firefox Safe Mode''' to see if the problem goes away. Safe Mode is a troubleshooting mode, which disables most add-ons.
    ''(If you're not using it, switch to the Default theme.)''
    * On Windows you can open Firefox 4.0+ in Safe Mode by holding the '''Shift''' key when you open the Firefox desktop or Start menu shortcut.
    * On Mac you can open Firefox 4.0+ in Safe Mode by holding the '''option''' key while starting Firefox.
    * On Linux you can open Firefox 4.0+ in Safe Mode by quitting Firefox and then going to your Terminal and running: firefox -safe-mode (you may need to specify the Firefox installation path e.g. /usr/lib/firefox)
    * Or open the Help menu and click on the '''Restart with Add-ons Disabled...''' menu item while Firefox is running.
    [[Image:FirefoxSafeMode|width=520]]
    ''Once you get the pop-up, just select "'Start in Safe Mode"''
    [[Image:Safe Mode Fx 15 - Win]]
    '''''If the issue is not present in Firefox Safe Mode''''', your problem is probably caused by an extension, and you need to figure out which one. Please follow the [[Troubleshooting extensions and themes]] article for that.
    ''To exit the Firefox Safe Mode, just close Firefox and wait a few seconds before opening Firefox for normal use again.''
    ''When you figure out what's causing your issues, please let us know. It might help other users who have the same problem.''
    Thank you

  • IPSEC packet has invalid spi

    I have a very simple LAN-2-LAN between two cisco routers running IOS version 12.4(15)T8 as follows:
    RouterA:
    crypto isakmp key test123 address 4.2.97.15 no-xauth
    crypto isakmp policy 1
    encr aes 256
    hash sha
    authentication pre-share
    group 5
    lifetime 86400
    no crypto ipsec nat-transparency udp-encapsulation
    crypto ipsec transform-set tset esp-aes 256 esp-sha-hmac
    crypto map vpn 10 ipsec-isakmp
    set peer 4.2.97.15
    set security-association lifetime seconds 3600
    set transform-set tset
    set pfs group5
    match address vpn
    interface FastEthernet0/0
    ip address 207.15.205.15 255.255.255.0
    speed 100
    full-duplex
    crypto map vpn
    ip access-list extended vpn
    permit ip 129.174.15.0 0.0.0.255 129.174.16.0 0.0.0.255
    RouterB:
    crypto isakmp key test123 address 207.15.205.15 no-xauth
    crypto isakmp policy 1
    encr aes 256
    hash sha
    authentication pre-share
    group 5
    lifetime 86400
    no crypto ipsec nat-transparency udp-encapsulation
    crypto ipsec transform-set tset esp-aes 256 esp-sha-hmac
    crypto map vpn 10 ipsec-isakmp
    set peer 207.15.205.15
    set security-association lifetime seconds 3600
    set transform-set tset
    set pfs group5
    match address vpn
    interface FastEthernet0/0
    ip address 4.2.97.15 255.255.255.0
    speed 100
    full-duplex
    crypto map vpn
    ip access-list extended vpn
    permit ip 129.174.16.0 0.0.0.255 129.174.15.0 0.0.0.255
    Every now and then I am seeing this message in the log file:
    Jul 27 00:25:20.603: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd
    IPSEC packet has invalid spi for destaddr=207.15.205.15, prot=50,
    spi=0x681E0955(1746798933), srcaddr=4.2.97.15.
    Why am I seeing this message?  The VPN peer between two router is very stable without any errors.
    I've asked several ccie consultant folks and none of them is able to provide me with a satifactory answer regarding this message.
    Anyone know why?  Thanks in advance.

    I know its been a while since this was asked but to help anyone who may still want to know here is the reason from Cisco:
    It simply means IPsec Security Associations are out of sync       between the peer devices. As a result, an encrypting device will encrypt       traffic with SAs that its peer does not know about. These packets are dropped       on the peer with the above message logged to the syslog
    Read more here: http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a0080bf6100.shtml
    One of the most common IPsec issues is that SAs can become out of sync       between the peer devices. As a result, an encrypting device will encrypt       traffic with SAs that its peer does not know about. These packets are dropped       on the peer with this message logged to the syslog: Sep  2 13:27:57.707: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet
       has invalid spi for destaddr=20.1.1.2, prot=50, spi=0xB761863E(3076621886),
       srcaddr=10.1.1.1

  • How to Prevent Windows 10 from Spying Full Guide

    Easily make Windows 10 stop spying on you.
    Easy to follow step by steps to secure your Windows 10 and prevent sensitive information leaking....
    Read More
    This topic first appeared in the Spiceworks Community

    Team Folder in the past was managed by administrators. Administrator can create, edit, delete team folders. The team folder can be published to a group of users, including Active Directory group. It is very convenient to share files and folders with a group of users in the same team. As team groups bigger, it may not be convenient for administrator to manage all the team folders. So it makes sense for administrator to assign some users to be able to manage team folder that they own themselves. Role Manager It usually starts with the role manager by creating a role with Add/Edit/Delete permissions and assign it to users or Active Directory groups. Manage Team Folder The user who are in the private team folder role will be able to manage team folders without seeing all the team folders from everyone. Here is a YouTube Video about...

  • What Protection Beyond NAT Does SPI Firewall in E4200 Provide?

    In the E4200 Cisco has dumbed-down the settings and Help to the point where it's impossible to derive any hard information from the documentation.
    My question is this:
    In a NAT environment (i.e., where I have a private LAN using 192.168.x.x addresses):
    Specifically what additional protection, if any, does enabling the E4200's "SPI Firewall" setting provide?
    Please do not answer with basic "It's good, set it" or "It enables the firewall" or what you guess it must do type answers.  I'm looking for information beyond that - what I want to know is just what the "SPI Firewall" ENABLED setting is adding in addition to the basic incoming request blocking that's inherent in a NAT setup.  Is the router doing additional IP header validation, blocking packets from specific addresses (and if so, who sets the table), etc.?
    I have only IPv4 capability through my ISP at the moment, so an answer oriented toward IPv4 will be fine.
    Thank you.
    -Noel

    NAT per definition does address translation. It does not provide security. It tries to deliver packets arriving on the public IP address. It tries to find the LAN IP address to which it can deliver an incoming packet. If it can't it will deliver the packet locally (i.e. to the router itself). NAT doesn't filter. NAT doesn't drop packets. It rewrites the destination IP address of packets arriving from the internet if it knows it has to.
    The SPI firewall filters traffic. That's the part which drops packets. When you initiate traffic from the LAN to the internet it will remember this session/state and then will allow matching incoming responses from the internet back through (after they went through NAT).
    Of course, this means that NAT and firewall go hand-in-hand when a new session is initiated from the LAN:
    1. NAT remembers a NAT session to rewrite responses to the correct LAN IP address.
    2. SPI remembers a firewall session to let incoming responses go through to the destination.
    But still these are two different tables for two different purposes. You may want to do a little reading in the Linux firewall iptables on which the firewall in most cheap routers are built on.
    Thus with NAT enabled the major effect of turning off the SPI firewall is to expose the router itself to the internet. All traffic which does not match NAT sessions is delivered locally. If the SPI firewall is off you expose the router to the internet. Of course, most ports are closed thus you won't notice the difference. But as we have only learned recently some routers listen for UPnP on the internet IP address (which they shouldn't of course) and a SPI firewall might have helped here to blocked exactly that traffic.
    In addition, you often find that NAT is configured with more "relaxed" settings internally than the firewall. As NAT is not a security measure but an enabling technology to deliver and not to drop you often find that NAT sessions time out (due to inactivity) later than firewall sessions. And NAT sessions usually only time out. They don't keep a session state. But of course this depends on the exact implementation and configuration of Linksys which I don't know.
    SPI, however, is also used to do "deep inspection", i.e. not only look at the source/destination IPs/ports but also into the contents of some protocols. For Linksys routers it's usually the URL filtering which checks the contents of HTTP requests. Possibly Cisco/Linksys has implemented more checks there.
    So to sum up: without SPI firewall you expose the router to the internet and access restrictions shouldn't work.
    And as you may think: with IPv6 the SPI firewall becomes very important as you don't need NAT anymore...

  • RV042 - I have customer who upgraded to 20 meg cable internet service and can only get 10 meg thru the router.

    RV042 - I have customer who upgraded to 20 meg cable internet service and can only get 10 meg thru the router. The customer had upgrade to a 20 meg cable internet service from a 10 meg service.   The customer is only able to get the 20 meg service going from cable modem to PC.  If he goes thru the RV042 router, he is only getting up to 10.7 down and 1.37 up.  Additional steps taken….He had a Linksys SRW224P switch connected to the RV042 router and we had disconnected this switch for testing purposes.   We performed the speed test again and we get the same speed results so we know the switch is not the issue.He had upgraded to firmware version 1.3.12.19 – TM Feb 13, 2009 – tested speed and no change.We accessed the web management interface and tried several modifications.   This includes the following…..-       We disabled the firewall – no change-       We disabled SPI with is the Stateful Packet Inspection (I was thinking this one would do it) – no change in speed.-       We disabled DoS (Deny of Service) – no change.-       We set MTU to Manual and tested various byte increments based on MTU ping testing. – Once again, no change in speed.  He is NOT using Load balancing on the routerHe has NO access rules but does have a few port forwards. Finally, with each change, he is saving the changes on the router. 

    You are expecting 20MB throughput on a $150 router?  Well, ok, maybe.. Can you check on your router or switch if the port is set or auto negotiated to 10 or 100?  That could explain 10MB limit (although technically a 10Mb port is considered 20Mb theoretical max throughput as 100Mb port is considered 200Mb per Cisco).  So maybe you ended up with 10/half somehow?  MTU 1500 would also be good for that connection I think and to try to get max throughput. 

  • Terrible prices, super cookie spying, & ridiculous surcharges.

    So I'm thinking about leaving Verizon after 10 years. There's really no dispute that they have the best coverage, but the immoral practices from those higher up make me sick. Not only do they pass the buck along to us when in comes to the taxes that the government charges them, but then they make us pay the taxes they they have to pay on their sales and services. Have you heard that we been being spied on and they continue to do so? Two word. super cookies.
    Super cookies -  Whether anyone knows it or not Verizon is using what are called super cookies to track your every move on your smart phone. They know what websites you go to, which ones you like the most, how long you linger on those pages as well as track a plethora of other important information that can be sold for a giant financial gain. Every other cellular company that had been using these "super cookies" have been called out as violating its customers privacy and have hence stopped tracking their customers like the gestapo. So how about Verizon wireless? Oh ya that's right your still tracking us and only said that you'll give us the option to "opt-out" when you figure out a way to do that... So as of now there is no real convenient way to get you to stop tracking us. WAY TO PUT YOUR CUSTOMERS FIRST!
    I've been seeing this all over HULU "2 lines + 10GB for $110" So is this false advertisement? Try to find this on their website all you'll spend a lot of time for nothing because it doesn't exist... Not only is it probably for new customers only (because honestly who cares about us), but you're not going to find it online.
    I have a 2 smart phones on my account, 10 GB, and end up paying $183 every month which is insane! When I upgraded my phone they added a kind $32 dollars for 2 months... Ya that's right, I go spend a few hundred dollars and BUY a smart phone from Verizon and then they turn around and hike my bill for two months when nothing has changes but my device.
    The long and the short of it is Verizon is MONEY HUNRGY and could give $.02 about their customers. The fact that you're trying to flood the market with false ads on TV to get your customers from a mass exodus says it all... I'd love to know how many customers you've lost since Sprint has offered to cut everyones bill in half???
    I'm not sure what I'm going to do, but I'm looking at sprint and I'm not going to continue to get robbed! Verizon this what pride falling looks like... enjoy losing customers faster than you can blink!
    So here's my question. What can you do for us Verizon? The ones that pay your payrolls, upgrade your networks, and keep your storefronts rolling. I'll never complain about your service which is why i haven't left yet, but what are you willing to do for me. How can we all unsubscribe from super cookies, and when will you stop charging us ridiculous fees on top of our plan?

    You can opt out of super cookies, which is a good idea as they are rumored to cause extra data use.
    2 lines + 10GB for $110".    IT is fact, all customers on More everything share plans, including yourself are paying this price.
    AT&T has the same adds for the same service.  
    in fact all carriers are now  ala' carte, 1.  you pay for a line, 2.  you pay for a data pool, 3.  you buy your own phone.
    That last part has completely escaped you.  
    All customers, on all carriers must buy their own phones.   T- Mobile requires customers to buy their phone at full retail, no 2 year subsidy, no installment plan.
    The ala'  carte plan structure is fair for everyone.

  • Writing content spi

    Hi, I've a cms portlet that does CRUD of content in it's own repository (maybe
    Oracle DB)
    I would like to integrate the the content as well as repository to the BEA portal
    for personalization purposes.
    Is there anyone who has done it before.
    Can anyone provide me some details on how I can do this?

    Edmund, unfortunately i don't know of an example spi implementation to point you
    to that is public. The article does discuss the interfaces you need to implement,
    there are about 5 of them that reside in com.bea.content.spi. content_repo.jar
    is the bea ootb implementation of the spi, but the spi interfaces reside in content.jar.
    let me know if you run into specific issues/questions with your implementation.
    James
    "Fred Simone" <[email protected]> wrote:
    >
    Hi James,
    I read through the article you emailed me, the article is still very
    brief.
    It does not mentioned what are implementation needed to be involved
    what are the interface exactly required for implementation.
    Is there a more detailed guide on how i can do this.
    Btw, I noticed that there a content_repo.jar, is that what I need to
    implement?
    I would appreciate if there are any sample or detail guide that I can
    continue
    my
    implementation for the BEA Portal 3rd Party CM Personal.
    regards,
    Edmund Leong
    93897453
    "James Owen" <[email protected]> wrote:
    We recently submitted an article to dev2dev on the content spi, butit
    hasn't been
    posted yet. If you send me an email ([email protected]) requesting the article,
    i'll
    pass it along.
    regards,
    james
    "Fred Simone" <[email protected]> wrote:
    Hi, I've a cms portlet that does CRUD of content in it's own repository
    (maybe
    Oracle DB)
    I would like to integrate the the content as well as repository to
    the
    BEA portal
    for personalization purposes.
    Is there anyone who has done it before.
    Can anyone provide me some details on how I can do this?

  • WRT350N Leaving Port 21 Wide Open with SPI Firewall Enabled

    I just ran Shields Up and noticed port 21 (FTP) is wide open, while all the other ports marked as stealthed.
    The router is a Linksys WRT350N with the latest firmware 1.03.2.  SPI Firewall is enabled and it's blocking "Anonymous Internet Request."
    Am I missing something here?  Why isn't port 21 being stealthed along with all the other ports?  I've run this test before with other Linksys routers and all the ports are stealthed so I'm concerned now.
    https://www.grc.com/x/ne.dll?bh0bkyd2
    Anyone else with the same router and configuration please run the Shields Up port scan at GRC to see if your port 21 is open and report back.  Thanks!

    Linksys told me that that port had to "stay" open, it is part of the FTP service when you attach the USB storage device.  After a lengthy amount of time on the phone, I had to suggest maybe a flash update.  But they would not put anyone on the phone to convince me they had a grasp on thiss issue, SO I FIGURED IT OUT.  Access the router.  Select "Storage", then select "Administration",  There you find "Internet Access".  Unselect "Enable" and obviously select "Disable".  Port 21 now in Stealth.  Now who can take it futher and figure out port forwarding/triggering for when one will start to use server?  Max

  • Possible to see at a glance who has/has not viewed pdf via the 'Tracker'?

    We are working on setting up procedures for Browser-based reviews. We were hoping we'd be able to see at-a-glance who had/had not viewed or sent back comments, and the date they sent them in the Tracker, but it seems to be just a list of who it was sent to originally. How do you know who has sent comments, other than manually scrolling through all the comments to see people's names?

    Hi;
    No, there isn't a way for you to see anything about who has saved progress.
    Thanks,
    Josh

Maybe you are looking for