Possible apple id hack

I received a few emails directed Bill, these emails say they are Apple and say I bought apps that I don't have.

These types of emails are usually phishing e-mails to get the details of your account.  It is more likely, they have got hold of your e-mail and send these emails to try to get the account you get to provide your password. Usually, these emails link to sites that are made to look like Apple, but are not Apple.

Its unlikely that your ID Apple is compromised, but you can change the password for it at http://appleid.apple.com

You can check your actual purchases for 90 days at http://reportaproblem.apple.com and see if one of them is eatually appear.

Finally, you can report phishing emails to:

[email protected]

You can learn more about the E-Mails of Phishing here:

http://www.Apple.com/legal/more-resources/phishing/

Identify the fraudulent 'phishing' - Apple Support e-mail

Tags: Mac App Store

Similar Questions

  • Security: Is it possible that someone hacked in to moniter what I write on e-mail?

    When I write comments on the emails I submit, they automatically say posted in drafts, but not in my drafts when I check to see. Is it possible that someone hacked in to moniter what I write on these attackers? What should I do about it?

    In Hotmail, your e-mail will be automatically save in the project as you write, if your browser suddenly closes then it save indraft, once you send then it will delete the project or if you discard email. If this is the case, this is normal.

  • Apple ID hacked, iPhone deleted and locked

    Hello

    Apple ID my brother hacked, iPhone has deleted and locked. When you set up the phone he asked once again for the Apple ID and password which is then said to be incorrect. When he tries to change his password on https://appleid.apple.com/ it says that the password is incorrect and more - there is no such an Apple ID. Then of course, it has been changed as well. He also received a letter from the hacker asking little money for recovering his Apple ID. Has attempted to call Apple support - nobody takes the phone even if it is an hour of work. Is it possible to reset the iPhone to factory settings, so that he can use it? ITunes will restore aid? Also, how can we get Apple to answer calls?

    Thank you

    Edgar.

    Solved by contacting Apple support, the most important support never

  • Apple ID hacked over a month

    My apple ID has been hacked by a person out of China more than a month. Apple notified immediately when the e-mails started coming. I was told it would take about a week, but always when I call support they tell me that the engineering team haven't started anything. They said they would deactivate my account to stop the two-step verification which they did not. I have more than 15 k $ in products apple right now. The person that I was initially assigned to unresponsive. Once he told me that he was out of the Office for a week and then told me he was sick for 2 weeks. Frustrated. No one wiped out my iTunes credits. IM locked on a bunch of applications I paid because they must be updated as I can't make my products apple rendering useless.  My children are home from school for the summer and cannot use their iPads, because its linked to my account and they want to use their gift cards to get new applications. Ugh. Any advice or suggestions are greatly appreciated. THX

    Why the moderator did you remove all the answers on this? Also why I am blocked from answering an email someone sent to ask me if I had any resolution. More than 2 months and still no resolution. Instead of spending the answers take time and crashes me how about fixing my account. SMH

  • My Apple ID hacked after 12 hours

    2 days ago, I bought iPhone5. Last night I did nine iCloud email (account) and off course all find my iPhone on YOU. Everything worked very well, but this morning I tried to connect to Game Center and password was rejected. Then I went to the Apple sign, but after a few attempts I was unable to open a session. I then go to iforgot.apple.com and saw the end of the Russian email address. I did not address recovery, just 3 safety issues. When I choose to answer security questions he can ask me for my birthday, but since I never get my birthday correct internet accounts I can't now remember the date, I put here and can not go to the next step in answering these questions. I disabled wireless because I'm scared of someone hangs my phone remotely.

    Please help me with this. Here you have 2 photos for more information.

    Problem solved by contacting Apple Support. They asked for security question and then they got my password changed.

  • development of mobile iOS without possible Apple/Mac?

    Hello

    Is it possible to develop/deploy an application mobile iOS (for iPad) on a PC?

    I have already developed an Android using Flash Builder application and now I would like to build the app for iOS also. I found conflicting information on the web. On the site of the iOS developer program, I found the following: "You need a Mac with Intel processor running Mac OS X Snow Leopard or later to develop iOS for the App Store applications."

    Is this correct? Or can I use my Flash Builder (4.6) running under Windows to create a package for iOS? Finally, download it in the App Store?

    Any comments would be appreciated.

    Kind regards

    Wim.

    Wim,

    For complete information on iOS using Flash Builder development process, please visit http://help.adobe.com/en_US/flex/mobileapps/WS064a3073e805330f6c6abf312e7545f65e-8000.html. This topic contains detailed information about how to obtain a certificate from developer, to generate a configuration profile, create and deploy the application.

    Hope this helps,

    Mallika Yelandur

    Adobe Community Help & learning

  • Hacked and no help from Apple for almost 2 mos.

    Hi all

    I'm pretty desperate here. I followed beyond posts on what to do when your AppleID is hacked, and many of them ended with "call Apple's Support." Apple support has been totally useless.

    My problem started on 14 March, when I received an email from Apple Support in Chinese, who thanked me for contact Apple. Shortly after, I got a bunch of notifications that my security questions and the password have been changed on my AppleID. Initially I thought that I didn't have access to my recovery email, which came from a former employer. However, I finally got the tech Director for the my old man use ' sdomain to get access to e-mail again. I used the website of julien inconu without result - no password reset email came through, although others did, which one expert of the main Apple support (as a test to confirm that the email address works).

    Two weeks ago, I spoke with my third Technical Advisor, which once again was super helpful, but she informed me she submitted the request to engineers just reset my email recovery (I still have access to the e-mail address associated with the AppleID), which is something made a support person previous (they said no (, but I think that the person has not only explain the question correctly). Again, I start to worry not this will go down as the other two.

    So, after hours and hours on the phone with specialists, who do not have the power/knowledge/combo? to help me, I always find myself waiting for resolution. Whenever I call, and they say they need to "check with the engineers" who then do not 2 weeks at a time. The problem seems to be that Julian inconu website don't push my recovery email, so they do not have two ways to check me (they were able to send a code to my devices, but that's all). Is - what really the case where a person can can join Apple to hack my account but I can't then this person out? I'm certainly not the only person to have ever experienced.

    And all this time, the person who hacked my AppleID has access to all location data to find my Mac/iPhone (to turn off the coast, you must have the Apple ID). They would not even freeze the account! I also have not been able to update applications (which means I can't use many of them), have not updated to El Capitan (I'm behind the curve, sorry, but just got a new keyboard and mouse Magic 2 and now cannot use those).

    Don't worry, I'll change to two-step verification, as soon as I get my account!

    If anyone has any other ideas of ways that I can get a resolution or departments to call (is there anyone who can lead me to a kind of engineer), would be great. I have spent hours on this problem and have so far got absolutely nowhere thanks a lot for the help!

    Updates? I was told that the audit in two steps has been to resolve the issue, which prevented the Apple engineers. Sorry, you encounter the same problem.

  • iPad can not activate after update 9.3 iOS. "Incorrect Apple ID" used message, when it obviously isn't

    After the update to iOS 9.3 my 2 Mini iPad fails to activate.

    I get the message 'wrong apple ID' all the time, even if its my correct apple ID, that works on iTunes and iCloud, etc..

    I tried the activation via iTunes recovery mode and DFU mode, but nothing helps. I do not think it's a problem of server activation, this looks more like a problem with activation ID.

    I also tried to remove the device from iCloud, remove the device to locate your iPhone and even changed my password Apple ID.

    Is this a possible iOS Malware hack "Keyraider"?

    It is more likely that it is a bug on the Apple name, given the large number of threads with people having the same problem. Especially people with older devices.

    You may only be stuck waiting for them to sort out if restore via iTunes did not work for you.

  • IPhone 6s more compromised / hacked.

    On a train this week (London) my Iphone rang a few pets, and I couldn't take the call, so I pressed the switch off

    Immediately hitting the switch off, the gentleman sitting opposite (I never met before) had his phone on the table, his phone Samsung, hitting my decline button, has my name and surname, phone number address e-mail and my image of Linkedin displayed on his phone profile.

    To be clear, the gentleman was sitting in front. There was no way he could see who I was. The layout on his phone wasn't a page "linkedin".

    What should I do, who do I report this?

    Help, please

    Mark

    To be honest with you, its sounds a little paranoid. There is no possible way to hack your iPhone. There is nothing strange in the incoming call on unknown number.

  • I offered him my iPad to my father, and it was forgotten not only apple ID, but also by e-mail. the ipad needed to activate the icloud since its ios 9.3 update. You can help me to unlock the ipad without the iCloud. I have evidence to prove that it's mine

    I offered him my iPad to my father, and it was forgotten not only apple ID, but also by e-mail. the ipad needed to activate the icloud since its ios 9.3 update. You can help me to unlock the ipad without the iCloud. I have evidence to prove that it's mine

    You need to take it to an Apple Store with a dated receipt to prove that you are the original owner/purchaser. It's possible Apple may be able to release the lock. We can not help you with it.

  • IPhone requires data to use Apple Watch

    My wife does not require the use of the data, but she would like to get an iphone and a Apple Watch, will work to watch if she gets only a plan and texting.  I guess some functions require access later and I hope that the WiFi would be nice.

    Hi Scott

    Some of the features and services Apple Watch that can be used to involve the use of cellular data or Wi - Fi internet access.

    Whenever possible, Apple Watch relies on its Bluetooth connection with paired iPhone. When it provides certain features and services through the watch, the iPhone can use mobile data / mobile or Wi - Fi. Apple Watch has no cellular function, can not use cellular data otherwise than through the iPhone.

    Apple Watch offers a number of features when paired iPhone is either unavailable (e.g. disabled) or not in the Bluetooth range:

    • Play music from a playlist that has been synced to Apple Watch.
    • Use the watch for the time, as well as alarms, stopwatches and the clock.
    • Keep track of your activity (Stand, Move, exercise) with the application of the activity.
    • Follow the workouts with the application of the workout.
    • View photos of the synced photo album.
    • Use Apple pay for shopping.

    If the watch is not connected to your iPhone via Bluetooth, but it is within range of a wireless (2.4 GHz) your iPhone plugged in before, the watch can connect to the network and you can also still:

    • Send and receive messages using iMessage.
    • Send and receive digital messages Touch.
    • Use Siri.
    • Make and receive phone calls if you have calls enabled Wi - Fi (depending on your operator).

    More information:

    Use Apple Watch without her sister iPhone - Apple Support

  • has anyone successfully recovered a pirate apple id

    My ID apple was hacked from China last week. It happened in the middle of the night, so by the time I discovered that they had changed my password, date of birth, email recovery security questions and purchased a few apps: sina IM subscriptions, or something.

    I called the apple support as soon as I found out, but it was too late. All they could do was ask me a question of safety, I had never put in place. They said that they would have to go to the technical team and they would get back to me even though they knew more.

    It was a week ago, and I heard nothing. I called a couple times more support, but all they can do is go on the same process until you get to the part of security question and then... crickets.

    So this happened to someone else, you got your account successfully return, how long did take, and how do you know it was fixed? Should I just cut my losses and start over with a new apple ID?

    Thank you

    (The display of the account of my wife because actually posting here without your ID :-() impossible)

    Hello

    I was hacked from China last night. Even though I have reset my password, I can't change the Questions of security (which are in Chinese) or any other crucial information such as date of birth and other means of authentication...

    Trying to access the Apple support via the web, which brings me to the Chinese site... And there is a significant lack of language support on Apple's Chinese site.

    In addition, this problem of access to assistance from Apple is far too often:

    Service temporarily unavailable

    I got 4 emails from Apple support (in Chinese). Cat contact support out there to talk about these cases that opened when my ID got stolen. They responded quickly, but simply directed me to call (1-800-263-3394) account security team.

    I guess if I knew how to hack my way back as the pirates did with my account, I have managed to do so via a few simple apple support tickets. It seemed to work for them...

    Finally, all the purchase were made as purchase app for this shit:

    https://iTunes.Apple.com/ca/app/yy-Quan-min-Zhi-Bo-Shi-pin/id427941017?Mt=8

    $ 25,28

    $ 6.99

    $ 3.99

    $ 1.39

    $ 1.39

    $ 1.39

    $ 1.39

    Total: $ 41.82

    It is very close to the balance that I had left in my Itune Store generic. (Fortunately, no PayPal or Visa are related to my ID)

    This! @# application developer seems not legitimate at all...

    in any case, I'll post back when / if things are put in order or not.

    you're going to want to spend time with security support now... Oh joy!

    Edit: Surprise! Apple support have to sleep! Im going to have to wait until 07:00.

    /Cheers

    g

  • A Hacker is using my computer?

    Sometimes, I get this message when I shut down my computer: "other people are registered on this computer. Close window can cause the loss of data... "No one else using my computer I know... Is it possible that a hacker had access to my computer?

    An analysis deep run local tech before I contacted you. Another run through MaCaffe to double check found more wasted software. Except that this is personal computer, but I started to disconnect before closing because there her husband as a user too. Will let you know if the pop message yet :-) Thank you to be so fast! Donna

    Multiple users - probably the cause.

    Personal opinion: Drop McAfee soon.  Get something more reliable and less hungry for resources.

    Insofar as the system - maintenance/cleaning, I'd pay more technology:

    Search for malware:

    Download, install, execute, update and perform analyses complete system with the two following applications:

    Remove anything they find. Reboot when necessary. (You can uninstall one or both when finished.)

    Search online with eSet Online Scanner.

    The less you have to run all the time, most things you want to run will perform:

    Use Autoruns to understand this all starts when your computer's / when you log in. Look for whatever it is you do not know usingGoogle (or ask here.) You can hopefully figure out if there are things from when your computer does (or connect) you don't not need and then configure them (through their own built-in mechanisms is the preferred method) so they do not - start using your resources without reason.

    You can download and use Process Explorer to see exactly what is taking your time processor/CPU and memory. This can help you to identify applications that you might want to consider alternatives for and get rid of all together.

    Do a house cleaning and the dust of this hard drive:

    You can free up disk space (will also help get rid of the things that you do not use) through the following steps:

    Windows XP should take between 4.5 and 9 GB * with * an Office suite, editing Photo software, alternative Internet browser (s), various Internet plugins and a host of other things installed.

    If you are comfortable with the stability of your system, you can delete the uninstall of patches which has installed Windows XP...
    http://www3.TELUS.NET/dandemar/spack.htm
    (Especially of interest here - #4)
    (Variant: http://www.dougknox.com/xp/utils/xp_hotfix_backup.htm )

    You can run disk - integrated into Windows XP - cleanup to erase everything except your last restore point and yet more 'free '... files cleaning

    How to use disk cleanup
    http://support.Microsoft.com/kb/310312

    You can disable hibernation if it is enabled and you do not...

    When you Hibernate your computer, Windows saves the contents of the system memory in the hiberfil.sys file. As a result, the size of the hiberfil.sys file will always be equal to the amount of physical memory in your system. If you don't use the Hibernate feature and want to reclaim the space used by Windows for the hiberfil.sys file, perform the following steps:

    -Start the Control Panel Power Options applet (go to start, settings, Control Panel, and then click Power Options).
    -Select the Hibernate tab, uncheck "Activate the hibernation", and then click OK. Although you might think otherwise, selecting never under "Hibernate" option on the power management tab does not delete the hiberfil.sys file.
    -Windows remove the "Hibernate" option on the power management tab and delete the hiberfil.sys file.

    You can control the amount of space your system restore can use...

    1. Click Start, right click my computer and then click Properties.
    2. click on the System Restore tab.
    3. highlight one of your readers (or C: If you only) and click on the button "settings".
    4 change the percentage of disk space you want to allow... I suggest moving the slider until you have about 1 GB (1024 MB or close to that...)
    5. click on OK. Then click OK again.

    You can control the amount of space used may or may not temporary Internet files...

    Empty the temporary Internet files and reduce the size, that it stores a size between 64 MB and 128 MB...

    -Open a copy of Microsoft Internet Explorer.
    -Select TOOLS - Internet Options.
    -On the general tab in the section 'Temporary Internet files', follow these steps:
    -Click on 'Delete the Cookies' (click OK)
    -Click on "Settings" and change the "amount of disk space to use: ' something between 64 MB and 128 MB. (There may be many more now.)
    -Click OK.
    -Click on 'Delete files', then select "Delete all offline content" (the box), and then click OK. (If you had a LOT, it can take 2 to 10 minutes or more).
    -Once it's done, click OK, close Internet Explorer, open Internet Explorer.

    You can use an application that scans your system for the log files and temporary files and use it to get rid of those who:

    CCleaner (free!)
    http://www.CCleaner.com/
    (just disk cleanup - do not play with the part of the registry for the moment)

    Other ways to free up space...

    SequoiaView
    http://www.win.Tue.nl/SequoiaView/

    JDiskReport
    http://www.jgoodies.com/freeware/JDiskReport/

    Those who can help you discover visually where all space is used. Then, you can determine what to do.

    After that - you want to check any physical errors and fix everything for efficient access"

    CHKDSK
    How to scan your disks for errors* will take time and a reboot.

    Defragment
    How to defragment your hard drives* will take time

    Cleaning the components of update on your Windows XP computer

    It is a good idea at this time to ensure that you continue to get the updates you need. This will help you ensure that your system update is ready to do it for you.

    Download and run the MSRT tool manually:
    http://www.Microsoft.com/security/malwareremove/default.mspx
    (Ignore the details and download the tool to download and save to your desktop, run it.)

    Reset.

    Download/install the latest program Windows installation (for your operating system):
    (Windows XP 32-bit: WindowsXP-KB942288-v3 - x 86 .exe )
    (Download and save it to your desktop, run it.)

    Reset.

    and...

    Download the latest version of Windows Update (x 86) agent here:
    http://go.Microsoft.com/fwlink/?LinkId=91237
    ... and save it to the root of your C:\ drive. After you register on theroot of the C:\ drive, follow these steps:

    Close all Internet Explorer Windows and other applications.

    AutoScan--> RUN and type:
    %SystemDrive%\windowsupdateagent30-x86.exe /WUFORCE
    --> Click OK.

    (If asked, select 'Run'). --> Click on NEXT--> select 'I agree' and click NEXT--> where he completed the installation, click "Finish"...

    Reset.

    Now reset your Windows with this FixIt components update (you * NOT * use the version aggressive, if requested):
    How to reset the Windows Update components?

    Reset.

    Now that your system is generally free of malicious software (assuming you have an AntiVirus application), you've cleaned the "additional applications" that could be running and picking up your precious memory and the processor, you have authorized out of valuable and makes disk space as there are no problems with the drive itself and your Windows Update components are updates and should work fine - it is only only one other thing youpouvez wish to make:

    Get and install the hardware device last drivers for your system hardware/system manufacturers support and/or download web site.

    If you want, come back and let us know a bit more information on your system - particularly the brand / model of the system, you have - and maybe someone here can guide you to the place s x of law to this end. This isn't 100% necessary - but I'd be willing to bet that you would gain some performance and features in making this part.

  • A hacker can type into a microphone for laptop?

    Hi all
     
    Is it possible for a hacker to tap into my laptop computer microphone and listen to me? o.0

    Also how do I know if a person is indeed listening? My microphone has never been disabled, and Yes, I have the latest software installed Norton antivirus protection.

     
    In addition, how can I tell if a computer hacker broke into my system? Are there subtle/obvious signs?
     
    Thank you all.
     
    Rick
     

    Hello

    Yes it is possible then turn off the microphone when not in service.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp?prevx=Y  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ======================================

    If necessary AFTER you are sure that the machine is clean of any malware. (DO NOT USE IF)
    MALWARE IS STILL PRESENT).

    How to do a repair installation to repair Windows 7
    http://www.SevenForums.com/tutorials/3413-repair-install.html

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 for virus and spyware help
    infections. See http://www.microsoft.com/protect/support/default.mspx for more details. For
    international information, see your subsidiary local Support site.

    Microsoft support - Virus and Security Solution Center
    http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#TAB0

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • How to check a cisco image when the device not approved (hacked)?

    I have a cisco router that I don't totally trust. I want to check the image to verify that it has not been reinstalled with a notched. The verify command indicates that the image is ok.

    As I checked the image on the router itself, but with the help of a possibly compromised system I have not totally trust this information.

    Issues related to the:

    * Is it possible to deploy "hacked images" or the low level of cisco boot loader refuse to load such an image due to internal hardware signature checks that cannot be falsified.

    * I have uploaded the image of the router. If the router contained a manipulated image (and has not changed during the download so I downloaded a fake but the original image), how can I check the content when it is stored on my workstation. Cisco Web sites contains a few 'service' where I ask md5sum/sha1 /... for a version of the given image?

    Thanks in advance for any answers.

    Hello

    I guess you can always boot in rommon and audits/transfer from there?

    jF

Maybe you are looking for