Surveillance of BW on wrt160... Possible?

Hello

I live in a House of the student with 8 other people. One of them uses the internet
(I pay for) big time, leaving the others (and me) with a very slow speed. With a speed of 20mb9t, I shouldn't download with 117 kbps!

The problem is, that I don't know who he is, and of course all say "it isn't me". I found the tool in the router to find the addresses (DCHP clienttable), and..., there is an option to control the availability of the internet to some MAC addresses (e.g. including the ports/site, they cannot use on what times)...

But I wonder if there is a possibility to check who uses a lot of bandwidth and perhaps to set an option that people can no longer use it then 3 periods of the day?

Greetings,

Zeebonk,

Download the manual of your router and find the instructions to activate your router log.  Most likely someone downloads programs p2p as bittorrents, limewire, etc...

Tags: Linksys Routers

Similar Questions

  • Is it possible to assign a different sound to my second e-mail account?

    I have two email accounts set up and works fine in Thunderbird. My main account, which I use for almost everything and a second account that I use for video surveillance and I was wondering if it was possible to assign a different sound to the second account.

    You can try this addon, it seems to be mixed results.
    Hard to know if it had fallen to not properly configure the user.
    I have not used it myself, but it must be worth a try.

    How to install the Extension module:
    After you download addon extension *.xpi file to the downloads or desktop folder.

    In Thunderbird
    'Tools > "Add-ons"
    or
    'The menu icon ' > 'Add-ons'

    • Click the gear icon and select 'install module file.
    • Find the downloaded *.xpi file and click 'open '.
    • You have as much need to restart Thunderbird when you are prompted.
  • Is it possible to recover hundreds of mails that have disappeared from my Inbox after it has been quarantined today by Norton Internet Security?

    I received an infected email this morning which resulted in Norton Internet Security quarantine inbox. All received emails are gone now from the Inbox (with the exception of two who apparently arrived just before the infected message).
    (1) is it possible to recover the E-mails lost without re-infection of the Inbox?
    (2) how can I avoid this happening again? Until today, the infected emails have simply removed by Norton Internet Security on arrival without all the previous messages being lost in the Inbox.
    I would be very grateful for help.

    you force Nortons of UN-setting in the file quarantine.
    Then, you create an exception for Norton analyzes the folders that contain your Thunderbird profile, so it is not repeated.

    Be aware that the infection is not as severe as the cure. Maybe you can find someone to Semantec to explain how an email in Thunderbird can infect anything unless you physically open an infected attachment that Norton should catch when it is written in the temp folder before opening.

    I lost a lot of time talking to corporate cretins to Semantec and they charge just "this is another line of defense" when asked for more details. Why, because they can simply justify not e-mail Scanner in any other terms. Enjoy it servers little or not by the challenges of usability and convenience.

    This "mail" was written on your drive hard until Semantec has managed to make a mess of things. It's a little late don't you think saying "you have an infection. Do they expect also for stuff in your browser to be written on the disc? You bet they do. Where is the preventive surveillance to data transmissions that prevents infection before it is written on your drive?

  • Possible Hijack, System get "changed" or perhaps "partially virtualized" virus strange very important situation

    I have a problem with 2 computers and its kind of a large.  Hard to know where to start so I'll keep it short, but I think it may concern even Microsoft, because it involves the use of what I believe to be false "terms of service" or small print and I knew even where the source of this problem is, but I really need help! Myself and others use laptops we bought together.  We live in a family, but laptops, a TOSHIBA and a HP/COMPAQ F700 satellite, as well as what I call a wireless router belong to the USA! We are connected through this wireless device, a PRISM which is perhaps a bit older, but of course seems to work, it is plugged into a modem cable motorola belonging to someone else in the House.  To make things moving along, he came to our attention that A: our systems periodically change without our permission, by that I mean that the toshiba that was purchased at walmart brand new, came with an Intel Celeron, and I think THAT the wireless card IS an atheros brand.  I KNOW that was the case with the Compaq regarding the wireless adapter, and Compaq was bought at a rent to own store and came with a 1 GB ram AMD processor.  For some reason, we are under some form of control Admin, and our system is changing periodically on BOTH computers to say his family chipset intel and our wireless adapters will go to realtek USB 2.0, once again on BOTH computers.  When this happens, our user accounts admin, that we had as an administrator user accounts AND I have unlocked the hidden via the cmd prompt and hold SHIFT + ENTER thing, will be signed in some way limit our ability to do things.  LAST FEW DETAILS, I promise you: the so-called matrix memory of intel as magically appeared with software RAID of surveillance and we saw our event logs, which we prob didn't know existed, being transferred by a remote user, and we have never consulted the remote adjustment, except in order to turn them off, as well as file sharing options.  However they continue to change when this happens.  Yesterday, to finish that, I found strange things after doing a thing of complete system repair, not for the first time, this time on the compaq.  After the repair, which seemed fine at first, I was embarrassed to find a few shortcuts readme present in the recently amended on the start menu folder.  I followed them to the folder locations that led me to the prog. files, THE SIMS 2, and various subfolders with S.W.R. claiming to be from MICROSOFT and don't mention any particular O.S. except with reference to .NET and some virtualization programs that we noticed the menu running task.  OH, I shouldn't forget that with the processor changes in both pc, THEY BOTH now say that they ar x 86 client or PC workstation and a recent attempt on the repair of the system or pressing f8 on the toshiba somehow led me to a weird command prompt which began with X : ??  I'm prob a few things set aside even if it is really long, but the SIMS 2 folder is very disturbing because a person who lives here once gave us a CD on an old computer that has not been used for at least 3 years and we have certainly not installed this game WE NEITHER of these new computers.  I SUSPECT SOME things but don't know what to do.  I TRIED to get our product off the coast of the TOSHIBA key but was said previously by a repairman it seems to have BEEN DELETED!  The records in question, according to me, are always on both pc and we executed the software suggested, including microsoft security databases, s.s.and destroy, and the malewarebytes thing, as well as to have a repair shop gives us some tips. They said several things, like the toshiba tried to boot from the drive cd/DVD, then boot pxe or something and someone had changed the wake on lan option, and maybe other things I do not remember.  OK SORRY FOR ALL this THAT REALLY, but I wanted to make sure that I gave as much information as possible because we never wanted our PC clone, virtualized, or something like that, whatever realtek usb 2.0 is, it's another icon of the wireless connection in the tray on the lower right AND THE COMPAQ is REMAINED CONNECTED WITH the off switch wireless?  Help!

    Thank you for your gracious reply. It certainly sounds to me like your computers are compromised. As I said, the only way to fix now is to restore as long as the plant once more after you back up your data and then set them up by the suggestions below. It costs you nothing but time. I'll also give you my general information on the configuration of the network wireless safely. Unfortunately, you must have control of the wireless router to do this. If you do not, then consider doing your own Internet connection and wireless router. Addition to the steps of General safety below, make sure that file/printer sharing is DISABLED.

    The result of all this is to keep on the front of your mind is that security, physical access to a machine trumps all. If you do not trust the people with whom you live and/or people who visit them, you have to keep the computer with you or in a locked environment that no one else can enter. And of course the locks can be chosen. Or find the best people to live with. I understand that this is not possible in your real world, but I'm telling you all the options.

    Computer security - any computer running an operating system is accessible by a person with 1) physical access; (2) time; (3) jurisdiction; (4) tools of. There are a few things you can do to make it a little more difficult but:

    1. define a password in the BIOS that must be entered before starting the operating system. Also to set the supervisor password in the BIOS so the BIOS configuration cannot be entered without it.

    2. starting at the BIOS, change the order of boot to hard drive first.

    3. set strong passwords on all accounts, including the built-in XP administrator account (it is disabled by default in Vista).

    4. If you leave your own account connected, use Windows key + L to lock the computer (or set the screen/power economy saver) when you step away from the computer and require a password to use.

    5. do the other accounts of users limited in XP Home, regular user accounts in XP Pro. All users must be on a Standard account in Vista with an administrator account (called something like 'Tech' or 'CompAdmin') only used for purposes of elevation.

    6. If more than one person uses the computer user set permissions/restrictions:

    If you have XP/Vista/Windows 7 Home, you don't have the built-in ability to create fine-grained limits. In XP and Vista, you can use the Security Console or MVP Doug Knox or the program MS SteadyState to set restrictions as you wish. SteadyState now supports Vista but not Windows 7. Mr. Knox security console may still work in Win7.

    http://www.dougknox.com
    http://www.Microsoft.com/Windows/products/winfamily/SharedAccess/default.mspx
    Information about SteadyState - http://aumha.net/viewtopic.php?t=27570
    SteadyState support - http://social.microsoft.com/forums/en-US/windowssteadystate/threads/
    SteadyState How - to (not supported in Windows 7 still) - http://www.howtogeek.com/howto/6520/windows-steadystate/

    Please understand that these are technical answers to what is essentially a technical problem and there are ways around these precautions. It is a problem of family / interpersonal which cannot be solved by technical means.

    Establishing a safe wireless router - have a computer connected to the router with an ethernet cable. Examples given are for a Linksys router. See the manual of your router or the router mftr's Web site. for the parameters by default if you don't have a Linksys. Open a browser such as Internet Explorer or Firefox and in the address bar type:

    http://192.168.1.1 [Enter] (it is default IP address of the router, which varies from router to router then check your manual)

    This will bring you to the login screen of the router. The default username is blank and the Linksys default password is "admin" without the quotes. Enter this information. You are now in the configuration of the router utility. Your configuration utility may be slightly different from mine. The first thing to do is to change the password by default because everyone knows the default passwords for different routers.

    Click the Administration link at the top of the page. Enter your new password. MAKE A NOTE SOMEWHERE THAT YOU WILL NOT LOSE. Re-enter the password to confirm it, and then click Save settings at the bottom of the page. The router will reboot and show you the box of connection again. Do not fill in the user name and put it in your new password to enter the configuration utility.

    Now, click on the link wireless at the top of the page. Change the network name (SSID) wireless by default to something, you'll recognize. I suggest that my clients not use their surname as the SSID. For example, you might want to name your network wireless network "CastleAnthrax" or similar. ;-)

    Click on save settings and when you get the prompt that your changes were successful, click the wireless security link which is just beside the Basic Wireless Settings link (where you changed your SSID). Most computers purchased during the last 4 years have the wireless hardware that will support WPA2-Personal (also known as WPA2-PSK). This is the desired encryption level. If your wireless hardware is older, use WPA. Don't use WEP, because who is easily broken within minutes. So go ahead and set the Security Mode WPA2-Personal. Do this and enter a password. For example, you could use the password ' here be dragons, beware you scurvy dogs! The password is what you enter on all computers that are allowed to connect to the wireless network. MAKE A NOTE SOMEWHERE THAT YOU WILL NOT LOSE.

    At this point, your router is set up and if the computer that you use to configure the router will normally connect wireless, disconnect the ethernet cable and wireless of the computer should see your new network. Enter the password that you have created (exactly as you wrote it with all capital letters and punctuation) to join the network and start surfing.

    If you want to develop me on this or have any other questions, feel free to ask. MS - MVP - Elephant Boy computers - don't panic!

  • Use of surveillance data

    I have a request to add monitoring of the use of phones (Edge, GPRS, etc.) data for our application, I tried the SDK and nothing comes to can someone point me in the right direction?

    It doesn't have to be real-time, although that would be nice but surveillance of newspapers after the fact would be nice.

    It seems possible, given that demand for Mini Moni (http://www.ehnert.net/MiniMoni/) does.

    Thank you

    Lindsay

    You can use the getNumberOfPacketsSent and getNumberOfPacketsReceived of the class RadioInfo, methods that provide the number of IP bytes sent and received.

  • "Question of possible priority with the operator to control flow.

    Hi guys

    I have the following problem:

    Yesterday, I did an upgrade from debian wheezy distribution Debian jessie.

    Since then, I had a problem with a plugin which I use for Icinga a surveillance system.

    When I run it, I got the error that there is a 'undefined subroutine.

    I read on google that I can fix it, with resettlement vsphere SDK, but the installation blocked to "CPAN is to download and install the pre-requisites Perl module"SOAP::Lite.

    Can I skip this step with Ctrl + C, and at the end he says «this Setup program has installed successfully...» ».


    But when I run the Plugin I get the error message 'problem priority Possible with operator control in the /usr/share/perl/5.20/VMware/VICommon.pm line flow 2147' and the whole stucks plugin.

    I tried the next step that I found in this forum and the error message does not appear, but the stucks again plugin...

    Re: VMware-vSphere-Perl-SDK-5.5.0-1384587 broke up with perl 5.20

    I also have Perl 5.20.2...

    Can you guys help me?

    Vinzenz

    OK I could fix it...

    I changed the line 2147

    "

    return (meaning $user_agent-> cookie_jar and)

    $user_agent->-> as_string cookie_jar don't ");

    "

    And this time I waited for a long time and I get an error message that there is a problem with the SOAP.

    The solution was to downgrade Net-HTTP and libwww-perl with the following commands:

    Perl - MCPAN-e shell

    o conf urllist push http://backpan.perl.org

    install GAAS/Net-HTTP-6.03.tar.gz

    install www-perl-6.03-tar.gz GAAS/lib

    The second command loads the old versions of the urllist.

    Thx for your help and I hope that I can help others with the same problem.

    Vinzenz

  • Several possible results of Script plugin?

    Hi all

    My company has several custom applications that I am considering writing plugins for.  If successful, we can move forward with a bigger HQ demo.  What I'm trying to understand, that is if it is possible to have multiple "instances" of a metric in a plugin XML.  Please excuse me if this is an a newbie, I'm indeed a beginner HQ.

    For example, the application can have global stats, but then to have a variable number of groups, each with their own settings:

    App1:
    -Avail %
    -CPU %
    -Last file processed
    -Time since the last file
    -Group 1:
    -Name
    -The State
    -Process time
    -Treatment of the file
    -Group 2:
    -Name
    -The State
    -Process time
    -Treatment of the file

    Different servers would have a different number of these groups of group-#, so I wouldn't have to write the plugin to take the maximum number of groups and then simply return a bunch of zeroes or something.  This is similar to the record variables in the IO subsystem.  Due to the nature of the application, I learned to do this via a script, but I can format the output in any way.

    Any thoughts?

    Thank you
    Andrew

    There are two ways that we could manage the Autodiscover:
    -The CLI has a 'import of resources' command, which reads an xml file
    Description of all the types of server and service you want to create or
    Update.  Of course, the xml file could be generated by a script.
    -We had the intention of adding the auto-decouverte script-able, it would be
    a great use case

    Regarding the execution of the script to collect surveillance data, there are
    built-in caching.  The cache key is the metric properties
    model.  In the example of iostat, where the model is:

    exec:file=PDK/scripts/device_iostat.pl,args=SDA:availability

    The properties/cache-key would be:

    file=PDK/scripts/device_iostat.pl,args=SDA

    If you want the script to collect data for all resources in a
    single turn, you could just change the model as follows:

    exec:file=PDK/scripts/device_iostat.pl:sda_Availability

    Which makes the properties cache-key/identical for all resources:

    file=PDK/scripts/device_iostat.pl

    The io-device - plugin.xml would change to:
        
    value="exec:file=%script%:%device%"/ >


    model = ' ${model} _Availability.
    indicator = "true" / >

    And device_iostat.pl would be just the format of the output with device keys
    key name:
    Print "labels of $_ ${device} [$i] = $values [$i] \n";

    The lifetime of the cache is defined by the metric, including intervals
    default values are defined by the plugin and can be changed later by-
    resources or in the world by type in the user interface.
    So, if your metric intervals have been set up to collect all 5
    minutes, run the script would only once every 5 minutes without worrying
    How many resources, the output of the script applies to.

    For this, all the senses?  Whatever it is, I'll do a second
    version of the iostat plugin that works this way, which should be more
    Claire.

    On 4 January 2007, at 21:34, Andrew Noonan wrote:

    > Hi Doug,.
    >
    > Thank you for the quick response!  I saw the example iostat and
    > while it would work to implement the structure of the Group/App
    > concept, it seems to indicate that you would have to manually
    > define each resource.  As you can imagine, if I've got 40 groups
    > a single application and 20 on the other, through moments of 60 UI to set
    > each group is rather painful.  In addition to this, as I understand it
    > good things, the script that collects this information will
    > call 40 times on this first server just to get one
    > 'round' of data.  I guess it could be minimized by design
    > the script to create a cache file, but then you have to worry
    > on all problems that can bring.  And then, maybe I'm
    > base this concern on a false assumption.  It looks like the iostat
    > script needs * someone * to tell him what to send as input devices
    > to the wrapper script.  I'm trying to design it for the output
    > a single call returns information for the equivalent of several
    > resources, just as the original iostat returns information on
    > multiple devices.
    >
    > If HQ can do, that's fine.  In other monitoring solutions
    > I worked with, the variable part of this (usually called a)
    (> 'instance', 'class' or something similar) has been defined (usually in
    (> XML) with a key of some sort attribute (name, PID, etc) so that the
    > next call data could be associated to the previous call
    > data.  In the present was if you were a tree OID, or call
    > iostat, surveillance or other process, you just have to define
    > the attributes of the instance instead of each individual thing.
    >
    > If no, then no, it's not the end of the world... I may be
    > could create a family of plugins for groups (Group - 1 -
    (> plugin.xml, group-2 - plugin.xml, etc..) and auto-discovery group
    > existance?
    >
    > Thank you,
    > Andrew
    >

  • is it possible to buy the iPhone 7 more unlocked and without a subscription which will work in Russia

    My friend is going to go to New York for the holidays of the maintains 21 October to 31 October. And I really want to buy the iPhone 7 more 128Gb it. I know that I need a free sim card or without a contract. I asked best buy about this and they said they don't sell iPhones with contracrs. Is this possible?

    Thank you.

    Apple has not announced when they will start to sell the iPhone Unlocked 7.

  • last possible system on Mac Mini 1.93 GHz Intel Core 2 GB memory

    last possible system on Mac Mini 1.93 GHz Intel Core 2 GB memory?

    My system works very well except for Safari and Firefox, which NOW have updated versions.  What is the solution? I use Snow Leopard and latest Firefox since it's 48.0.2 and Safari's 5.1.10 that I can no longer use to access certain web pages

    The official list of Mac compatible with macOS Sierra:

    What are the requirements for Sierra.

    Towards the end of 2009 or later

    • MacBook
    • iMac


    2010 or later

    • MacBook Air
    • MacBook Pro
    • Mini Mac
    • Mac Pro

    If you do not meet the above, but respect what follows, then you can upgrade to El Capitan.

    Upgrade to El Capitan

    You can pass the Lion El Capitan or directly from Snow Leopard. El Capitan can be downloaded for FREE from the Mac App Store.

    To upgrade to El Capitan, you must have Snow Leopard 10.6.8 or installed Lion. Download El Capitan from the App Store. Sign in with your Apple ID. El Capitan is free. The file is big enough, more than 5 GB, allow it some time to download. It would be preferable to use Ethernet because it is nearly four times faster than wireless.

    Mac that can be upgraded to OS X El Capitan

    1 iMac (mid-2007 or newer) - model identifier 7.1 or later

    2 MacBook (late 2008 or early 2009 or newer aluminium) - model identifier 5.1 or later

    3. MacBook Pro (Mid/Late 2007 or newer)- model identifier 3.1 or later version

    4 MacBook Air (late 2008 or newer)- model identifier 2.1 or later

    5 mac mini (early 2009 or newer)- model identifier 3.1 or later version

    6 mac Pro (Early 2008 or newer)- model identifier 3.1 or later version

    7 Xserve (early 2009) - model identifier 3.1 or later version

    To find the identifier of the model open system information in the Utilities folder. It is displayed in the Panel on the right.

    Are my applications?

    See table of application - RoaringApps compatibility

    Upgrade to Lion

    If your computer does not meet requirements to install the above, it can still meet the specifications to install Lion.

    You can buy Lion to the Apple store. The cost is $19.99 (as it was before) plus taxes.  It's a download. You will receive an email with a redemption code that you then use on the Mac App Store for download Lion. Save a copy of this installer to your download folder because Setup deletes itself at the end of the installation.

    Lion system requirements

    1 mac with an Intel Core 2 Duo, Core i3, Core i5, Core i7,

    or Xeon processor

    2. 2 GB of memory

    3 OS X 10.6.6 or later (10.6.8) recommended

    4. 7 GB of available space

    5. certain features require an Apple ID; conditions apply.

  • All my messages on my iPhone were mysteriously deleted after I restarted - is it possible to sync my old backup iPhone with my iMessages on my Mac?

    Hello!

    This past weekend, I noticed that my Messages app acted strangely on my iPhone 6. Accordingly, I turned and turn it on again and noticed that all of my posts have disappeared. I then did a hard reset and turned on - still no messages.

    I have my settings to keep my messages forever, what really saddened me to see all of my messages disappeared. In any case, I'm about to restore my backup iPhone on a new phone (6 s). Luckily, I backed up my phone the week last before my messages disappearing.

    I understand that when I restore a backup, everything that happened on my phone since will not appear. However, I have also the Messages on my MacBook Air app, when kept all my messages before and after the mysterious disappearance on my phone. Once I have perform this restore, I was wondering if it is possible to synchronize in any post-restore on my laptop to my phone messages.

    Thank you!

    Hi masizh,

    Congratulations on your new iPhone 6 s! I understand that you want to synchronize the restoration of post messages on your Mac Messages app to your iPhone 6 s. If these are the iMessages, your new device needs to load the entire conversation once you send or receive an iMessage from the recipient. SMS messages may not work in the same way, however, you can contact your operator for support with text messages.

    To continue to have your Mac with your iPhone SMS sync, don't forget to implement continuity with your new device.

    If you have an iPhone, the SMS that you send and receive on your iPhone may appear on your Mac, iPad, and iPod touch as well. You can then continue the conversation from any device is closer to you.

    Set up SMS and MMS messaging

    Use this feature with any Mac, iPhone, iPad, or iPod touch that satisfies the requirements of continuity system. Make sure that your devices are configured as follows:

    • Each device is connected to iCloud with the same Apple ID.
    • On iPhone, go to settings > Messages > Send and receive. Make sure the Apple ID at the top of the screen is the same Apple ID you use for iMessage on other devices. Add a check to your address, phone number, so that you can be reached by both iMessage. Do the same on your iPad or iPod touch.
    • On iPhone, go to settings > Messages > transfer, text messages, then choose which devices to send and receive text messages from the iPhone. A verification code and then on each device. Enter this code on your iPhone.
    • On Mac, open Messages, and then choose message > Preferences. Click accounts, and then select your account from iMessage. Make sure the Apple ID shown here is the same Apple ID you use on other devices. Add a control to your phone number and email address.

    Use the SMS and MMS messaging

    To use this feature, simply start conversations as usual in the Messages application on any of your devices. Alternatively, you can start a conversation by clicking a phone number in Safari, Contacts, calendar, or other applications detecting phone numbers. All your incoming and outgoing messages on all your devices.

    Please use the Apple Support communities to post your question. Enjoy your new iPhone!

  • Is it possible to compress more that can compress Finder?

    Hello

    I would like to compress my files more compress Finder. Is this possible? How can it be done? Need me external software for it?

    Not in a practical sense. If there were a better way than has been reliable and fast, Apple would already be him.

    If you are out of space, you need a bigger drive or an additional drive, or decide to place some of your 'stuff' on a player that remains on your desktop and is not available when you carry your PC autour.

  • Is it possible to use Microsoft Money on a mac laptop?

    I think of buying my first mac laptop.

    Is it possible to use Microsoft Money on the mac?

    Install Windows on your Apple computer then any program that runs on Windows. Windows can be installed using Boot Camp Assistant or using a machine virtual Parallels, Fusion, or VirtualBox.

  • More high graphics card Possible for early 2009 Mac Pro

    As the title suggests, I have an early 2009 Mac Pro with 12 GB of RAM.

    I want to update my graphics card to something better and I have no idea of what I put in the card. Ideally, I would like to put the last possible graphics card that is compatible for this.

    I don't know what I would look for PCI or PCI - e and what diet I would look for that would support such a computer "arcane".

    Any advice would be greatly appreciated!

    Best wishes

    Sergio

    the 2009 mac 4.1 pro can be upgraded to a number of current spare cards from Nvidia and AMD, but in many cases the cards require custom flashing of the Distributor and custom drivers. You need to buy a card with a distributor of mac because versions "Windows" of these cards will not work out of the box and OS X will not support without 3rd party drivers. This procedure is not recommended by apple that would rather you buy a new mac pro and again I want to say something for $5K, which offers the latest GPU is already 3 years old.

    research on the Web "Mac Pro 4.1 GPU" for more details.

  • Is it possible to change my user name?

    Hello

    I was wondering if it was possible to change my username to communities of Apple Support since this is not my name and that he had entered incorrectly by someone else?

    Thank you

    Arnaud.

    There is no option to change your username on Apple support communities.

  • IOS screenshot 10.0.2 - not possible

    Since updating to IOS 10, its not possible to make a screenshot using the home and power button.

    Someone at - it a solution for this problem?

    Thank you

    Rainer

    It works in the same way he has always done on my iPhone 6. Try to restart your phone and try again.

Maybe you are looking for