Question about CP International Computers & Internet

1 Answer

A company sub-contracted possibly thru your firm contacted me to advise that it appears my computer is in serious trouble due to possible hackers trying to get in...I have had numerous problems for 2 mths and it's getting worse...unfortunately I'm having phone problems and unable to use my handsfree phone to sit at my computer and get the help from the person calling (Stephen) calling from 1-831-480-1100 -I've asked him twice to call me back so I can the cordless / he just called me moments ago and due to problems (with picking up calls only) from that phone, I missed his call again however I did get his number and called it 3 times /continously marking busy -I'm unable to get thru no matter what. can you confirm (to your knowledge) as to whether this is a valid number and a certified call or a possible prank...unfortunately I'm not trusting when it comes to computers! I need an immediate answer since I rely heavily on my computer for work purposes and can't be delayed much more!!! Thanks..

Posted by on

Ad

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    Top Expert:

    An expert who has finished #1 on the weekly Top 10 Fixya Experts Leaderboard.

    Superstar:

    An expert that got 20 achievements.

    All-Star:

    An expert that got 10 achievements.

  • CP Internati... Master
  • 22,114 Answers

Sounds like a scam to me!

Posted on Mar 07, 2017

Ad

6 Suggested Answers

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Ad
  • 31 Answers

SOURCE: answering system

It first sounds as if the handset isn't charged properly. Check the battery status first. The manufacture advises to charge the system for approx. 7 hours before any use occurs. Second, make sure that the registration took, when programming the phone originally. I would de-register the handset by: 1 {MENU} i {0}{0}{2} 2 {3}{3}{5} i {OK} 3 Select the handset you want to cancel by pressing the desired handset number ({1} ? {4}). Then re-register by: 1 Handset: {MENU} i {0}{0}{1} 2 Base unit: KX-TG6021/KX-TG6022/ KX-TG6023 Press and hold {LOCATOR} until the IN USE indicator flashes. KX-TG6051/KX-TG6052/ KX-TG6053/KX-TG6054 Press and hold {LOCATOR/ INTERCOM} until the IN USE indicator flashes. LAfter the IN USE indicator starts flashing, the rest of the procedure must be completed within 1 minute. 3 Handset: Press {OK}, then wait until a beep sounds. 4 {OFF} Third, make sure that the display on the handset does not show "SP-Phone" in the display, if it does press the phone icon button. Fourth, Do you currently have voicemail from your phone service provider? If so, the answering machine will not answer. Make sure that the answering machine portion is turned on. Do this by: Press {ANSWER ON} to turn on/off the answering system. When the answering system is turned on, the ANSWER ON indicator lights. When the answering system is turned off, the ANSWER ON indicator turns off. If there are any further questions or comments, please post here. Please rate this solution through fix-it. Thank you

Posted on Jul 08, 2007

  • 13 Answers

SOURCE: MD481 does not ring when incoming calls come thru and answer maching does not pick up.

try going to this link and looking for additional seetings for your phone or troubleshooting instructions-link is for complete user manual for your phone
http://www.usersmanualguide.com/motorola/cordless_phones/md481

Posted on Dec 20, 2007

  • 139 Answers

SOURCE: WBR 2310 Reset Switch

Try this...
--Uninstall the d-link wizard software from your computer...if it actually installed.
--Shut down the computer and router...make sure they're connected together with the ethernet cable
--Turn on the router first.
--Turn on the computer
--Wait about 2 minutes after the computer starts up
--Go to the command prompt and type in the command "ipconfig". This will give you the computers ip address, subnet mask, and default gateway. To get to the command prompt, click on Start -- Run -- and then type "cmd" and click "Ok"
--The default gateway address should be the address of your router...typically it would be 192.168.0.1...but this will tell you if it's something else.
--If the ip address listed after the ipconfig command is blank or begins with 169.... then your computer is probably not talking to the router...the router or network cable may be defective.
--If the default gateway address is something other than 192.168.0.1 ...try that address in Internet Explorer to see if the router will respond properly. If the router responds, you can configure it directly without using the wizard software. Your D-link documentation (on disc?) will guide you through the manual setup procedure...sometimes referred to as the "alternative" procedure.
--Good luck...and I hope this helps!

Posted on Jan 12, 2008

  • 84 Answers

SOURCE: telephone connection problem with DSL

unplug everthing from all jacks in the house. call your # a couple of times. if the line rings, plug everything in 1 at a time, but call again after each hook up. if the line goes dead or is busy, that phone you just plugged in is the problem. [ a short in the phone, computer, answer machine, or any piece of equipment plugged into the phone line.] if the line is busy when everything is unplugged, call your phone company. there maybe a problem with your inside wire.there also maybe a box [called a nid] inside your basment/garage or on the side of your house, where you can plug your phone directly in, bypassing all the jacks in your house
hope this helps.
wg

Posted on Feb 13, 2008

  • 37 Answers

SOURCE: ps3 won't connect wireless or thru the ethernet...any help?

If you have the 20 Gig modle wireless is not built in. If you have another modle you'll need to go to the Network Settings on the PS3 and switch the mode to wireless... You can then run "easy setup" and test for connection. Make sure you define the correct security and key (such as 64 bit WEP if nessicary) in the PS3 Network settings.

Posted on Feb 23, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

5 Reasons Why Businesses Contract Security Guard Companies?


1. Money
2. Back ground checks
3. Bonded
4. Liability
5. Insurance

Jul 31, 2017 | Computers & Internet

1 Answer

My yahoo account has been hacked and my questions the answers have been changed. I would like a change for password thru a text if possible.


I am guessing too late now as the hacker will have changed your telephone number if they changed your security answers.

You can only contact Yahoo direct. We are not Yahoo, we are Fixya, a group of people just like you helping others.

Jul 30, 2017 | Yahoo Computers & Internet

1 Answer

Driver update


This problem was created by the upgrade, most computer manufacturers advise against this upgrade to 10 due to this exact complaint. Contact Microsoft for a possible resolution.

Jul 15, 2016 | Computers & Internet

2 Answers

I think i have been hacked my fb app has disappeared and i cannot get into my page


Hi, Unfortunately there's lots of scammers and hackers on Facebook, The link below is a YouTube page full of videos showing scammers on Facebook, Take care........ CHEERS..
facebook scammers YouTube
Also this is something that needs sharing.........
Hackers gained entry to Facebook's internal corporate network for several months, with access to hundreds of the social network's employee usernames and passwords.
The hackers, which were actively exploiting Facebook's network in July and September last year and possibly as recently as February this year, were discovered by a security researcher perform testing on Facebook's corporate network.
Having discovered seven security vulnerabilities with Facebook's corporate tools, including a file transfer service, Devcore security researcher Orange Tsai found that at least one hacker, possibly two, had compromised Facebook and were operating within its corporate network.
Tsai said: "While collecting vulnerability details and evidences for reporting to Facebook, I found some strange things on web log.
"The hacker created a proxy on the credential page to log the credentials of Facebook
employees. These logged passwords were stored under web directory for the hacker to use [collect] every once in a while."
According to Tsai, the logged Facebook employee credentials could have given the hackers access to email accounts, Facebook's virtual private network and other company tools. Facebook user data is stored separately to its corporate network; it is unknown whether the right Facebook employee credentials could have given the hackers access to Facebook user data.
Tsai said: "At the time I discovered these, there were around 300 logged credentials dated between 1-7, from 1 February, mostly '@fb.com' and '@facebook.com'. Upon seeing it I thought it was a pretty serious security incident."
The testing - a series of attempts by security researchers to find and report holes in a site or service's cyber security - was conducted as part of Facebook's Bug Bounty, which sees the social network pay people who find and disclose vulnerabilities to the company.
Facebook was alerted to the hack on 5 February by Tsai. The company launched an internal investigation, which concluded on 20 April, allowing Devcore to publish the details of the hack.
Commenting on Hacker News, a Facebook security team member called Reginaldo said: "On this case, the software we were using is third party. As we don't have full control of it, we ran it isolated from the systems that host the data people share on Facebook. We do this precisely to have better security.
"We determined that the activity Orange detected was in fact from another researcher who participates in our bounty program. Neither of them were able to compromise other parts of our infra-structure."
Facebook has not responded to request for comment.

Apr 29, 2016 | Tablets & eReaders

1 Answer

I received an email from facebook informing me that I have won US$900 000,00 in the Facebook Group Award Program 2016 which was drawn on 18 March 2016. Is there such a competition or draw?


Hi Juaan, Unfortunately there's lots of scammers on Facebook, The link below is a YouTube page full of videos showing scammers on Facebook, Hackers gained entry to Facebook's internal corporate network for several months, with access to hundreds of the social network's employee usernames and passwords.
The hackers, which were actively exploiting Facebook's network in July and September last year and possibly as recently as February this year, were discovered by a security researcher perform testing on Facebook's corporate network.
Having discovered seven security vulnerabilities with Facebook's corporate tools, including a file transfer service, Devcore security researcher Orange Tsai found that at least one hacker, possibly two, had compromised Facebook and were operating within its corporate network.
Tsai said: "While collecting vulnerability details and evidences for reporting to Facebook, I found some strange things on web log.
"The hacker created a proxy on the credential page to log the credentials of Facebook
employees. These logged passwords were stored under web directory for the hacker to use [collect] every once in a while."
According to Tsai, the logged Facebook employee credentials could have given the hackers access to email accounts, Facebook's virtual private network and other company tools. Facebook user data is stored separately to its corporate network; it is unknown whether the right Facebook employee credentials could have given the hackers access to Facebook user data.
Tsai said: "At the time I discovered these, there were around 300 logged credentials dated between 1-7, from 1 February, mostly '@fb.com' and '@facebook.com'. Upon seeing it I thought it was a pretty serious security incident."
The testing - a series of attempts by security researchers to find and report holes in a site or service's cyber security - was conducted as part of Facebook's Bug Bounty, which sees the social network pay people who find and disclose vulnerabilities to the company.
Facebook was alerted to the hack on 5 February by Tsai. The company launched an internal investigation, which concluded on 20 April, allowing Devcore to publish the details of the hack.
Commenting on Hacker News, a Facebook security team member called Reginaldo said: "On this case, the software we were using is third party. As we don't have full control of it, we ran it isolated from the systems that host the data people share on Facebook. We do this precisely to have better security.
"We determined that the activity Orange detected was in fact from another researcher who participates in our bounty program. Neither of them were able to compromise other parts of our infra-structure."
Facebook has not responded to request for comment.
facebook scammers YouTube

Apr 27, 2016 | Facebook Computers & Internet

1 Answer

Got spots on my lower back


If you haven\'t had chicken pox as a child then adults certainly can contract it. The greater risk in adults is though is that the virus responsible for chicken pox can also cause shingles. This is a much more serious illness.



Measles is also possible to contract as an adult.



Did you have the MMR vaccine? If so, then it is unlikely that you have contracted either measles or chicken pox.



Symptoms of measles generally appear within 14 days of exposure to the virus. Symptoms include:




People with chickenpox have the following symptoms before the rash appears:



  • Fever


  • Headache


  • Stomach ache


The chickenpox rash occurs about 10 to 21 days after coming into contact with someone who had the disease. The average patient develops 250 to 500 small, itchy, fluid-filled blisters over red spots on the skin.

Sep 09, 2014 | Health & Beauty

1 Answer

I have a hacker on my computer, I believe I know who it is ,because they know me very well , she uses my name & email name to acess alll my files & data from a remote comp., she is so locked in I...


This is a very serious problem. You will need to disconnect this infected computer from the internet as a hacker is capable of doing loads of damage. Once this computer is disconnected from the internet a computer technician will be able to remove the virus and stop the hacker. It is important to get this computer repaired as soon as possible. Install a good Anti-Virus program on your computer in the furture and disable remote access once you get your account back.

Take your computer into a computer store for repair as soon as possible. DISCONNECT this computer from the internet now. Enter into your E-mail account and change your password.

Take care!
damnor01

Oct 08, 2011 | Dell Dimension 2400 PC Desktop

2 Answers

How to hack a facebook password?


IMPORTANT NOTES: THE FOLLOWING DETAILS ARE FOR TRAINING TO PROVIDE RESOURCEFUL COMPUTER NETWORKING EXPERINCES LEAST CONTRIBUTORY TO AN ALTERNATIVE FUTIVE INTENSION.

Hacking into face book requires to be an initiator of the site. First, create the website called face book to be made available for several persons. Least informing the members about the intent to requesting details either usually known as social networks. Usually websites that are recognized as popular would have structure hosts. Mentionable examples are network administrators that make details aware to members about the ongoing conditions. Network administrators that makes the website continues to exist as the resources require to host either expertise or design technicalities are concerned. Websites also require technical experts that restores the conditions that occurs as the networked structures are established to become popularly tasked by several entities either human or devices of computers and peripherals. Internetworking sites have several entities of experts depending on the type of resources provided either as commercial, educational, social or personal sites. The magnitude of resources provided to include the numbers of members makes the web site require several experts to keep operational. Hosting websites requires several resources to make possible. Mentionable examples are the computer structures that are either situation ally located at an address or mobile. Each entity of device computers has address numbers that recognize as operational entities with purpose descriptions of functionalities. Establishing a website requires having the computer devices to the barest minimum a computer, network devices of modems routers, as hardware requirements. The complement to computer devices is program making possible instable displays to achieve user, professional or education experiences. Once the computer structures of hardwires, software's, structures have achieved regular functionality makes available several possible experiences among which hacking is mentioned. Hacking is very technical to describe or explain. First, the entity that makes available advertised recognition as hacker from which request are made to resolve computer device conditions that occur elsewhere becomes thought as computer technician. In which instance, solving missing passwords, usernames or retrieving details on computer from establishments that contract the entities expertise is mentionable means to make expertise functional. The contract entity requesting hacker's expertise usually least requests hacking as resource, the request to always to resolve an issue in which instance allows for expert technician to display skills? Face book hackers are web designers would make the pages display least informing the subscriber about intentions. Regular functional websites requires ascertaining the detail intents, to be verified to resourceful provision either where the administrators that make the space available are contactable. For example, websites that have contact details may least disclose the intent to members however provides mission statements malign acquirable alternate persons should least be thought as hackers sites. Once the members to site recognize the provider entities either as providing resources within expectation also with details that makes tangible as an entity with responsible establishment entities means hacking situations are unanticipated.


Additional notes

Hacking is very technical to explain. Usually, the persons that acquire resources are the only recognizers to hacking incidences. For example, hacking into devices that least becomes recognized may not dispense such a message. Hacking situations are explainable. First the condition where the hackers have retrieved details that belong as personal details. Attempting to retrieve forget ton passwords to personal accounts may be possible with means known as hacking to another person since the default entry is not resorted. Second, the situation where the hackers have to acquire resources least reckonable by the owner. Resources would usually display on networks for example least known to persons until disappearance. Conditions of such nature least makes available recognition of hacking unless personal resources become disintegrable. Third the situation that hacking is suspected without any resources missing. Occasionally message goes around of hacking taking place making person's causation. In such situations, missing details appears hacked until proven unpacked. All three categories of hacking are technical to explain depending on whose side made the hacking. The network sites administrator has contact details either email, phone or chat to quest for recent conditions or concerns. Inform the network sites experts of the condition either in person since computer device surfing is technical.

Feb 07, 2011 | Computers & Internet

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

57 people viewed this question

Ask a Question

Usually answered in minutes!

Top CP International Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a CP International Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...