IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Hola, Me Droogies: a not-quite ex post facto Solution might happen ..but not quite yet.
Define, please: the exact meaning of [Pwned] ‘K?
and {a few of a one’s observations that indicate}, “I’ve been Pwned”: correct assumptions -vs- “not quite Right”, say. Example 1 of dozens, this one solved via a still-accessible PW:
Should you try to go to {say) System Preferences and draw a blank or perhaps a re-iteration of situations whereby a small-App clicked upon: draws a blank or ‘becomes’ an obvious echo of other non-reponses to the ’Open’ Command.

Rand’s eidetic memory of a host of *work-arounds (some via utility of a still working-PW for an App which has NOT been superseded by one associated with this mythical?=‘Hack’) has resulted in improved capabilities within this clusterfuck. My own disdain for acquiring info re keen things you can do in OS X—beyond what ‘I needed’—for the quite pedestrian usage of daily Go-to places: has been another lazy-approach moi justified by, “It Just Works” aka ‘no need to understand much going-on under the hood’. aka sloth. :-/
* Like: typing say, 'Terminal' into Spotlight as a go-to.. kewl!; also too: [, Command] gets you to nuking cookies re paywalls.

I marvel at Rand’s grasp of what he’s learned via the decades since Apple® began—thence exploited all along the capabilities necessitated by his job involving oft encyclopedic matters, each composed with enviable clarity. Rand just may be the Only one I’ve yet encountered who simply, does Not makethingsup. I am grateful for the generous assistance here, and in so many other ways. (We are not having a battle-of-wits: both seek the max-Truthiness via any means discoverable; screw Ego and other tics from the monkey-brain).

Shall leave discussion on whether or NOT a non-IT-Lifer CAN? extract meaningful, Experimentally-testable DATA from Console + Own Eyes … to a future date when this entire matter has or has Not become entirely scoped-out, to both Rand’s and my own satisfactions—never-mind any satisfictions, eh? Latest status--much data already saved elsewhere: means I can leave input data cable plugged-in but still ..wrote this offline.

Besides ..there’s Fun to be had in slaying dragons—within a lugubrious pandemic; beats the soothing alternatives like Solitaire mind-numbing. Makes endorphins!


Carrion: sometimes it's just not-Knowing fershure, y'Know?
New Hola!
Sometimes ignorance is bliss. :-)

If you're worried about being infected with something, you should run something like MalwareBytes.

https://www.malwarebytes.com/mac/ Free for 14 days.

All of these OSes do all kinds of stuff in the background that we'll never grok on our own - at least not if we want to do other fun things with our lives! :-)

Welcome back. Don't stress out!! :-)

Stay safe.

Cheers,
Scott.
New I fear I may have slandered malwarebytes
…in a conversation last month with Ashton. I conflated it with the “Macdefender” and “Mackeeper” scamwares, and urged him to deploy garlic and a cross. I subsequently realized my mistake. I’ve never used malwarebytes myself, but it appears to have a spotless reputation.

I brought Ashton his “burner” Mac yesterday, but this was unable to connect to the unsecured wireless network, even though his older iMac, six inches away, had no problem doing so. I argued—apparently successfully—that, once I had secured all the documents from the elder unit onto external media, he had little/nothing at risk in going online with this machine. I believe that he could cable up the new iMac with as much confidence, but have not yet closed the deal. Anyway, I’m glad to welcome our man AB back to these precincts, and venture to hope that at some point we may collectively set his mind at ease.

I’ll repeat that although I am by no means an IT security maven, I pay enough attention to Mac news that were some kind of vicious malware with the powers he attributes to it out there in the wild, I would at least have heard rumors of this. I demonstrated, I believe, that some of the symptoms AB attributed to external interference were in fact obscure attributes of the Mac GUI protocols. I have not the technical chops to explain away the enigmas of the Console, but as Peter has observed, these are not there for the lay user, and lend themselves to mystification and misinterpretation on the part of the uninitiate.

cordially,
New You almost certainly have not been compromised.
Points:

1. Stop looking at system logs. They're of no help to 99% of people 99% of the time. Worked example: you.

2. Change all your passwords to strong ones. Turn on 2FA wherever possible.

3. If you are still unconvinced, nuke and pave from known-good install media.

4. None of your evidence is evidence of compromise. See (1).

5. Glad to see you back.
New Additional: If you have been compromised...
...it's probably not about you.

Most compromised individual users have been compromised to use their computers as part of botnets for attacks on high-value targets, not to harvest personal data or credit cards.

(Those are harvested by large companies legally :P )
Ceterum autem censeo pars Republican esse delendam.
New So what you're saying is he's not worthy?
Welcome back.
New I'd say I have a life...
...but I don't. I just don't have any free time.
Ceterum autem censeo pars Republican esse delendam.
New one 1.
As someone who reviews java puke and linux log files on a daily basis for a living they are not for the faint of heart and are very difficult to splain slow to folks without hardware and programming backgrounds (need both). So unless one wants an un-needed description of how sausage is both made and excreted they are best left alone.
"Science is the belief in the ignorance of the experts" – Richard Feynman
New +5.
IOW, System logs are useful only if you are looking for something very very specific. Like most logs, in fact.

Wade.
New With you there..
My 'dossier' zeroes in on just that and it's chock-full of actual names of a variety of Tools as comprise this particular Tool KIt ... granularity; included within the sub-sets you see: when yo rotate that tiny triangle "for more info".
Fun stuff, sleuthing--if you really try to do its Right. And succeed.

Boolean has its Uses ... even in real-Science, where Logic Rules {too}.

Tally Ho --->

(Response to above, on Console--immediately after above part of post

3/10/21 1:04:44.247 AM cdpd[1043]: Calling SOSCCView for view Passwords reported device is NOT A MEMBER - (error: (null))
3/10/21 1:04:44.248 AM com.apple.iCloudHelper[76611]: User-visible keychain sync status is DISABLED


..and so it ---> Goes, still, despite recent small repairs.

Semper Fi, y'all.
Expand Edited by Ashton March 10, 2021, 04:12:49 AM EST
New What toolkit?
You've run an intrusion detection tool such as MalwareBytes, and it's given you a name, right?
New Made me look...
Calling SOSCCView for view Passwords reported device is NOT A MEMBER


Hmm... Discussions.Apple:

Unless you are having problems with your computer, Console messages can be ignored.


Ok, that's not a very helpful answer. Let's see...

MacRumors:

Oh, and forgot to add, to rule out third party software issues, try Safe Booting and running the machine. Compare that to what it does currently. If it behaves differently, that's a big clue that software is the culprit.

For further non-destructive troubleshooting, try making a new test user account. Log into that account, and run some apps. Compare performance to your regular account. If it is noticeably better, that points to a user-space issue. Helps to rule out (or confirm) system-wide issues...either hardware or software.


HTH a little. Good luck!

And let us know if MalwareBytes finds anything, please. Thanks.

Cheers,
Scott.
New Though, if you don't know what you're looking for...
... or even if you're looking in the right place, then you do have to be prepared to admit when you're looking at 100% useless shit.

I work with apps that need logging but it frequently gets mixed in with logging from libraries my app is including so am very familiar with swimming through the shit in search of gold.

Wade.
New You still with us?
Ashton, haven't heard from you since this. Have you been touching grass?
--

Drew
New Beats pushing.
New Welcome back, Ashton!
Alex

"There is a cult of ignorance in the United States, and there has always been. The strain of anti-intellectualism has been a constant thread winding its way through our political and cultural life, nurtured by the false notion that democracy means that "my ignorance is just as good as your knowledge."

-- Isaac Asimov
New Добро пожаловать обратно, товарищ!
bcnu,
Mikem

It's mourning in America again.
New Спасибо..!
New Whan I have a demonstrably-secured keyboard, I have some responses to below..
That is: shall demonstrate that I AM "within that One Percent /not the tired-"99% who were told as tyros": not-to-bother ever! finding out why: the Console -perpetual-log DESERVES that degree of protection. at least those of you who lacked even a smidgeon of genuine Curiosity--when you fell for that chestnut meme.

That is all. For now.

BTW Thanks! Wade for your crystalline explanation of Root -vs- Admin and reminder of SUDO-which seems to have some ingrained smarts about: ~when to grant its Own OK to a query. ie ya CAN'T 'BE' root ... nowhow. ;^>
Brevity Award.
Expand Edited by Ashton March 9, 2021, 08:14:26 PM EST
New Get a wired keyboard.
I'd say get the Apple Magic Keyboard, but our friends in Cupertino think that £149 is reasonable for a very average membrane keyboard in a fancy aluminium frock.

This seems like a more reasonable option:

https://www.amazon.com/Macally-Computer-Wired-Keyboard-Apple/dp/B07CV67HHJ/ref=sr_1_4?dchild=1&keywords=apple+usb+keyboard&qid=1615355545&sr=8-4
New A tad belated, but welcome back!
New "Define, please: the exact meaning of [Pwned] ‘K?"
K.

Def: What you weren't.

HTH!
--

   Christian R. Conrad
The Man Who (used to think he) Knows Fucking Everything


Mail: Same username as at the top left of this post, at iki.fi
     Hola, Me Droogies: a not-quite ex post facto Solution might happen ..but not quite yet. - (Ashton) - (21)
         Hola! - (Another Scott) - (1)
             I fear I may have slandered malwarebytes - (rcareaga)
         You almost certainly have not been compromised. - (pwhysall) - (11)
             Additional: If you have been compromised... - (InThane) - (2)
                 So what you're saying is he's not worthy? - (crazy) - (1)
                     I'd say I have a life... - (InThane)
             one 1. - (boxley) - (7)
                 +5. - (static) - (6)
                     With you there.. - (Ashton) - (5)
                         What toolkit? - (pwhysall)
                         Made me look... - (Another Scott)
                         Though, if you don't know what you're looking for... - (static)
                         You still with us? - (drook) - (1)
                             Beats pushing. -NT - (CRConrad)
         Welcome back, Ashton! -NT - (a6l6e6x)
         Добро пожаловать обратно, товарищ! -NT - (mmoffitt) - (1)
             Спасибо..! -NT - (Ashton)
         Whan I have a demonstrably-secured keyboard, I have some responses to below.. - (Ashton) - (1)
             Get a wired keyboard. - (pwhysall)
         A tad belated, but welcome back! -NT - (scoenye)
         "Define, please: the exact meaning of [Pwned] ‘K?" - (CRConrad)

Little Red Plasma Riding Dot.
91 ms