I dumped LMI last year but the account is still there. I've received about 4 notices over the past month from LMI about attempting access from various parts of the globe. Here's the latest:
There was a failed login attempt to your LogMeIn account.
LogMeIn ID: xxx@xxx.xxx
Time of Event: 1/18/2017 6:24 AM From IP Address: 77.153.153.19 From location: Fontenay-sous-Bois, France
I've removed my computers from my LMI account since I don't plan to use LMI anymore. Strange though how this is occurring now and hadn't happened for years (or at least the reporting feature wasn't working maybe?!?!).
Should I contact the LMI folks to disable and remove my account entirely? Seems like the next logical move.
Personal opinion: I would make sure LMI was uninstalled from all workstations and then set up a spam filter on your email to bit-bucket any email from them.
But, if you're feeling kind and generous, you might contact them and ask that the emails stop being sent since you no longer have any need for them.
Mike Copeland
mbsoftwaresolutions@mbsoftwaresolutions.com wrote:
I dumped LMI last year but the account is still there. I've received about 4 notices over the past month from LMI about attempting access from various parts of the globe. Here's the latest:
There was a failed login attempt to your LogMeIn account.
LogMeIn ID: xxx@xxx.xxx
Time of Event: 1/18/2017 6:24 AM From IP Address: 77.153.153.19 From location: Fontenay-sous-Bois, France
I've removed my computers from my LMI account since I don't plan to use LMI anymore. Strange though how this is occurring now and hadn't happened for years (or at least the reporting feature wasn't working maybe?!?!).
Should I contact the LMI folks to disable and remove my account entirely? Seems like the next logical move.
[excessive quoting removed by server]
Already uninstalled LMI from the machines! Forgot to mention that. I think I'm safe?
On 2017-01-18 15:40, Mike Copeland wrote:
Personal opinion: I would make sure LMI was uninstalled from all workstations and then set up a spam filter on your email to bit-bucket any email from them.
But, if you're feeling kind and generous, you might contact them and ask that the emails stop being sent since you no longer have any need for them.
Mike Copeland
mbsoftwaresolutions@mbsoftwaresolutions.com wrote:
I dumped LMI last year but the account is still there. I've received about 4 notices over the past month from LMI about attempting access from various parts of the globe. Here's the latest:
There was a failed login attempt to your LogMeIn account.
LogMeIn ID: xxx@xxx.xxx
Time of Event: 1/18/2017 6:24 AM From IP Address: 77.153.153.19 From location: Fontenay-sous-Bois, France
I've removed my computers from my LMI account since I don't plan to use LMI anymore. Strange though how this is occurring now and hadn't happened for years (or at least the reporting feature wasn't working maybe?!?!).
Should I contact the LMI folks to disable and remove my account entirely? Seems like the next logical move.
[excessive quoting removed by server]
As you know, connections to LMI client machines (individual workstations) are controlled thru and managed at the LMI servers back at the LMI mothership. Lots of benefits and drawbacks to the approach, but it usually works pretty well.
So, if a baddo wants into your account, all they need is your login name and password for the Master user on the account. Getting the login name isn't hard since it's often your email address and attempts to connect to your account could be performed by an automated script running through a database of login names.
The password, though, is obviously a different issue, since I'm sure you used something extremely obtuse and long and convoluted!
LMI has always had a 'feature' that will lock the account, preventing access by anyone, for an unspecified period of time after X failed-attempts to login. It slows the script-kiddies down a LOT. (Usually it's 4 attempts and you're blocked for around 90 minutes.)
All that to say that the baddo's have a slow process to slog through to try to hack in.
And once they are in, they COULD use your account (I'm assuming it's paid for in advance and you figure it's easier to let it ride to expiration than get any refund, if any) to provide LMI service to other computers...but since you have removed the installs from YOUR computers, there's no risk.
I think you're safe. At the worst, a baddie will get LMI services for the remainder of your subscription and if you try to use it in the future it might not be accessible (since they'd likely change the master password.)
Hope this helps.
Mike Copeland
mbsoftwaresolutions@mbsoftwaresolutions.com wrote:
Already uninstalled LMI from the machines! Forgot to mention that. I think I'm safe?
On 2017-01-18 15:40, Mike Copeland wrote:
Personal opinion: I would make sure LMI was uninstalled from all workstations and then set up a spam filter on your email to bit-bucket any email from them.
But, if you're feeling kind and generous, you might contact them and ask that the emails stop being sent since you no longer have any need for them.
Mike Copeland
mbsoftwaresolutions@mbsoftwaresolutions.com wrote:
I dumped LMI last year but the account is still there. I've received about 4 notices over the past month from LMI about attempting access from various parts of the globe. Here's the latest:
There was a failed login attempt to your LogMeIn account.
LogMeIn ID: xxx@xxx.xxx
Time of Event: 1/18/2017 6:24 AM From IP Address: 77.153.153.19 From location: Fontenay-sous-Bois, France
I've removed my computers from my LMI account since I don't plan to use LMI anymore. Strange though how this is occurring now and hadn't happened for years (or at least the reporting feature wasn't working maybe?!?!).
Should I contact the LMI folks to disable and remove my account entirely? Seems like the next logical move.
[excessive quoting removed by server]
Correction to previous email:
I don't think the 90-minute login block works except for when you're already logged in and trying to access an individual workstation via that workstation's passcode.
To be honest, I'm not sure if there's a block on the master access to the control panel...I've never had a problem logging in. (But I do often forget what I changed a workstation's individual passcode to.)
Mike Copeland
Mike Copeland wrote:
As you know, connections to LMI client machines (individual workstations) are controlled thru and managed at the LMI servers back at the LMI mothership. Lots of benefits and drawbacks to the approach, but it usually works pretty well.
So, if a baddo wants into your account, all they need is your login name and password for the Master user on the account. Getting the login name isn't hard since it's often your email address and attempts to connect to your account could be performed by an automated script running through a database of login names.
The password, though, is obviously a different issue, since I'm sure you used something extremely obtuse and long and convoluted!
LMI has always had a 'feature' that will lock the account, preventing access by anyone, for an unspecified period of time after X failed-attempts to login. It slows the script-kiddies down a LOT. (Usually it's 4 attempts and you're blocked for around 90 minutes.)
All that to say that the baddo's have a slow process to slog through to try to hack in.
And once they are in, they COULD use your account (I'm assuming it's paid for in advance and you figure it's easier to let it ride to expiration than get any refund, if any) to provide LMI service to other computers...but since you have removed the installs from YOUR computers, there's no risk.
I think you're safe. At the worst, a baddie will get LMI services for the remainder of your subscription and if you try to use it in the future it might not be accessible (since they'd likely change the master password.)
Hope this helps.
Mike Copeland
mbsoftwaresolutions@mbsoftwaresolutions.com wrote:
Already uninstalled LMI from the machines! Forgot to mention that. I think I'm safe?
On 2017-01-18 15:40, Mike Copeland wrote:
Personal opinion: I would make sure LMI was uninstalled from all workstations and then set up a spam filter on your email to bit-bucket any email from them.
But, if you're feeling kind and generous, you might contact them and ask that the emails stop being sent since you no longer have any need for them.
Mike Copeland
mbsoftwaresolutions@mbsoftwaresolutions.com wrote:
I dumped LMI last year but the account is still there. I've received about 4 notices over the past month from LMI about attempting access from various parts of the globe. Here's the latest:
There was a failed login attempt to your LogMeIn account.
LogMeIn ID: xxx@xxx.xxx
Time of Event: 1/18/2017 6:24 AM From IP Address: 77.153.153.19 From location: Fontenay-sous-Bois, France
I've removed my computers from my LMI account since I don't plan to use LMI anymore. Strange though how this is occurring now and hadn't happened for years (or at least the reporting feature wasn't working maybe?!?!).
Should I contact the LMI folks to disable and remove my account entirely? Seems like the next logical move.
[excessive quoting removed by server]
On 2017-01-18 17:15, Mike Copeland wrote:
As you know, connections to LMI client machines (individual workstations) are controlled thru and managed at the LMI servers back at the LMI mothership. Lots of benefits and drawbacks to the approach, but it usually works pretty well.
So, if a baddo wants into your account, all they need is your login name and password for the Master user on the account. Getting the login name isn't hard since it's often your email address and attempts to connect to your account could be performed by an automated script running through a database of login names.
The password, though, is obviously a different issue, since I'm sure you used something extremely obtuse and long and convoluted!
LMI has always had a 'feature' that will lock the account, preventing access by anyone, for an unspecified period of time after X failed-attempts to login. It slows the script-kiddies down a LOT. (Usually it's 4 attempts and you're blocked for around 90 minutes.)
All that to say that the baddo's have a slow process to slog through to try to hack in.
And once they are in, they COULD use your account (I'm assuming it's paid for in advance and you figure it's easier to let it ride to expiration than get any refund, if any) to provide LMI service to other computers...but since you have removed the installs from YOUR computers, there's no risk.
I think you're safe. At the worst, a baddie will get LMI services for the remainder of your subscription and if you try to use it in the future it might not be accessible (since they'd likely change the master password.)
I had the 2-step verification on my account, anyway.