Site accessed by Intel Mac OS X and iPhone OS at the same time

I have created my own logging in a PHP script on my website. While doing this, I record a timestamp, IP address and HTTP referrer. I notice that I often have two hits as follows where it looks like an iPhone and a Mac are accessing my site at roughly the same time from the same IP address. Can someone explain what is happening here?

[‘2019-06-23 02:47:26pm’, ‘’, ‘Lakewood, California, United States’, ”, ‘Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/605.1.15 (KHTML, like Gecko)’]

[‘2019-06-23 02:47:28pm’, ‘’, ‘Lakewood, California, United States’, ”, ‘Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Mobile/15E148 Safari/604.1’]

[‘2019-06-23 03:09:04pm’, ‘’, ‘Drogheda, Louth, Ireland’, ”, ‘Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/605.1.15 (KHTML, like Gecko)’]

[‘2019-06-23 03:09:07pm’, ‘’, ‘Drogheda, Louth, Ireland’, ”, ‘Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Mobile/15E148 Safari/604.1’]

I have a html/php form that links to an excel file as a database I want to know how can that form be accessed globally?

Once the user enters the form data the data is sent to the excel file. At the moment I am using Apache on Xampp to make it work locally on my laptop. I want to figure out how can the form be accessed from anywhere in the world in my company by any user and that data stored in the excel file on the PC having the excel file.

Can 3rd party AVs have accessed to my windows pc and android phone even after uninstalling and removing them?

So before we start this, I have paranoia issues (doctor diagnosed, not self-diagnosed) so things might at some points seem like an extremely far reach, but please bare with me, and try to help me.

So, I bought an AV yesterday (prefer not to name it, paranoid), after reading site reviews about it and getting a few recommendations about it. But after buying it, I stumbled across some user reviews and a lot of them were talking about abysmal customer support, and shady business practices. Not only that, but when making an account on that AV’s site, it was riddled with issues (“Invalid email”), and then after somehow making an account, when i tried to log in, they kept saying “invalid username or password”. So I clicked on the “forgot password” option, entered my email and submit and they never sent me an email to reset the password. So I just thought “fuck it” and logged in using my google account tied to that same email. After that I downloaded and installed it on my windows pc and android phone, and unfortunately it was then i saw the user reviews which were abysmal, and i realized it was kinda shitty for me too. So I emailed their customer support asking for a refund, and removed it from my phone, and uninstalled it from my pc, then i had to restart my pc to complete uninstallation, and after restarting, the AV was back on my desktop, and on the “apps” part of settings. So I google searched and downloaded their own uninstaller and uninstalled it, and after it uninstalled, it said “uninstalled with errors, contact customer support to complete uninstallation”. I felt I can’t bother with that, so I just to restarted the pc, looked to see if it was still there, and then clicked on “This PC” and typed in the AV’s name in the search tab and shift deleted every single file with the name of the AV.

After that I restarted again and realized my PC was considerably slower. BIOS time before installing the AV was around 2 seconds, but after installing and uninstalling the AV, BIOS time is now 4 seconds.

Now all this, the shady business practices, the poor customer support, the uninstalling difficulties, the difficulty and errors faced when trying to make an account, and the BIOS time slow down even AFTER UNinstallation, makes me worried about if these guys are still in my PC and phone and are maybe accessing the deepest corners of my pc and phone. I gave them access, what’s to stop them now, i guess.

So question is, can they still access my pc, phone, and also maybe my google account??? Do they still have access to my pc and phone??? Could they hack me or something????

And if so, how do I completely purge their existence from my phone and PC??? How do I get my PC back to normal??? How do I stop them from accessing my PC??? How do i make it as if it was never installed in the first place???

Sorry for the long post, I had to explain everything here, I have nowhere else to go right now, I’d really appreciate advice, help and all that. I’m paranoid and I haven’t gotten any work done and I’m falling behind with work so I need help ASAP. Thank you in advance.

P.S. This AV is quite a reputable software, review sites love it always gets great reviews from testing labs and so on and it has hundreds of millions of users worldwide. So it’s not some unknown AV.

How to find out if a specific file was accessed by a process and denied access?

I was recently trying to install an SSL certificate and I was unaware of which account was being used on IIS to access it.

I thought that maybe if I looked in the Security log I would find out what account was trying to access the certificate.

Obviously the Audit Failure keyword would be in the filter, but what about finding the path to the certificate file?

What accounts for file accessed immediately after including link in Gmail?

Less than 60 seconds after sending an email w/ Gmail that contained a pasted https link to a .zip file, that file was accessed by two non-Google servers. Neither server belongs to the email recipient.

One of those servers is an Amazon Web Services (AWS) server, so that might be Google. But the other is not, and strangely, its referral URL is a search result link in the form…

Based on the file size, it appears the entire file was not downloaded (it’s quite large). But I’m confused as to what’s going on here. Is this something Google is doing for the purposes of previewing the link? Or is someone else getting access to this email? It was so quick, that I do think something automated is likely (as opposed to someone sitting around reading my email).

Using Apache’s ssl certificates when it is accessed via Nginx reverse proxy

I have been running an Apache webserver on my machine for a long while, serving various sites via https. Recently I had to install a Nginx server on the same box, and set it up to reverse proxy most requests to the Apache webserver via port 8080. I can access the sites hosted on the Apache server, but the SSL certificate in use is still the one associated with the Nginx server, not the one referred to in the Apache .conf files. How can I direct Nginx to defer to Apache’s pre-configured SSL when it forwards a request?

How are data accessed with unique index in MariaDB?

I’m using MariaDB 13.3.14

I have a very simple test table with an email column. And I am using ANALYZE to see the behavior of the indexes.

If I understand correctly the output of ANALYZE, rows indicates the estimate of records accessed in the table, and r_rows the actual number of accesses.

The issue is that, for a query as simple as:

SELECT * FROM user WHERE email = '' -- exists in email column and it is unique 

if I create a normal index in the email field, r_rows shows a value of 1. However, if I create a unique index,r_rows shows a NULL value.

From the MariaDB Knowledge Base:

Meaning of NULL in r_rows and r_filtered

Here, one can see that orders.r_rows=NULL and orders.r_filtered=NULL. This means that table orders was not scanned even once. Indeed, we can also see customer.r_filtered=0.00. This shows that a part of WHERE attached to table customer was never satisfied (or, satisfied in less than 0.01% of cases).

Here is the output of both ANALYZE queries: Analyze queries

So my question is, if I have a valid result, how can it be that the table is not accessed?

How are the data retrieved when a unique index is used?