I am using FF 5.0.1. The English spellchecker add on does not work.It will underline the misspelled word but does not give you the correct spelling choice.

I did not upgrade to 4.0 because I did not like it.I thought I was upgrading finally to 4.0 assuming at this date they had fixed all the bugs and updated the add ons.
I downloaded the latest version and love it, love it except the one add on that I use more than anything does not work properly.:-(
Please notify the developer of this issue.

"SafeBrowser'',
No it does NOT show up as I said before the ONLY option is "paste" there are NO suggestions showing up.
As I said before,I have used this same add on for many years and earlier versions and have had no problems until version FF5.01.
''cor-el'',
I have already done all that prior to posting here.
Even as I type this response the spell check add on puts a red squigly line under your screen names but does not give me any suggestions.
I am frustrated beyond belief because I am a faithful and dedicated user of this browser and I am going to just roll back to a older version until this silly issue is resolved.
I appreciate all your help but I suppose until the person who developed this add on does something to make it compatible with FF5.01 I will not be using it.
I apologize for any misspelled words but my spell check extension is not working properly. :-(

Similar Messages

  • Why doesn't the repair box in Aperture show up? and if it does, once you choose repair does it give you an indication it is working?

    Why doesn't the repair box in Aperture show up? and if it does, once you choose repair does it give you an indication it is working?

    Winterwren22 wrote:
    Why doesn't the repair box in Aperture show up?
    Without more information, speculation is a waste of time.  At the least tell us what you do, what the results are, and how that result differs from your expectation.  Then tell us what steps you have taken to resolve the issue, and what the results of taking those steps was.
    once you choose repair does it give you an indication it is working?
    Adjustments you make are shown live.
    Instructions on the use of Repair Brush are here (ignore "Spot & Patch" -- it is superannuated).

  • What happens when the computer get too full of e-mails?  Will it automatically start deleting ... or give you some kind of warning??  I never delete personal mail right away since I might want to refer back to it, and then the first thing I know, I've got

    What happens when the computer get too full of e-mails?  Will it automatically start deleting ... or give you some kind of warning??  I never delete personal mail right away since I might want to refer back to it, and then the first thing I know, I've got a big backlog. 

    It will not automatically delete any emails; you will need to do that. You may suffer performance  issues in Mail  if you let your mailboxes become too bloated. And, aside from Mail, the files take up a lot of room are photos, videos, and music, so you might want to watch those - every once in a while, check how much hard drive space you have and make sure you empty the trash regularly. Checking your hard drive space: highlight your Macintosh HD icon on the desktop; hit Command  + I and check the total capacity, and how much is left.

  • Why Photoshop will not give you the opportunity to download for either Windows platform or Mac.

    Hello, My husband spent all day waiting to talk to someone at Photoshop, to speak with them, while he is mostly bed bound now, on a feeding tube in his stomache, and is awaiting a surgury to keep him alive. He will be even more bed ridden afterwards. As always, and the complex health issues, he also could pass.
    He was crying by the time he tried to explain his story of need.
    You see, he has been using Phtoshop for many years, heavily invested, for his photo's and work. His Power Mac G5 crashed, we could not afford another, and he had just purchased CS5. So we could only afford the IMac now, we again needed to upgrade to CS6. The install alows you to use it on two computers, a  computer and laptop.
    We tried explaining to the sales people when he finally got through, that we need an install for just a Windows laptop, we can not afford another Mac, we need a laptop for him in bed, if he will be able to do anything, he wants to work on his art.
    They, Photoshop, were very unsimpethtic, we just purchased an upgrade for CS6, because of the IMac, yet, now we can not install and use our second choice on a Windows platform. Again, we would need to pay full upgrade price again. Yet, he only has it installed on Imac, they told him he would have to de-actiate it, WHICH, I ALSO HELP HIM IN HIS WORK, WE KEEP COPIES ON A EXFAT32 harddrive too, and Mac, to share and show clients.
    The people of Photoshop did not even care he is dying, litterly, slowly,,, but he is keeping positive that all will be well, and survive.
    Timothy and Marcia Cannon
    we will no longer be a coustomer for Adobe.

    Thank you, but you see, it needs to be on the Macintosh for me, and he is getting a PC, Windows laptop donated to him to use. You should have an option, as with many software providers do, Windows or Mac/Apple platform. We will  only be using theses two computers, and stated in their agreement, two computers are allowed, our printer allows it, many softwares allow this.
    He will need this "work" inspiration while recuperating, many years he has used their product. And now, he is going to be constant in bed, where as I can also help with the IMac.
    Timothy and Marcia Cannon
    [email protected]

  • How much space does apple give you for free in the cloud

    how much space does apple give any user in the cloud

    5Gb - http://www.apple.com/icloud/what-is.html

  • HT5787 what happens when someone sell second iphone and does not give you the correct password

    what happens when someone sell second iphone and does not give you

    If you are talking about activation lock you are out of luck. Without that information you cannot activate the device and have just lost your money. Unless you can find the person and get your money back.

  • I have a 2011 i5 iMac and I am trying to connect it to my Samsung PS50C680 Plasma TV. I am using a MDP to HDMI cable and using HDMI 1 which is the correct input according to the manual. No matter which I turn on first the iMac still cannot connect.

    I have a 2011 i5 iMac and I am struggling to connect it to my Samsung PS50C680 Plasma TV. I am using a MDP to HDMI cable and using HDMI1 on the TV as shown in the manual. No matter which I turn on first etc the iMac cannot find the display and the TV shows no signal. Has anyone else had a similar problem? Any help would be appreciated.

    Hello, anabelleho. 
    Thank you for visiting Apple Support Communities.
    Here is a troubleshooting article that I would recommend going through when experiencing this issue.
    Apple computers: Troubleshooting issues with video on internal or external displays
    http://support.apple.com/kb/ht1573
    Cheers,
    Jason H.

  • I can not get the add this extention to work today will you please fix it so I can use it as it is broken Please fix the add this button so that it will work!

    I get this error message Something went wrong in processing your request. (If you were a web browser, I would say "400 rate limited".) when I try to use the add this button extension for firefox. Will you please help me to fix this problem so that I will be able to use the add this again real soon thank u.

    This issue can be caused by corrupted cookies or cookies that are blocked.
    *check the permissions on the about:permissions page and in "Tools > Page Info > Permissions"
    Clear the cache and remove cookies only from websites that cause problems.
    "Clear the Cache":
    *Firefox/Tools > Options > Advanced > Network > Cached Web Content: "Clear Now"
    "Remove Cookies" from sites causing problems:
    *Firefox/Tools > Options > Privacy > "Use custom settings for history" > Cookies: "Show Cookies"

  • I picked a password for my voicemail, but I don't know how to activate it.  Where in settings does it give you the option to apply the password before accessing messages?

    I selected a password for my iphone 4 voice mail....but can't figure out how to activate the password protection.  I don't want anyone, without the password, to be able to access messages.  How do I do that?  Thanks!

    There is no such option.
    You know people close enough to allow them to use your iPhone that would listen to your voicemail or that you don't trust enough not to? Why would you allow such a person to use/access your iPhone?

  • I am trying to access my gmail on Firefox, but the browser is not alowing me to connect, but returns an invalid secirity certificate. The dialogue does not give you an option to bypass the blockage and proceed. So I cannnot access my g mail.

    I can access my gmail on internet explorer, but firefox is giving the message as shown below. It ought to give an exception option, but it does not. So I cannot access gmail through firefox.

    Check the date and time in the clock on your computer: (double) click the clock icon on the Windows Taskbar.
    * https://support.mozilla.com/kb/Secure+Connection+Failed

  • Face time is not working between our 2 touches.  It pops up but then does not give you time to accept??  Does it matter they are registered both at the same email?

    I have 2 touches for our kids to share.  the 11 yr old has her own email but apple said she is too young to have a registered itunes account so i put them both under my account.  is that causing me problems?  kids just want to face time???

    When all this is going on can you open and surf the web on the browser?
    All your errors can be from no internet connection also.
    It seems wide spread it could also be from a update to facetime possibly.

  • How can I use oracle function to decode the encode value

    Hi everybody,
    If the data is encode value how can I decode this value

    DBMS_OBFUSCATION_TOOLKIT
    DBMS_OBFUSCATION_TOOLKIT allows an application to encrypt data using either the Data Encryption Standard (DES) or the Triple DES algorithms.
    The Data Encryption Standard (DES), also known as the Data Encryption Algorithm (DEA) by the American National Standards Institute (ANSI) and DEA-1 by the International Standards Organization (ISO), has been a worldwide encryption standard for over 20 years. The banking industry has also adopted DES-based standards for transactions between private financial institutions, and between financial institutions and private individuals. DES will eventually be replaced by a new Advanced Encryption Standard (AES).
    DES is a symmetric key cipher; that is, the same key is used to encrypt data as well as decrypt data. DES encrypts data in 64-bit blocks using a 56-bit key. The DES algorithm ignores 8 bits of the 64-bit key that is supplied; however, developers must supply a 64-bit key to the algorithm.
    Triple DES (3DES) is a far stronger cipher than DES; the resulting ciphertext (encrypted data) is much harder to break using an exhaustive search: 2**112 or 2**168 attempts instead of 2**56 attempts. Triple DES is also not as vulnerable to certain types of cryptanalysis as is DES. DES procedures are as follows:
    DESEncrypt Procedure
    DESDecrypt Procedure
    Oracle installs this package in the SYS schema. You can then grant package access to existing users and roles as needed. The package also grants access to the PUBLIC role so no explicit grant needs to be done.
    This chapter discusses the following topics:
    Overview of Key Management
    Summary of DBMS_OBFUSCATION Subprograms
    Overview of Key Management
    Key management, including both generation and secure storage of cryptographic keys, is one of the most important aspects of encryption. If keys are poorly chosen or stored improperly, then it is far easier for a malefactor to break the encryption. Rather than using an exhaustive key search attack (that is, cycling through all the possible keys in hopes of finding the correct decryption key), cryptanalysts typically seek weaknesses in the choice of keys, or the way in which keys are stored.
    Key generation is an important aspect of encryption. Typically, keys are generated automatically through a random-number generator. Provided that the random number generation is cryptographically secure, this can be an acceptable form of key generation. However, if random numbers are not cryptographically secure, but have elements of predictability, the security of the encryption may be easily compromised.
    The DBMS_OBFUSCATION_TOOLKIT package does not generate encryption keys nor does it maintain them. Care must be taken by the application developer to ensure the secure generation and storage of encryption keys used with this package. Furthermore, the encryption and decryption done by the DBMS_OBFUSCATION_TOOLKIT takes place on the server, not the client. If the key is passed over the connection between the client and the server, the connection must be protected using Oracle Advanced Security; otherwise the key is vulnerable to capture over the wire.
    Key storage is one of the most important, yet difficult aspects of encryption and one of the hardest to manage properly. To recover data encrypted with a symmetric key, the key must be accessible to the application or user seeking to decrypt data. The key needs to be easy enough to retrieve that users can access encrypted data when they need to without significant performance degradation. The key also needs to be secure enough that it is not easily recoverable by an unauthorized user trying to access encrypted data he is not supposed to see.
    The three options available to a developer are:
    Store the key in the database
    Store the key in the operating system
    Have the user manage the key
    Storing the Key in the Database
    Storing the keys in the database cannot always provide bullet-proof security if you are trying to protect data against the DBA accessing encrypted data (since an all-privileged DBA can access tables containing encryption keys), but it can provide security against the casual snooper, or against someone compromising the database files on the operating system. Furthermore, the security you can obtain by storing keys in the database does not have to be bullet-proof in order to be extremely useful.
    For example, suppose you want to encrypt an employee's social security number, one of the columns in table EMP. You could encrypt each employee's SSN using a key which is stored in a separate column in EMP. However, anyone with SELECT access on the EMP table could retrieve the encryption key and decrypt the matching social security number. Alternatively, you could store the encryption keys in another table, and use a package to retrieve the correct key for the encrypted data item, based on a primary key-foreign key relationship between the tables.
    A developer could envelope both the DBMS_OBFUSCATION_TOOLKIT package and the procedure to retrieve the encryption keys supplied to the package. Furthermore, the encryption key itself could be transformed in some way (for example, XORed with the foreign key to the EMP table) so that the key itself is not stored in easily recoverable form.
    Oracle recommends using the wrap utility of PL/SQL to obfuscate the code within a PL/SQL package itself that does the encryption. That prevents people from breaking the encryption by looking at the PL/SQL code that handles keys, calls encrypting routines, and so on. In other words, use the wrap utility to obfuscate the PL/SQL packages themselves. This scheme is secure enough to prevent users with SELECT access to EMP from reading unencrypted sensitive data, and a DBA from easily retrieving encryption keys and using them to decrypt data in the EMP table. It can be made more secure by changing encryption keys regularly, or having a better key storage algorithm (so the keys themselves are encrypted, for example).
    Storing the Key in the Operating System
    Storing keys in the operating system (that is, in a flat file) is another option. With Oracle8i you can make callouts from PL/SQL, which you could use to retrieve encryption keys. If you store keys in the O/S and make callouts to retrieve the keys, the security of your encrypted data is only as secure as the protection of the key file on the O/S. Of course, a user retrieving keys from the operating system would have to be able to either access the Oracle database files (to decrypt encrypted data), or be able to gain access to the table in which the encrypted data is stored as a legitimate user.
    User-Supplied Keys
    If you ask a user to supply the key, it is crucial that you use network encryption, such as that provided by Oracle Advanced Security, so the key is not passed from client to server in the clear. The user must remember the key, or your data is nonrecoverable.
    http://download-west.oracle.com/docs/cd/B10501_01/appdev.920/a96612/d_obtool.htm#ARPLS028
    Joel P�rez

  • HT204053 I don't want to use my credit card at the moment, how to set up a free payment method to download free application?

    I have tried with free application, but it doesn't work when I review the account. I cannot find any "none" payment method. Thank innadvancenfor help friend!

    If you access your account in itunes, you should be allowed to chose "none" as a payment choice. However, I do know at times that the service will not give you a choice for that. If it doen't give you a choice, and you have to place in a payment method. It's okay. Simply place in a credit card or a debit card that has to be processed as a credit card, and it will allow you to use the service. Even though you are not purchasing anything, your card will not be charged. I hope this helps.

  • Which is the right spelling suggestion?

    1980s or 1980's?
    I think their spelling people are confused.

    Hi Sophia,
    "Alternatives" are the suggested corrections. What's in the small box is what's in your document.
    The suggestion is correct.
    An apostrophe is used to indicate possession (Sophia's shoe, Barry's hat) or contraction (John's going out later, but he's home now—contracting "John is" and "he is").
    1900s is the correct spelling to represent the ten year period from 1900 to 1909 or the hundred year period from 1900 to 1999.
    Examples where "1900's" is correct would include this use as a possessive:
    "Engine Number 1900's drivers had flat spots from an emergency stop on its last run."
    Regards,
    Barry

  • If you have a shattered screen and the lock button doesnt work, but you only tell the apple store about the lock button, will they give you a whole new phone, or just fix the button. Even if you still have warranty

    I recently broke my lock button when it dropped, and wont work again, also i shattered my screen a while back, but it didnt bother me. Now that i want to get the button fixed, will the apple store only fix the button, or the whole phone. I still have 2 weeks of warranty left so it's not like they'd fix one thing and not the other when either way they'll both be free ya know?

    They will not give you anything.
    They wil either return the device as is or replace it at the out of warranty replacement cost.

Maybe you are looking for