10.6.4 Security Update 2010-05 and Flash Disk Problem

New Mac and System 10.6.4-- Software update notified me of Security Update 2010-05, and I downloaded yesterday without remembering I had a flask disk in 1 of 4 USB ports, using it to organize data when the hard disk on my older IMac (3 years) crashed. Now if I try a restart with the flash disk in 2 of the 4 ports (including the one it was in or the one with the printer connection), I get a blank gray screen, and must do a cold restart. If the flash disk is in one of the other two remaining ports, no problem. If another flash disk is in any of the 4 ports, no problem. I have reinstalled the security update and reformatted the problem flash disk without any change or success

Hi chgr5, and a warm welcome to the forums!
If you don't get an answer in the Tiger/10.4 forums where we are now, you might try...
http://discussions.apple.com/forum.jspa?forumID=1339
Whew, that's pretty strande, if it were Tiger/10.4 I'd suggest this, but my 10.6 iMac died...
Safe Boot , (holding Shift key down at bootup), use Disk Utility from there to Repair Permissions, move these files to the Desktop.
PS. Safe boot may stay on the gray radian for a long time, let it go, it's trying to repair the Hard Drive.
/Users/YourUserName/Library/Preferences/com.apple.desktop.plist
/Users/YourUserName/Library/Preferences/com.apple.recentitems.plist
/Users/YourUserName/Library/Preferences/com.apple.finder.plist
n Finder, select Go menu>Go to Folder, and go to "/volumes".
Volumes is where an alias to your hard drive ("/" at boot) is placed at startup, and where all the "mount points" for auxiliary drives are created for you to access them. This folder is normally hidden from view.
Drives with an extra 1 on the end have a side-effect of mounting a drive with the same name as the system already think exists. Try trashing the duplicates with a 1 or 2 if there are no real files in them, and reboot.
Reboot & test.

Similar Messages

  • Security Update 2010-005 and WiFi

    After installing the latest security update, I am unable to connect to by my WiFi (LinkSys). I enter the password (which I verified using my MacBook G4 which runs 10.5 and did not receive the update), but the password is not accepted.

    sig wrote:
    Try putting a $ sign in front of the password.
    You mean we have to PAY for our own WiFi now???
    But seriously, why this unix(?) character.
    -mj

  • Security Update 2008-007 and Exchange Server Problem

    At work I access an exchange server using Entourage 2004 under Leopard 10.5.5. I just installed the 2008-007 Security Update and now I can no longer connect with the exchange server. Other network services are working, just can't access exchange. Oddly, I am also unable to access the my work mail using Outlook Web Access (OWA) in Safari, but it works in Firefox. Has anyone else run into these problems? Any advice? Thanks.
    M. Ward

    Hi,
    I'm having exactly the same problem at work. We use a Microsoft Exchange Server 2007 here and I can't connect to my folder in the server since yesterday, either on my desktop iMac and on my MacBook. When I click on the server icon I have for a long time in the dock, after sometime waiting I get the message "Connection failed-Maybe the server doesn't exist......". I also tried through the "connect" icon in a Finder window and even changing the server adress to smb://nameoftheserver doesn't work.
    I don't have the OWA problem since it works with https:// and not with http://
    Hope somebody can help us.
    Ansumane

  • X11 fails to start after Security Update 2010-002

    I installed Security Update 2010-002 and QuickTime 7.6.6, and now X11 fails with a dylib problem:
    Dyld Error Message:
    Library not loaded: /usr/X11/lib/libpixman-1.0.dylib
    Referenced from: /Applications/Utilities/X11.app/Contents/MacOS/X11.bin
    Reason: Incompatible library version: X11.bin requires version 15.0.0 or later, but libpixman-1.0.dylib provides version 13.0.0
    Is this a known problem? What can I do about it? Do I need to revert to a previous version of X11, or back out the security update?

    I had the same problem and fixed it by downloading the latest from
    http://xquartz.macosforge.org/trac/wiki/Releases
    Note that you should keep the dmg that you download and need to
    reinstall it after any security updates or OS updates.
    Dave

  • BootCamp won't boot after  security update 2010-001

    I just installed the security update 2010-001 and my bootcamp partition is not booting anymore is stopping on a black screen with a white line (cursor), just before the splash screen of winxp.
    Anybody else had the same problem?
    Somebody can solve this?
    Thanks

    Sorry probably my question wasn't clear. I'll try to explain myself better. After installing security update 2010-001 the bootcamp doesn't boot anymore. If I try to boot it, it remains on the black screen and there is the flashing underscore. Please help me, I don't know what to do!
    Thanks

  • Problem after Security Update 2010-003

    Hello,
    Since i installed the Security Update 2010-003 i have a problem at the login-screen an password-prompt like this http://twitpic.com/1j66kr
    Have you any idea to fix it?
    Thanks a lot!
    Greiber

    Hi and Welcome to Apple Discussions.
    These symbols are from Apple's Last Resort font, and indicate that a major problem has arisen with the OS's ability to use the basic system fonts. It's been reported here a few times, and I think the only solution is to reinstall all system fonts. See Kurt Lang's post.
    Here is a user tip by Kurt Lang that lists all necessary system fonts and their locations.
    -mj

  • ClamAV and DNS Failure with Security Update 2010-005

    Hey everyone, got a bit of an issue.
    I'm running Leopard Server 10.5.8 and I've noticed a very odd issue with the latest security update, (2010-005).
    Since the update, whenever ClamAV goes out to check for new definitions and database updates, all of my DNS clients lose connection during the few minutes that it's working. I've verified this by watching the logs as the updates happen. Everything is fine, and the second that ClamAV starts running, DNS fails on all the clients, then starts again after the update process.
    Anyone else notice this? And more importantly, how should I go about disabling ClamAV, since I don't run a mail server off this particular server.
    Thanks!

    The System Info below your post indicates that you are running OS X 10.5.8. The FaceTime Beta requires a minimum of OS X 10.6.4.

  • Security Update 2010-007 freezes MacBookPro with grey screen and spinner

    Just some observations: a client with a MacBook Pro (2GHz Duo Core, 1.5Gb RAM) was running 10.5.8 without issue. Applied the Security Update 2010-007, Java Update 8, iTunes 10.0.1 and Safari 5.0.2. Rebooted, and machine kernal panics. Restarted twice to same kernel panic. Machine was able to reboot off of a clone backup (firewire external drive) made the day prior (without the updates) without issue. Try to reboot on normal drive and kernel panic.
    Tried Rember and found one of the modules of RAM failed the test. Pulled the 1Gb out, machine booted to the grey screen (gray screen for google typos), the Apple logo and the spinner - for an hour. Apparently the update installation (with the bad RAM) pooched the system. Resetting the PRAM/NVRAM and PMU did nothing. A reinstallation of the 10.5.8 combo update fixed the issue.
    Reminder: kernel panics are almost always a result of bad RAM in my experience. And by bad RAM, I mean RAM that will work with an older version of an OS, but not a newer one. EPROM info wrong or however else that RAM is preconfigured doesn't jive with the latest specs Apple uses in some in-between update.
    Grey screens, endless spinning of the spinner -- most of that can be ferreted out, but it's usually easier to simply reapply a combo update to restore a system to sanity.

    Hey, since I have updated to 10.6.3 I have a similar issue. When I put my macbook pro to sleep and I come back a few hours later and turn my external monitor on I notice that the macbook is ON, BUT frozen! The time is usually a few hours back, so the macbook must have started up and frozen shortly after I had put it to sleep. There is no way to restart but to hold down the power button, SUPER annoying!
    Hope this will get addressed in an update. Any way your problem is connected to sleep mode?

  • HT1338 Hi, I'm trying to load Facetime on my MacBook and it says "You are missing a critical security patch. Please use Software Update to install Security Update 2010-005". I've checked and all my software is updated. What do I do?

    Hi, I'm trying to load Facetime on my MacBook and it says "You are missing a critical security patch. Please use Software Update to install Security Update 2010-005". I've checked and all my software is updated. What do I do?

    First off, iOS 5 will not run on Macs.   You need to give us your Mac OS X on your Mac to determine which security update you need.  Go to Apple menu -> About This Mac.     And then read the link here:
    http://support.apple.com/kb/HT1222

  • Please read this before you load SECURITY UPDATE 2010-006

    I've just spent 72 hours with frozen cursors and frozen screens - so far all directly related to security update 2010-006. After successfully using SuperDuper! to erase my Internal HD and load a 2+ week old system without security update 2010-006 I seem to be fine again.
    OK I have so much share-free ware on my MBP-13" (May 2010) running 10.6.4 that maybe I'm the only one on the planet to see this - but there is a 214 PAGE post for MBP-15 and MPB-17's freezing -- prior to Security Update 2010-006 ------ related or not, don't know.
    I believe I will actually get a duplicate MacBook Pro (or at least a MINI with the same chip/speed) so that I can keep one clean and experiment (i.e. download stuff) on the other. Then if a problem, my life doesn't stop. I realize that from banking to photos to news to work to reports to my balance sheet to SKYPE to eMail to....... wow, and in 1983 I just had my HP calculators!! These Macs just have to work!
    Best of success and comments welcome here.
    Steve
    11 Oct 2010

    Thanks for the feedback! I think my system is now "OK" (hours of checks, with Apple as well etc. etc.) but likely there was a conflict - and since I don't know what - and since I can't remove everything right now - if this keeps working I just won't install the security update 2010-006.
    BUT will this sneak up on me in security update 2010-007 or ??? I kinda have to get to the bottom of this - am actually thinking of buying a second, almost identical Mac (or at least a somewhat cheaper MINI 2.4 gHz) to have some backup beyond my external drives (which saved me!)
    Thanks again and any/all comments truly appreciated.
    Best regards,
    Steve Schulte
    Monday 11 October 2010

  • Security Update 2010-001---   So secure I lost Admin Access!

    I am running a Snow Leopard Server on a Mac Mini (I bought into the dual 500GB model) to host some documents and act as a small cross-platform dropbox for any kind of files that need to be shared over a biomedical research-related network. A little overkill but...
    Anyway today I followed the software update prompt and installed Security Update 2010-001. After restart, I can no longer login as the administrator (or anyone else for that matter). Curiously, I can access it using +Server Admin+ and using +screen sharing+, all with the same old username and password as before. I just cannot login on the mini itself. Any thoughts on this issue? Potential was to resolve it? I have the 2nd drive configured as a Time Machine backup, so perhaps I can rewind to yesterday? Not sure how that works but I guess I can figure it out somehow.

    Per Oxfjell wrote:
    How'd you regain access to the Mac Mini? I have currently locked myself out in the same fashion, and the only thing I can think of is to reinstall the server OS.. Funny thing is, I'm the only one with access at the moment, and all I did was a simple reboot.. I haven't tampered with passwords or anything of the kind. Why the admin password is suddenly not working is beyond me..
    In the remote server access software, somehow I had inadvertently checked the button that allowed only limited access. The way I fixed it was to go to the Access pane of the Server Admin software, then I selected the button "For the selected services" button on the left and selected "Login Window" and finally clicked the button "allow all users and groups" on the right. This is counter intuitive because you don't want to allow access to everyone, but it will still require local management of the server (eg only those already allowed to login will be allowed after you check the button)
    I hope that makes sense. It solved the problem for me and saved me a lot of hassle.

  • VPN broken after 10.6.4 Update / Security Update 2010-005

    I have a MacMini Server that was running 10.6.3 in use as a gateway for the last 3 or 4 months and everything has been working just fine. However, after applying 10.6.4 and Security Update 2010-005 the iChat and VPN services broke.
    I was able to fix the iChat service by using serveradmin in Terminal - Server Admin was showing the correct name of the iChat server, but serveradmin reported a different (incorrect) name. My only guess is that one of the updates somehow changed that setting behind the scenes.
    I have yet to be able to fix the VPN (L2TP) issue, though. I can connect internally (to 10.0.1.1) with no problem. I can connect with via iPhone over 3G no problem. I cannot connect externally from a 10.5.8 or a 10.6.4 client - any attempt always fails with a timeout. The VPN log shows nothing, but the system log shows:
    Sep 24 14:18:33 gateway racoon[90950]: Connecting.
    Sep 24 14:18:33 gateway racoon[90950]: IKE Packet: receive success. (Responder, Main-Mode message 1).
    Sep 24 14:18:33 gateway racoon[90950]: IKE Packet: transmit success. (Responder, Main-Mode message 2).
    Sep 24 14:18:36 gateway racoon[90950]: IKE Packet: transmit success. (Phase1 Retransmit).
    Sep 24 14:19:03: --- last message repeated 8 times ---
    Sep 24 14:19:03 gateway racoon[90950]: IKEv1 Phase1: maximum retransmits. (Phase1 Maximum Retransmits).
    Sep 24 14:19:03 gateway racoon[90950]: Disconnecting. (Connection tried to negotiate for, 29.171451 seconds).
    Sep 24 14:19:03 gateway racoon[90950]: IKE Phase1 Failure-Rate Statistic. (Failure-Rate = 100.000).
    It would seem that the response to the initial handshake is being blocked. However, serveradmin has this to say about ipfilter:
    gateway:/ *******$ sudo serveradmin settings ipfilter|grep VPN
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN ISAKMP/IKE:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP - Layer-Two Tunneling Protocol:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP\: IKE NAT Traversal:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP\: ISAKMP/IKE:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:action = "allow"
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:readOnly = yes
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:protocol = "gre"
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:name = ""
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:dest-port = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:readOnly = yes
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:protocol = "esp"
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:dest-port = ""
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:oldDescription = "Layer-Two Tunneling Protocol (L2TP)"
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:protocol = "udp"
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:readOnly = no
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:dest-port = "1701"
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:oldDescription = "PPTP VPN"
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:protocol = "tcp"
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:readOnly = no
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:name = ""
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:dest-port = "1723"
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:readOnly = no
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:protocol = "udp"
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:dest-port = "500"
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:readOnly = no
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:protocol = "udp"
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:dest-port = "4500"
    Which seems to be correct to me.
    As with the iChat problem, everything seems to be correct as reported by Server Admin. I have been hunting for the incorrect setting using serveradmin, but so far everything there seems to be correct as well.
    One last item that I just discovered today, and which is probably a huge hint (and I just don't know how to connect the dots), is that when I stop the VPN service (it's running on the gateway server), the entire office loses it's connection to the internet. Turn VPN back on, and the internet is back.
    I think my server is deeply, deeply disturbed, but I am not ready to wipe it clean and start over again. I sure would appreciate any insights on this one....

    I have a MacMini Server that was running 10.6.3 in use as a gateway for the last 3 or 4 months and everything has been working just fine. However, after applying 10.6.4 and Security Update 2010-005 the iChat and VPN services broke.
    I was able to fix the iChat service by using serveradmin in Terminal - Server Admin was showing the correct name of the iChat server, but serveradmin reported a different (incorrect) name. My only guess is that one of the updates somehow changed that setting behind the scenes.
    I have yet to be able to fix the VPN (L2TP) issue, though. I can connect internally (to 10.0.1.1) with no problem. I can connect with via iPhone over 3G no problem. I cannot connect externally from a 10.5.8 or a 10.6.4 client - any attempt always fails with a timeout. The VPN log shows nothing, but the system log shows:
    Sep 24 14:18:33 gateway racoon[90950]: Connecting.
    Sep 24 14:18:33 gateway racoon[90950]: IKE Packet: receive success. (Responder, Main-Mode message 1).
    Sep 24 14:18:33 gateway racoon[90950]: IKE Packet: transmit success. (Responder, Main-Mode message 2).
    Sep 24 14:18:36 gateway racoon[90950]: IKE Packet: transmit success. (Phase1 Retransmit).
    Sep 24 14:19:03: --- last message repeated 8 times ---
    Sep 24 14:19:03 gateway racoon[90950]: IKEv1 Phase1: maximum retransmits. (Phase1 Maximum Retransmits).
    Sep 24 14:19:03 gateway racoon[90950]: Disconnecting. (Connection tried to negotiate for, 29.171451 seconds).
    Sep 24 14:19:03 gateway racoon[90950]: IKE Phase1 Failure-Rate Statistic. (Failure-Rate = 100.000).
    It would seem that the response to the initial handshake is being blocked. However, serveradmin has this to say about ipfilter:
    gateway:/ *******$ sudo serveradmin settings ipfilter|grep VPN
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN ISAKMP/IKE:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP - Layer-Two Tunneling Protocol:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP\: IKE NAT Traversal:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP\: ISAKMP/IKE:action = "allow"
    ipfilter:ipAddressGroupsWithRules:array_id:any:rules:_arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:action = "allow"
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:readOnly = yes
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:protocol = "gre"
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:name = ""
    ipfilter:standardServices:arrayid:VPN PPTP\: GRE - Generic Routing Encapsulation protocol:dest-port = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:readOnly = yes
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:protocol = "esp"
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: ESP - Encapsulating Security Payload protocol:dest-port = ""
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:oldDescription = "Layer-Two Tunneling Protocol (L2TP)"
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:protocol = "udp"
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:readOnly = no
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP - Layer-Two Tunneling Protocol:dest-port = "1701"
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:oldDescription = "PPTP VPN"
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:protocol = "tcp"
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:readOnly = no
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:name = ""
    ipfilter:standardServices:arrayid:VPN PPTP - Point-to-Point Tunneling Protocol:dest-port = "1723"
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:readOnly = no
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:protocol = "udp"
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: ISAKMP/IKE:dest-port = "500"
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:readOnly = no
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:protocol = "udp"
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:name = ""
    ipfilter:standardServices:arrayid:VPN L2TP\: IKE NAT Traversal:dest-port = "4500"
    Which seems to be correct to me.
    As with the iChat problem, everything seems to be correct as reported by Server Admin. I have been hunting for the incorrect setting using serveradmin, but so far everything there seems to be correct as well.
    One last item that I just discovered today, and which is probably a huge hint (and I just don't know how to connect the dots), is that when I stop the VPN service (it's running on the gateway server), the entire office loses it's connection to the internet. Turn VPN back on, and the internet is back.
    I think my server is deeply, deeply disturbed, but I am not ready to wipe it clean and start over again. I sure would appreciate any insights on this one....

  • After Security Update 2010-001: Airport Card Not Detected

    Currently running OS X 10.5.8 on a Mid 2009 MacBook Pro.
    Here's the issue. When I boot up the machine and click the AirPort drop down it tells me that there is no airport card detected. Under system profiler it says the same thing. If I boot to a 10.6 Mac OS Install DVD and open system profiler, the AirPort card is detected. This occurred after a reboot prompted by the Security Update 2010-001.
    So far I have repaired permissions and repaired disk. No fix.
    I reset the PRAM/NVRAM and SMC. No fix.
    I booted to an OS X image on an external drive. No fix.
    I cannot boot to the Apple Hardware Test (D at startup) because my company requires PGP disk encryption. I could decrypt but this would take at least 6 hours (not counting re-encrypting afterwards).
    I tried replacing the extensions. No fix.
    There were no firmware updates applied or any other major OS updates.
    Anyone have anything else I can attempt?

    anyone else see that??
    Yes, Already covered in full here. Strange but no problem.
    http://discussions.apple.com/thread.jspa?threadID=2310982&tstart=15

  • Security Update 2010-005 for Facetime

    Hi,
    I have downloaded Face-time Beta to be installed on my iMac OS 10.5.8.
    During Installation i get a message that I need to install first "Security Update 2010-005 using software update"
    My software update shows no update required. Nevertheless, I have downloaded all 5 security updates and installed them one after the other, with no problems.
    Still i get the same message that Security Update 2010-005 needed when I try to install the Facetime.
    Can anybody knows a way out of this loop ? or how do I "Inform" the software update that the Security update 2010-005 is already installed ?
    thanks,

    Yes, you'd need to buy it - it's available widely for $29 (Apple store or resellers); you can then update to 10.6.4 - use the combo updater available here:
    http://support.apple.com/kb/DL1048
    (updates for an OS are available for free, but you do have to pay for the initial upgrade to another OS).
    Edit: And when you're doing the updates to 10.6.4, don't forget to repair permissions after each update.
    Message was edited by: Barbara Daniels1

  • IMac wakes from sleep by itself after security update 2010-001

    Since installing last weeks security update 2010-001, my iMac has suddenly started waking up when it should be asleep. Now I've had Auto Sleep problems with my iMac before, but this problem of finding my iMac running when I left it asleep started immediately after the update. Now, one thing additional I've notice since the update is that I often see the message on the screen "Keyboard Connected" when it always was or should have been and I wonder if this is related to my iMac waking up. Anyone else seen this problem since the update or have any ideas?

    Thanks to you both for suggestions, but I still have the same problem after trying them and as I said in my title this only started after the 2010-001 security update. As a test I put my iMac to sleep at 13:35 and it woke up by itself at 13:46. Here is the console log below, does it help at all in finding the root cause?
    23/01/2010 13:46:17 com.apple.usbmuxd[20] DeviceRequestAsync failed: 0xe0004057
    23/01/2010 13:46:17 kernel Wake reason = OHC2
    23/01/2010 13:46:17 kernel System Wake
    23/01/2010 13:46:17 kernel Previous Sleep Cause: 5
    23/01/2010 13:46:17 kernel USB (OHCI):Port 1 on bus 0x6 has remote wakeup from some device
    23/01/2010 13:46:17 kernel en1: 802.11d country code set to 'X3'.
    23/01/2010 13:46:17 kernel en1: Supported channels 1 2 3 4 5 6 7 8 9 10 11 12 13 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140
    23/01/2010 13:46:26 kernel NVEthernet::setLinkStatus - Valid but not Active
    23/01/2010 13:46:26 kernel en1: 802.11d country code set to 'BE'.
    23/01/2010 13:46:26 kernel en1: Supported channels 1 2 3 4 5 6 7 8 9 10 11 12 13 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140
    23/01/2010 13:46:26 kernel Auth result for: 00:19:70:24:4b:58 MAC AUTH succeeded
    23/01/2010 13:46:26 kernel AirPort: Link Up on en1
    23/01/2010 13:46:26 kernel AirPort: RSN handshake complete on en1
    23/01/2010 13:46:26 kernel EIR is supported.
    23/01/2010 13:46:26 kernel SSP is supported.
    23/01/2010 13:46:26 kernel [09437000][BNBMouseDevice::startMultitouch][30] ERROR: Invalid attempt to re-start multitouch handler
    23/01/2010 13:46:26 configd[13] network configuration changed.
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:58867 from 192.168.1.1:1900
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:58867 from 192.168.1.1:1900
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:60944 from 192.168.1.1:53
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:51633 from 192.168.1.1:53
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:52391 from 192.168.1.1:53
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:60944 from 192.168.1.1:53
    23/01/2010 13:46:29 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:62159 from 192.168.1.1:53
    23/01/2010 13:46:31 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:58867 from 192.168.1.1:1900
    23/01/2010 13:46:31 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:58867 from 192.168.1.1:1900
    23/01/2010 13:46:31 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:58867 from 192.168.1.1:1900
    23/01/2010 13:46:33 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:61768 from 192.168.1.1:53
    23/01/2010 13:46:47 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:65126 from 192.168.1.1:53
    23/01/2010 13:47:20 Firewall[52] Stealth Mode connection attempt to UDP 192.168.1.2:64652 from 192.168.1.1:53

Maybe you are looking for