Anti-Virus-Software on SAP-Apps - Exclude list

Hi All,
we are planing to install the Anti-Virus-Software Forefront on our Windows SAP-Application-Server (Dialog Instances).
The exclude list for the virusscanner:
C:\usr\sap\MRP\D20\work
C:\usr\sap\DAA\SMDA97\work
C:\usr\sap\MRP\work
C:\WINDOWS\NTDS
C:\WINDOWS\NTFRS
C:\WINDOWS\SoftwareDistribution\Datastore
C:\WINDOWS\SYSVOL
On Sunday night we plan a full scan on the server.
Do you have any additions to the exclude list?
Thanks for your support.
Andreas

I think a hyprid solution is the best.
We will start with the exclude dirs and this exclude processes:
disp+work.exe
gwrd.exe
icman.exe
igsmux.exe
igspw.exe
msg_server.exe
oracle.exe
saposcol.exe
saprouter.exe
sapstartsrv.exe
tnslsnr.exe
brbackup.exe
brarchive.exe
brrestore.exe
Thanks for your fast help!
Regards,
Andreas

Similar Messages

  • My MBpro has been running some kind of app in the background upon turning on, heating up for no cause. Is this normal since Snow Lepard? It's been updated and I also have anti-virus software too.

    My MBpro has been running some kind of app in the background upon turning on, heating up for no cause. Is this normal since Snow Lepard? It's been updated and I also have anti-virus software too.

    you're welcome....
    also check activity monitor - all processes - see what's using up most of your cpu resources under % CPU....
    highlight anything that's really high and hit quit process......anything over 10% is considered high - unless it's your browser....
    good luck...

  • Cisco Jabber for Windows - Anti-Virus Software

    Hello,
    Cisco Jabber for Windows could not resolve outlook contacts, when a client has installed McAffee Anti-Virus Software.
    Is there any documentation available, how to setup a Anti-Virus Software, to get Cisco Jabber for Windows running?
    Cisco Jabber for Windows Version 9.2.4 Build 4528
    Outlook 2013
    Thanks
    Alex

    this is all what we mention about antivirus;  http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/jabber/Windows/9_2/JABW_BK_J6915A59_00_jabber-windows-server-setup/JABW_BK_J6915A59_00_jabber-windows-server-setup_chapter_00.html
    Some antivirus or firewall applications, such as Symantec EndPoint Protection, block inbound CDP packets, which disables desk phone video capabilities. You should configure your antivirus or firewall application to allow inbound CDP packets. See the following Symantec technical document for additional details about this issue: Cisco IP Phone version 7970 and Cisco Unified Video Advantage is Blocked by Network Threat Protection.
    with that being said; we probably would like to get the jabber process excluded from the antivirus list so that it allows for inbound MAPI communication as that is what is used for quering for the outlook contact.
    The only process that ever runs from Jabber for windows is "CiscoJabber.exe" which is located in the following path:
    C:\Program Files (x86)\Cisco Systems\Cisco Jabber
    i hope this helps.

  • Suggestions for anti-virus softwares?

    Hi everyone,
    I recently brought a Macbook Pro and is preparing to set it up with different softwares. Right now, I am still not sure which anti-virus software I should use for the macbook pro. I have read online articles recommending Norton, Intego, and McAfee.
    Can anyone please give me some suggestions or pros & cons to which anti-virus software I should use?
    Thanks everyone!

    XProtect works with all applications that set the "quarantine" attribute on downloaded files.
    I'm not questioning your expertise, but how exactly do you know that? I'd definitely like to read more about it, and especially the "'quarantine' attribute".
    It may not be something Apple publishes in its ads, but it's documented in Apple's developer documentation.  See (search these documents for "quarantine"):
    http://developer.apple.com/library/mac/#releasenotes/MacOSX/WhatsNewInOSX/Articl es/MacOSX10_5.html
    http://developer.apple.com/library/mac/#releasenotes/Carbon/RN-LaunchServices/_i ndex.html#//apple_ref/doc/uid/TP40001369
    http://developer.apple.com/library/mac/documentation/General/Reference/InfoPlist KeyReference/InfoPlistKeyReference.pdf
    Apple is, as usual, a bit tight-lipped about XProtect, but I can assure you that XProtect's action is tied directly to the quarantine system.  I have verified this through testing with a collection of malware.  If the quarantine attribute is set on a piece of malware, trying to open it triggers an XProtect warning.  If the quarantine attribute is not set, you can open it freely, with no warning.
    That includes all built-in Aqua applications
    By "built-in" I assume you mean Apple apps bundled with the OS. (Just making sure.)
    That is correct.
    other popular web browsers and mail clients.
    And what if I'd like to use an unpopular browser?
    You might not be a believer in popularity, but if a browser does not implement this feature as Apple has recommended to all developers, you'd be wise to avoid it, as they've dropped the ball.  If a browser developer drops an easy ball like this, there are likely to be many other balls on the floor that you haven't seen.
    How exactly do I find out if it's on 'the list'?
    Carolyn posted a link to my Mac Malware Guide earlier...  if you read that, it'll tell you.  Basically, if you've got a question as to whether a browser or other file downloader complies with Apple's developer guidelines on this topic, just download a known good app from a known good site.  If you can then open that app without a warning, saying the app was downloaded and asking if you're sure you want to open it, then that downloader is unsafe.  (Of course, if you have disabled those quarantine warnings, this test does not apply, but that doesn't matter as you've pretty thoroughly turned off all the built-in malware protection anyway.)
    And why is this 'list' such a secret, anyway?
    There's really no secret involved, it's just a feature that most apps implement (since it's easy to do) and few users care whether it's there or not.  It's not talked about, but it's no secret, in the same way that you probably never think or talk about the catalytic converter in your car.

  • I Opened A Strange Attachment, Do I need To Install Anti Virus Software?

    I have Yahoo Mail and recently received some emails from myself with strange attachments. Similar emails were sent to random contacts in my Yahoo contact list. I did not send these emails. When I changed my email password, these emails stopped. However, I'm worried my iMac G5 (OS 10.6.4) has a virus because I opened one of the attachments. Also, could a worm virus on my IMac have caused these emails? Yahoo advised me to run anti-virus software. Do I need to run anti-virus software and if so, which one? I've been reading online that anti virus software can cause more harm than good and make your mac "buggy," whatever that means.

    P NewYork wrote:
    I've been reading online that anti virus software can cause more harm than good and make your mac "buggy," whatever that means.
    Yes, you read right! There are no known viruses that attack OS X and other exploits are very rare.
    It sounds like your email address is being spoofed.
    http://en.wikipedia.org/wiki/Spoofing_attack
    This means that infected PC is going through its contact list and sending spoofed as that address.
    There's nothing you can do but alert your PC friends.
    EDIT: Are these emails actually being sent by your Mac? Check in Sent mail folder?
    If you feel you MUST run AV software to prove you have nothing , do a scan with ClamXav a mac friendly freeware app.
    -mj
    Message was edited by: macjack

  • Does my iMac need an anti-virus or malware detection app to remain secure?

    Does my iMac need an anti-virus or malware detection app to remain secure?

    The best defense for keeping your Mac secure is YOU.  Honestly, I will not tell you to not get software but YOU are the best way to stay safe. I myself have never used any software on my personal computers personally.
    rules to remember:
    Don't:
    Open any e-mails from an unknown sender
    Open any e-mails that have attachments unless that person is in your contacts...BUT, this one can be tricky as well.  If one of your contacts gets infected, their computer could send an email (with an attachment) to everyone in their contact list.  This is a trick to get you to open the attachment because you know the sender.  So always check for really generic subject lines that sound fake, call them if you are not sure.
    Click on any of those intrusive ads on websites.
    Careful downloading software from the Internet that you are not sure about.  Always do your research.
    if you do decide to get software, I can safely say DO NOT GET MACKEEPER.  STAY AWAY.  I have heard only horror stories about this software. 
    Keep your Network safe, make sure if youuse an open WiFi connection to LOCK it.

  • Help! Anti-Virus Software

    I recently bought a macbook pro two weeks ago and with my previous laptops (they were windows) ive always had to get anti-virus software. Do i need security for my macbook pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Anti-virus Software: Norton Anti-virus OR Intego's Virus Barrier?

    Hello all.
    Let's just assume here that "we need an anti-virus software" and not dwell into the other area of discussion about Macs not needing any, despite the recent 'worms'.
    Which one would you get, which one is better overall? Norton Anti-virus or Intego's Virus Barrier?
    I think I remember reading a MacWorld magazine back a few months and think they rated Virus Barrier the best.
    What about you guys? Thanks and cheers.

    First, do not believe the FUD (Fear, Uncertainty, and Doubt) spread about Norton AntiVirus. A good bit of that is undeserved, especially when it comes to NAV 10, which is the Tiger-compatible version and what I use.
    I recently engaged in a debate on this subject in this thread, so you can read some of my thoughts there in response to the usual FUD spread about NAV and Symantec Norton products in general.
    See my "Detecting and avoiding malware and spyware" FAQ for my recommendations as well as a list of some recent Mac OS X security threats that have emerged, including Trojans, rootkits, and spyware.
    You can also read another post of mine on this topic here re: NAV vs. Intego.
    Good luck!
    Dr. Smoke
    Author: Troubleshooting Mac® OS X
    Note: The information provided in the link(s) above is freely available. However, because I own The X Lab™, a commercial Web site to which some of these links point, the Apple Discussions Terms of Use require I include the following disclosure statement with this post:
    I may receive some form of compensation, financial or otherwise, from my recommendation or link.

  • What is Apple's position on Anti-virus software for the mac?

    I have started replacing my customers PCs with iMac's and Mac-Mini, and I have always operated on the assumption that anti-virus software is not necessary, but I fear that my opinion might need revisiting.  So I would pose the question again, does the community and/or Apple have an opinion on the need for Anti-Virus, Malware and all the other nasty inflictions.  If you, as a group or individually do recommend, what product would you recommend?  Thank You --- Bill Shaw - Kansas City, Mo.

    This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an attacker who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware. Starting with OS X 10.7.5, there is another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications that are downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Applications certified in this way haven't actually been tested by Apple (unless they come from the Mac App Store), but you can be sure that they haven't been modified by anyone other than the developer, and his identity is known, so he could be held responsible if he knowingly released malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe. Note, however, that there are some caveats concerning Gatekeeper:
    It doesn't apply to software that comes packaged as an installer. Treat all third-party installers with caution.
    It can be disabled or overridden by the user.
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to applications downloaded from the network. Software installed from a CD or other media is not checked.
    For more information about Gatekeeper, see this Apple Support article. Notwithstanding the above, the most effective defense against malware attacks is your own intelligence. All known malware on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. [Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.]
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Java on the network (not to be confused with JavaScript, to which it's not related) is always a potential weak spot in the security of any operating system. If a Java web plugin is not installed, don't install it unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the filesystem. Malware gets into the system by being downloaded, not by materializing from nowhere.
    In order to meet that nonexistent threat, the software duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability and poor performance.
    By modifying the system at a low level, the software itself may create vulnerabilities that could be exploited by malware attackers.
    ClamXav doesn't have these drawbacks.

  • Anti virus software  and patching os

    Can anyone tell me their views on anti virus software running on a database server? We are windows 2003 / 11g.
    I have not allowed it in the past but our networking folks think we should have it installed so we can at least scan the C: drive.
    Also, what is your policy for updating the OS. I currently do not update the OS unless I have a know issue. Others seem to think this is crazy but this policy has worked well for the last 3 years. I should add that we replace our databases every 4 or 5 years and they are all behind two firewalls - access is only thru the web app or file server.
    I would be very interested in other's policies.
    Thanks,
    Kathie

    Personal opinion: I'd never put AV on a proper, production Oracle server -and by "proper", I essentially mean what you indicate: it's not accessible directly by the public; it's behind firewalls; it has no functioning connection to the Internet etc etc etc
    We also disable automatic updates on all our Windows servers, because otherwise there's a tendency for a production database to die unannounced as the automatic updates kick in!
    As for manual updates: we tend not to bother on a routine basis. We've fully patched a server when we were planning to take it offline for other reasons (an Oracle CPU patch, for example), so periodically everything becomes as up-to-date as it can. But during normal running, we just let it run without interruption (i.e., without updates) for as long as we can. Only

  • My Macbook pro has had two kernel panics recently.  Could it be Sophos anti virus software?  Here is the error report:  Interval Since Last Panic Report:  209275 sec Panics Since Last Report:          1 Anonymous UUID:                    B29E4ED8-E695-459

    Interval Since Last Panic Report:  209275 sec
    Panics Since Last Report:          1
    Anonymous UUID:                    B29E4ED8-E695-459A-B922-5E2DED9D42A2
    Wed Aug  1 06:58:39 2012
    panic(cpu 0 caller 0xffffff80002c473a): Kernel trap at 0xffffff800031b53f, type 14=page fault, registers:
    CR0: 0x0000000080010033, CR2: 0x00000000000000d0, CR3: 0x0000000020b00023, CR4: 0x00000000000606e0
    RAX: 0x000000000000000d, RBX: 0x0000000000008000, RCX: 0xffffff8014516b20, RDX: 0x0000000000008000
    RSP: 0xffffff80f057baf0, RBP: 0xffffff80f057bb30, RSI: 0xffffff80131caf80, RDI: 0x0000000000000000
    R8:  0x0000000000000000, R9:  0x0000000000000000, R10: 0xffffff80131cafb8, R11: 0x0000000000000000
    R12: 0xffffff80e9ca1b00, R13: 0xffffff8015a7f000, R14: 0xffffff80131caf80, R15: 0x0000000000000000
    RFL: 0x0000000000010282, RIP: 0xffffff800031b53f, CS:  0x0000000000000008, SS:  0x0000000000000010
    CR2: 0x00000000000000d0, Error code: 0x0000000000000000, Faulting CPU: 0x0
    Backtrace (CPU 0), Frame : Return Address
    0xffffff80f057b7a0 : 0xffffff8000220792
    0xffffff80f057b820 : 0xffffff80002c473a
    0xffffff80f057b9d0 : 0xffffff80002da0cd
    0xffffff80f057b9f0 : 0xffffff800031b53f
    0xffffff80f057bb30 : 0xffffff7f80ae55e4
    0xffffff80f057bcb0 : 0xffffff800053d509
    0xffffff80f057bcf0 : 0xffffff8000582f84
    0xffffff80f057bde0 : 0xffffff80005893e6
    0xffffff80f057bed0 : 0xffffff80005897c9
    0xffffff80f057bf60 : 0xffffff80005ccfe8
    0xffffff80f057bfb0 : 0xffffff80002da5e9
          Kernel Extensions in backtrace:
             com.sophos.kext.sav(8.0.4)[898EB02E-4A1D-1F59-6625-C0466041D6C4]@0xffffff7f80ae 3000->0xffffff7f80ae7fff
    BSD process name corresponding to current thread: InterCheck
    Mac OS version:
    11E53
    Kernel version:
    Darwin Kernel Version 11.4.0: Mon Apr  9 19:32:15 PDT 2012; root:xnu-1699.26.8~1/RELEASE_X86_64
    Kernel UUID: A8ED611D-FB0F-3729-8392-E7A32C5E7D74
    System model name: MacBookPro8,2 (Mac-94245A3940C91C80)
    System uptime in nanoseconds: 51418744072298
    last loaded kext at 3635848934754: com.seagate.driver.PowSecDriverCore          5.1.1 (addr 0xffffff7f809df000, size 172032)
    last unloaded kext at 3695866490895: com.apple.iokit.IOSCSIBlockCommandsDevice          3.2.0 (addr 0xffffff7f808c1000, size 86016)
    loaded kexts:
    com.sophos.kext.sav          8.0.4
    com.apple.filesystems.smbfs          1.7.2
    com.apple.filesystems.afpfs          9.8.1
    com.apple.nke.asp_tcp          6.0.1
    com.apple.driver.AppleHWSensor          1.9.5d0
    com.apple.driver.AppleMikeyHIDDriver          122
    com.apple.driver.AudioAUUC          1.59
    com.apple.driver.AppleHDA          2.2.0f3
    com.apple.driver.AppleMikeyDriver          2.2.0f3
    com.apple.driver.AppleUpstreamUserClient          3.5.9
    com.apple.driver.AppleMCCSControl          1.0.26
    com.apple.driver.AppleIntelHD3000Graphics          7.1.8
    com.apple.driver.AGPM          100.12.42
    com.apple.driver.SMCMotionSensor          3.0.2d6
    com.apple.kext.ATIFramebuffer          7.1.8
    com.apple.driver.AppleSMCPDRC          5.0.0d0
    com.apple.iokit.IOUserEthernet          1.0.0d1
    com.apple.iokit.IOBluetoothSerialManager          4.0.5f11
    com.apple.driver.AppleSMCLMU          2.0.1d2
    com.apple.Dont_Steal_Mac_OS_X          7.0.0
    com.apple.driver.AudioIPCDriver          1.2.2
    com.apple.driver.ACPI_SMC_PlatformPlugin          5.0.0d0
    com.apple.driver.AppleMuxControl          3.0.16
    com.apple.driver.AppleLPC          1.5.8
    com.apple.ATIRadeonX3000          7.1.8
    com.apple.filesystems.autofs          3.0
    com.apple.driver.AppleUSBTCButtons          225.2
    com.apple.driver.BroadcomUSBBluetoothHCIController          4.0.5f11
    com.apple.driver.AppleUSBTCKeyboard          225.2
    com.apple.driver.AppleIRController          312
    com.apple.AppleFSCompression.AppleFSCompressionTypeDataless          1.0.0d1
    com.apple.AppleFSCompression.AppleFSCompressionTypeZlib          1.0.0d1
    com.apple.BootCache          33
    com.apple.iokit.SCSITaskUserClient          3.2.0
    com.apple.driver.XsanFilter          404
    com.apple.iokit.IOAHCISerialATAPI          2.0.3
    com.apple.iokit.IOAHCIBlockStorage          2.0.3
    com.apple.driver.AppleUSBHub          4.5.0
    com.apple.driver.AppleFWOHCI          4.8.9
    com.apple.driver.AirPort.Brcm4331          530.4.20
    com.apple.driver.AppleSDXC          1.2.0
    com.apple.iokit.AppleBCM5701Ethernet          3.1.2b2
    com.apple.driver.AppleEFINVRAM          1.5.0
    com.apple.driver.AppleSmartBatteryManager          161.0.0
    com.apple.driver.AppleAHCIPort          2.3.0
    com.apple.driver.AppleUSBEHCI          4.5.8
    com.apple.driver.AppleACPIButtons          1.5
    com.apple.driver.AppleRTC          1.5
    com.apple.driver.AppleHPET          1.6
    com.apple.driver.AppleSMBIOS          1.8
    com.apple.driver.AppleACPIEC          1.5
    com.apple.driver.AppleAPIC          1.5
    com.apple.driver.AppleIntelCPUPowerManagementClient          193.0.0
    com.apple.nke.applicationfirewall          3.2.30
    com.apple.security.quarantine          1.3
    com.apple.driver.AppleIntelCPUPowerManagement          193.0.0
    com.apple.security.SecureRemotePassword          1.0
    com.apple.driver.DspFuncLib          2.2.0f3
    com.apple.driver.AppleSMBusController          1.0.10d0
    com.apple.iokit.IOSurface          80.0.2
    com.apple.iokit.IOSerialFamily          10.0.5
    com.apple.iokit.IOFireWireIP          2.2.4
    com.apple.driver.AppleHDAController          2.2.0f3
    com.apple.iokit.IOHDAFamily          2.2.0f3
    com.apple.iokit.IOAudioFamily          1.8.6fc17
    com.apple.kext.OSvKernDSPLib          1.3
    com.apple.driver.ApplePolicyControl          3.0.16
    com.apple.driver.AppleSMC          3.1.3d8
    com.apple.driver.IOPlatformPluginLegacy          5.0.0d0
    com.apple.driver.AppleSMBusPCI          1.0.10d0
    com.apple.driver.AppleGraphicsControl          3.0.16
    com.apple.driver.IOPlatformPluginFamily          5.1.0d17
    com.apple.driver.AppleBacklightExpert          1.0.3
    com.apple.iokit.IONDRVSupport          2.3.2
    com.apple.kext.ATI6000Controller          7.1.8
    com.apple.kext.ATISupport          7.1.8
    com.apple.driver.AppleIntelSNBGraphicsFB          7.1.8
    com.apple.iokit.IOGraphicsFamily          2.3.2
    com.apple.kext.triggers          1.0
    com.apple.driver.AppleThunderboltDPInAdapter          1.8.2
    com.apple.driver.AppleThunderboltDPAdapterFamily          1.8.2
    com.apple.driver.AppleThunderboltPCIDownAdapter          1.2.4
    com.apple.driver.AppleUSBBluetoothHCIController          4.0.5f11
    com.apple.iokit.IOBluetoothFamily          4.0.5f11
    com.apple.driver.AppleUSBMultitouch          227.1
    com.apple.iokit.IOUSBHIDDriver          4.4.5
    com.apple.driver.AppleUSBMergeNub          4.5.3
    com.apple.driver.AppleUSBComposite          4.5.8
    com.apple.iokit.IOSCSIMultimediaCommandsDevice          3.2.0
    com.apple.iokit.IOBDStorageFamily          1.6
    com.apple.iokit.IODVDStorageFamily          1.7
    com.apple.iokit.IOCDStorageFamily          1.7
    com.apple.iokit.IOSCSIArchitectureModelFamily          3.2.0
    com.apple.driver.AppleThunderboltNHI          1.5.5
    com.apple.iokit.IOThunderboltFamily          2.0.0
    com.apple.iokit.IOUSBUserClient          4.5.8
    com.apple.iokit.IOFireWireFamily          4.4.5
    com.apple.iokit.IO80211Family          420.3
    com.apple.iokit.IOEthernetAVBController          1.0.1b1
    com.apple.iokit.IONetworkingFamily          2.1
    com.apple.iokit.IOAHCIFamily          2.0.8
    com.apple.iokit.IOUSBFamily          4.5.8
    com.apple.driver.AppleEFIRuntime          1.5.0
    com.apple.iokit.IOHIDFamily          1.7.1
    com.apple.iokit.IOSMBusFamily          1.1
    com.apple.security.sandbox          177.5
    com.apple.kext.AppleMatch          1.0.0d1
    com.apple.security.TMSafetyNet          7
    com.apple.driver.DiskImages          331.6
    com.apple.iokit.IOStorageFamily          1.7.1
    com.apple.driver.AppleKeyStore          28.18
    com.apple.driver.AppleACPIPlatform          1.5
    com.apple.iokit.IOPCIFamily          2.6.8
    com.apple.iokit.IOACPIFamily          1.4
    Model: MacBookPro8,2, BootROM MBP81.0047.B27, 4 processors, Intel Core i7, 2.2 GHz, 8 GB, SMC 1.69f3
    Graphics: AMD Radeon HD 6750M, AMD Radeon HD 6750M, PCIe, 512 MB
    Graphics: Intel HD Graphics 3000, Intel HD Graphics 3000, Built-In, 512 MB
    Memory Module: BANK 0/DIMM0, 4 GB, DDR3, 1333 MHz, 0x0198, 0x393930353432382D3037332E4130304C4620
    Memory Module: BANK 1/DIMM0, 4 GB, DDR3, 1333 MHz, 0x0198, 0x393930353432382D3037332E4130304C4620
    AirPort: spairport_wireless_card_type_airport_extreme (0x14E4, 0xD6), Broadcom BCM43xx 1.0 (5.106.198.4.20)
    Bluetooth: Version 4.0.5f11, 2 service, 11 devices, 1 incoming serial ports
    Network Service: Wi-Fi, AirPort, en1
    Serial ATA Device: TOSHIBA MK5065GSXF, 500.11 GB
    Serial ATA Device: MATSHITADVD-R   UJ-8A8
    USB Device: FaceTime HD Camera (Built-in), apple_vendor_id, 0x8509, 0xfa200000 / 3
    USB Device: hub_device, 0x0424  (SMSC), 0x2513, 0xfa100000 / 2
    USB Device: BRCM2070 Hub, 0x0a5c  (Broadcom Corp.), 0x4500, 0xfa110000 / 5
    USB Device: Bluetooth USB Host Controller, apple_vendor_id, 0x821a, 0xfa113000 / 7
    USB Device: Apple Internal Keyboard / Trackpad, apple_vendor_id, 0x0252, 0xfa120000 / 4
    USB Device: hub_device, 0x0424  (SMSC), 0x2513, 0xfd100000 / 2
    USB Device: IR Receiver, apple_vendor_id, 0x8242, 0xfd110000 / 3

    Yes.    "BSD process name corresponding to current thread: InterCheck"
    Apparently InterCheck is the Sophos scanner.
    Uninstall Sophos >  http://openforum.sophos.com/t5/Sophos-Anti-Virus-for-Mac-Home/Removing-Sophos-An ti-Virus-for-Mac-Home-Edition/td-p/37
    Then restart your Mac. Hopefully no more kernel panics.
    According to the Sophos system requirements, you should be able to run Sophos on Lion v10.7 
    If you want to have anti virus software installed, you can download ClamXav from the App Store. Might have better luck.

  • Is anti-virus software necessary on Mac?

    Is anti-virus necessary on Mac? I am running Parallels Desktop and consistently receive offers to purchase Kaspersky Anti-Virus Software. I don't surf the net under the Windows 7 desktop, I've only been using Safari on the Mac side. Someone told me that the Windows 7 side of the Parallels desktop is suseptable to virus attacks if I'm not running some type of anti-virus software. Is this accurate? I've never had any problems on the Mac side of my Parallels desktop and in fact is one of the things I like the most about my Mac. When I had a PC, the resurces were constantly hijacked by scans and updates by Norton's and it took forever for my PC to boot.
    Stephen

    while norton is set to automatic upgrade, does it do so only when Windows is being used
    Yes. It's not running except when Windows is active, so it can't update. It will check for updates as soon as Windows is booted up.
    is norton working in the 'back-ground' against an anti-vius attack on Windows while I'm using OS X
    No. It's a Windows app, it can't run in OS X. Norton for Mac can run in OS X, but I don't recommend using that. Furthermore, as Windows is not running when you're in OS X (unless you have a virtual machine running) it _can't_ be attacked by malware. It's not around to be be targeted.

  • Anti virus software - do i need it for my mac?

    Hi - with all the publicity in the news about the hacking of PC's and we only have 2 weeks to protect our computers from hackers - would you recommend that we purchase particular software for our iMac's to combat this forthcoming attack?  Any information gratefully received.  x

    with all the publicity in the news about the hacking of PC's and we only have 2 weeks to protect our computers from hackers
    You have to protect your computers from hackers all the time. The point is that you have to do that, and delegating that responsibility to some magical product that claims the ability to do it for you is an ineffective defense.
    There is no two week countdown to anything; there never has been.
    - would you recommend that we purchase particular software for our iMac's to combat this forthcoming attack? 
    Absolutely not. OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "speed up", "clean up", "optimize", or "accelerate" your Mac. Without exception, they will do the opposite.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources. Illegally obtained software is almost certain to contain malware.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iTunes or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Block browser popups: Safari menu > Preferences > Security > and check "Block popup windows":
    Popup windows are useful and required for some websites, but popups have devolved to become a common means to deliver targeted advertising that you probably do not want.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever see a popup indicating it detected registry errors, that your Mac is infected with some ick, or that you won some prize, it is 100% fraudulent. Ignore it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. To date, most of these attempts have been pathetic and are easily recognized, but that is likely to change in the future as criminals become more clever.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • What Anti-Virus Software for E72 would you recomme...

    Hi, what would you recommend for an anti-virus software for E72? Thanks.

    Hello,
    Various anti-malware vendors are still going through the Windows 8 certification process for their software with Microsoft, however, many of them already have products that work under Windows 8.  Two testing organizations, AV-Comparatives and AV-Test, have been keeping track of which products work under Windows 8, and the results can be found on their respective web sites:
    AV-Comparatives:  Windows 8 Approved Security Products
    AV-Test: Security Products for Windows 8 (Home User)
    I would recommend checking each list frequently, as they seem to be getting updated on a daily basis.
    Regards,
    Aryeh Goretsky
    I am a volunteer and neither a Lenovo nor a Microsoft employee. • Dexter is a good dog • Dexter je dobrý pes
    S230u (3347-4HU) • X220 (4286-CTO) • W510 (4318-CTO) • W530 (2441-4R3) • X100e (3508-CTO) • X120e (0596-CTO) • T61p (6459-CTO) • T43p (2678-H7U) • T42 (2378-R4U) • T23 (2648-LU7)
      Deutsche Community   Comunidad en Español Русскоязычное Сообщество

  • What is the best anti virus software to use with OS X 10.8?

    What is the best anti virus software to use with OS X 10.8?  Norton is slowing my iMac down and I'm constantly being bombarded by blocking messages for programs I don't recognize.
    Thanks

    Get rid of Norton a/k/a Symantec. It is one of the worst pieces of trash you can install on a Mac.
    You do not need any additional anti-virus software than is already designed into OS X to protect your Mac against malware. I assume you paid enough for your iMac and that's part of what you paid.
    If you use Windows, or are concerned about harboring viruses that target Windows, or care about friends who use Windows, then get ClamXav. It's in the App Store and it is free.
    Since friends don't let friends use Windows, I have no use for it.

Maybe you are looking for

  • How I got my shuffle back

    I had the issue of Windows not recognizing my shuffle - All I saw was the alternating flash between green & amber. Shuffle firmware 1.1: iTunes version 5.0.1 Steps: Disabled SpyBot's TeaTimer Removed iTunes & all updaters Deleted C:\Program Files\iPo

  • Nota Fiscal Eletrônica Complementar - Processo de Importação

    Pessoal, Para o processo de Importação, a empresa que estamos implementando a NF-e, utilizam a Nota Complementar. De acordo com o manual do contribuinte versões 3.0 e 1.1.1, se a Nota original for eletrônica, basta inserirmos a Chave de Acesso refere

  • The Mysteriously Appearing Photos That Were In The Trash Bin

    Hello; I have a conventional digital camera that connects to my mac USB and downloads my photos onto my desktop. I frequently toss out photos I do not want. Last night I tossed out a bunch of my photos and emptied the trash bin. But just a minute ago

  • DNS when using Workgroup Settings?

    So, upgraded to Leopard and it is wreaking havoc on my LAN. The server preferences utility cannot find the local server by name, only by IP. Worse, local clients upgraded to Leopard cannot get an IP. Also, when I try to access the wiki from the serve

  • How do i look at my photo stream on osx 10.6

    Jsut wondering if i could look at my photo stream using osx 10.6 and iphoto '09