Antivirus, antispyware, and software firewall for OS 10.3

Finally migrated one of my Macs to OS X (10.3), so now I'm surfing w/o a life jacket. What do most Panther users use for virus protection, spyware protection, and for a software firewall?
Thanks in advance for your recommendations.
Carl B.

Carl:
There is one known "virus", is you can call it that, for Mac OS X, a weak trojan called Oompa Loompa. You have to download it, open it, authenticate and install it. Anyone who goes to all that trouble...
Like many, if not most, mac users, I have never had virus or spyware protection. No problems either. Mac OS X has built in security, that if utilized properly, can give you a very high level of protection. A level no a-v software can give.
Here are some articles I put together that can get you on the road to security: Maintenance, Safe Practices, and OS Hardening. You don't have to do it all at once, but even if you begin with regular maintenance procedures and a good backup strategy you'll be ahead of much of the pack.
Good luck.
cornelius
PismoG4 550, 100GB 5400 Toshiba internal, 1 GB RAM; Pismo 500 OS X (10.4.5)   Mac OS X (10.4.5)   Beige G3 OS 8.6

Similar Messages

  • Best Practices to do software Patching and Software Deployment for bigger environment like 300 K computers

    Hi Friends,
    i am looking for low level suggestions and a ppt/document etc too  , The client base is 300 k users and spread globally ( major in three different regions), the requirement is
    1) methodology to do software patching, can we patch all in one go or do we have to divide as per region etc
    2) How many clients can be targeted for software patching in one go ( ex : can we target 20K clients in one go ?), i know there are other factors too will play key role here like band width etc , but i am looking answers out of real time experience
    3) What Methodology to follow when it comes to critical/emergency updates ?
    Regards
    Tanoj
    OSLM ENGINEER - SCCM 2007 & 2012

    There is no single best practice to patching, if there were then SCCM would ship preconfigured :).  As an example, Microsoft internally patches 300,000 workstations with 98% success in about a week according to their own podcast:
    Microsoft Podcast
    That said, I do follow a few rules when building a patching plan for a client.  Maybe you'll find it helpful:
    Always use a "soak tier".  I forget where I first heard the term, but the idea is to have a good cross section of users get patches one or more weeks before your general deployment.  This will help identify potential issues with a patch
    before it hits general release.  Make sure said group is NOT just the IT department ... we make the worst guinea pigs (we aren't known for closing out end of the month billing or posting legal documents).
    When it comes to workstations, avoid needlessly phased deployment.  99% of the time, using local time zones is enough of a phased deployment.  Unlike servers with very particular boot and patching orders, workstations can simply be patched.  You
    have enough collections in your environment ... so any new collection for patching should be justified.
    Keep your ADR count down.  It's tempting to build a new ADR for everything (workstations, general servers, exchange servers, etc.).  Problem is that best practice also has you building a new SUG every time each ADR runs ... so you end up getting
    flooded with update groups and that much more maintenance.  When possible simply use maintenance windows to break up patching schedules instead of using mostly duplicate ADRs that simply have separate start dates.
    Use Orchastrator.  To me Orchastrator is to Software Updates what MDT is to Operating System Deployments:  effectively mandatory.  Even if you don't have complicated cluster updates you need to automate with SCO integrated to SCCM (there
    are great examples on the web if you do), you can at the very least create run-books to manage that monthly maintenance you otherwise have to handle manually in SCCM (which is a lot IMO).  I have monthly run-books that delete expired updates from SUGs,
    consoldate SUGs older than 6 months unto a single annual group, and even create new update packages (and update all ADRs to use them) every 6 months to keep a single repository from getting too large.
    I'm sure others out there can give you more advice ... but that's my two cents.

  • Driver and software updates for Deskjet printer on Yosemite

    I currently have a deskjet printer (3054) and I am wondering if/when updated software/ driver will be released. I am afraid to update to 10.10 and then find out my printer will not work.
    Thanks

    Hello Stock411,
              You should not have any issues installing your DJ 3054 on the new Mac OS 10.10 Yosemite.  This also depends on what you are upgrading from.  If you have already installed Full Feature Software on Mavericks, then you should have no issues.  The J610a DJ 3054 is a supported printer on Yosemite.  Please feel free to post any further questions, or concerns.
    Thank you,
    Thanks,
    Double-U-Dee
    Don't forget to give Kudos where Kudos is Due - OR - if a Response Resolved your Issue, Click the "Accept as Solution"
    I am an HP employee, but my posts and replies are my own and do not reflect the opinion of HP.

  • Is the Hardware and Software enough/good for my needs

    I've been reading these forums and a few others and am concerned about somethings and hope some of you can help with these concerns:
    Some background and info:
    1. I've ordered a Dell XPS 720 H2C which as a Intel Core2 Extreme processor QX6700 (3.46GHz,,Overclocked) w/Quad Core Technology and 8MBcache, 4 GB RAM, Dual 768MB NVIDIA GeForce 8800GTX, 1.5TB RAID 0 HDD and a secondary 500GB SATA 3GB/s (No option for a RAID 0 secondary HDD, Windows VISTA ultimate OS.
    2. Will be buying/upgarding the Production Premium CS3 package. (currently only use PhotoShop CS3 and Flash CS3).
    3. I have a Canon XH A1 prosumer video camera (I'm an amature photographer/videographer not a professional. Software is my forte).
    My questions at this moment are to do with hardware software capabilties and workflow.
    My first project (of many I hope) is a make some corporate videos in HDV format for online marketing purposes (kind of like the videos Adobe have for CS3 - http://www.adobe.com/creativelicense/) and possibly to produce DVDs of the same.
    My first question is; Given the hardware and software, will I be able to do what I need? I really hope I don't have to go buy any more hardware. I don't mind having to do one or two more steps. to achieve the end goal (initially).
    Starting with the mode to shoot in (for the purpose stated above), what is my workflow going to be?
    i. What is the best mode to shoot in? (24f, 30f, 60i)
    ii. How do I get the video from the MiniDV tape onto my HDD and then into Premier Pro.
    iii. I need to be able to compisite multiple HDV clips to produce the final cut. Is the hardware and software good for this? On a scale of 1 to 10, what can I expect in terms of productivity.
    I've heard elsewhere that Premier Pro just don't produce true HD quality results. Is this earlier versions.
    What format/compression and dimension is the best for online viewing (I want to retain the HD quaility as far as possible.)
    Thank you all for listening and hope to hear your opinions.
    Shiv.

    Steven,
    Thank you for your quick reply and information there in. The video is very nice too. Great angles and composition.
    So I guess, I'm going to have swap my drive and re-install my OS when the machine arrives.
    I'm not going to be able to capture directly to my desktop (due to poratability reasons). So is there I way in Premire CS3 to uncompress the HDV from the camera and store it in my HDD in uncompressed format? I don't mind having to do this extra step each time if the post production experience is going to be better.
    I've heard a lot about Aspect HD from you and others here as well as other forums. I'm not very video savvy yet and don't understand a lot of the vocabulary used :). I've been to their website and don't get what their products are supposed to give me either (I guess their audience understands exactly what they are saying).
    What I do get is it decompresses the MPEG 2 to saves it to yout HDD for editing purposes. However, I would have thought the Premier Pro CS3 would have that capability as part of the product, no?
    I'd also like to use footage that is not HDV as well as photos/images (composits) but still retain the final cut to be HDV quality. Is this possible and if so, what does it do to the editing experience/performance?
    Will I be able to output the final cut back to my camera's Mini DV tape (without having to buy Aspect HD)?

  • How can i get the driver and software for q1342a laser printer 1000

    How can i get a driver and software Cd for HP Laserjet 1000 S/N#CNBJ242828
    Product ID# Q1342A

    The product you have seems to be a commercial printer. For the best chance at finding a solution I would suggest posting in the forum for HP Business Support!
    You may find the Commercial Laserjet board here.
    http://h30499.www3.hp.com/t5/Printers-LaserJet/bd-p/bsc-413
    Hope this helps!
    Help the community by marking this post as a solution if it solved your issue!.
    If my post helped you in any way, please click the blue KUDOS star under my name! It would mean a great deal.

  • Quickweb software upgrade for HP Pavilion dv6t-3000 CTO Entertainment Notebook PC Drivers

    Hi
    I have purchased my laptop in the year 2010 from HP. Now i need to upgrade HP QuickWeb software .
    My current version is less than 1.0. I guess we have latest version as 3 or above..
    Please let me know how to update the software to version 3 or greater.
    Here is my laptop model
    HP Pavilion dv6t-3000 CTO Entertainment Notebook PC
    Product name: HP Pavilion dv6 Notebook PC
    Windows 7 Home Premium 64-bit Service Pack 1

    Hello @SridharGaddam,
    I understand that you are looking for an upgraded version of HP Quickweb for your HP Pavilion dv6t-3000 CTO Notebook PC. I am providing you with a link to the HP Pavilion dv6t-3000 CTO Entertainment Notebook PC Drivers, which has all the most current drivers and software available for your computer. This is the software that HP has updated for your computer, and if you do not see the software you are looking for that means it is not compatible with your computer.
    I hope this answers your question to your satisfaction. Thank you for posting on the HP Forums. Have a great day!
    Please click the "Thumbs Up" on the bottom right of this post to say thank you if you appreciate the support I provide!
    Also be sure to mark my post as “Accept as Solution" if you feel my post solved your issue, it will help others who face the same challenge find the same solution.
    Dunidar
    I work on behalf of HP
    Find out a bit more about me by checking out my profile!
    "Customers don’t expect you to be perfect. They do expect you to fix things when they go wrong." ~ Donald Porter

  • What hardware and software is needed to use share point 2010

    Please if enyone could help!
    I want to become familiar with the advantages of using excel for example simultaneusly with other users, shere point does it best for us yes???  What do I need to install or what hardware is needed to do that?
    Thanks,

    Here are the hardware and software requirements for SharePoint
    http://technet.microsoft.com/en-us/library/cc262485(v=office.14).aspx
    Paul Stork SharePoint Server MVP
    Principal Architect: Blue Chip Consulting Group
    Blog: http://dontpapanic.com/blog
    Twitter: Follow @pstork
    Please remember to mark your question as "answered" if this solves your problem.

  • Monitoring and Alarming System for Blue M furnace

    Please help me...
    The Blue M furnace has a temperature controller(MIC 6000) attached to it, The temperature from the furnace is taken using a thermocouple, my project is to continuously monitor and set up an alarm when the temperature.
    About the Furnace and the controller:
    1) Ramp time is 1 hour and ramp up is up to 300 degrees celsius
    2) Soak time is 45 minutes and soak at 300 degrees.
    3) Ramp down cycle for 2 hours and ramp down to 50 degrees.
    Objectives:
    1) Continuously monitor the furnace temperature on computer as a temperature Vs Time graph, even when the temperature is OFF
    2) Set up alarm system. The alarm should be enabled only at the soak period cycle and disabled in all other stages.
    My questions are:
    Whether is this project  doable in Labview and if it is possible, what are the hardware and software required for this project and also can you please give me an idea or help me in doing this project. I am new to Labview, I didnot even have the software rightnow but I can learn it if this project is doable.
     Hope you can help me in this issue.

    Hello Brian,
    Roughly speaking this project should be possible in LabVIEW. But before we make a definitive decision, we would need more information from you. My question/suggestion for you are as below:
    1. How is this temperature controller connected to your computer? Is it through a serial port? If it is, the what is the communication protocol that it uses? Is it RS-232, RS-485 or Modbus?
    2. Would it be possible for you to provide us with a link to its product manual on the web? This way we can pull up its information and see if we have instrument drivers available for it.
    3. Call one of our technical sales reps. These guys can understand your requirements in detail and then recommend you appropriately.
    4. If you are looking to learn LabVIEW then you can download its evaluation version from here and then go through a free training session available here.
    Regards,
    Chetan K
    Application Engineer
    National Instruments

  • Lenovo Drivers and software

    There are a lot of drivers and software listed for my T500 on the Lenovo website but the explanation about what they do is very weak. Can I get that info anywhere? I recently updated my system from Win 7 32 bit to 64 bit and some of my drivers had to be replaced (fn+ function key and Ultranav Touchpad to name two). In the process of finding those, I found all the others. Should I consider updating all the listed drivers that are appropriate for my T500 and Win 7 64 bit operating system? Thanks.
    Dave

    Install the lenovo update utility and it should get all the ones you need

  • ESET Cybersecurity for Mac Antivirus/Antispyware Software

    Just switched from PC to Mac (first-time Mac user).  Previously, I used ESET Antivirus software during my PC years and was pleased.  Thinking about installing ESET Cybersecurity for Mac Antivirus/Antispyware software.  Any thoughts???

    As sig says, you don't really need it.  Even though there has just been the worst outbreak of malware in Mac history*, you're still safe as long as you don't fall for such scams and install the software.  There are no viruses that can make their way onto your Mac without your assistance.  Take a look at my Mac Virus Guide, and if you still want AV software, get ClamXav.
    * Disclaimer: links to my pages may give me compensation, and should not be taken as endorsement of my services by Apple.

  • Software and Licensing confusion for asa5512-ips edition firewall

    Hi all, we are looking at purchasing a Cisco ASA 5512-X IPS Edition but we are having a very difficult time trying to figure out what software and licensing we need for it.  Can someone please answer the following questions?
    1. I see the part number for the software is ASA5512-NI1Y (at least this is what we were told), but I see that some places sell it for over 800 dollars like http://nextwarehouse.com/item/?1518620 and then some sell it for 99 cents, like http://www.pcm.com/p/Cisco-Anti-Virus-&-Security-Software-Licensing/product~dpno~9969455~pdp.ificche - how can this possibly be right?  Does the 800 dollar one contain the licenses???
    I cannot get a straight answer from Cisco on this, every time I call to ask about it all I get is a sales pitch to buy it from them alone and a promise that someone will call me back "with more details".
    2. Is there only one software package for this? As in, if we buy ASA5512-NI1Y will every feature of the firewall be available?
    Thanks all, hopefully my questions make some sense as this has been really confusing and frustrating for us.
    Mike Anderson

    That part number is only for the IPS license of the soon-to-be-discontinued ASA 5512-X with CX module (last day of sales August 17 2015 - reference). It does not include the ASA appliance itself. That said, it is capable of running as a perimeter firewall with basic IPS functionality. No additional software is required (although a support contract on the base ASA appliance is required to add on a current IPS subscription license).
    You would be better served with an ASA 5512-X with FirePOWER module. The FirePOWER technology (from the 2013 acquisition of Sourcefire) is more advanced than the signature-based technology in the CX's IPS and will be the strategic platform that is further built upon moving forward. 
    Any qualified Cisco partner should be able to create a valid quote for you to purchase one. 

  • What is the best antivirus/antispyware for mac0sX 2014

    Can you please suggest what the best antivirus/antispyware programme for MacOSX (Mavericks) is now.  I am concerned about the new Russian viruses and spyware.

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Software and Driver Installation for HP Officejet 7310 Crash on my new laptop running Windows 8.1

    I am trying to load the software and drivers for my hp Officejet 7310 on my brand new Lenovo laptop which runs windows 8.1.  I had successfully loaded the software last week.  Unfortunately I lost the disk drive on my 2 week old computer. The store gave me another brand new Lenovo laptop.  On the new laptop I get errors when I try to load what I think is the same software that I loaded on the other computer a week ago.  I downloaded the software from the hp website.
    The driver software download fine.   Originally it then unzipped and a nice interface came up.  I think I clicked the load button.  A message box came up saying that it could not find a certain file in appData\local\temp\7xxx...  I tried the download and install several more times.  I think I then did windows updates and registered my version of office.  I was thinking that with the other computer I must have had the computer in a different state such that the drivers and software installed without a hitch. 
    Things seem to have gotten worse.  I do not get as far.  It still downloads fine but now after unzipping rather than the nice interface with the "load" button I get the a message box.
    The latest error is in a message box with the heading "Microsoft Visual C++ Runtime Library".  The error says that Program:c:\users\...\appData\local\temp\7zS4237\setup.exe  This application has requested the Runtime to terminate it in an unusual way. 
    I was able to connect the printer through the "add Printers" and am not actually too worried about having the whole "HP Solution" with the scanning interface.  I am worried that this error will cause me problems in the future with other things.  Thanks in advance for any help.
    I saw similar issuesdiscussed on the web and have tried several things.  I really do not want to reload the OS and start again.  We have barely used the system and I have no idea how this problem occurred and so I would not know how to prevent it from happening again.  I did stop and start the print service.  I was tempted to "totally unload the hp print drivers" but the file names in the posted instructions did not exactly match my files.  Another post mentioned making sure that I had the latest version of Adobe Flash Player loaded.  I went to the adobe site and it said that it is part of windows 8.1's internet explorer.  I ran the test and it seemed to work.
    Could the HP installation failure have corrupted my version of Microsoft Visual C++ Runtime Library?
    Thanks in advance for your help.

    Hi Karen_M2,
    Thank you for your response!
    The HP software does require the C ++ run-time libraries in order to install correctly. Please see this guide, Microsoft Visual C++ Runtime Error May Display When Installing Certain Printers.
    Here are the differences between the four types of uninstall: 
    1
    Removes the Windows device discovery (Plug and Play) entries from the Windows registry. After running level 1, connect the USB cable to the all-in-one and let Windows try to discover the device again.
    2
    Performs Level 1 and removes the software drivers. After running level 2, run the all-in-one installer and use the "Add a new device" option to attempt to reinstall the all-in-one again.
    3
    Performs Levels 1 and 2 and removes the HP Photo and Imaging software. You must completely reinstall the all-in-one software after running level 3.
    4
    Performs Levels 1, 2 and 3, and removes HP Software Update. You must completely reinstall the all-in-one software after running level 4.
    If you have an HP computer I would not recommend the L4 uninstall as it would also uninstall any other HP software you have installed besides your printer.  
    Definitely continue going through the post I had provided, Re: Error message Microsoft visual c++ runtime library.
    If that still does not resolve your issue, or you cannot uninstall using one of the four methods above, then try the following:
    Uninstalling the Printer Software.
    Clean boot the computer. How to perform a clean boot in Windows.
    Disable any antivirus programs. How to Disable Antivirus in Windows 8?
    Disable any firewall programs. Windows Firewall from start to finish.
    Create a new user account. Managing User Accounts and Logins (Windows 8).
    Reinstall using the HP Printer Install Wizard for Windows.
    Hope this information helps, and have a good day!
    RnRMusicMan
    I work on behalf of HP
    Please click “Accept as Solution ” if you feel my post solved your issue, it will help others find the solution.
    Click the “Kudos Thumbs Up" to say “Thanks” for helping!

  • What antivirus protection should I purchase for my MacBook Pro? MacSecurity.app appeared on my desktop, and I downloaded that. Since then, it has said my computer is infected and pop-ups have been appearing.

    What antivirus protection should I purchase for my MacBook Pro? MacSecurity.app appeared on my desktop, and I downloaded that. Since then, it has said my computer is infected and pop-ups have been appearing.

    You've been infected by a scam trojan.  You don't need any anti-virus software on your Mac.  See the following about getting rid of the trojan.
    Trojan War
    If you discover a trojan program is running on your computer then look to the following information for assistance:
    1. A recent discussion on the Apple Support Communities: MacDefender Trojan.
    2. An excellent site devoted to Mac Malware: Macintosh Virus Guide
    3. Another site for removing MacDefende, et.al.: MAC Defender Rogue Anti-Virus analysis and Removal
    4. A new removal utility - MacDefenderKiller
    Removing strange software can be a task.  The following outlines various ways of uninstalling software:
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash.  Applications may create preference files that are stored in the /Home/Library/Preferences/ folder.  Although they do nothing once you delete the associated application, they do take up some disk space.  If you want you can look for them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application.  In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder.  You can also check there to see if the application has created a folder.  You can also delete the folder that's in the Applications Support folder.  Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a Startup item or a Log In item.  Startup items are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder.  Log In Items are set in the Accounts preferences.  Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab.  Locate the item in the list for the application you want to remove and click on the Delete [-] button to delete it from the list.
    Some software use startup daemons or agents that are a new feature of the OS.  Look for them in /Library/LaunchAgents/ and /Library/LaunchDaemons/ or in /Home/Library/LaunchAgents/.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.  Unfortunately Spotlight will not look in certain folders by default.  You can modify Spotlight's behavior or use a third-party search utility, Easy Find, instead.  Download Easy Find at VersionTracker or MacUpdate.
    Some applications install a receipt in the /Library/Receipts/ folder.  Usually with the same name as the program or the developer.  The item generally has a ".pkg" extension.  Be sure you also delete this item as some programs use it to determine if it's already installed.
    There are many utilities that can uninstall applications.  Note that you must have this software installed before you install software you may need to uninstall.  Uninstallers won't work if you install them after the fact.  Here is a selection:
    AppZapper
    Automaton
    Hazel
    CleanApp
    Yank
    SuperPop
    Uninstaller
    Spring Cleaning
    Look for them and others at VersionTracker or MacUpdate.
    For more information visit The XLab FAQs and read the FAQs on removing software and dealing with spyware and malware.
    After removing all the components of the software you may have to restart the computer to fully disable the software.  This will be the case when removing software that has installed a daemon.  After the daemon has been removed you need to restart the computer to stop the daemon.  Alternatively, you can kill the daemon process using the Terminal application or Activity Monitor.

  • Is Airport a substitute for software firewall?

    I have a Windows PC behind my Airport network. Is my Airport's NAT (or the NAT of any router for that matter) a substitute for software firewall?
    As I understand it, the only thing software firewalls do is block un-used ports, which Airport's NAT already does (since by default it doesn't forward any port except 80 and few other necessary ports to the IPs behind its NAT), and therefore there's no way for hackers to get to them. Please correct me if I'm wrong.
    It'd also be nice to know what ports Airport permit traffics... and how it knows which IP to forward the traffic too (does it act kind of like a proxy?).
    Thanks

    Yi,
    Below is an article that discusses hardware and software firewalls. I hope it helps. The original article can be found here.
    Firewall Debate: Hardware vs. Software
    By Ronald Pacchiano
    November 4, 2003
    I'm about to get my first broadband connection, and I know I need to get a firewall. However, I've been getting some conflicting advice as to what type of firewall I need. Some people tell me I should get a hardware firewall, while others tell me a software firewall is preferred. What's the difference, and more importantly, which is better?
    Good question. The truth is that in a typical home office environment, one type of firewall isn't necessarily better than the other. They are some differences, though, and they can be used together to give you an even greater degree of protection.
    Hardware firewalls are important because they provide a strong degree of protection from most forms of attack coming from the outside world. Additionally, in most cases, they can be effective with little or no configuration, and they can protect every machine on a local network.
    A hardware firewall in a typical broadband router employs a technique called packet filtering, which examines the header of a packet to determine its source and destination addresses. This information is compared to a set of predefined and/or user-created rules that determine whether the packet is to be forwarded or dropped. A more advanced technique called Stateful Packet Inspection (SPI), looks at additional characteristics such as a packet's actual origin (i.e. did it come from the Internet or from the local network) and whether incoming traffic is a response to existing outgoing connections, like a request for a Web page.
    But most hardware residential firewalls have an Achilles' heel in that they typically treat any kind of traffic traveling from the local network out to the Internet as safe, which can sometimes be a problem.
    Consider this scenario: What would happen if you received an e-mail message or visited a website that contained a concealed program? Let's say this program was designed to install itself on your machine and then surreptitiously communicate with someone via the Internet — a distributed denial of service (DDoS) attack zombie or a keystroke logger, for example? And trust me, this is by no means an unlikely scenario.
    To most broadband hardware firewalls, the traffic generated by such programs would appear legitimate since it originated inside your network and would most likely be let through. This malevolent traffic might be blocked if the hardware firewall was configured to block outgoing traffic on the specific Transmission Control Protocol/Internet Protocol (TCP/IP) port(s) the program was using, but given that there are over 65,000 possible ports and there's no way to know which ports a program of this nature might use, the odds of the right ones being blocked are slim.
    Moreover, blocking too many ports would almost certainly adversely affect your ability to use some programs (many games, for instance). Also, some broadband router firewalls don't even provide the ability to restrict outgoing traffic, only incoming traffic.
    Advantages of Software Firewalls
    Now consider what a software firewall might do in the aforementioned scenario. When you first set up a software firewall, you can specify which applications are allowed to communicate over the Internet from that PC. Programs that aren't explicitly allowed to do so are either blocked or else the user is prompted for confirmation before the traffic is allowed to pass. Therefore, it would likely intercept this kind of traffic before it left your computer.
    Another potential scenario where a software firewall would be useful is in the case of an e-mail worm with its own e-mail sever, like the recent "SoBig" worm. Its built-in mail server could attempt to send mail on the valid Simple Mail Transfer Protocol (SMTP) port (25), which would probably pass through the router because of its trusted origin.
    On the other hand, a software firewall could be configured to only allow Microsoft Outlook to use port 25 (assuming Outlook is your e-mail client). Any attempt by another application to use the port would be dropped, or blocked pending user confirmation. For that matter, the application's attempt to use any port would be blocked if the firewall was configured that way.
    By comparison, a hardware firewall that had the ability to filter outgoing traffic might allow you to block most kinds of traffic from a particular PC, but it wouldn't be able to flag you and alert you to repeated attempts to infiltrate your computer.
    One obvious downside to software firewalls is that they can only protect the machine they're installed on, so if you have multiple computers (which many small offices do), you need to buy, install, and configure a software firewall separately on each machine. This can get expensive and can be difficult to manage if you have a lot of computers.
    But the fact of the matter is that software firewalls generally offer the best measure of protection against certain types of situations like Trojan programs or e-mail worms. Speaking of which, a firewall isn't the only protection method available to you. Whether you end up using a software firewall or a hardware firewall, you should always supplement it with anti-virus software.
    A good anti-virus package is just as important as a firewall, and I would seriously suggest that you invest in a good one (I'm partial to both Norton and McAfee myself). However, keeping your virus definitions updated is far more important than which program you use. I cannot stress the importance of this enough. Making sure your definitions are current is absolutely critical to maintaining your protection. Many Anti-virus programs today can be configured to automatically update themselves, so you have no excuse for not maintaining them.
    The bottom line is that with any home-office broadband connection, a hardware firewall should be considered a bare minimum, and supplementing it with a software firewall on one or more computers (and don't forget anti-virus software) is almost always a good idea.

Maybe you are looking for

  • Texts are not showing up after upgrading to version 11

    Could someone help me with why some of my texts are not show up on my Flash project? Before the upgrade, everything is fine. However, after upgrading to version 11, my texts are disappearing. Before (version 10.3.183.7...) After (version 11.0.1.152..

  • Tutorials: How to make a digital photo look like an oil painting in CS3

    Can anyone point me to a tutorial that shows how to do this? I have looked all over the internet - but can't seem to find a decent way to do this and achieve the effect I want! Thanks for any help

  • Low profile

    Hi, My connection suddenly dropped over the last 3 days, I can just about use 1 PC at a time and send emails, browsing takes forever. Before this week I could watch moviesand have 3 kids doing homework etc online, and have my son playing Call of Duty

  • Creation of customar specific Infotype

    Dear All SAP Gurus, I am new in SAP HR. As per company requirement, they want new infotype "Project" should contain information:- 1) start date, 2) End date of Project, 3) Project Name. Please help me to create new infotype step by step. Thanks in ad

  • OLE Object

    dear all, please help....... the application that was built has included MSFlxGrd.ocx (it's a flexgrid) into an Ole container. Besides including this ocx as a deployment package, what other libraries or references does it depend on? Also, does it car