Anybody know about the Window Presentation and Google Update Plugins?

Do you have the Google Update and Windows Presentation plugins? I didn't add them, but they are there and weren't removed as incompatible when I updated from FF 7 to 7.01. So, I haven't disabled them. The Windows Presentation plugin hasn't been updated since 2008 and has no updates! Neither does the Google Update plugin.

Do you have the Google Update and Windows Presentation plugins? I didn't add them, but they are there and weren't removed as incompatible when I updated from FF 7 to 7.01. So, I haven't disabled them. The Windows Presentation plugin hasn't been updated since 2008 and has no updates! Neither does the Google Update plugin.

Similar Messages

  • Since the last update Yosemite 10.10.2 , Safari returned to the previous presentation and google chrome moved ????? ( Mac Book Pro) , you can set the update uninstall and reinstall ? thank you

    since the last update Yosemite 10.10.2 , Safari returned to the previous presentation and google chrome moved ????? ( Mac Book Pro) , you can set the update uninstall and reinstall ? thank you (I'm French and my English is not mastered,sorry)

    Try running the combo update.
    10.10.2 Combo Update

  • What to do about Microsoft Office 2003, Windows Presentation Foundation & Google Update.

    I am not sure what to do about the following 3 third-party plugins. It appears that the Windows Presentation Foundation plugin "has a major security vulnerability that can be exploited by malicious websites as described in the Firefox Article "How to enable and disable Windows Presentation Foundation." It seems that the easiest way to deal with this plugin is to disable it via the add-ons manager. My question do the other two plugins pose security risks - should I disable them. I have tried to find additional information on all three plugins and cannot seem to ascertain whether they need to be updated or if, in fact, there are updates for these plugins. I am not sure if they are even compatible with Firefox, perhaps they been added to the Mozilla Add-ons block list. At any rate, any assistance would be greatly appreciated!
    The three plugins in question are:
    Microsoft Office 2003 Unkown ? Research Office plugin for Netscape Navigator plugin
    Windows Presentation Foundation Unknown ? Research
    (WPF) plugin for Mozilla Browsers plugin
    Google Update Unknown ? Research
    Google Update
    Thank you in advance.
    GAMKRTWCA

    hello, i have those plugins on my computer too but have always kept them disabled because i'm not exactly sure what functionality they offer - i have never encountered any site that would depend on them or would cause problems without them, so you can likely just disable them without any harm...

  • Anybody know about a window in Safari about Immediate Threat, ostensibly from Norton?

    On frequent occasion, my wife's MacBook Pro while running Safari stops with a window alerting her to an immediate threat from trojan infections. The window looks like it's from Norton, but I think that's not true. BTW, Norton is not installed on her machine.
    Has her computer been infected? Any suggestions for solution?
    Thanks so much!

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can read it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB com.apple.AirPortBaseStationAgent 464843899 51 );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */   /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;5p;6p;8p;12p;' ' {sub(/^ +/,"")};NR==6;NR==13&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { print "'${p[41]}'";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$|'${p[41]}'/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/ { next;} /(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { print "'${p[41]}'.plist\t'${p[42]}'";if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/ { next;} /%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]" "$1;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' '" L*/P*/*loginit*' 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,In,iTu,Keyb,Mail/B,P*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t /S*/L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' -i4TCP:0-1023 com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;A2 0 $((N1+1)) 2;C0;A1 0 $N1 1;C0;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D13 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • Please tell me how i know about the factory unlock and Jailbreak unlock iphone4

    I have purchase an iphone 4 from Los Angeles and the saler has confirmed that this is Factory unlock serial number of the iphone is QR1XXXXTA4S VERSION OF THE PHONE IS 4.3.5.
    This is working here at Pakistan with local carier fantastic.
    I would like to know that if I will go for update and this will not factory unlock the iphone will lock during the update what is the procedure to identify Factory unlocked and Jailbreak unlocked iphone4
    Imran
    < Edited By Host >

    It is against the TOS to discuss jailbreaking on the forums. Please remove your post with your email address. It has already been reported.

  • Does anyone know about the Fakeflash virus and how to secure a patch for it?

    Hi.  Read about the Fakeflash, or Flashback, virus today.  Have been trying to find my UUID number on my old iBook so that I can tell if my computer has already been infected, but can't seem to locate it.  (Seems as if old versions don't list it on the About panel.)  Also, can't seem to find the place to download Apple's patch for the security breach anywhere.   Anyone have any info?  Thanks, Chris

    Two Helpful Links Regarding Flashback Trojan
    A link to a great User Tip about the trojan: Flashback Trojan User Tip
    A related link in the tip to a checker: Malware Checker Dowload Link
    A Google search can reveal a variety of alternatives on how the remove the trojan should your computer get infected. This can get you started.

  • Anybody know about the following error message? E_AUTH_BAD_DEVICE_KEY

    Hi i am getting the error message above when trying to activiate digital editions and link with my ereader.
    I registered with adobe today, plugged the ereader in and it came up with this message after entering my log in details. I tried registering again with a different email address but same message again.
    I have tried to phoen adobe but the automated number asks for a serial number which i cant find on digitial editions anywhere. and i cant see any kind of email ro chat help available either.
    any help greatly appreciated!
    Thanks

    Hi Ginger!
    Unfortunately, this 'ereader' stuff is more than plug-and-play.  It starts
    with techy stuff and then continues with some more techy stuff until you're
    reading the ebook.  The message you're getting tells me that something is
    messed up in the installation of either your ereader or your copy of ADE.
    You didn't tell us what kind of ereader you're using or your computer type
    and operating system.  I can't 'assume' what ereader your have, but let me
    'assume' that you've got a PC running Windows 7.  Here goes....
    If the ereader isn't registered, Adobe may generate the message you're
    getting. You should make sure that your ereader has been registered with
    its website.  For simplicity, use the same ID and password for this as you
    used to register with Adobe when you downloaded and installed ADE.
    Sometimes when you do this, the ereader website updates the software
    located on the ereader (not ADE - that's on your computer).  And some of
    these updates cause problems later on.
    Once you have done the registration bit, you 'should' be ready to download
    ebooks to your computer via ADE, and then transfer them to your ereader.
    You go to the ebook website and follow their directions for downloading.
    During that process, the website should activate ADE on your computer
    automagically, and then you'll be asked what to do with the ebook: 'open'
    it or 'save' it.  I suggest saving it.  If you choose 'open', the ebook
    will be downloaded, but ADE will open it to read on your computer, and the
    ebook won't appear in your library.  If you choose 'save', then the ebook
    will be saved and entered in your ADE library.  That's the basic process.
    Using the ereader isn't supposed to be hard either.  You would plug it into
    your computer and make sure that the computer 'sees' it attached.  The
    ereader should have a drive letter if you display your computer's
    information using My Computer or Windows Explorer (NOT Internet Explorer),
    and the ereader should display a message saying that it's connected to the
    computer.  After this is done, you can start ADE.  During its startup
    process, ADE will look for attached ereaders, and when it is finished
    starting up, it will display the ereader on the bookshelf part (the left
    panel) of its Library view.  Now the easy part.  You just drag and drop the
    ebook you want to transfer from your ADE library to the ereader on the
    bookshelf.
    Adobe help is not necessarily helpful.  You don't have a serial number
    because ADE is a free product.  The Adobe tech's sometimes don't want to
    help you because ADE is a free product, and will tell you that you'll have
    to pay for service.  Baloney.  If you get someone on the phone or in a chat
    session, tell them that you are a Digital Editions user, and that help for
    this product is free from Adobe.
    Hope this helps!
    =============

  • Want to know about the AirPort Express and AirTunes

    I have been contemplating purchasing an AirPort Express to stream music from my bedroom into the entertainment room in a 4 bedroom apartment. I have a wireless G D-link router which could be better but its not going to get better any time soon. As far as AirTunes goes, i have been researching it but still have questions on how it works exactly. Also, is it possible to play music through the speakers that are currently hooked up to my computer and through the stero in my living room simulaneously with this device.

    So i have the airport express and i want to use internet at the same time as streaming my music to my stereo. I also have a router that i normally use for internet. My problem is, how do i use them at the same time because the airport run's or the router runs not both. I tried running a ethernet cord from the router to the airport express, and i can now recieve internet and stream music, but i want to be able to use my router instead of the express. also if i can't and have to go through the express, can i password protect the internet connection because i have no idea how to use settings for this device?

  • What should I know about the Trustor Rapport malware protection update?

    I received a message to allow update of something trustor rapport malware protection. I did not know if I had it or if I should allow it to update. Anyone know about this?

    Trojan War
    If you discover a trojan program is running on your computer then look to the following information for assistance:
    1. A recent discussion on the Apple Support Communities: MacDefender Trojan.
    2. An excellent site devoted to Mac Malware: Macintosh Virus Guide
    3. Another site for removing MacDefende, et.al.: MAC Defender Rogue Anti-Virus analysis and Removal
    4. A new removal utility - MacDefenderKiller
    5. And to protect against a recent variant, MacGuard.
    Before you delete anything, we need your help. Some AV folks in our community need to analyze these files in order to protect others. Before you delete anything please consider doing the following:   Upload either the original .zip file or the MacGuard application to http://www.VirusTotal.com.  If either is not detected by ClamXAV, then also upload it to http://cgi.clamav.net/sendvirus.cgi.   If you are uncomfortable doing this for any reason and can determine the URL of the site where you got it please send the link to [email protected].
    Removing strange software can be a task.  The following outlines various ways of uninstalling software:
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash.  Applications may create preference files that are stored in the /Home/Library/Preferences/ folder.  Although they do nothing once you delete the associated application, they do take up some disk space.  If you want you can look for them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application.  In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder.  You can also check there to see if the application has created a folder.  You can also delete the folder that's in the Applications Support folder.  Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a Startup item or a Log In item.  Startup items are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder.  Log In Items are set in the Accounts preferences.  Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab.  Locate the item in the list for the application you want to remove and click on the Delete [-] button to delete it from the list.
    Some software use startup daemons or agents that are a new feature of the OS.  Look for them in /Library/LaunchAgents/ and /Library/LaunchDaemons/ or in /Home/Library/LaunchAgents/.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.  Unfortunately Spotlight will not look in certain folders by default.  You can modify Spotlight's behavior or use a third-party search utility, Easy Find, instead.  Download Easy Find at VersionTracker or MacUpdate.
    Some applications install a receipt in the /Library/Receipts/ folder.  Usually with the same name as the program or the developer.  The item generally has a ".pkg" extension.  Be sure you also delete this item as some programs use it to determine if it's already installed.
    There are many utilities that can uninstall applications.  Note that you must have this software installed before you install software you may need to uninstall.  Uninstallers won't work if you install them after the fact.  Here is a selection:
    AppZapper
    Automaton
    Hazel
    CleanApp
    Yank
    SuperPop
    Uninstaller
    Spring Cleaning
    Look for them and others at VersionTracker or MacUpdate.
    For more information visit The XLab FAQs and read the FAQs on removing software and dealing with spyware and malware.
    After removing all the components of the software you may have to restart the computer to fully disable the software.  This will be the case when removing software that has installed a daemon.  After the daemon has been removed you need to restart the computer to stop the daemon.  Alternatively, you can kill the daemon process using the Terminal application or Activity Monitor.
    That most likely is just a rename of the trojan known as MacDefender. Do not download it or allow it access to your computer.

  • Any Ideas About the Windows 8.1 Pro update

    Hi,
      Does anyone have any idea what is going on with the Windows 8.1 Pro free update? Why is it not available at the moment?
    Thank you.

    Hi,
    Windows 8.1 update is available for Windows 8.1 Pro, it can be automatically installed in your system if you have turned on install important updates automatically, you can check whether KB 2919355 is listed under the installed updates, if it is not, then
    please check for updates, install all important updates, particularly KB 2919442, restart your PC, and then check for
    KB 2919355 again.
    http://support.microsoft.com/kb/2919355
    Yolanda Zhu
    TechNet Community Support

  • 5 Things MSPs Need to Know about the Windows 10 Upgrade Launch This Wednesday

    This Wednesday, July 29th, Microsoft will officially launch their new Windows 10 operating system for both business and home users.If your non-enterprise end users have either Windows 7 or Windows 8.1 installed on their devices, they are eligible for a free upgrade up until July 29, 2016 - a full year after upgrading. As MSPs, however, youmay be hesitant to immediately roll out Windows 10, since it likely still has bugs to be corrected. Unfortunately, with its release date imminent, there's been widespread anxiety about clients receiving upgrade notifications and worse, installing Windows 10 without consulting their IT department, IT solutions provider, and/or MSP. If you've been uneasy about Microsoft's latest launch and want to know how to best prepare yourself for July 29th,keep reading!How have you been preparing for the release?...
    This topic first appeared in the Spiceworks Community

    Let's get physical (or virtual)!Hey SpiceHeads, this week's theme forOn the Air (Wed. 10am CT)is "Thin is In!"Ok so we're really talking about thinclients and VDI, but getting in shape is important for everyone, including your IT environment.What area in your IT environment or department could be in better shape? And what exercise program/diet/weight loss gimmick would you prescribe?Does that tangled network cable mess of blue spaghetti in your data closet need to go on a low-carb diet?Does your storage solution need to get off its fat, lazy NAS?Wish you could send angry users to yoga (or boot camp) before they submitted tickets?Let us know below and you could win a swag bundle (below) fromHP! Then don't forget to check us out on7/29 at 10am CTand find out who the winners are.

  • Anybody knows about the nimbuzz video version in mac?

    I need a software for video calling from mac to windows 7 .i am using Nimbuzz in windows 7 . but in mac no video option .Also Hotspot shield is not working in oman. Anybody can give me a solution

    Hi
    Well these are used in Requirement in OutputDetermination
    Where both KOBED & KOBEV are subroutines and they are same only for one or two requirements but if you see all the requirements they are not same.
    KOBEV is used for adding requirements related to header conditions.
    KOBED is used for adding requirements related to both header and item conditions.
    If you put your routine in KOBED that is good enough.
    But if your requirement checks only header fields (like customer, order type etc), it is recommended to use KOBED for performance issues.
    OSS Note 156230 contains a very clear and thorough description of this function.
    Hope this helps and solves your query
    Cheers

  • Did anybody know about the OMR(Optical mark reader) tools.

    I have to read a image file using OMR(Optical mark reader).Did any third party tools for java r available in market? Plz help me....

    Hi Karsten,
    Some of my experience with stills is discussed here:
    http://discussions.apple.com/thread.jspa?threadID=2331300&tstart=120
    This mainly covers the "freeze frame" problem with loss of colour and definition/brightness. I use the "video adjustments" tool to match the still with the original video frame.
    Like you, I'm generally happy with the quality of stills obtained from iMovie '09. Other than "freeze frames" I import stills from the Events into iPhoto for enhancement/adjustment then either prepare slideshows in iPhoto or re-import to iMovie for slideshow preparation etc.
    None of this is probably that relevant to your question, but it gives me an excuse to ask you - what happened to your Mac Mini, or have you turned to the dark side?
    Incidentally, thanks for all your invaluable help over a lengthy period - keep up the good work!
    John

  • Does anybody knows about the 'requirement' in the output type.

    Hi,
    When i check the code of those 'requirement' for the output type.
    Found there existed FORM <b>KOBED</b>_9XX and FORM <b>KOBEV</b>_9XX.
    sometimes the same code in those 2 Forms.
    My questions, what the difference between KOBED and KOBEV??
    Thanks!!

    Hi
    Well these are used in Requirement in OutputDetermination
    Where both KOBED & KOBEV are subroutines and they are same only for one or two requirements but if you see all the requirements they are not same.
    KOBEV is used for adding requirements related to header conditions.
    KOBED is used for adding requirements related to both header and item conditions.
    If you put your routine in KOBED that is good enough.
    But if your requirement checks only header fields (like customer, order type etc), it is recommended to use KOBED for performance issues.
    OSS Note 156230 contains a very clear and thorough description of this function.
    Hope this helps and solves your query
    Cheers

  • I need to upgrade memory slots on my Mac mid 2010 up to 4 GB module which is currently 2GB with two different 1GB memory  slots.Is it compatible and would like to know about the cost?

    I need to upgrade memory slots on my Mac mid 2010 up to 4 GB module which is currently 2GB with two different 1GB memory  slots.Is it compatible and would like to know about the cost?

    this sub forum is about running windows on macs maybe you should try
    https://discussions.apple.com/community/notebooks/macbook

Maybe you are looking for

  • Pages 08 on macbook compatible with 09 on iPad?

    I have pages 08 on my macbook and 09 on my iPad. I modified an 08 created file on my ipad now it won't open on the macbook (pages08). why not?

  • Event trigger in sap pi 7.3.1

    Hi I looking standard approach on below requirement . 1.  Requirement :  All failed messages needs to post to JMS adapter using Event trigger , when message failed in SAP PI. 2.Audit log : In SAP 7.3.1  I need to post message audit log to JMS adapter

  • Monitor flickering blue? (Not from Display)

    My Macbook '09's monitor is flickering blue.  It's usually only the top right corner, 2x1", that's tinted blue. Sometimes it'll extend over to 4", sometimes it'll fill the whole screen (it usually does this when I push the monitor all the way back, b

  • AP 1231G strange problem

    Hi, I'm troubleshooting an Aironet 1231G, Ios version 12.3(4)JA: 1 ssid, no guest-mode. If i use no enciption or authentication I CAN'T CONNECT the AP. Then if I use WPA TKIP, I CAN connect the AP. Any one can help me thanks FX

  • Encoding H.264 for flash

    I'm new to flash, but want to use it's ability to play H.264 quicktimes I'm used to using for other web video. I know I have certain audio codecs I must use, but is there a data rate limit as well. My files are 640x360, 24 fps. I will be offering the