Best iPod conversion programs?  from AVI, etc. to MPEG-4

Some of the programs I've downloaded for trial do not work with Vista Home Premium. And if they do work it will only convery a 5MB file or so.
My question is what is the best program for converting video files for play with an iPod touch while the OS is Vista Home Premium?
Naything is helpful, thank you.

Here is the answer posted by jr20079 - a great program, and freeware:
Heres the super converter
http://www.erightsoft.com/S6Kg1.html
(Scroll down)
Worked perfectly for me!

Similar Messages

  • Creative Vision:M, best video conversion program(freeware or softwar

    I recently got a creative vision:m and love it, but i cannot figure out whether or not my recently purchased "23 Copy DVD Gold Edition" software is worth the fifty bucks i had to pay. Does anyone know of online freeware etc that works well and produces good quality video conversion (esp. from .mp4 to .avi etc.). I know there is a free converter that comes with the program but when i tried it the videos played slightly choppy on my vision:m. When i used .avi format, there was no such problem. Thanks

    Problem apparently solved: Last night, I downloaded and installed the free program, SUPER. My husband has not had a problem so far; been working beautifully! Ravenquille

  • Free conversion software from avi to mp4

    Hi has any body know of a good "free" avi to mp4 convertor that works?

    Hey there,
    I would use Handbrake or Videora (both of which are free). I have had great luck with each.
    http://handbrake.fr/
    http://www.videora.com/en-us/Converter/iPod/
    B-rock

  • Do you want to allow the following program from Unknown Publisher - Program Name: CompMgmtLauncher.exe etc

    Dear All,
    I'm facing some issue in WINDOWS SERVER 2008 R2 on each windows settings its prompting for UAC  like on windows settings (Server Manager, Network Settings, Firewall Settings etc) and in Publisher "Unknown"
    is showing though its windows settings.
    ERROR: "Do you want to allow
    the following program from Unknown Publisher. . . . "
    Program Name: CompMgmtLauncher.exe 
    These prompts only occurs with domain user though its a member of administrator group on that local machine while logging with local administrator user this doesn't happen.
    Thanks
    REGARDS DANISH DANIE

    Hi Danie Danish,
    Would you please let me know current situation of this issue? Have you referred to britishdhez’s suggestion
    and solved it?
    Just additional. Please use anti-virus software to scan the server. Meanwhile, please run
    sfc /scannow command to check protected system files.
    If any update, please feel free to let us know.
    Hope this helps.
    Best regards,
    Justin Gu

  • How do I transfer TV Programs from my iTunes account to my iPod Classic (so I can watch them on my TV)?

    How do I transfer TV Programs from my iTunes account to my iPod Classic (so I can watch them on my TV)?

    Ha, it worked. Thank you anyways!

  • Why can't I sync my playlists from my Ipod Classic program over to my new Ipod touch?

    I'm not able to sync the playlists from my older Ipod Classic program over to my new Ipod Touch. WHen I connect to the program and drag the playlist up to the Ipid Icon they simply disappear and do not sync with the Ipod Touch.

    Was the iPod previous synced to another iTunes library/computer?
    Have you successfully synced from this iTunes library/computer before?
    If so have you done anything like update iTunes on the computer since it last successfully synced?
    Do the songs play in iTunes?          
    Does any media now sync to the iPod?
    Do you have the right boxes checked to sync?
    iTunes: Syncing media content to iOS devices and iPod       
    Try syncing using the manual method                
    Managing content manually on iPhone, iPad, and iPod
    Last, backup the iPod to iTunes and restore from backup

  • From AVI to FLV for Flash MX Professional 2004

    Hi there...
    Let me thank you for your attention...
    This is my issue, I had this Flash MX 2004 Professional when I bought my PC, since then , 6 years ago, I learned how to use it, and recently got a little proyect which turned out to be something very professional, I developed some SWF files at 30fps and recorded them using Camtasia Studio at 40fps, then I created an AVI video file of 400MB +-, I want that those AVIs inside an SWF with my own VIDEO PLAYER, the one me myself developed, play, paused buttons, progressBar, time, etc. Problem is, these AVI files are much too big, I think, for my Flash MX 2004 Professional, they last 1hour 30min.  I cannot upgrade to a modern version of Flash ever since, I have no time to do it, the proyect is already somehow delayed, and almost everything is already done in Flash MX 2004 Professional, I have no ways to convert my AVI files into FLA files, or how place those 1hour-30min AVI files in my SWF, ever since I need those videos besides some other SWF files which I will use to lounch a product will must run just as it it were a DVD, it has its own menu, from the user may select the video they want to see, when they select one, a new window must pop-up with my video and my controlers in it.
    Would you recommend me some programs that may convert my heavy AVI files into more readable FLA files, my Flash MX 2004 Professional does not do it properly... I have no idea why...
    Please I appreciate your advice ever since I just learned everything as I developed my SWF and other files.
    Thanks for your attention

    check out the source code on this page
    http://rodneybauer.com/whiteboard2.htm
    im using flv file...not swf file....and using html5....see below for more info on that...
    you can use other video / sound assets besides flv
    ----------------random notes for you to check out------------
    mobile device video info
    The options actually match those of the most recent iPod Video, which uses H.264 video, up to 1.5Mbps, 640 x 480 pixels, and 30 frames per second with low-complexity AAC audio up to 160 Kbps, 48kHz stereo audio. On the lower end, bandwidths up to 768Kbps, 320 x 240 pixels, and 30 frames per second are also used, known as Baseline Profile up to Level 1.3. Both options can be output with .m4v, .mp4, or .mov extensions.
    iTunes. The simplest way is to use iTunes built-in converter. Apple makes it fairly simple to convert videos to play on the Apple TV or iPod, which are also conversions that can be used on the iPhone. Any video that can play in iTunes, then, can be converted to play on the iPhone, and local files can also be synced directly to the iPhone via iTunes sync conduit, making for a fairly easy process. Two downsides: first, iTunes uses a "lowest common denominator" approach, meaning that there are no customized options for encoding into H.264. Also, some users have reported a bug in the most recent version of iTunes that creates video files with no audio, so don’t toss your original video clips until you’ve had a chance to test out the new H.264-compressed video clips.
    Handbrake. Handbrake is the next most-popular encoding tool for both Windows and Macintosh platforms, and it’s available in a command-line version for Linux. Handbrake does a lot more than just H.264 conversions, but for purposes of this article, Handbrake would be used to transcode an MPEG-2 transport stream or other non-H.264 formats and codecs into H.264 video files. Speed on the product is quite good, and it has the option of a single-profile conversion (like iTunes) or the ability to customize encoding or profiles and then save the tweaks for future encodings. Handbrake has made a name for itself in DVD-to-iPod conversion, so the extension of Handbrake to the iPhone is one that many users trust.
    On any of the last three products, the H.264 files output from these products can be added to the iTunes library for uploading to the iPhone. For those choosing to put their iPhone-compliant videos on the web, it’s also helpful to choose hinted streaming to allow the videos to begin playing immediately rather than waiting for the entire cache to fill.
    http://www.webmonkey.com/2010/05/embed-videos-in-your-web-pages-using-html5/
    So, you want in on the fun? Do you want to use some HTML5 video tags on your site right now? No problem. Fasten your seat belts, as we’re about to take a tour of the wonderful world of HTML5 video.
    Browser Support for HTML5
    First, let’s deal with some very basic stuff, like where this will work and where it won’t. As you can see in the table below, only the latest versions of most browsers support native video playback using HTML5’s <video> tag.
    HTML5 <video> support by browser: Fx 3.0     Fx 3.5     IE7     IE8     IE9     Safari 3     Safari 4     Chrome 3+     Opera 10.5
    Since Firefox 3.0 and IE 7 & 8 lack any support for HTML5 video, you’ll have to come up with a fallback plan for serving video to those users. Depending on what you want to do you, could fallback first to Quicktime and then, failing that, to Flash. That’s the strategy used in Video for Everyone (note that as of v0.4, Video for everyone no longer falls back to QuickTime).
    To keep things simple we’re just going to fall straight from HTML5 to Flash.
    Formats, Codecs and Technicalities
    The next thing you need to understand is what is actually happening when you load and play a video file in your web browser. You’re probably used to thinking of video as .mp4 or .mov files, but unfortunately it’s not that simple. The actual file formats are just containers. Think of them as a bit like a .zip file — they hold other stuff inside.
    Each container holds at minimum one video track and, most likely, one audio track. When you watch a movie online, your video player (most likely Flash) decodes both the audio and video and sends the information to your screen and speakers.
    Why does this matter? Well, because the process of decoding what’s inside the video container file varies. To know how to decode a movie, the player (which is your web browser in the case of HTML5 video) has to know which codec the movie was encoded with.
    When it comes to web video there are two codecs to worry about: H.264 and Theora.
    There’s a huge debate right now among web developers, browser makers and just about everyone else as to which codec is right for the web. We believe that a free, open codec without patent and licensing restrictions is the best solution for the web. Sadly, neither codec exactly fulfills that dream, so for now, let’s just skip the whole argument and be practical — we’re going to use both codecs.
    Why? Well, have a look at the table below, which shows which codecs work where and you’ll quickly see that there is no one-size-fits-all-browsers solution. Only Google Chrome can play both H.264 and Theora.
    Codec support by browser/platform:     Firefox     Opera     Chrome     Safari     IE 9     iPhone     Android
    Ogg Theora    
    H.264  
    So, you may be thinking … if HTML5 video doesn’t work in IE7 or IE8 and it means I’m going to have to encode my videos twice, then why bother at all? Well, the best answer is simple: mobile users. If you want iPhone and Android users to be able to see your video, HTML5 is the only way to do it — Flash support is coming to Android sooner or later but for now HTML5 is the only option, and we all know Flash doesn’t run on the iPhone or the iPad.
    The HTML5 Code
    Here’s how to actually embed your videos. First, we encode video in both .ogv and .mp4 containers. Encoding video is beyond the scope of this article, so instead we suggest you check out Mark Pilgrim’s online book Dive Into HTML5, which has a whole chapter devoted to understanding video encoding. Pilgrim’s encoding suggestions use free software to get the job done, and in the end you’ll have two files — one .mp4 and one .ogv.
    Now it’s time to unleash those movies in pure HTML glory. Here’s the code:
    view source
    print?
    1    <video width="560" height="340" controls>
    2      <source src="path/to/myvideo.mp4" type='video/mp4; codecs="avc1.42E01E, mp4a.40.2"'>
    3    <source src="path/to/myvideo.ogv" type='video/ogg; codecs="theora, vorbis"'>
    4    </video>
    Yes, that’s it. What we’ve done here is use the <video> tag to specify the dimensions of our video, and to denote that we want to use the browser’s default controls. Then, within the video tag, we’ve added two <source> elements which link to our video files.
    The “type” attribute of the <source> tag helps the browser understand which file it should load. It’s a bit of an ugly chunk of code that needs to specify the container format, the video codec and the audio codec.
    In this case we’ve assumed standard .ogv and baseline encoded H.264 video as per Pilgrim’s tutorial. See the WHATWG wiki for more information on which video types you can specify.
    And there you have it — native web video, no plugins required.
    Dealing With Everyone Else
    What about IE7, IE8 and older versions of just about any other browser? Well, for those users, we’ll fall back on Flash. To do that, we just use an <embed> tag within our video tag:
    view source
    print?
    1    <video width="560" height="340" controls>
    2      <source src="path/to/myvideo.mp4" type='video/mp4; codecs="avc1.42E01E, mp4a.40.2"'>
    3    <source src="path/to/myvideo.ogv" type='video/ogg; codecs="theora, vorbis"'>
    4      <object width="640" height="384" type="application/x-shockwave-flash"
    5            data="path/to/swf/player.swf?image=placeholder.jpg&file=path/to/myvideo.mp4">
    6            <param name="movie" value="path/to/swf/player.swf?image=placeholder.jpg&file=path/to/myvideo.mp4" />
    7        </object>
    8    </video>
    Now any browser that doesn’t understand the HTML5 video tag will just continue on its way until it hits the object tag, which it should understand (note that the order, mp4 before ogv, is important for iPad support — Apple requires that mp4 be the first video file).
    Of course for this to work you need a Flash video container. JW Player is one popular example, or you can roll your own using Adobe’s tools. Also remember that we still haven’t handled the case of an older version of Firefox with no Flash plugin installed (maybe your users are surfing your tubes with an outdated Linux machine). You can always add good old text-based links to the video files as a catch-all fix for anyone who can’t, for whatever reason, see either the HTML5 or Flash versions.
    Conclusion
    Embedding HTML5 video isn’t significantly more difficult than using Flash, especially if you’ve been using H.264 video files in your Flash player — which is exactly what YouTube has done with its HTML5 beta.
    While we’re concerned about the licensing and patent requirements of H.264, it isn’t hard to notice that if you skip Theora and make all non-H.264 fall back to Flash, you’ve still saved yourself a considerable encoding headache. In fact, that’s probably the best practical argument against Mozilla and Opera’s refusal to support H.264.
    If you’d like to use some of the more advanced aspects of HTML5 video, be sure to check the SublimeVideo player, which offers very nice JavaScript-powered set of custom controls. Also be sure to have a look at Video for Everybody, which makes for more complex code but handles just about every use case you could imagine. And there’s a handy Video for Everybody WordPress plugin as well.
    http://camendesign.com/code/video_for_everybody

  • Suggestion for IDoc creation and conversion program

    Hi Experts,
    I want to send the data from SAP to Non-SAP System. The Non-SAP System needs the text file with delimiter.
    So which way is better to send the data.
    Via a IDOc with ALE      OR
          Just download the file by the program and send it to Non-SAP System.
    Please suggest me, which option is best and cheapest and need the advantage and disadvantage for both the ways. And also how many hours will took to implement each scenarios.
    As per my knowledge, The Idoc with ALE will took 3 Days to build the setup and prepare the IDoc and Conversion program will took 1.5 days to prepare the file.
    Note:There are maximum 8 fields needs to send to the Non-SAP System from SAP. So not much information.
    Thanks in Advance,
    Warm Regards,
    Vijay

    Hi Gangisetty,
    For less no. of fields transfer there is no need at all to go with ALE.
    If there is some Standard Master Data to be transfered then IDOC comes very handy.
    But if requirement is to fetch data from different tables and some formatting before sending to Legacy System then you should go with conversion Report which will fetch all required data, format or manipulate as per requirement and then using outbound control it can send the flat file Common Shared FTP folder.
    Using Conversion Report which will required less development time and you can schedule it as per bussiness requirement.
    Using ALE-IDoc may consume some time as you need to create Partner Profile, Logical System etc and it might be required to have PI(XI) as middleware for some internal formatting etc.
    Though, Both ways are possible it's upto your call which way to go.
    As per info given by you i would suggest to by Conversion Report Method.
    Regards,
    Vivek

  • Conversion program for the open sales orders

    Hi ,
         How to proceed for writing a conversion program for open sales order ??
    Please share if 've any document or idea.
    LSMW object: 0090, Method: 0000
    Business Object : BUS2032, Method : CREATEFROMDAT2,
    Message Type: SALESORDER_CREATEFROMDAT2
    Basic Type: SALESORDER_CREATEFROMDAT202
    Regards,
    Jyoti Shankar

    Dear Saso,
    I think, instead using Report: VA05/ VA05N; its better to use Report: VL10C
    In this report, you will get all the Sales Orders along with Materials - relevant for open delivery, along with Open Qty. and various other options can be selected from "Change Layout - (Ctrlt+F8)".
    Best Regards,
    Amit
    Note: Don't maintain any Field-Entry (while executing the Report: VL10N; in order to list all Sales Orders. But, if you want to list Sales Orders based upon some criterias, maintain the Field-entries, as reqd.

  • How do you uninstall a program from mountain lion osx

    Hi first time on mac forum
    my question is being new to imacs how do you uninstal a program from an imac running osx mountain lion. And of course get rid of the icon for that program from launchpad
    thanks

    What app do you want to uninstall? If it's an app that is provided by the installation of OS X, e.g. Safari, Reminders, Notes, Mail, etc. - there are many others - they shouldn't be uninstalled.
    If it is an app that was downloaded from the Mac App Store, in Launchpad click and hold its icon until it jiggles. Click on the 'x' in the corner to delete it.
    If it's an app that was installed using an installer program it is always best to see if an uninstaller is available from the developer of the app (there is often an uninstaller bundled in with the installer package).
    Other third party apps that are simply drag-installed into the Applications folder - like Skype, for example - can be just dragged to the Trash and will be deleted when the Trash is emptied.

  • UTF8 encoding Issue in the conversion program

    Hi all,
    Our requirement is to get data from a file stored in application server and update the SAP database.
    The flat file has some special characters such as u2122, ® etc.
    In the conversion program, we are using the encoding format as UTF-8. This means it will only handle UTF-8 file ( byte order mark (BOM) 8).
    After running the conversion program, we came to know that the special character u2122 is getting replaced wtih #.
    And when we modified the format of flat file to UTF-8 instead of ANSI or UTF-16 or 32.
    We were able to get the trademark symbol in correct look in addition with other special characters.
    Since this involves a manual of processing modifying the flat file to UTF-8 format and then running the conversion program for getting all the special characters in good look, we are thinking to make this process "automatic" in the conversion program itself i.e. whatever the format of flat file may be, we would convert that file to UTF with BOM 8 format and then go ahead with the next updating processes.
    So, can anybody let me know if we can make this an automatic process?  Can we convert each non UTF-8 record read from flat file to UTF-8 record in the program itself by any means and then update that record in the database? Is there any FM for this? Or can we convert the flat file to UTF-8 file programmatically irrespective of the original file formats?
    Any inputs on this would be greatly appreciated.
    Thanks,
    Shamim

    Sham,
    Try with the class CL_BCS_CONVERT and the method STRING_TO_SOLIX.
    Regards,
    Kiran Bobbala

  • Ripping audio from AVI

    Hi,
    I wasn't sure where to post this question. I didn't see a forum that looked apropriate, and since I'm using an iMac G5 I thought this one was as good as any other. So, what I'm after is software that will allow me to extract audio from AVIs, MPGs, etc. Any suggestions?
    Thanks,
    Andrew

    Hi,
    Just wanted to follow up on my original post. I first tried using a freeware AVI spitter called Explicit, then importing the 9-12 minute pieces into iMovie. There was a few problems with this method, though. First, it took around 15 minutes to import one 9-12 minute AVI segment. Second, after it was imported and converted into DV format (the format iMovie uses) it was something like a gig in size. Lastly, the audio, the thing I was after, was completely mangled. So, I downloaded Divx Doctor 2, converted the AVI, and then was able to use Peak (a great audio editing program by BIAS) and was able to extract all the audio and save it as AIFF. I could have actually saved it to any one of several formats, at 16 or 24 bits, for those who aren't familiar with the program. By the way, you can convert more than AVIs with Divx Doctor 2.
    Thanks so much for the link! Hopefully this info will help someone else looking for to get samples from movies.

  • Bad performance of video convertion from .avi to .mp4

    I use QT Pro v7.0.3 to convert avi video to mp4. The mp4 quality is bad. I am unsure if mp4 movie is bad in quality or QT Pro is bad in convertion. As iPod selects to support mp4 video, the quality should be of an acceptable one, otherwise, it just damages iPod reputation. It is my first time to watch mp4 video but the impression is not to bother at all - worse than vCD. Is there any one using mp4 video? Any comments!
    Thanks,
    Ray

    I set my QT avi to mp4 conversion to 2500 kbits/sec, current image size, current frame rate, and it's still worse than the original avi. FAR worse.
    I've given up on encoding my avi's to play from my iPod. It just stinks, so I'm not sure what to tell ya... just that you are not alone in your observation. They look OK for play on the iPod, but playing from the iPod to anything else, like say a TV, it's not worth it. It seems to be better to just play the avi via some other means on the TV, because the conversion is seriously sub par.

  • Data conversion program

    can u give idea about data conversion program for inventory management program stocks,which reads legacy extract file and the valuation master file from pc gets issue storage location valuation details and output a file with these details
    regards,
    phani

    Hi Phani,
    Make sure that the data from legacy system is stored in a TXT file in a specific format.
    In SAP, create a program to upload the file using FM GUI_UPLOAD. The structure of the internal table will be same as that of the file.
    Upload the data and update the necessary tables.
    Best regards,
    Prashant

  • Does an mac air need any internet/security protection from viruses etc. ?

    I was wondering does the mac need any interent security such as kaspersky or norton installed for protection? or is there already protection from viruses etc on the software installed? Thanks

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.  3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.  The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for