Bridging mac mini to xbox 360 to use xbox live...HELP!

i've done this once before with a previous router i was just trying out and it worked great. however, i purchased a wireless router and cant get it to work again. i've found all the instructions that the internet has to offer when it comes to using your mac as a bridge to get on xbox live...the fact that i've done it successfully hopefully shows that. my problem now comes in the DNS stage...it always fails.
i think the problem is this...in the termminal when i type in ifconfig en0...the inep i get is 192.768.2.1...but when i check to see what my router IP is...it's the same. is this what is causing my problem and not letting me get on xbox live?
when i go to my xbox settings...under IP i know its working because on the xbox live test it passes every time...and just fails at DNS which is where i'm supposed to put my router IP which happens to be the same as my normal IP.
is this the problem?
i called my ISP and they said there's nothing they can do about it...they cant change my router IP. i hope you guys can help. i really want to get on without having to spend 50*100 bucks. thanks.

okay...here's my complete set up. i have my mac mini which is connected to my belkin wireless connection which is upstairs. the belkin router is plugged into my cable modem (road runner if that matters). i pick up a full signal on my mini. from my xbox360 to my mac mini, i have an ethernet cable connected.
when i type in ifconfig en0 in the terminal, the "inet" i get is 192.68.2.1. this is to be used in the IP section of connecting to xbox live as i understand. actually, each time i try to connect, it passes all of the IP tests.
the problem comes with the DNS. from what i understand, what i'm supposed to put in the DNS section of my xbox live is the number i get when i type in DIG in the terminal and then scroll down to where it says server. the number i get there is also 192.168.2.1.
i type that into the dns and it does not work.
my firewall is off...my sharing is on. i'm not sure what to do.
to make sure that my xbox is working, i plugged in my dell laptop and bridged the connections and it worked great. but i need it to work with my mac...at least i want it to. thanks.

Similar Messages

  • I just purchased a new mac mini and would like to use my old dell monitor. I tried a HD to VGA adapter converter,it plugs in, but nothing shows on the monitor. Any suggestions? Thanks

    I just purchased a new mac mini and would like to use my old dell monitor. I tried a HD to VGA adapter converter,it plugs in, but nothing shows on the monitor. Any suggestions?

    What do you mean by "HD to VGA adapter converter"?
    Do you mean have an HDMI to VGA adapter connected the the Mini's HDMI port?
    Or maybe you plugged n the the included HDMI to DVI adapter and then connected a DVI to DVI adapter?
    In either case that will not work since VGA is analog and the Mini's HDMI port is digital only.
    You need to purchase a mini displayport to VGA adapter. It plugs into the Mini's Thunderbolt port.
    http://store.apple.com/us/product/MB572Z/B/mini-displayport-to-vga-adapter
    Make sure you get a name--brand one. I purchased some el cheapo, no-name ones and they did not work

  • Just started up my Mac Mini out of the box, using a USB windows keyboard, it will not recognize letters so I am unable to enter serial number.  Anything I can do to get the mini mac right out of the box to recognize the windows keyboard?

    Just started up my Mac Mini out of the box, using a USB windows keyboard, it will not recognize letters so I am unable to enter serial number.  Anything I can do to get the mini mac right out of the box to recognize the windows keyboard?  Do I have to buy an Apple Keyboard to get it to work right out of the box?

    Is this a normal USB keyboard or is there anything specialized about it? Does this keyboard require you to install any special software to use it on a Windows box? Or is it usually a plug & play keyboard?
    Normally if a Mac does not recognize a keyboard it asks you to press certain keys to identify the keyboard. What is happening on screen with this keyboard? What serial number are you referring to?

  • Hi Guys, I have a problem with Importing Pictures onto my Mac mini with Lion installed by using a Card Reader, What is the problem here so I can get Pictures onto my Computer. ,

    Hi Guys,
    I have a problem with Importing Pictures onto my Mac mini with Lion installed by using a Card Reader,
    What is the problem here so I can get Pictures onto my Computer. ,

    Hi Noob Søren
    There are a few things that are confusing in your question.
    As far as I know, you dont have to install Time Machine on this OS as it is already installed for you. You only need to connect a hard drive to your computer via firewire or usb, click on the Time Machine icon, Open Time Machine Preference in the drop down menu and select a disk: your connected hard drive.
    You can of course reformat this connected device, partition it into a few volumes to organise data if you so wish.
    I find it strange that your mac's hard drive is divided into two volumes... perhaps this was created through bootcamp?
    You can access the configuration of your hd through Applications/Utilities/Disk Utilities.
    Clicking on one of the icons on the right hand panel will bring the details of the contents of your hardDrive and volumes. From there you can decide to erase a partition, reformat etc....
    If your hd contains more than one volume, and one of them is empty, you could decide to remove it. Back up all your important data before doing so.
    Hope this helps
    WN

  • Should I ok "this computer's local hostname Irma-Mac-mini-local" is already in use on this network. The name has been changed to Irma2 Mac-mini 2-local

    Should I ok this message-this computer's local hostname Irma's Mac-mini-local is already in use on this network. The name has been changed to Irma's Mac-mini-2local

    Don't think this is a conflict with IP Addresses or computer names
    = DHCP hangover when computer renews DHCP lease
    There is no actual other computer
    It just appears that way when reconnects so creates new -2 computer name
    What types of names do you use your computers ?
    Whether you name them after quantum particles or the romantic poets...
    They will each start to be appended with "-2" then "-3" etc if you auto configure network settings from Airport Router  DHCP service and you have this Change computer name issue where pop up window states name is already being used on your LAN
    As stated previous post you can reset the computer name in SysPrefs / Sharing / Edit button
    And restart Router or renew all DHCP leases (if persists in not allowing original name)
    Can now press Edit and reset name of choice
    But for Fix see link above

  • Does 2012 mac mini get very hot when using logic pro

    does 2012 mac mini get very hot when using logic pro

    Are you saying that your machine does or is it an enquiry before buying ? I use a 2011 server model - well, it does get hot over a period of time, but I've very rarely heard the fan kick in, its a surprise when it does. As far as I know the casing has been specifically designed to conduct heat, rather than having any fancy grilles and so on, being so small in size. I haven't found it to be cause for concern, if that's any help.
    Slidersson is in need of more cold showers.

  • How to clone 40 mac mini at the same time using network clone (like Ghost)

    how to clone 40 mac mini at the same time using network clone (like Ghost)
    Any Ideas ?
    Thanks

    Rather than a 100% identical clone to 40 Macs, I suspect you want the same basic image to be loaded on to those 40 Macs but will require some individualisation so that for example each has a unique computer name.
    NetRestore and System Imaging Utility can do this but a lot of people including myself prefer to use DeployStudio which has more capabilities. See http://www.deploystudio.com
    DeployStudio can be used to like NetRestore to restore an image to multiple Macs at the same time which is like multiple people downloading at the same time, but it can unlike the standard NetRestore also be configured to use multicast traffic which is more like a TV broadcast whereby multiple people receive the same transmission at the same time. This can be more efficient for imaging larger numbers of computers at the same time. For example 1Gbps shared between 40 computers is only 25.6Mbps each, but if you multicast a single transmission of 100Mbps to 40 computers then all 40 can listen to it at the same time and still be receiving 100Mbps even on the same network connection.

  • Mac mini gets green tinted display severel times. Help... :(

    I just bought a new 2,3 ghz Mac Mini 3 days ago to use as a mediacenter.
    I have it set up using my Phillips Tv as screen with a HDMI cable.
    Audio is toslink to my amp.
    I have a eyetv hybrid connected and a belkin usb hub with severel WD disk.
    My problem is that suddenly the display turns green for a couple of seconds
    and after that everything on the screen is tinted green.
    Sometimes after a while it turns itself back to the right colours again.
    There is no consistency in when it does this, and again no consistency in
    when it turns itself back again.
    The funny thing (as i see it) is that i had a Mac Mini mid 2009 connected
    exactly as i have setup the new Mac Mini. And everything worked fine.
    I run sabnzbd, air video server, eyetv 3 and XBMC on it. There is aswell
    a python script that lauches sickbeard on startup running.
    Can anybody please help me to what the problem is???

    Try a different gamma setting to brighten up movies. To do this, go into Displays Preferences and click on the Color tab and then the Calibrate button. Put a check mark in the box for Expert Mode and click Continue to start the calibration process. When you get to the screen for gamma, move the slider to the left and it should brighten up middle levels of the picture. See if that helps with movies.
    As to RAM, it depends on which generation mini you have as to how much RAM it will take. And you haven't said which one you have.

  • Networking with an Xbox 360: Getting the Xbox hard drive on desktop?

    Last Xmas my family became the owner of an Xbox 360. The Xbox is successfully hooked into my Airport network for online gaming.
    Saved games are stored on the Xbox's hard drive. I'm wondering if anyone has ideas about how I can "backup" the content on the Xbox's hard drive to my Mac's hard drive. I think that would entail "mounting" the Xbox's hard drive in my OS X environment over the Airport network.
    I know networking with Windows computers is possible, but the Xbox?
    Thanks for any ideas.

    Thanks for the reply.
    I've tried Connect to Server and entered smb:// and the IP of the XBox, but received an error: The Finder cannot complete the operation because some data in "smb://10.0.1.3" could not be read or written. (Error cose -36)."
    So far, no dice. Any other ideas?

  • Someone who can say how to get Adpbe flash player version 11.2.202.197 to work together with Lion on mac mini. Support from Apple can obviously not help the problem and do not care if it works

    Someone who can say how to get Adpbe flash player version 11.2.202.197 to work together with Lion on mac mini. Support from Apple can obviously not help the problem and do not care if it works

    Adobe flash player version 11.2.202.197 is for Windows Vista / Windows 7 / Vista 64 / Windows 7 64
    Adobe Flash Player version 11.1.102.55 is the current version for Snow Leopard and Lion.
    Adobe - Install Adobe Flash Player

  • Hi, I have tried repetedly to install flash player on my mac mini with no luck..... help please !

    Hi, I have tried repetedly to install flash player on my mac mini with no luck..... help please !

    How to perform a "clean install" of Flash Player in Mac OS X

  • How do i connect my mac mini to a kvm switch using the hdmi to dvi adapter?

    I want to connect my Mac Mini using the HDMI to DVI adapter to a KVM switch cable. I have an Iogear KVM switch. The cable from the KVM switch has a male VGA end connection. I have been trying to determine the right adapter to connect the female DVI connection to the male VGA connector. I will be using the Mac mini and a PC running through the KVM switch. This is doable as the iogear switch is compatible with both a PC and a Mac. Any ideas out there? Thank you.

    You would need to get  HDMI or DVI to VGA CONVERTER, not a simple adopter. The converter requires USP connection for power. HDMI is only digital while VGA is analogue.
    http://www.newegg.com/Product/Product.aspx?Item=N82E16812699001&nm_mc=EMC-IGNEFL 070414&cm_mmc=EMC-IGNEFL070414-_-EMC-070414-Index-_-AudioVideoSplitters-_-126990 01-L019B
    If your MIni has a mini displayport or Thunderbolt port yu can get a les expensive mini displayport to VGA afopter.

  • 2012 Mac Mini becoming very slow when using finder

    Hi!
    I've had my 2012 Mac Mini (10.9 Mavericks, Dual Booted W/ Windows) since February 2014 (Late to the party, I know) and, up until about a week ago, it was fine.
    Then, all of a sudden, it starts being unusabley slow the moment I try to do anything in finder. Relaunching finder makes it a bit more bareable, and rebooting fixes it completely until I next open finder. I thought this may have been one of those rare times when a Mac gets a virus, however, AVG found nothing. The next thing I found was that it was to do with the fact that my hard drive was full (it was quite full) and that if I was using all of my 4GB of RAM that my Mac would use virtual memory, and that this would effect the speed if I didn't have a lot of HDD space. However, despite removing nearly 1/2 of the things on my HDD, the problem still persists. I have basically ruled out visiting "the local" apple store, as I'm in the middle of nowhere. the nearest one is around 3 hours away.
    Thanks,
    Dan

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Do Mac Mini and Macbook Pro Retina use the exact same i7 processor?

    If not why do I get the exact same info from both computers:
    Intel(R) Core(TM) i7-3615QM CPU @ 2.30GHz
    Processor Speed: 2.3 GHz
    Number of Processors: 1
    Total Number of Cores: 4
    L2 Cache (per Core): 256 KB
    L3 Cache: 6 MB
    Isn't it strange that they are using a mobile CPU in a desktop computer?

    One way to tel is the the specs for the laptop
    http://www.apple.com/macbook-pro/specs-retina/
    Says it has
    Intel Iris Graphics
    While the specs for the Mac Mini
    http://support.apple.com/kb/SP659
    Say it has
    Intel HD Graphics 4000
    The graphis for both are integrated with the CPU chip
    Also, the wifi's for the Mini and laptops provide more detail inof
    http://en.wikipedia.org/wiki/MacBook_Pro
    http://en.wikipedia.org/wiki/Mac_Mini

  • Connecting G4 Tower to Mac Mini so Both Can be Used.

    hi i was wondering if anyone knew the best way for me to use/ connect my old G4 Tower (yikes it's like 8 years old!!!) as a backup or extra hard drive with my new Mac Mini 9 (which runs slowly btw, needs more something???) Is this a useless endeavor or is it do-able?
    Thanks!
    franzialux

    For an even faster transfer speed connect them via FireWire Target Disk Mode: How to use FireWire target disk mode
    Unfortunately, the production name for the "Yikes" G4 towers are the "Power Mac G4 (PCI Graphics)" which are not capable of FireWire Target Disk Mode. The "Power Mac G4 (AGP Graphics)", that came out right after the "Yikes" models, were the first that supported FWTDM. Now, perhaps franzialux is not aware of these terms and using "yikes" as description was only an expression, but it's possible the G4 tower doesn't support FWTDM.
    -Doug

Maybe you are looking for

  • MSI Big Bang Trinergy Pre-Order questions?

    On this page it says http://event.msi.com/mb/bigbang/preorder/ "All those who pre-order the MSI Big Bang-Trinergy motherboard between Nov 30 and Dec 15 are qualified to receive exclusive gaming bundle. Besides, MSI will protect your new purchase with

  • OBIEE 11g - How to configure Virtual IP for servers hosting OBIEE 11g

    Hi, I have 2 Linux servers. I have installed OBIEE 11.1.1.6 on first server and did a scale out on second server. I don't have a Load Balancer. I want to configure Virtual IP for these hosts. Please advise how to do it. Thanks Nitin Aggarwal

  • MY BBM IS NOT WORKING

    hiiii i got a blackberry 9320 and everytime i go on bbm it says 'welcome to bbm' but doesnt come on

  • Printing to a PDF page larger than your FM document

    When printing to a PDF page larger than your FM document, try this: Use File > Print Book, set up your printer for Adobe PDF and 11x17 (or whatever your preferred page size is), and deselect Generate Acrobat Data. Turn on Registration marks if you li

  • Production/Inv. report using batch chracteristics as selection criteria

    Hi Can u please tlet me know is there any production or inventory report in standard report where we can the list of materials produced based on batch characteristics as selection critera? Reason we are using grade as one charateristics in batch. Now