Can CS5 media be used with shift from 32-bit to 64-bit Win7?

CS5 was installed on 32-bit Win 7 machine from CD/DVD set.  If I reconstruct the machine using 64-bit Win 7, can I reinstall the suite from the same digital media?

yes, as long as you have the serial number.  if you do not, use belarc advisor to recover it before uninstalling your cs5.

Similar Messages

  • Can Photoshop CS3 be used with files from Lightroom 5?

    I have Photoshop CS3 and I am considering buying Lightroom 5. Does anyone know if output from Lightroom 5 can be processed in Photoshop CS3?

    The process engine in LR 5 is equivalent to ACR 8.1(Process version 2012) in PS CS 6 or PS CC.
    So if you are using LR 5 you have the equivalent of the latest version of ACR, do all the processing of your raw files with Lightroom. When you are ready to make other advanced editing functions in PS CS3 you use the "edit in function" and a tiff or psd file is rendered by LR and sent to Photoshop.
    The only disadvantage is that you cannot use the "edit in function" to make ACR in PS CS3 render the raw file with LIghtroom adjustments, since it is just not capable of reading the full adjustments from LR 5.
    PS CS3 uses ACR 4.x (Process version 2003)
    This is why you have to use LR to create the tiff/psd file for use in PS CS. In the final analysis when you have completed your work in PS CS you still are left with an additional file tiff/psd.

  • How can I export a video with audio from premiere cs 5.5 to a DVD

    how can I export a video with audio from premiere cs 5.5 to a DVD

    You don't... at least not directly... you export MPEG2-DVD and then use the TWO files (audio and video) in Encore
    CS5-thru-CC PPro/Encore tutorial list http://forums.adobe.com/thread/1448923 may help

  • How does one transfer CS5 actions for use with CS6?

    CS6 installation, which was uneventful, has transferred none of my actions from my copy of CS5. The CS5 actions are located in the actions folder of the APPLICATION/PHOTOSHOP CS5/PRESETS/ACTIONS.  The "actions" folder in application support/adobe in my library is empty, and has always been so.
    Only the CS6 default actions are located in the same folder for CS6.
    I use imac i7, lion.
    Note that i also have CS3 and CS4 on my machine. This due to recent upgrade to CS5 and recent upgrade to LION, and my general paranoia.
    Must i load each action into CS6, one at a time?
    thanks to any and all.
    vince

    Re: how does one transfer CS5 actions for use with CS6?
    On a Mac - There are multiple ways to do this.  I have done them both ways. In order to do this you need to know where you have your actions stored, and you can move them all at once if you have them stored in the same location.
    1. You can load an action ONE AT TIME into your actions palette by:
         A. Open up the action palette and click on the little arrow with 4 little horizontal lines next to it on the upper right corner of the actions palette.
         B. Select "Load Actions" and a Finder window will open up and you can search your computer through this window for your actions.
         C. Click on the action from the Finder window then click 'Open' at the bottom right of the finder window.
         D. To save these so that they appear every time you open up your actions palette, go back to the little arrow at the top right of the actions palette and when the drop down window opens- click on 'Save Actions'. It will select the location where the          actions are currently stored as the place to save them. If you want to change that path, you can do it at this time in the little path window.  I just leave it, since I keep all my actions stored in the same file.
    2. TO MOVE MULTIPLE ACTION SETS AT ONCE
         A. Open up CS6 (or CS5) and move the Photoshop workspace it to the right side of your computer screen so you can see your desktop on the left side.
         B. Open up your Finder search window from your dock (the square blue head icon thingy for those who are new to photoshop). Move this to the left side of your screen so you can see the Photoshop work space on the right and the Finder window          on the left. In the Finder window, navigate to the file where all your actions are stored, select all the actions in the file (command+A will select everything in the file if you are actively inside the open file) or you can select multiple files           individually by continuously holding down the command key and clicking on the different actions you want to move.
         C. With the Photoshop workspace visible on the right, and the actions palette open so you can see that the actions actually transferred - In the Finder window, click the selected actions you want to load and drag them over to the Photoshop           workspace.  I did this without an image open, I just dragged them onto the empty workspace.  The actions should all appear immediately in the actions palette that is open.
         D. To save these so that they appear every time you open up your actions palette, go back to the little arrow at the top right of the actions palette and when the drop down window opens click on 'Save Actions'. It will select the location where the           actions are stored as the place to save them. If you want to change that path, you can do it at this time in the little path window.  I just leave it, since I keep all my actions stored in the same file.
    I hope this helps. 
    and I hope there are no typos. 

  • Can a nook be used with os7

    Can a Nook be used with Apple products?  I don't want network or virus problems.

    Android is the most malware-prone, insecure platform there is - but millions of users seem to survive without dropping like flies!
    I can't answer Q.1 but as for Q2:
    How safe is your smartphone? (Android is the top malware collector)
    A major source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace were initially found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:
    http://www.bbc.co.uk/news/uk-15600697
    Android: it's getting worse: Juniper found a 400% increase in Android malware from 2009 to the summer of 2010.  We have since seen exponential grow in Android malware over the last several months. The Juniper Global Threat Center found that the months of October and November are shaping up to see the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.
    July 2012: Smartphones running Google's Android software have been hijacked by an illegal botnet, according to a Microsoft researcher.
    Botnets are large illegal networks of infected machines - usually desktop or laptop computers - typically used to send out masses of spam email.
    Researcher Terry Zink said there was evidence of spam being sent from Yahoo mail servers by Android devices:  http://www.bbc.co.uk/news/technology-18720565
    One question Juniper always get when discussing our research is if Apple’s iOS is more or less secure than Android? Maybe, but it’s not necessarily because of the security or lack of vulnerabilities in the platforms themselves. The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware. There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught.
    http://globalthreatcenter.com/?p=2492
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    (Apple closed out 2011 with a commanding 52.1 percent share of mobile devices tracked browsing the Web, while Google's Android had just 16.2 percent.)
    And most recently this:
    Millions of people are using Android apps that can be tricked into revealing personal data, research indicates.
    Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins.
    These apps failed to implement standard scrambling systems, allowing "man-in-the-middle" attacks to reveal data that passes back and forth when devices communicate with websites.
    http://www.bbc.co.uk/news/technology-20025973
    And this:
    Freezing an Android phone can help reveal its confidential contents, German security researchers have found.
    The team froze phones for an hour as a way to get around the encryption system that protects the data on a phone by scrambling it.
    Google introduced the data scrambling system with the latest version of Android called Ice Cream Sandwich.
    The attack allowed the researchers to get at contact lists, browsing histories and photos.
    http://www.bbc.co.uk/news/technology-21697704
    Update from May 2013:
    Malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the only platform being actively targeted is Google's Android, which researchers now say is resembling Windows on the desktop PC.
    http://appleinsider.com/articles/13/05/14/mobile-malware-exploding-but-only-for- android
    And in early June 2013 a highly toxic trojan began attacking the Android platform:
    According to reports:
    Obad.a exploits previously unknown Android bugs, uses Bluetooth and Wi-Fi connections to spread to near-by handsets, and allows attackers to issue malicious commands using standard SMS text messages.
    By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges," Unuchek said. "As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges."
    More information here:
    http://arstechnica.com/security/2013/06/behold-the-worlds-most-sophisticated-and roid-trojan
    A recent study on smartphone malware has found that 92 percent of nefarious mobile software is targeted at Google's Android platform, and the amount of attacks are growing:
    The latest data released in June 2013 by Juniper Networks reveals that Android malware has grown at a "staggering rate" over the last three years. In 2010, it accounted for just 24 percent of all mobile malware, while as of this March the platform accounts for nearly all of it.
    In the last year alone, the total number of malicious apps has grown 614 percent to 276,259. The annual Mobile Threats support also identified more than 500 third-party Android application stores worldwide that are known to host mobile malware.
    http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats -continue-ram-nyse-jnpr-1029552
    The far reaching vulnerability, discovered by San Francisco's Bluebox Security, involves "discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature."
    Android apps (packaged as an "APK") are signed with an encryption key (just like iOS apps) to prevent a malicious party from changing the code. Signed apps are expressly designed to enable the system to detect any tampering or modification.
    However, due to the newly discovered Android flaw, a rogue developer can trick the system into thinking that a compromised app is still legitimate, giving it system wide access to do virtually anything.
    "A device affected by this exploit could do anything in the realm of computer malice, including become a part of a botnet, eavesdrop with the microphone, export your data to a third party, encrypt your data and hold it hostage, use your device as a stepping stone to another network, attack your connected PC, send premium SMS messages, perform a DDoS attack against a target, or wipe your device," a representative of the company wrote AppleInsider:
    http://appleinsider.com/articles/13/07/03/security-flaw-opens-all-modern-android -devices-to-zombie-botnet-takeover
    The problem (with Android) is: that committee design has failed to make Android a good platform for either users or for developers. By not making any hard choices and giving people what they said they wanted, Google simply abandoned the future to cling tenaciously to the past.
    Rather than conceptualizing and engineering really new solutions to historical computing problems as Apple did with iOS, Google has only attempted to wrest control away from iOS via volume shipments and has effectively sent mobile computing back in time into the 1990s, resulting in the same malware, spyware, viruses and usability issues of Windows.
    http://appleinsider.com/articles/13/07/14/editorial-googles-android-haunted-by-s teve-jobs-warnings-on-app-signing-security
    The Department of Homeland Security considers the malware threat from Android so serious that they issued a public warning on July 23, 2013:
    http://info.publicintelligence.net/DHS-FBI-AndroidThreats.pdf

  • The context has expired and can no longer be used. (Exception from HRESULT: 0x80090317)

    We have a problem with our wiki site collection. Once a day (and sometimes more), we get the following error message :
    The context has expired and can no longer be used. (Exception from HRESULT: 0x80090317)
    This message is displayed to everyone, and will stay there for an hour or so before the collection is back to life.
    Doing an iisreset would get the site working but that will last for a day at the most.
    This is what we checked and tried so far :
    1. Our time zones are set and are correct.
    2. Changing the timeout or disabling the web page security validation (followed by an iisreset) didn't work.
    3. All server use the same NTP server for time sync (and they are indeed in sync).
    4. It is happening only on the wiki collection, not the other collections.
    5. We are unable to reproduce the behavior on the staging servers.
    Some particularities :
    1. Regional settings are set to French (Canada)
    2. We have 500+ wiki pages in the site collection
    3. We require page check-out / check-in for editing. Tried without, same problem.
    Any ideas as to what should we try next ?
    Regards,
    homerggg

    Hi,
    I don't think we have changed them from the default, a quick look shows ours are set to:
    Token-timeout = 24hrs
    FormsTokenLifetime = 10hrs
    WindowsTokenLifetime = 10hrs
    LogonTokenCacheExpirationWindow = 10m
    Rob

  • Can older charger be used with MacBook Air?

    Can older charger be used with MacBook Air? Charger with cylindrical magnetic male end was lost. Charger for older white plastic MacBook is available, but is it safe to use with MacBook Air.

    You have to use the right power adapter.
    You can order one from Apple store.
    https://support.apple.com/en-us/HT201700
    Best.

  • Can different music be used with different set of photos in a slide show?

    Can different music be used with different set of photos in a slide show?

    Yes. The basic idea is that you make a playlist of songs and choose that to use with the slideshow, rather than any particular song. In iPhoto 11 you can do this in iPhoto. In earlier versions you do this in iTunes.
    There is a limitation. Each song will play the full way through, you can't croassfade from one to another and so on.
    Alternatives to iPhoto's slideshow include:
    iMovie, on every Mac sold.
    Others, in order of price: PhotoPresenter  $29
    PhotoToMovie  $49.95
    PulpMotion  $129
    FotoMagico $29 (Home version) ($149 Pro version, which includes PhotoPresenter)
    Final Cut Express  $199
    It's difficult to compare these apps. They have differences in capability - some are driven off templates. some aren't. Some have a wider variety of transitions. Others will have excellent audio controls. It's worth checking them out to see what meets your needs. However, there is no doubt that Final Cut Express is the most capable app of them all. You get what you pay for.

  • Can Creative Cloud be used with an ipad?

    Can Creative Cloud be used with an ipad

    Not the desktop products. You can go here https://creative.adobe.com/products and choose a specific products and then look at the System Requirements.
    From the iPad you can use the Touch apps Ideas and Photoshop Touch. Also you can view your uploaded files from the browser.

  • HT4106 I have a camera connection kit for my ipad 2. Can this kit be used with my new ipad air?... If so what adapter is required please

    Camera connection kit for ipad 2. Can this kit be used with ipad air and if so what adapter(s) are required please

    You can try the 30 pin to lightning adapter but I'm not sure if that'll work. So if you get it to experiment, make sure you can return it. Apple does sell a SD to lightning adapter for the newer devices. So that should be a sure bet. The main downside is that your 30 pin camera kit came with both USB and SD for 29 and now the USB adapter is 19 and the SD adapter 29, so more expensive.
    You may want to look into third party adapters, but make sure you use a reputable manufacturer (ie not a cheap no-name off amazon) because iOS7 brought with it software that looks for a signed chip in the adapter. And a chip is 'signed' when a company gets apple's permission to make accessories. I would suggest sticking with companies like Belkin, Kensington and Targus. They seem to be of a better reputation when making things and would have a signed chip.

  • SharePoint Navigation Error:The context has expired and can no longer be used. (Exception from HRESULT: 0x80090317)

    Hi,
    I take a exeption  on the  SharePoint 2013 left navigation. 
    Exeption:  "The context has expired and can no longer be used. (Exception from HRESULT: 0x80090317)"
    I searched  this exeption keyword on the internet and  I find usualy 3 results
    1)check datetime servers --> I checked datetime for all SP Severs ,DB server and AD server ..there is  no problem
    2)Disabled the WebPageSecurity Validation on CA>General Settings-->I tired  and problem not solved
    3) Reset IIS --> if I restart IIS problem solved  but  after 2-3 hours or anytime  error comes again..
    ULS Log:
    PortalSiteMapProvider was unable to fetch children for node
     at URL: /MySite/MySubSite, message: The context has expired and can no longer be used. (Exception from HRESULT: 0x80090317), stack trace:   
     at Microsoft.SharePoint.SPGlobal.HandleComException(COMException comEx)    
     at Microsoft.SharePoint.Library.SPRequest.SetHttpParameters(String bstrHttpMethod, String bstrRequestDigest, UInt32 flags, Guid gTranLockerId, Byte[]& ppsaImpersonateUserToken, Boolean bIgnoreTimeout, String bstrUserLogin, String bstrUserKey, UInt32
    ulRoleCount, String bstrRoles, Boolean bWindowsMode, String bstrAppPrincipalName, Boolean bIsHostHeaderAppPrincipal, String bstrOriginalAppPrincipalIdentifier, ApplicationPrincipalInfo& pAppUserInfo, Boolean bInvalidateCachedConfigurationProperties, Int32
    lAppDomainId, ISPManagedObjectFactory pFactory, Boolean bCallstack, ISPDataCallback pCanaryCallback)    
     at Microsoft.SharePoint.SPGlobal.CreateSPRequestAndSetIdentity(SPSite site, String name, Boolean bNotGlobalAdminCode, String strUrl, Boolean bNotAddToContext, Byte[] UserToken, SPAppPrincipalToken appPrincipalToken, String userName, Boolean bIgnoreTokenTimeout,
    Boolean bAsAnonymous)    
     at Microsoft.SharePoint.SPWeb.InitializeSPRequest()    
     at Microsoft.SharePoint.SPWeb.EnsureSPRequest()    
     at Microsoft.SharePoint.SPWeb.get_Request()    
     at Microsoft.SharePoint.Publishing.Navigation.SiteNavigationSettings..ctor(SPSite site)    
     at Microsoft.SharePoint.Publishing.Navigation.SiteNavigationSettings.GetSiteNavigationSettings(SPSite site)    
     at Microsoft.SharePoint.Publishing.Navigation.PortalSiteMapNode.GetNavigationChildren(NodeTypes includedTypes, NodeTypes includedHiddenTypes, Boolean trimmingEnabled, OrderingMethod ordering, AutomaticSortingMethod method, Boolean ascending, Int32 lcid)
     at Microsoft.SharePoint.Publishing.Navigation.PortalSiteMapNode.GetNavigationChildren(NodeTypes includedTypes, NodeTypes includedHiddenTypes, OrderingMethod ordering, AutomaticSortingMethod method, Boolean ascending, Int32 lcid)    
     at Microsoft.SharePoint.Publishing.Navigation.PortalSiteMapNode.GetNavigationChildren(NodeTypes includedHiddenTypes)    
     at Microsoft.SharePoint.Publishing.Navigation.PortalSiteMapProvider.GetChildNodes(PortalSiteMapNode node, NodeTypes includedHiddenTypes)
    Plaase Help.

    Hi Veli,
    Please check the security token timeout value and it is set to 1440 as expected by default. You can check via running the command:
    stsadm -o getproperty -pn token-timeout
    Then check the OOB recycle times of the probkematic web application pool, and add daily recycle times for the problematic web application pool. You can do as the article:
    http://technet.microsoft.com/en-us/library/cc754494(v=WS.10).aspx
    Best Regards,
    Wendy
    Wendy Li
    TechNet Community Support

  • HT5517 How can have full picture using mirrored image from iPad

    How can have full picture using mirrored image from iPad on my Apple TV airplay

    Welcome to the Apple Community.
    Mirroring won't fill the TV screen. The iPad has an aspect ratio of 4:3 and the iPhone 4S or prior an aspect ratio of 3:2, neither of these will fit exactly into a TV screen which as an aspect ratio of 16:9. The Apple TV will not zoom the mirrored image, because it may well cut off information which is situated at the top or bottom of the screen.
    You may wish to try each of the settings in ‘Settings > Audio & Video > Adjust for AirPlay overscan’ for the best setting that suits you.

  • Can this extension be used with trial version of dw8?

    The extension:
    http://www.projectseven.com/extensions/info/vscroller/index.htm
    Can ANY extension be used with trial version?
    After I down loaded it and tried to open dw, I got a dialog
    box in which the text was not visible. All I could do was hit 'ok,'
    which quit it.

    Trial versions are fully functional so all extensions should
    work in it.
    Paul Whitham
    Certified Dreamweaver MX2004 Professional
    Adobe Community Expert - Dreamweaver
    Valleybiz Internet Design
    www.valleybiz.net
    "thighmister" <[email protected]> wrote in
    message
    news:eud87r$r06$[email protected]..
    > The extension:
    >
    http://www.projectseven.com/extensions/info/vscroller/index.htm
    >
    > Can ANY extension be used with trial version?
    >
    > After I down loaded it and tried to open dw, I got a
    dialog box in which
    > the
    > text was not visible. All I could do was hit 'ok,' which
    quit it.
    >

  • Can extends keyword be used with respect to interfaces?

    can extends keyword be used with respect to interfaces?

    srinu269 wrote:
    can extends keyword be used with respect to interfaces?Yes. An interface can extend another interface:
    interface A {
        public void a();
    interface B extends A {
        public void b();
    class X implements B {
        public void b() {    
        public void a() {
    }

  • Can Keynote 5 be used with Yosemite?

    Can Keynote 5 be used with Yosemite?
    I have quite a few very sophisticated Keynote 5 presentations and I would hate to have to go through and re-do them if forced to work in Keynote 6.
    Anyone tried to use Keynote 5 in Yosemite?

    No problems yet, but I just ordered a new iMac Retina with Yosemite pre-installed (I assume) for my wife, who uses Keynote and absolutely hated KN6 that  auto-displaced her KN5 when i inadvertently updated her system to Mavericks. 
    Fortunately, I was able to re-install KN5 and it runs fine in Mavericks, so far.  Looks like I will be doing the same with Yosemite, if you are correct.  For an experienced KN5 user, KN6 should not have had a steep learning curve. But it did.  And to top things off, KN5 presentations my wife built in the past averaged 500mb file sizes compared with a KN6 presentation she built with a similar number of slides and photo content that sized out at 17GB!!!  That was really nice.  You have to wonder if anyone at Apple knows what they are doing? 
    Thank you for your response;  However, if you are wrong, the iMac Retina is going straight back to them.  I know of no other company that is more clueless about serving their customer's needs than Apple.

Maybe you are looking for

  • Macbook Pro early 2009 connect to apple tv

    How can I connect my macbook pro (early 2009) to my apple tv?? I have no problem connecting my ipad 2 or iphone...any help or suggesting greatly appreciated...thanks

  • sql:setDataSource in Java EE 6 web project

    I'm trying to figure out how to use <sql:setDataSource> within a (Java EE 6) web project that does not contain a web.xml deployment descriptor. In a previous version of the project, I was able to connect to the database using: web.xml <resource-ref>

  • Enhancement for Co11(Production order confirmation)

    Hi all, i am creating a Production order with 4 line items  (TC : Co01), i am confirming by the TC : Co11, when i press the SAVE button the 4 line items which are there in the confirmation order should be saved in my Ztable. Is there any Enhancement

  • My ipod (second generation) turn on once in a while

    My Ipod 2 ios 4.2.1 doesn't turn on when i want it to  but (sometimes) when it does, it tell me to connect it on itune on the computer. but no computer detects my ipod ... what can i do to fix it?? please HELP!!

  • Dataguard broker issues

    hi all, am getting the following errors from the broker Welcome to DGMGRL, type "help" for information. DGMGRL> connect sys/Fes7Evu6@emrep Connected. DGMGRL> switchover to offsite_emrep; Performing switchover NOW, please wait... Operation requires sh