Can msn mess, be used with this?

can i use this to talk to people with msn mess.?

Hi
With iChat using a jabber account http://allforces.com/2005/05/06/ichat-to-msn-through-jabber/ text only.
Tony

Similar Messages

  • HT204302 i get a message when I plug in my ipod to my laptop saying "cannot use this ipod because apple mobile device is not started" can any one help me with this...I have never had this happen before

    Hello anyone
    I get a message when i plug in my ipod touch saying "cannot use this ipod because apple mobile service is not started" can anyone please help me with this problem...I had this message once before but I forgot how to correct it

    From the More Like This section on the right:
    I get error message when I plug in iPhone 4s saying "This iPhone cannot be used because the Apple Mobile Device service is not started"
    can't get my ipod to connect to tunes error message "cannot be used because the apple mobile device service is not started"  fixes? Using Win XP
    im trying to connect my ipod to itunes and its saying it cannot connect because the "Apple Mobile Device is not started" help
    Or see: iPhone, iPad, iPod touch: How to restart the Apple Mobile Device Service (AMDS) on Windows

  • A certificate could not be found that can be used with this Extensible Authentication Protocol. (Error 798)

    Hi,
    I posted this on Azure forim with no luck maybe here is a better choise.
    When trying to connect a windows 8\8.1 client with a vpn connection for azure virtual network we get the fallowing error.
    "A certificate could not be found that can be used with this Extensible Authentication Protocol. (Error 798)"\
    I'm fallowing this msdn article about point to site vpn on azure. according to it the certificat is good for both win 7 and win 8.
    http://msdn.microsoft.com/en-us/library/azure/dn133792.aspx
    this is the commanf to build the client certificat:
    makecert.exe -n "CN=ClientCertificateName" -pe -sky exchange -m 96 -ss My -in "RootCertificateName" -is my -a sha1
    When runing the installtion of the certificat on the client the defult crtificate store is "Automatic", It does not metter if I leave it on Automatic or choose any of the other options (personal, trusted issuers ...) I always get the same error.
    Thanks

    Hi,
    Apologize to say that I am not familar with Azure and lack of the environment to investigate the issue here.
    Besides, please take a look at the below threads to see if it could help:
    Point-to-Site on Windows 8 Client
    connection Error 798
    Best regards
    Michael Shao
    TechNet Community Support

  • A certificate could not be found that can be used with this extensible authentication protocol in PEAP policy config

    Windows 2003 enterprise
    AD DC, DNS, DHCP, CA and IAS all are running from single server. But at the time of configuration of Remote Access Policy the error message of "a certificate could not be found that can be used with this extensible authentication protocol" is appeared.
    So with the help of mmc snap in the certificate was requested from CA (Domain Controller template)as a new certificate request and placed in the local computer personal folder. 
    After placing the certificate the error message was disappeared during configuring PEAP. 
    But after sometime the certificate was disappeared from remote access policy. But the same imported certificate was present in personal folder.
    What is reason for frequent disappearing?
    How to manage the situation?

    Hi,
    I think the cause is that the DomainControllerAuthentication certificate has superseded the
    DomainController certificate which is chosen during the setup of IAS.
    To avoid this, if you’re going to install IAS on a Domain Controller, the DC should be made to enroll for a separate certificate from the template
    'RAS and IAS Servers' before the IAS server is installed and this certificate should then be chosen for any PEAP setup.
    Further details:
    Enrolling Certificates with Templates
    http://technet.microsoft.com/en-us/library/dd197527(v=WS.10).aspx
    Configure the server certificate template
    http://technet.microsoft.com/en-us/library/cc755043(v=WS.10).aspx
    Steven Lee
    TechNet Community Support

  • Can someone pls help me with this code

    The method createScreen() creates the first screen wherein the user makes a selection if he wants all the data ,in a range or single data.The problem comes in when the user makes a selection of single.that then displays the singleScreen() method.Then the user has to input a key data like date or invoice no on the basis of which all the information for that set of data is selected.Now if the user inputs a wrong key that does not exist for the first time the program says invalid entry of data,after u click ok on the option pane it prompts him to enter the data again.But since then whenever the user inputs wrong data the program says wrong data but after displaying the singlescreen again does not wait for input from the user it again flashes the option pane with the invalid entry message.and this goes on doubling everytime the user inputs wrong data.the second wrong entry of data flashes the error message twice,the third wrong entry flashes the option pane message 4 times and so on.What actually happens is it does not wait at the singlescreen() for user to input data ,it straight goes into displaying the JOptionPane message for wrong data entry so we have to click the optiion pane twice,four times and so on.
    Can someone pls help me with this!!!!!!!!!
    import java.util.*;
    import javax.swing.*;
    import javax.swing.event.*;
    import java.awt.*;
    import java.awt.event.*;
    import java.text.*;
    import java.util.*;
    public class MainMenu extends JFrame implements ActionListener,ItemListener{
    //class     
         FileReaderDemo1 fd=new FileReaderDemo1();
         FileReaderDemo1 fr;
         Swing1Win sw;
    //primary
         int monthkey=1,counter=0;
         boolean flag=false,splitflag=false;
         String selection,monthselection,dateselection="01",yearselection="00",s,searchcriteria="By Date",datekey,smonthkey,invoiceno;
    //arrays
         String singlesearcharray[];
         String[] monthlist={"Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sept","Oct","Nov","Dec"};
         String[] datelist=new String[31];
         String[] yearlist=new String[100];
         String[] searchlist={"By Date","By Invoiceno"};
    //collection
         Hashtable allinvoicesdata=new Hashtable();
         Vector data=new Vector();
         Enumeration keydata;
    //components
         JButton next=new JButton("NEXT>>");
         JComboBox month,date,year,search;
         JLabel bydate,byinvno,trial;
         JTextField yeartext,invtext;
         JPanel panel1,panel2,panel3,panel4;
         JRadioButton single,range,all;
         ButtonGroup group;
         JButton select=new JButton("SELECT");
    //frame and layout declarations
         JFrame jf;
         Container con;
         GridBagLayout gridbag=new GridBagLayout();
         GridBagConstraints gc=new GridBagConstraints();
    //constructor
         MainMenu(){
              jf=new JFrame();
              con=getContentPane();
              con.setLayout(null);
              fr=new FileReaderDemo1();
              createScreen();
              setSize(500,250);
              setLocation(250,250);
              setVisible(true);
    //This is thefirst screen displayed
         public void createScreen(){
              group=new ButtonGroup();
              single=new JRadioButton("SINGLE");
              range=new JRadioButton("RANGE");
              all=new JRadioButton("ALL");
              search=new JComboBox(searchlist);
              group.add(single);
              group.add(range);
              group.add(all);
              single.setBounds(100,50,100,20);
              search.setBounds(200,50,100,20);
              range.setBounds(100,90,100,20);
              all.setBounds(100,130,100,20);
              select.setBounds(200,200,100,20);
              con.add(single);
              con.add(search);
              con.add(range);
              con.add(all);
              con.add(select);
              search.setEnabled(false);
              single.addItemListener(this);
              search.addActionListener(new MyActionListener());     
              range.addItemListener(this);
              all.addItemListener(this);
              select.addActionListener(this);
         public class MyActionListener implements ActionListener{
              public void actionPerformed(ActionEvent a){
                   JComboBox cb=(JComboBox)a.getSource();
                   if(a.getSource().equals(month))
                        monthkey=((cb.getSelectedIndex())+1);
                   if(a.getSource().equals(date)){
                        dateselection=(String)cb.getSelectedItem();
                   if(a.getSource().equals(year))
                        yearselection=(String)cb.getSelectedItem();
                   if(a.getSource().equals(search)){
                        searchcriteria=(String)cb.getSelectedItem();
         public void itemStateChanged(ItemEvent ie){
              if(ie.getItem()==single){
                   selection="single";     
                   search.setEnabled(true);
              else if (ie.getItem()==all){
                   selection="all";
                   search.setEnabled(false);
              else if (ie.getItem()==range){
                   search.setEnabled(false);
         public void actionPerformed(ActionEvent ae){          
              if(ae.getSource().equals(select))
                        if(selection.equals("single")){
                             singleScreen();
                        if(selection.equals("all"))
                             sw=new Swing1Win();
              if(ae.getSource().equals(next)){
                   if(monthkey<9)
                        smonthkey="0"+monthkey;
                   System.out.println(smonthkey+"/"+dateselection+"/"+yearselection+"it prints this");
                   allinvoicesdata=fr.read(searchcriteria);
                   if (searchcriteria.equals("By Date")){
                        System.out.println("it goes in this");
                        singleinvoice(smonthkey+"/"+dateselection+"/"+yearselection);
                   else if (searchcriteria.equals("By Invoiceno")){
                        invoiceno=invtext.getText();
                        singleinvoice(invoiceno);
                   if (flag == false){
                        System.out.println("flag is false");
                        singleScreen();
                   else{
                   System.out.println("its in here");
                   singlesearcharray=new String[data.size()];
                   data.copyInto(singlesearcharray);
                   sw=new Swing1Win(singlesearcharray);
         public void singleinvoice(String searchdata){
              keydata=allinvoicesdata.keys();
              while(keydata.hasMoreElements()){
                        s=(String)keydata.nextElement();
                        if(s.equals(searchdata)){
                             System.out.println(s);
                             flag=true;
                             break;
              if (flag==true){
                   System.out.println("vector found");
                   System.exit(0);
                   data= ((Vector)(allinvoicesdata.get(s)));
              else{
                   JOptionPane.showMessageDialog(jf,"Invalid entry of date : choose again");     
         public void singleScreen(){
              System.out.println("its at the start");
              con.removeAll();
              SwingUtilities.updateComponentTreeUI(con);
              con.setLayout(null);
              counter=0;
              panel2=new JPanel(gridbag);
              bydate=new JLabel("By Date : ");
              byinvno=new JLabel("By Invoice No : ");
              dateComboBox();
              invtext=new JTextField(6);
              gc.gridx=0;
              gc.gridy=0;
              gc.gridwidth=1;
              gridbag.setConstraints(month,gc);
              panel2.add(month);
              gc.gridx=1;
              gc.gridy=0;
              gridbag.setConstraints(date,gc);
              panel2.add(date);
              gc.gridx=2;
              gc.gridy=0;
              gc.gridwidth=1;
              gridbag.setConstraints(year,gc);
              panel2.add(year);
              bydate.setBounds(100,30,60,20);
              con.add(bydate);
              panel2.setBounds(170,30,200,30);
              con.add(panel2);
              byinvno.setBounds(100,70,100,20);
              invtext.setBounds(200,70,50,20);
              con.add(byinvno);
              con.add(invtext);
              next.setBounds(300,200,100,20);
              con.add(next);
              if (searchcriteria.equals("By Invoiceno")){
                   month.setEnabled(false);
                   date.setEnabled(false);
                   year.setEnabled(false);
              else if(searchcriteria.equals("By Date")){
                   byinvno.setEnabled(false);
                   invtext.setEnabled(false);
              monthkey=1;
              dateselection="01";
              yearselection="00";
              month.addActionListener(new MyActionListener());
              date.addActionListener(new MyActionListener());
              year.addActionListener(new MyActionListener());
              next.addActionListener(this);
              invtext.addKeyListener(new KeyAdapter(){
                   public void keyTyped(KeyEvent ke){
                        char c=ke.getKeyChar();
                        if ((c == KeyEvent.VK_BACK_SPACE) ||(c == KeyEvent.VK_DELETE)){
                             System.out.println(counter+"before");
                             counter--;               
                             System.out.println(counter+"after");
                        else
                             counter++;
                        if(counter>6){
                             System.out.println(counter);
                             counter--;
                             ke.consume();
                        else                    
                        if(!((Character.isDigit(c) || (c == KeyEvent.VK_BACK_SPACE) || (c == KeyEvent.VK_DELETE)))){
                             getToolkit().beep();
                             counter--;     
                             JOptionPane.showMessageDialog(null,"please enter numerical value");
                             ke.consume();
              System.out.println("its at the end");
         public void dateComboBox(){          
              for (int counter=0,day=01;day<=31;counter++,day++)
                   if(day<=9)
                        datelist[counter]="0"+String.valueOf(day);
                   else
                        datelist[counter]=String.valueOf(day);
              for(int counter=0,yr=00;yr<=99;yr++,counter++)
                   if(yr<=9)
                        yearlist[counter]="0"+String.valueOf(yr);
                   else
                        yearlist[counter]=String.valueOf(yr);
              month=new JComboBox(monthlist);
              date=new JComboBox(datelist);
              year=new JComboBox(yearlist);
         public static void main(String[] args){
              MainMenu mm=new MainMenu();
         public class WindowHandler extends WindowAdapter{
              public void windowClosing(WindowEvent we){
                   jf.dispose();
                   System.exit(0);
    }     

    Hi,
    I had a similar problem with a message dialog. Don't know if it is a bug, I was in a hurry and had no time to search the bug database... I found a solution by using keyPressed() and keyReleased() instead of keyTyped():
       private boolean pressed = false;
       public void keyPressed(KeyEvent e) {
          pressed = true;
       public void keyReleased(KeyEvent e) {
          if (!pressed) {
             e.consume();
             return;
          // Here you can test whatever key you want
       //...I don't know if it will help you, but it worked for me.
    Regards.

  • We are sorry, but we are unable to complete your request.•The Office 2007 Product Key provided is already associated with another user on this site. Please log in with the user information originally used with this Office 2007 Product Key.

    Over the years I have had many ISP and email addresses - but now we have  finally gone almost fully virtual...
    I have a live login and MS ID 4 my SkyDrive account but I only use my MS  touch with 8.1, SkyDrive and office 365 for mobility.
    And I still like to backup to my own server!!!
    What would be good is if I can put all the software licenses and product  keys of the software and keep a record of my mac addresses for  hardware  and even static IP's in a file or a secure location within the MS online  store.
    That's where MS wants me to get my computing needs from in future and I  will always be able to retrieve it in future but what about the $$$$$ I have  spent on software, hardware and applications prior to now???
    I know u guys love 2 collect data 4 marketing analysis,
    4 example I have an old PC that is still running a server from last century  - if you knew about it a simple script would allow you to offer upgrades or at  least relevant MS products - UNLIKE the rubbish adds I just turn off or tune out 
    now...
    Why cant I add products previous online email purchases into the 1 MS live  ID account where I can keep it together? If you make that available I don't have  to have separate steam accounts, EA game accounts, ASUS and adobe accounts etc 
    etc.
    What has brought me 2 this is I was looking for my office pro 2007 disks to  rebuild a HOME USE ONLY windows 7 laptop (NO touch screen so 8.1 is no benefit  at all)
    I HAVE 4 Genuine PRODUCT KEYs for Office 2007 BUT EVERY TIME I WENT TO  DOWNLOAD the software - regardless of the key I used - I got the error message:  We are sorry, but we are unable to complete your request.•The Office 2007  Product Key
    provided is already associated with another user on this site.  Please log in with the user information originally used with this Office 2007  Product Key.
    That's crap - This is a clean brand spanker install of Win7 and there was  nothing b4 I put the oem drivers from Toshiba back on.
    I looked at dozens of support pages and forum blogs and tried for hours to  get a copy to download - including incognito and other logins but because my  default PC name is also my MS Windows live ID the same error was repeated.
    I keep away from the non MS sites for these things and with good reason -  there were heaps of similar users with the same issue or very close to it that  had downloaded from a supposed MS copy from eValue or digital river etc and the  next
    thing was total corruption of the OS.
    EVENTUALLY I found a LIVE MS chat on a support site in the US and she gave  me a link to a slightly older version which will need updating and some reg edit  changes but so far, so good.
    The point is - what a crock !
    I should be able to just keep all my software, drivers, updates, service  packs, and versions that I have upgraded in the MS store.
    If Microsoft aren't going to support XP or Office 2003 and eventually 2007,  vista & Windows7 not far behind??? then that's still no excuse for them to  put these restrictions and limits when I OWN my copy of the software!!
    Unlike office 365 and SkyDrive space which is described in the T&C  (that we all read before ticking that radial button to agree of course) as ONLY  under a leased licence.
    IF Microsoft can support AND develop software that supports SQL2000  Servers, why is it so hard to archive and keep the same info for  everyone???

    Over the years I have had many ISP and email addresses - but now we have  finally gone almost fully virtual...
    I have a live login and MS ID 4 my SkyDrive account but I only use my MS  touch with 8.1, SkyDrive and office 365 for mobility.
    And I still like to backup to my own server!!!
    What would be good is if I can put all the software licenses and product  keys of the software and keep a record of my mac addresses for  hardware  and even static IP's in a file or a secure location within the MS online  store.
    That's where MS wants me to get my computing needs from in future and I  will always be able to retrieve it in future but what about the $$$$$ I have  spent on software, hardware and applications prior to now???
    I know u guys love 2 collect data 4 marketing analysis,
    4 example I have an old PC that is still running a server from last century  - if you knew about it a simple script would allow you to offer upgrades or at  least relevant MS products - UNLIKE the rubbish adds I just turn off or tune out 
    now...
    Why cant I add products previous online email purchases into the 1 MS live  ID account where I can keep it together? If you make that available I don't have  to have separate steam accounts, EA game accounts, ASUS and adobe accounts etc 
    etc.
    What has brought me 2 this is I was looking for my office pro 2007 disks to  rebuild a HOME USE ONLY windows 7 laptop (NO touch screen so 8.1 is no benefit  at all)
    I HAVE 4 Genuine PRODUCT KEYs for Office 2007 BUT EVERY TIME I WENT TO  DOWNLOAD the software - regardless of the key I used - I got the error message:  We are sorry, but we are unable to complete your request.•The Office 2007  Product Key
    provided is already associated with another user on this site.  Please log in with the user information originally used with this Office 2007  Product Key.
    That's crap - This is a clean brand spanker install of Win7 and there was  nothing b4 I put the oem drivers from Toshiba back on.
    I looked at dozens of support pages and forum blogs and tried for hours to  get a copy to download - including incognito and other logins but because my  default PC name is also my MS Windows live ID the same error was repeated.
    I keep away from the non MS sites for these things and with good reason -  there were heaps of similar users with the same issue or very close to it that  had downloaded from a supposed MS copy from eValue or digital river etc and the  next
    thing was total corruption of the OS.
    EVENTUALLY I found a LIVE MS chat on a support site in the US and she gave  me a link to a slightly older version which will need updating and some reg edit  changes but so far, so good.
    The point is - what a crock !
    I should be able to just keep all my software, drivers, updates, service  packs, and versions that I have upgraded in the MS store.
    If Microsoft aren't going to support XP or Office 2003 and eventually 2007,  vista & Windows7 not far behind??? then that's still no excuse for them to  put these restrictions and limits when I OWN my copy of the software!!
    Unlike office 365 and SkyDrive space which is described in the T&C  (that we all read before ticking that radial button to agree of course) as ONLY  under a leased licence.
    IF Microsoft can support AND develop software that supports SQL2000  Servers, why is it so hard to archive and keep the same info for  everyone???

  • Can I fix a disk with this message?-Disk Utility can't repair this disk. Back up as many of your files as possible, reformat the disk, and restore your backed-up files.

    Can I fix a disk with this message?
    Disk Utility can’t repair this disk. Back up as many of your files as possible, reformat the disk, and restore your backed-up files.

    Some problems can indeed be fixed this way. But working from Recovery_HD or Disk Warrior DVDs and working in the restricted environment those provide can be difficult. You can literally spend days working on this problem (while your regular work is unavailable) only to discover the old drive is unsalvageable.
    There is no way to know up front whether you are facing a major Hardware failure or a minor software glitch, or something in between. Often you are forced to work from the drive you no longer trust. I continue to recommend you do this work from a different, fully functioning Mac OS X booted from a different drive.
    If you have had the foresight to (as The hatter often recommends) clone your virgin install onto another drive for use in such situations, you will be able to recover from such problems in record time. If not, my previous recommendations stands:
    Buy a new Drive. Or  two. Install Mac OS X from scratch on a new drive, and get your Mac running again. Later, you can use the full power of Mac OS X to attempt to rescue your data, if needed. Then Zero the old drive, to see if it can hold data again reliably.
    If the old drive eventually provides some needed data, and is salvageable, Merry Christmas.

  • Can a nook be used with os7

    Can a Nook be used with Apple products?  I don't want network or virus problems.

    Android is the most malware-prone, insecure platform there is - but millions of users seem to survive without dropping like flies!
    I can't answer Q.1 but as for Q2:
    How safe is your smartphone? (Android is the top malware collector)
    A major source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace were initially found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:
    http://www.bbc.co.uk/news/uk-15600697
    Android: it's getting worse: Juniper found a 400% increase in Android malware from 2009 to the summer of 2010.  We have since seen exponential grow in Android malware over the last several months. The Juniper Global Threat Center found that the months of October and November are shaping up to see the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.
    July 2012: Smartphones running Google's Android software have been hijacked by an illegal botnet, according to a Microsoft researcher.
    Botnets are large illegal networks of infected machines - usually desktop or laptop computers - typically used to send out masses of spam email.
    Researcher Terry Zink said there was evidence of spam being sent from Yahoo mail servers by Android devices:  http://www.bbc.co.uk/news/technology-18720565
    One question Juniper always get when discussing our research is if Apple’s iOS is more or less secure than Android? Maybe, but it’s not necessarily because of the security or lack of vulnerabilities in the platforms themselves. The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware. There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught.
    http://globalthreatcenter.com/?p=2492
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    (Apple closed out 2011 with a commanding 52.1 percent share of mobile devices tracked browsing the Web, while Google's Android had just 16.2 percent.)
    And most recently this:
    Millions of people are using Android apps that can be tricked into revealing personal data, research indicates.
    Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins.
    These apps failed to implement standard scrambling systems, allowing "man-in-the-middle" attacks to reveal data that passes back and forth when devices communicate with websites.
    http://www.bbc.co.uk/news/technology-20025973
    And this:
    Freezing an Android phone can help reveal its confidential contents, German security researchers have found.
    The team froze phones for an hour as a way to get around the encryption system that protects the data on a phone by scrambling it.
    Google introduced the data scrambling system with the latest version of Android called Ice Cream Sandwich.
    The attack allowed the researchers to get at contact lists, browsing histories and photos.
    http://www.bbc.co.uk/news/technology-21697704
    Update from May 2013:
    Malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the only platform being actively targeted is Google's Android, which researchers now say is resembling Windows on the desktop PC.
    http://appleinsider.com/articles/13/05/14/mobile-malware-exploding-but-only-for- android
    And in early June 2013 a highly toxic trojan began attacking the Android platform:
    According to reports:
    Obad.a exploits previously unknown Android bugs, uses Bluetooth and Wi-Fi connections to spread to near-by handsets, and allows attackers to issue malicious commands using standard SMS text messages.
    By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges," Unuchek said. "As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges."
    More information here:
    http://arstechnica.com/security/2013/06/behold-the-worlds-most-sophisticated-and roid-trojan
    A recent study on smartphone malware has found that 92 percent of nefarious mobile software is targeted at Google's Android platform, and the amount of attacks are growing:
    The latest data released in June 2013 by Juniper Networks reveals that Android malware has grown at a "staggering rate" over the last three years. In 2010, it accounted for just 24 percent of all mobile malware, while as of this March the platform accounts for nearly all of it.
    In the last year alone, the total number of malicious apps has grown 614 percent to 276,259. The annual Mobile Threats support also identified more than 500 third-party Android application stores worldwide that are known to host mobile malware.
    http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats -continue-ram-nyse-jnpr-1029552
    The far reaching vulnerability, discovered by San Francisco's Bluebox Security, involves "discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature."
    Android apps (packaged as an "APK") are signed with an encryption key (just like iOS apps) to prevent a malicious party from changing the code. Signed apps are expressly designed to enable the system to detect any tampering or modification.
    However, due to the newly discovered Android flaw, a rogue developer can trick the system into thinking that a compromised app is still legitimate, giving it system wide access to do virtually anything.
    "A device affected by this exploit could do anything in the realm of computer malice, including become a part of a botnet, eavesdrop with the microphone, export your data to a third party, encrypt your data and hold it hostage, use your device as a stepping stone to another network, attack your connected PC, send premium SMS messages, perform a DDoS attack against a target, or wipe your device," a representative of the company wrote AppleInsider:
    http://appleinsider.com/articles/13/07/03/security-flaw-opens-all-modern-android -devices-to-zombie-botnet-takeover
    The problem (with Android) is: that committee design has failed to make Android a good platform for either users or for developers. By not making any hard choices and giving people what they said they wanted, Google simply abandoned the future to cling tenaciously to the past.
    Rather than conceptualizing and engineering really new solutions to historical computing problems as Apple did with iOS, Google has only attempted to wrest control away from iOS via volume shipments and has effectively sent mobile computing back in time into the 1990s, resulting in the same malware, spyware, viruses and usability issues of Windows.
    http://appleinsider.com/articles/13/07/14/editorial-googles-android-haunted-by-s teve-jobs-warnings-on-app-signing-security
    The Department of Homeland Security considers the malware threat from Android so serious that they issued a public warning on July 23, 2013:
    http://info.publicintelligence.net/DHS-FBI-AndroidThreats.pdf

  • Can different music be used with different set of photos in a slide show?

    Can different music be used with different set of photos in a slide show?

    Yes. The basic idea is that you make a playlist of songs and choose that to use with the slideshow, rather than any particular song. In iPhoto 11 you can do this in iPhoto. In earlier versions you do this in iTunes.
    There is a limitation. Each song will play the full way through, you can't croassfade from one to another and so on.
    Alternatives to iPhoto's slideshow include:
    iMovie, on every Mac sold.
    Others, in order of price: PhotoPresenter  $29
    PhotoToMovie  $49.95
    PulpMotion  $129
    FotoMagico $29 (Home version) ($149 Pro version, which includes PhotoPresenter)
    Final Cut Express  $199
    It's difficult to compare these apps. They have differences in capability - some are driven off templates. some aren't. Some have a wider variety of transitions. Others will have excellent audio controls. It's worth checking them out to see what meets your needs. However, there is no doubt that Final Cut Express is the most capable app of them all. You get what you pay for.

  • I just bought the monthly package of lightroom and photoshop cc. I can't seem to find it under the apps on creative cloud - can you please assist me with this.

    i just bought the monthly package of lightroom and photoshop cc. I can't seem to find it under the apps on creative cloud - can you please assist me with this.

    You can right click the tab and choose "Close Tab" to close a tab.
    Some menu entries are hidden by default and only appear if you use the keyboard to open the menu.
    You can see the difference if you use Alt+F or Alt+B to open the "File" and "Bookmarks" menu and compare that to what you see if you use the mouse to open the menu after you have made the menu bar visible by pressing Alt or by pressing F10.
    Press F10 or press and hold the Alt key down to bring up the "Menu Bar" temporarily.

  • HT203088 I have the CANON REBEL T5 1200D, and when i connect it to my mac which is 10.10 the new OS X YOSEMITE it says that it "Cannot be used with this version of the operating system" why does it say that?

    I have the CANON REBEL T5 1200D, and when i connect it to my mac which is 10.10 the new OS X YOSEMITE it says that it "Cannot be used with this version of the operating system" why does it say that if my camera is listed under the supported digital cameras for OS X YOSEMITE?

    Put simply, the minimum system requirements for iTunes have changed. You need a Mac running at least OS X 10.6.8.
    It's best you look online to see if your model of Mac can be upgraded to at least 10.6.8 "Snow Leopard". It should still be possible to order a copy of Snow Leopard if so.

  • My display text of macbook pro 10.7.5 appears blurred , can any body help me with this issue. Everything i open now - chrome, safari - appears blurred

    Everything on my macbook air 10.7.5 appears blurred. I tried searching a few things but didnt get any success.
    Can anybody please help me with this ?

    Nothing looks blurred to me on the screen shot you posted.  However, I did notice that some of the fonts in the tabs are faded.  Which browser are you using?  You should post in a browser forum about that and also the blurring that you see. 
    Since your Finder fonts looks blurry to you, go to System Preferences/Personal/Appearance - play around with the text smoothing setting.  If that does not work, play around with the resolution settings - System Preferences/Displays/Display 

  • I have an Apple ID created in India. I will be living in US now on. So when I try to buy apps from here, I get a reply saying, I need to change my store to US. So do I have to create a new ID or can I in anyway continue with this same ID ?

    I have an Apple ID created in India. I will be living in US now on. So when I try to buy apps from here, I get a reply saying, I need to change my store to US. So do I have to create a new ID or can I in anyway continue with this same ID ?

    You can use the same ID but you will need a U.S. based credit or debit card account.
    This applies to the Mac App Store as well as iTunes...
    The Complete Guide to Using the iTunes Store | iLounge Article
    "Although you can browse the iTunes Store in any country without being signed in, you can only purchase content from the iTunes Store for your own country. This is enforced via the billing address associated with your credit card or other payment method that you use with the iTunes Store, rather than your actual geographic location."

  • HT1338 I have a macbook Pro i7 mid november 2010. I am wondering if i can exchange my notebook with the latest one. Can anyone help me out with this query please.

    I have a macbook Pro i7 mid november 2010. I am wondering if i can exchange my notebook with the latest one. Can anyone help me out with this query please.

    You can sell your existing computer using eBay, Craigslist or the venue of your choice. You could then use the proceeds to purchase a new computer.

  • I can not sync my phone with this Macbook Pro

    I had a nasty suprise I paid out over £1500.00 to be told that I can not sync my phone with this Macbook Pro.
    the reason for buying a Mac is that the windows 7 machine is in little bits so how do I sync that.  there is no music on this Mac pro and if I try to sync my phone it wants to wipe my phone That is Pants!
    <Re-Titled by Host>

    FTFY (for readability):
    "I had a nasty surprise, when after having paid out over £1500.00, I learned that I am unable to sync my phone (unidentified model) with my new MacBook Pro (unidentified model).
    The reason I bought the Mac was due to the fact that my former computer, a Windows 7 machine, has been damaged beyond repair.
    There is no music currently loaded onto my new Mac, and when I try to sync the data on my Mac to my phone (unidentified model) I am prompted with a warning that my phone data will be wiped clean. This is not good!"
    Okay, so I'm just being a little cheeky here - no offense intended.
    Details are always best when seeking assistance, however. Try not to make others do the work for you. Take the time to do it yourself.
    What model of Mac do you have?
    What version of OSX are you using?
    What version of iTunes are you using for syncing purposes?
    What model of phone are you using and what software version is installed on it?
    Try to better articulate the steps you are performing and the warnings that you are encountering.
    Best of luck.

Maybe you are looking for

  • Abap+Java sap mmc java info unavailable

    Hi there, windows 2003 EE, Mscs clusters oracle 10g Abap+java system usage type :PI my abap system is up but not java and it says j2ee info unavailable.my database is up and i can connect to it.but when i try to use config tool it says error in conne

  • Adobe flash keeps crashing I can't watch videos

    I tried everything. Deleting cookies. Un installing and re installing adobe flash. I tried the suggestions listed on the firefox site Adobe flash works fine when I open google chrome. Why does firefox suck? Its ridiculous... Its so bad...

  • Change screen resolution script.

    I'm trying to make a script to change the resolution of my screen from the current to a different one and back to the first. I need this to make some tests in my new monitor. I've looked everywhere, but apparently it's not as simple as I thought! To

  • Re: Keyoard issue

    Hi, I experie ce the same as trgw. I have a HP e vy X2 with dockig statio . I am curre tly missi g the  utto s: b n delete f12 caps lock = + (this was typed with the touch screen keyboard) Updates of windows and driversbhave been carried out. Can you

  • How to delete row in listbox with formatting

    Hello, I have a listbox and I want to delete selected rows (by clicking button in the example). It deletes the rows just fine but the problem is that I also want to preserve formating of the items when they are moved. The only way is to copy the form