Concerned About "Set Access" Firewall SettingOption

So I realized I couldn't use some of the cooler apps from iTunes because of my firewall setting in Security. Mainly 1 Password and the handy Remote apps. SO, I enabled the "Set access for specific services and applications" under firewall settings in Security and now my apps work fine. Is this as secure as the "Allow only essential services" option? I'm having trouble understanding the verbiage of what this option does for you? If an application is listed and "Allow incoming connections" is enabled, am I prone to hacks?

After you remove it, it will ask for permission again the next time you use it.
Here is a some, mostly accurate info on Leo's firewall. Anyway it will familiarize you with the basics:
http://securosis.com/2007/11/01/investigating-the-leopard-firewall/
since 10.5.2 Apple improved the firewall's behavior somewhat and made it more secure.
If it is still being contrary,
(this usually works)
Here’s what you do:
First, open System Preferences and click on “Security”.
Now follow these steps:
1. Make sure “Set access for specific services and applications” is selected.
2. Select the top application in the list.
3. Click the “-” button to delete it. Repeat until there are no applications in the list.
4. Select “Allow all incoming connections”.
5. Re-select “Set access for specific services and applications”, and quit.
From now on, you should be asked once and only once whether you want an app to accept incoming connections… and the iApplications may well not bother you at all.
(By the way, if you had specifically selected some applications where you wanted to block incoming connections, you’ll want to do add them to the list again.)
Kj

Similar Messages

  • HT5193 I want to use Apple TV in a hospital classroom setting and IT is concerned about security (patient information). Is this an issue and how can I put them at ease?

    I want to use the Apple TV to create an interactive white board type setting in the classroom. I appreciate the help.

    My first reply was probably a bit vague but it's not clear exactly what you're planning to do.
    Anyhow first off, remember this is simply a user to user forum and is not an Apple staffed technical advice area so no one here can accept any responsibility for the implementation you attempt. 
    If you intend to do anything that could potentially compromise patient confidentiality you must get appropriate advice from suitable agencies including your IT dept and probably Apple itself. Depending which country you are in you will be subject to local healthcare laws aimed at protecting patient confidentiality.
    As users we know next to nothing about AppleTV under the hood security.
    AppleTV runs a version of iOS just like iPhones and iPads.
    There is no antivirus/firewall software for iOS as it's already pretty locked down. 
    That does not mean it is 100% secure as nothing is, and all these devices can potentially be hacked.
    AppleTV itself does not store any content permanently, losing data when it's unplugged, so that is probably not an issue unless someone was going to attempt a forensic style data rescue from the internal components.
    If your IT dept allows iPhones or iPads on the network then in principle it's the same, and in many ways less of an issue as it doesn't support 3rd party apps, only a small selection of features from Apple and selected partners.
    I assume for your whiteboard plan this would entail using a touch screen like an iPad for mirroring.  Be aware that fullscreen mirroring will send a 4:3 image to the display as the iPad screen is 4:3 not 16:9 (widescreen).
    You need to work with your IT dept to assess the feasibility of what you want to do - unless you need internet access, to me it would seem a standalone local network without internet connectivity might remove some concerns about devices connecting to the main hospital network.  Maybe their concern is simply wifi and possible interecption of data sent to the AppleTV - this would likely be a proprietary screen sharing format for Airplay but it could still potentially be intercepted on wifi though I can't really see why anyone would want to as the data would probably be pretty useless to them unless this was a specific attempt to capture Airplay streams and people knew what they were doing and had compromised your wifi security.
    Good luck.
    AC

  • Firewall in set access mode let "allow incoming connections" without me

    I have set up my firewall to allow incoming connections for a file sharing client under "Set Access for specific services and applications", and I noticed that Skype, iChatagent, and Safari all included themselves to be set under allow as well a week later. I did not enter this in manually. How did this occur?

    I am quite befuddled by the 10.5 firewall. Maybe I'm thinking too much, but I've read all the documents I could get a hold of, and I still find it confusing and often conflicting in the specifics.
    For starters, there is the cryptic remark of ""Mac OS X normally determines which programs are allowed incoming connections. Select this option if you want to allow or block incoming connections for specific program." Presumedly the "option" it is referring to is the "Set access for specific services..." option, which implies that the "normally determines" circumstance refers to the first two options. But, "Allow all incoming connections" supposedly allows everything, and "Allow only essential services" supposedly blocks everything (except for two or three things). Where in either of these cases would OS X be "determining" anything, and if it does, what criteria is it using?
    The next thing I don't understand: when the option is set to "Set access for specific services", which applications does OS X explicitly ask permissions for? It seems that it since the firewall is only blocking incoming connections, it should only ask for applications that look like they want to accept incoming connections (i.e., server applications). But for me, it asks for permission for applications like Cyberduck (ftp app), and Microsoft Word 2004. In addition, the poster above mentioned Safari made it onto the list. To me, neither Cyberduck nor Safari should matter, since they are both purely client applications that only receive incoming data when it is requested by them, no? And what business does Word have in wanting to accept incoming connections? (maybe this is a question for Microsoft, not Apple).
    Well, I have a list of other questions about half a page long, but if anyone can help with those two, it would be a big help.

  • Concerned About Security and Privacy

    Fine.  Call me a conspiracy theorist, or whatever you want, but I'm concerned about online privacy and security in today's world.  Government, media and big business want our personal and financial information (and viewing habits) to track, store, sell and use.  I understand that's the world we live in but I refuse to "get used to it."  It's MY information and I don't just give it away.  They sure don't give us their's.  We can't even get unbiased truth out of any of them.  Now, I'm learning that it's possible for software, and other people, to access our cameras and microphones on the computer.  C'mon.  Enough is enough!
    I don't sign up or register for much of anything online.  When I do, it's 100% fake information.  I especially hate Google.  Don't get me wrong, I don't do anything online I wouldn't do in front of my mother, spouse or pastor.  It's the principle of the thing.  When you start giving up the little things, they start taking the big things.  (As we're already well aware of.)
    So, my question is this:  What safegaurds do you take on your computer?  Do you have lot of security apps/extensions?  Which ones?  Do you use your firewall and/or firevault?  Is that frustrating the way you use the internet or programs you use?  Which browser do you prefer?   Search Engine?  E-mail?  Do you use any third party software for virus protection or anti-spyware? 
    Basically, what do YOU do to protect your computer and your personal information?  I'm not the most computer literate person so I hope you'll have patience with me.

    Apple Product Security
    Snoop Proof Your Mac - NSA Style!
    Sesame 2 can be found @ http://atama.io/sesame.html

  • I am concerned about the health of my current computer but have not yet made the commitment to a new one, but: 1) How can I transfer my iTunes account to a new computer when I get one... and 2) What can I do if my current computer suddenly implodes and I

    I am a bit of a computer/Internet/iTunes dummy....
    I am concerned about the health of my current computer but have not yet made the commitment to a new one, but:
    1) How can I transfer my iTunes account to a new computer when I get one...
    and
    2) What can I do if my current computer suddenly implodes and I have not yet 'copied/'saved'/otherwise protected my account, as is? -- I have already had my computer crash once and had one of your people help me restore all of the paid for songs (none of the uploaded from my own collection of CD songs, of course, so I had to spend a long time rebuilding that) -- and I believe I was told you could only help me recover that material one or two times altogether, no?
    WithOUT purchasing a Mach or iCloud (I actually think I have one of the later, but rarely have checked it) account, is there anything I can do to responsibly protect my account?
    Thanks for any time taken on this!!!

    These are two possible approaches that will normally work to move an existing library to a new computer.
    Method 1
    Backup the library with this User Tip.
    Deauthorize the old computer if you no longer want to access protected content on it.
    Restore the backup to your new computer using the same tool used to back it up.
    Keep your backup up-to-date in future.
    Method 2
    Connect the two computers to the same network. Share your <User's Music> folder from the old computer and copy the entire iTunes library folder into the <User's Music> folder on the new one. Again, deauthorize the old computer if no longer required.
    Both methods should give the new computer a working clone of the library that was on the old one. As far as iTunes is concerned this is still the "home" library for your devices so you shouldn't have any issues with iTunes wanting to erase and reload.
    I'd recommend method 1 since it establishes an ongoing backup for your library.
    Note if you have iOS devices and haven't moved your contacts and calendar items across then you should create one dummy entry of each in your new profile and iTunes should  merge the existing data from the device.
    If your media folder has been split out from the main iTunes folder you may need to do some preparatory work to make it easier to move. See make a split library portable.
    Should you be in the unfortunate position where you are no longer able to access your original library or a backup then then see Recover your iTunes library from your iPod or iOS device for advice on how to set up your devices with a new library with the maximum preservation of data.
    tt2

  • I am concerned about personal data being not encryption in transit over the Internet and therefore can be seen by other people.

    I am a new Firefox user. I have just installed Firefox 4 on my windows PC today, 5/27/11. I have two major questions:
    1. Accidentally, I clicked some thing at random on the screen (I can't remember what it was) and this page, http://us.config.toolbar.yahoo.com/bh/v2/wp/?view=wc&intl=us&pc=yma3&dc=v2_upgd&cv=2.3., showed up under Yahoo! Toolbar. It informed me that the connection was not encrypted and that information sent over the Internet could be seen by other people. I am not sure what the warning is all about. Does it mean when I use Firefox as a browser to access the Yahoo! and other Internet sites, e.g., my bank, all my personal (username, password, etc.) and bank data will be seen by other unauthorized people? I have never seen a similar warning from other browsers, such as Internet Explorer and Safari? So, if Firefox does not offer protection of personal data, I wonder what's the point of using it. I could have misinterpreted the Firefox warning and would highly appreciated it if you can clarify.
    2. During the installation process, a message showed that Firefox 4 was not compatible with certain features of some of the software already on my PC. I did not copy those features and do not remember what they were except one that was associated with my firewall ZoneAlarm. I could be wrong but I think the message also said Firefox had removed the incompatible features. Please tell me if I should be concerned about it, especially the one that was removed from ZoneAlarm. Will my PC become susceptible to hacker invasions when I use Firefox as the browser? I wish Firefox had given some written explanations along with the incompatibility and removal message so that a user can understand exactly what it is about.
    I would appreciate to hearing from you at your earliest convenience. I have tentatively suspended using Firefox until I can be assured that it is safe to do so without potentially compromising my personal data.
    Thank you.

    That is a generic warning message that you get if you submit a form via a normal HTTP connection (i.e not in via a secure HTTPS connection). That warning pop-up probably has a box to suppress this message in the future.
    If you exchange data with your bank site then there should be a secure connection.
    You can verify that by clicking the Site Identity Button (website's favicon) on the left end of the location bar.
    * https://support.mozilla.com/kb/Site+Identity+Button
    You need to check the ZoneAlarm website to see if they have an update of their software that is compatible with Firefox 4.0.1

  • Setting Access Control in Airport Utility

    Hello everyone,
    I'm hoping that someone can confirm that setting access control to Local in the Airport Utility, and specifying computer addresses, is an optional layer of security over and above a network and base station password. In other words, if I leave access control set to Not Enabled, will I still have password protection for my wireless network?
    Regards,
    Gregory

    Thanks for reply, but I'm afraid I don't understand, and I apologize for my inexperience. What do you mean when you say that I should be more concerned that both access control and other security +should not+ be done? And by "... check on its either one or the other," did you mean check whether it's one or the other?
    In any case, page 58 of the Designing Apple Networks manual doesn't say anything about local access control that the one-line description under the Access Control tab in the Airport Utility doesn't already say, namely, that access can be restricted to particular computers. Well, that's clearly a good thing as long as you don't have visitors or collaborators frequently dropping by who need access to your network. I think it's reasonable to assume that network and base station password protection operate independently of access control based on Apple IDs.

  • Should I have concerns about the integrity of Best Buy's Mac sales?

      I bought my iMac OS X, Early 2008 Model from a Best Buy store. I was a naive & pensive 1st time [ever] PC buyer. The sales [kid] led me to an iMac that had been returned, and referred to it as an "open box sale." I was re-assured the Mac had been completely "wiped clean of all..." After setting it up at home, I found out different; and the previous owner had it for 4 months! Earlier at B.Buy the sales kid told me after asking "why was it returned?" His reply, "Because the screen was too big." His answer certainly didn't make sense to me then, or when I discovered [at home] that it took the 1st owner [him] so long to decide it wasn't what he wanted. So I packed up my Mac & returned to the B.Buy store to have everything cleared.
      I knew I had a lot of trial & error lessons on my hands, not being a computer literate person, but evidently I like a good challenge; and that it has been! No complaints; at first I was concerned about 'doing something wrong'. I was re-assured by the Geek Squad, "You can't harm it; just explore your Mac to get to know it." Well, needless to say, not being able to follow instructions in Owner's Manuals, I'm more of a "slowly SHOW me HOW TO, and what's what" type of learner. I had to Google everything pertaining to PC terminology, steps on how to download & install, files, folders, using delete/trash, keeping all in place/order and NOT duplicating [and which one to keep if I did!] Please don't think I'm stupid; my Mac has been properly stored for 6 years, minus 8 months. I was not in the position in my life to have it set up in a secure environment. Since Jan 2014, my Mac & I have spent many hours, equalling weeks & months face-to-[screen] face!
      I've had many problems since installing OS X Mavericks 10.9.4; and was very apprehensive updating due to the many unfavorable Reviews I had been researching. But I couldn't keep ignoring Apple's repeated recommendations of keeping every item updated. So I eventually found my way to all info, ON ONE PAGE! Yipee! I could not believe what I was reading! Even though I was aware my APPLE apps, plug-ins, utilities, etc. were not auto updating [set to do so]. I FINALLY found my Mac's PROBLEM. My main software, Snow Leopard (10.6.8) is GROSSLY OUTDATED! I totally spaced that due to my Mac being packed away for so long. So I'm working on that. I'M SHARING all MY INFO hoping to help other's who are at my technical level. SO all YOU COMPUTER WHIZZES can SCOFF, GIGGLE all YOU WANT . I take no offense, I'm kidding ☀️. 
      BUT!! Since learning how & where to navigate through the system's files & such, and seeing documents, folders and files that strike me as odd, I have a NAGGING ITCH something is there from the ORIGINAL OWNER. He CREATED SOMETHING, a way into my system, CURRENTLY. I've had to Google 'plist names', and with the help of a very longtime good Facebook friend in New York State, I am learning more from his knowledge & advice. ALL my APPLE security settings are set-up, deny's & allows, and I'm not downloading Videos from MeTube , or anywhere else for that matter. I only download SAFE game apps, and I'm the ONLY user. ANY IDEAS or SUGGESTIONS COMP WHIZZES? Besides updating my software; I'm just trying to find out [on that subject] if I have to buy, download/install all Software Programs of past to be able to run the current OS X Mavericks? Which I read already has a 10.9.5 version. I wanted to become a part of the "Preview Program" for Yosemite; but nope, I cannot! 
    REASONS for MY PREVIOUS OWNER Concerns: My system got so bad, while attempting to Chat on fb w/one friend; every letter I typed, the rainbow ball would spin forever, highlight & delete partial words, and would totally crash. I downloaded an anti Virus app for Mac; scanned my system [took forever]; ending w/a report of 55 VIRUSES!! Many files could not be scanned too. My Mac HD Encrypted Logical Partition Drive un-mounted at least two times, and there's one too many files than there should be. But the file name was not shown, only that the count is off. HELP?
    Message was edited by: SFO.13

    While I am no fan of Best Buy and would not buy a lightbulb from them I doubt you issues have anything to do with your iMac and more to do with your lack of experience and simply getting bad advice. Judging by you post I suspect you have loaded your computer down with a lot of crapware and that  has caused it's problems. For example running antivirus apps on a Mac not only is a waste of time, it's a waste of money, system resources and will eventually create more problems that it solves. Please begin educating yourself on the subject by reading Thomas Reeds articles on the subject, Thomas is a frequent and knowledgeable contributor to these forums. You can find his webpage at http://www.reedcorner.net/tech-guides/
    The good news is here are absolutely no, zero, zippo viruses for OS X. There are other types of malware available (for example trojans) however they differ greatly from viruses in that the use has to download and install them, whereas viruses do not work that way. OS X is not like MS Windows and is extremely secure.
    My suggestion at this point would be to clean your computer of the crapware (including antivirus apps) however before doing so please download and install EtreCheck and post its report. Then we can see how your computer has been configured and begin to give you some advice on the next steps.

  • How do I set my firewall settings in Avasti to allow communications between my HP 8600 and my comput

    How do I set my firewall settings in Avasti to allow communications between my HP 8600 and my computer

    Something to Consider:
    If you are talking about "Avast!" Security Software, either the free or the paid version, the following may apply to you:
    There are three main levels of Security in the Avast! software:  Home, Work, and Public
    Home is the setting many people use when "at home", that is, connected to the home network.  The home network is sometimes defined as the "192.168" network:  these are the computers and printers that you have and use in your home environment.  The network is (most usually) private and (should be) secured with with a passphrase at your router.  The Avast! Software sees the "Home" network as a "safe" environment:  devices connected within the "Home" network are allowed to "talk" (communicate) with one another without undue restrictions.
    Work is the next setting.  The software places some restrictions on this level of communication.  Home users can certainly use this setting -- in many (most) cases, the "Work" setting is a solution that provides for communication and a bit more security for the home network and its devices.
    Public is the strictest setting and is meant to keep your computer safe in a public place:  the library, coffee shop, on a street corner.  Outside "prying eyes" are prevented from peeping and outside communications are restricted.
    If you have set (or left) your Avast! software set to Public, or even Work (and you do not know how to handle the restrictions), then you may have simply locked out the communication between the printer and the computer(s) on your home network.
    Open your Avast! Software and set the security level to either "Home" or "Work".
    You can find out more about how to use the software settings at the Avast! website.
    Advanced Users Only - You will  know if you changed the Rules... this is not something one does by accident.
    If you have changed the rules within the settings, you may have locked yourself out.  Make sure you have both "in" and "out" traffic settings adjusted correctly for each rule you change / adapt / add.
    Kind Regards,
    Dragon-Fur

  • Is there a way to view Flash videos on my iMac without downloading Adobe Flash Player? I'm concerned about performance and security with Flash Player.

    Is there a way to view Flash videos on my iMac without downloading Adobe Flash Player? I'm concerned about performance and security with Adobe Flash Player.

    If the video is only available in a format that requires Flash player : then no.
    However, a great many can also be viewed in an HTML5 version, in which case http://hoyois.github.io/safariextensions/clicktoplugin/ or similar can be set up so that Flash never runs unless you specifically choose it to.

  • Concerns about Using Aperature

    My wife is a professional photographer. I provide her technical support. We use a competitive image database product today. We are both curious about Aperature. But, I have some concerns about how it will work for us.
    These concerns arise first from the fact that Aperature, like iPhoto, uses a single library to manage all of its images. Our current tool lets us save image info into separate database files.
    The benefits to these separate files are signficant. The first, is that it frees her from editing the shots from every shoot in the database. For, the database is a reference tool to be used well after jobs are finished (say to build a specialized mini-portfolio for a client). As a result, our workflow has us dumping every image into the db, regardless of quality. Occasionally, we quickly flag those of special value.
    Since it keeps everythign in a single file, I worry that Aperture would satisfactorily handle the 5 terrabytes of images she has shot in the last year, plus those which preceded it. Is there some convenient way to segment the data?
    Also, she tends to work on laptops (right now, G4s, since Photoshop is so slow on Intel). I was under the impression that Aperture requires a pretty high powered computer. Will it run satisfatorily with a large db on a G4 laptop?
    Lastly, she uses a Phase One back. I don't see Phase One RAW format as one of those supported by Aperature. Does it work with Phase One?
    Thanks,
    Gary
    Powerbook G4   Mac OS X (10.4.6)  

    Aperture currently allows you to specify the library file it will use when it starts up. The setting is in the preferences screen. This allows you to use different libraries for different purposes. The limitation is that only one library can only be one library open at a time. I don't know why they don't have a normal File Open option in the menu. This would be easier.
    Creating additional libraries is also a workaround since there is no New Library command. There are a variety of ways to do it. The easiest is to just make a copy of the empty library Aperture installs in your system by default and copy that every time you need a new library file. It's inconvenient, but not too bad since you only have to do it once in a while and it only takes a few seconds if you have the empty library to copy from handy...
    Matthew

  • Question about setting cookies and custom authentication

    I have a question about setting cookies.
    I have two different 'projects' in HTMLDB - we will call them App1 and App2.
    I also have two different connection configurations setup in the DADs.conf file. - we will call them Connect1 and Connect2.
    App1 is setup to use database authentication (no user is specified in the DAD) and uses Connect1. Once the user successfully logs in, we set a username cookie (this is a persistent connection).
    We created a custom authenticatoin scheme for App2 - this scheme checks for the username cookie (set by App1). We would like for App2 to use Connect2 (HTMLDB_PUBLIC_USER is the default user specified and it uses connection pooling).
    Is it possible to set a cookie from App1, Connect1 for App2, Connect2 - then redirect to App2 and pick up that cookie?
    Here is an example of what we are trying to accomplish:
    A user loggs into App1, we set a cookie, and the user is redirected to App2. If the cookie exists, we allow them access to the home page in App2, if no cookie, we redirect back to a 'Login Failed' page in App1. We don't want App2 to use the same database connection as App1 though, we need App2 to use connection pooling.
    Is this possible? OR...Is there a better way to accomplish what we want to do?
    This is an enhancement to an existing app. Our requirements are to use Database Authentication (setup where pass expires after 60 days or so, cannot reuse last 3 passwords, etc.) - which is already setup and being used by other applications in our organization. All of our users have accounts in the database. We don't want users to have a new username/pass - and we don't want to manage a separate group for HTMLDB apps.
    The existing application uses HTMLDB's built in authentication - which uses database username/pass, and it uses connection pooling, but we cannot handle the pass expire stuff in it, unless there's something we're not seeing or understanding - at least that's how our DBA explained it to us.
    Any help with this will be appreciated so much. I can send you the code we have if needed.
    Thanks!

    Same problem here.  I have so many problems with this remote app.  Is there an iTunes API? I would like to write my own remote app that actually works.

  • Update Multiple Columns when concerned about redo/undo log sizes.

    Hi ,
    I have update statements that updates multiple columns at once if any of them is changed. What I see that even though the value of column is not changed it still increases the redo size.
    Below is a sample code similar to the ones in my code. Basically I check whether there is a difference in any of the columns to be updated and update all of them.
    Is there a way to improve redo log size without splitting the update statement for every column that I will be updating. Redo/Undo log size is a concern for us..
      For i In 1.rec.Count Loop
        Update employees e
           Set e.first_name = rec(i).first_name, e.last_name = rec(i).last_name
         Where e.first_name != rec(i).first_name
            Or e.last_name != rec(i).last_name;
      End Loop;My database is 10g.

    Muhammed Soyer wrote:
    Redo/Undo log size is a concern for us..You are worried about the wrong thing.
    If you are concerned about the amount of undo and redo, you should be less concerned about the small diffrence between updating 1 or 3 columns and remove the loop that is contributing to a massive increase in both undo and redo.
    Re: global temporary table row order
    Name                                  Run1        Run2        Diff
    STAT...undo change vector size     240,500   6,802,736   6,562,236
    STAT...redo size                 1,566,136  24,504,020  22,937,884Run2 shows what adding a loop to a regular SQL statement will do to undo and redo. It made the redo used 15 times greater and the undo almost 30 times greater.

  • Concerns about 21CN and future systems and protoco...

    I don't know if this is the right forum for this topic.  Please tell me if it should be somewhere else.
    I live in a block of managed "retirement flats for the active retired" - not "care home", please !
    As part of the security features, we have a 24/7 electronic emergency "help system" whereby, when we pull a cord in the bathroom or bedroom, for example, we alert a dedicated help centre about sixty or seventy miles away which then provides whatever assistance is required either by talking to us directly or by alerting emergency services locally.
    Obviously, this system depends on access to the public telecommunications network in order to work at all.
    We have been informed by the management company that our system needs to be replaced as it is now getting too old to maintain.  Also, that we will have to pay for it ourselves.  Both facts of which we accept.
    We have been given two new systems to select from (one called Tunstall Communicall and the other called Tynetec Systems).  However, one of the first snags we have run into is one of "future proofing".  We have been learning about BT's plans for "21CN" and are concerned about whether any of the two systems we have been given to choose from  will continue to function after 21CN comes into effect.  Also, whether they will continue to work if BT changes or modifies the specifications for 21CN at any time now or in the future.
    Tunstall Communicall claim (repeat, claim) that their system is entirely futureproof by virtue of the fact that they can program into their boxes any protocol that BT (or any other telecomms provider) can throw at them .  This, they claim, applies now and in the future.
    Tynetec, on the other hand, while claiming (again, claiming) to be fully 21CN compliant, doubt that it is possible for any manufacturer to guarantee to meet every change that BT might throw at them in the future and therefore see no point in trying to guess what BT might do beyond 21CN.  As a consequence, they see no point in building this kind of functionality into their systems.  Who is telling the truth?
    How can we learn more about 21CN in particular -- and BT's plan for its networks in general?  Also, will the adoption of Internet Protocols affect the kind of equipment we are planning to invest in?  Also, what does 21CN mean to people like us; are its specifications likely to change (and thereby leave us in the lurch) and is it even going ahead at all?
    Would it be worthwhile asking the local BT Area Manager in our area to send someone technical to come and talk to us about this?  After all, we stand to be forking out more than £24,000 for something that might not work in a few years time - all because of BT.

    Have a check Here it is a web site to do with the 21cn switch over.
    I suspect that your alarm system will work as all it is is dial up telemetry over a pstn line.
    To a certain extent 21cn at CPE (customers premises equipment) level will be backwards compatible, there will be many other companies who use this technology, like water and gas company's.
    There was a similar issue back in the 80s when BT upgraded their exchanges from analogue to digital (ie Strowger to System X and Y) The majority of phones worked but the older ones would not give you the full range of facility's (pulse dialling and tone dialling)
    (If I have helped you in any way to say "Thank You" please click on the star next to the message. Thank You)
    If I have solved your Issue please click the "Mark as accepted solution" button.

  • I have some concerns about places my teen is visiting on the internet.  The history is always cleaned and i am wondering if there is a way to see what websites have been visit throught the airport router? thanks

    Hi pretty self expalanotory as in the title.  I just want to know if there is a way to access website history that is maybe stored right on the router.  Any assistance woudl be appreciated.  I am not just a nosy Dad but I am very concerned about unsafe activity that my son may be researching. Thank you.

    .there is no way to access historical website history on the router
    Correct
    but if I installed OpenDNS then I could track sites visited?
    Correct, but you may need to install some software on each computer that you want to be able to monitor in the household. OpenDNS will walk you through the setup.
    If you want to go back in time, there are also professional applications (read very expensive) that will reveal the browsing history of a given computer.....even if the browsing history has been erased by the user.
    You will have to have physical access to the computer to use these applications. Post back if you need a few names.

Maybe you are looking for

  • IPhone not recognizing music & video content

    Just after updating to iOS4 my iPhone suddenly stopped recognizing its audio and video content (the ipod app reports 'no content'). However, it does recognize that it has that amount of drive space occupied by "Other" items (when viewed in iTunes.) S

  • Dolby Digital Settings

    With my system, if Dolby Digital is set to "On" in settings, I don't get any sound at all from Rented or Purchased movies from iTunes - however, I do get sound from Netflix, Youtube, iTunes music, etc. Sound works in iTunes material if Dolby Digital

  • Update after Yosemite

    After updating to Yosemite iphoto dose not work but when I try to update it I get this "This update is not available for this Apple ID either because it was bought by a different user or the item was refunded or cancelled." iPhoto came with my comput

  • AIA PIPs for BRM(Order to bill and agent assited billing care)

    Hi, I have installed AIA11g FP and SOA11g on Weblogic 10. Now I would like to install PIPs for oracle billing and revenue management(Order to bill). I can only find AIA 2.5 release which is not compatible with weblogic 10. Could any one please let me

  • Use Stylesheet in Web Template

    Hi All, is it possible to use my own stylesheet in my Web Template? if yes, how? Thanks, Johannes