Do I need another type of anti-virus other than the Avast that I use? You say Avast is incompatable w/the upgrade of firefox...I feel I need protection of some kind..

stated as above..

I suggest you try using a debugger to step through the program to see what it is doing.
This will help you understand what you program does.
I also suggest you try formatting your code in a readable manner or using a code formatter to do this for you.

Similar Messages

  • What does mozilla reccomend for anti virus other than microsoft?

    In April Microsoft will discontinue support for anti virus protection along with updates for windows XP.
    What is a good alternative to use with firefox. I think Mozilla used to have a free program but I guess that is also discontinued. So I am looking for a fee anti virus program and need some guidance as so many out there.

    I can't speak for what mozilla recommends because I don't work for them. However, PC Magazine did an article called "The Best Free Antivirus for 2014". http://www.pcmag.com/article2/0,2817,2388652,00.asp
    I have been using Comodo for years but it's more than just an antivirus program, it has a firewall and Defense Plus too. It's free and they have a really good support within their online community. You can upgrade to the payware but I find the freeware is all I need.
    http://personalfirewall.comodo.com/free-download.html

  • Do I need to have any type of anti-virus or malware, spyware protection for my Macbook Pro?

    My Macbook is a year old. When I bought it, I was told by several people that I would not need any type of anti-virus software or anything to protect my computer because Mac did not get infected that often. However, I have had people today tell me that I do need protection for my computer. My Mac runs about as good as the day I got it, but I really don't want anything to happen to it. If I need to get an anti-virus, or malware/spyware software, what programs would y'all recomend? I am just looking for information. Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Installer appears as "blank dos-box type", hangs, anti virus off, firewall off, system win xp 64 bit. all attempts to solve failed. What next?

    installer appears as "blank dos-box type", hangs, anti virus off, firewall off, system win xp 64 bit. all attempts to solve failed. What next?

    Jeff,
    after trying to find, and use screen shot, i tried to access reader
    downloader... instead, found an offline version of reader. after
    installation started getting false reports that appeared as avg pop-ups.
    Within task manager, was able to detect virus / worm running 6 - 8
    services. immediately disconnected my 'net connection. closed all active
    services being run by rogue process. determined it was using two files
    named "lastalive0.dat" and"lastalive1.dat" to determine it's own status...
    upon stopping it's services it controlled, it would soft re-boot to
    resurrect another hijack attempt. tried workaround using secondary boot
    (win 7) to no avail. after two days, i transferred personal data to
    removable media and am in process of installing debian version of linux.
    i thank you for reply and apologize for my tardy response, it was my first
    forum experience
    tim
    On Tue, Mar 31, 2015 at 10:32 AM, Jeff A Wright <[email protected]>

  • What is Apple's position on Anti-virus software for the mac?

    I have started replacing my customers PCs with iMac's and Mac-Mini, and I have always operated on the assumption that anti-virus software is not necessary, but I fear that my opinion might need revisiting.  So I would pose the question again, does the community and/or Apple have an opinion on the need for Anti-Virus, Malware and all the other nasty inflictions.  If you, as a group or individually do recommend, what product would you recommend?  Thank You --- Bill Shaw - Kansas City, Mo.

    This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an attacker who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware. Starting with OS X 10.7.5, there is another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications that are downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Applications certified in this way haven't actually been tested by Apple (unless they come from the Mac App Store), but you can be sure that they haven't been modified by anyone other than the developer, and his identity is known, so he could be held responsible if he knowingly released malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe. Note, however, that there are some caveats concerning Gatekeeper:
    It doesn't apply to software that comes packaged as an installer. Treat all third-party installers with caution.
    It can be disabled or overridden by the user.
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to applications downloaded from the network. Software installed from a CD or other media is not checked.
    For more information about Gatekeeper, see this Apple Support article. Notwithstanding the above, the most effective defense against malware attacks is your own intelligence. All known malware on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. [Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.]
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Java on the network (not to be confused with JavaScript, to which it's not related) is always a potential weak spot in the security of any operating system. If a Java web plugin is not installed, don't install it unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the filesystem. Malware gets into the system by being downloaded, not by materializing from nowhere.
    In order to meet that nonexistent threat, the software duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability and poor performance.
    By modifying the system at a low level, the software itself may create vulnerabilities that could be exploited by malware attackers.
    ClamXav doesn't have these drawbacks.

  • What is the best anti virus software for the mac?

    I may have mistakenly allowed someone into my computer to fix a problem with Quicken. Now I am afraid of Identity Theft and wonder if there is a good software CD to take over my computer in order to find any problems with trojan horse applications.

    Who was this person that you allowed access to your computer?
    If you have reason to believe that this person was a scammer or otherwise malicious, there is absolutely no software that can give your computer a clean bill of health. No anti-virus software will help. A malicious individual with access to your computer could easily make malicious changes to your system that wouldn't be detected by anti-virus software. The only way to guarantee that your system is clean would be to erase the hard drive and reinstall everything from scratch. See:
    How to reinstall Mac OS X from scratch
    Note that if this person was malicious and had access to your Quicken data, you will need to take additional steps to protect that financial data, such as alerting the bank.
    (Fair disclosure: I may receive compensation from links to my sites, TheSafeMac.com and AdwareMedic.com.)

  • In Firefox 19 will my Norton anti-virus function if the toolbar is not yet compatible?

    I am reluctant to install the Firefox 19 update if my Norton anti-virus will not function.

    Yes that is no problem. Usually Norton updates the sameday as Firefox does so try their updates.
    What is it that is incompatible?
    See also
    * https://community.norton.com/t5/Norton-Toolbar-Norton-Identity/Firefox-19-Support-for-Norton-Toolbar/td-p/912951

  • Is there any benefit to installing anti-virus software on the Windows side of the Boot Camp configuration?

    Is there any benefit to installing anti-virus software on the Windows side of the Boot Camp configuration?

    The advantage is the susceptibility of Windows systems to viruses and passing those along.  While they may not affect, or infect, a Mac OS X systems, thy can be passed through to others.

  • Is there another way to close apps other than deleting them from the multitask bar.....I have a small crack in the bottom of my screen and that part of the screen does not recognize the touch.  :(

    Is there another way to close apps other than deleting them from the multitask bar.....I have a small crack in the bottom of my screen and that part of the screen does not recognize the touch. 

    There's generally no reason to be closing them that way at all. The apps you see in the recents bar are just that, apps that you used recently. Most of them are doing absolutely nothing. The only apps that are really doing anything in the background are ones that play music and ones that are using location services. Just leave them be.
    Best of luck.

  • 10.6.2 won't install to another volume other than the boot volume

    Report a possible bug to Apple.
    as is often recommended for updates, I install from another volume other than the one I want to update, and never update the volume I am booted from. The 10.6.2 update (both combo and update only) won't update any other volume other than the one booted from. Previous updates of OS X have always been able to do this. When I try to change installation location to another volume (which contain 10.6.1) it posts an error saying "This update requires 10.6.2 to be installed", which is wrong it two ways. First, how can an upgrade require itself to be installed before it will actually install. Second, there is no reason it shouldn't have been able to update the 10.6.1 volume. I had two 10.6.1 volumes, when booting from either one, it wouldn't update the other. The update will install if it's run on the volume I boot from, but that defeats the purpose of trying to eliminate update issues by installing from another volume.

    -update-
    In order to to update remotely, there seems to be a number of new and interesting restrictions
    imposed. I came to these basic conclusions by experimentation:
    1. I was unable to install a 10.6.2 update to a remote 10.6.0/10.6.1 volume, while booted from
    a 10.6.0/10.6.1 volume. In other words I had to be booted from a 10.6.2 volume to be able to
    remotely install (or reinstall) a 10.6.2 update to a remote 10.6.0/1/2 volume.
    2. If the volume I was installing to was another internal volume, then I usually (but not
    always) had to set the volume I was trying to install to, as the default startup volume in system
    preferences before the installer would accept it as a valid volume to update.
    3. If the volume I was installing to was a firewire or USB drive, then the #2 restriction did not apply,
    but the the #1 restriction still applied (I still had to be booted from a 10.6.2 volume to install
    a 10.6.2 update).
    4. If, after following the above rules, you are still having trouble, simply rebooting and trying
    again will usually work.
    So in conclusion:
    Remotely updating an external firewire or USB drive was relatively simple and easy, just boot
    from an internal 10.6.2 installation and do it.
    Remotely updating another internal drive though, can be quite annoying.
    Apple, it seems, is heavily promoting the automatic update method.
    Lately, it seems, it is getting more and more difficult in many cases, to get a major
    OS update to "take" properly. I have been heavily using the "bare bones admin account"
    method (outlined in my previous post) for the last several months with good success.
    I agree with you that the remote method should be the best, but Apple's install packages
    have become increasingly difficult to install using that method, even in 10.5.x.
    I will say this though, the updates I installed today using the remote method
    are working just fine, even though I had to wrestle with them to get them installed.
    Kj ♘

  • I need a replacement HD audio driver other than the IDT/Beats hunka junk.

    Anyone out there know if its alright to install a HD audio driver (brandwise) other than the one that came pre loaded on my HP Dv6 A8 windows7 x64? Hp apparently has IDT by the short hairs, not letting anything get out without being overprocessed, compressed and enhanced to DEATH. Not only that but they've got to drag that insolent worthless F*up, Beats audio to every download. I've tried everything, from the generic system driver that comes with windows, to registry patches and still have every problem that everyone else has with this driver.
    I only see a few ways through this and they are as follows
    1.)  Get a new sound card ( but I'm broke after paying 900.00 for this laptop)
    2.)  Build a cutom driver  ( guess you gotta start somewhere 'eh?)
    3.) Get the lo-down on a Beats-free Idt driver...........ANYONE?..anyone.......anyon..any........
    4.) OR, get a thumbs up and possibly a link to the original question.
    I'm afraid that all this messin' with my 'puter is gonna funk it up after a while. Kinda like a bad hair day, the more you fuss the worse the 'muss.
    Help       M EEeeee

    Sprinks
    I am providing you a link to an HP Support document called “Obtaining Software and Drivers” below. This document will demonstrate the different ways up getting your drivers. From Microsoft, to the HP driver page for your computer, to the original drivers that came with your computer.
    There is nothing saying you cannot go directly to the audio manufacturer and download their drivers for the chip but there is no guarantee that they will work correctly as most times the OEM (in this case HP) request modifications to the hardware to suit the software requirements so they may not match up exactly. It is worth giving it a try though.
    Obtaining Software and Drivers
    http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&docname=bph07165
    Please feel free to re-post if you have any further questions or concerns.
    Please click the "Thumbs Up" on the bottom right of this post to say thank you if you appreciate the support I provide!
    Also be sure to mark my post as “Accept as Solution" if you feel my post solved your issue, it will help others who face the same challenge find the same solution.
    Dunidar
    I work on behalf of HP
    Find out a bit more about me by checking out my profile!
    "Customers don’t expect you to be perfect. They do expect you to fix things when they go wrong." ~ Donald Porter

  • Can I hook up Apple TV to my HDTV? If so, do I need anything other than the Apple TV box?

    Can I hook up Apple TV to my HDTV? If so, do I need anything other than the Apple TV box?

    You'll need an HDMI cable to hook it to your TV.  Once you have that, you just have to plug in the Apple TV power and then plug it into the television using the HDMI cable.
    EDIT:
    If you don't have wireless you'll also need an ethernet cable to hook the Apple TV up to your router so you can stream content from the internet.
    Message was edited by: alexives

  • Reply address: is it possible to use another reply address other than the pop address used in my account. I have a special work account and would like to send emails with that address as my reply address...or sent from address

    Reply address: is it possible to use another reply address other than the pop address used in my account. I have a special work account and would like to send emails with that address as my reply address...or sent from address

    i found out how to do this finally!
    1) set up google gmail account to forward your emails to (from the [email protected])
    2) go to your gmail account
    3) go to settings (cog in right hand corner)
    4) go to 'accounts and import'
    5) go to 'send mail as'
    6) click 'Add another email address you own' - add your [email protected] address
    7) google will send a verification email with code to that email address.
    8) enter code
    9) go back to gmail account  >'send mail as' and select 'make default'
    10) close mac 'mail' program and reopen it.
    as long as you have gmail account selected as the primary account in MAIL - mail will now come throught as being sent from that  [email protected] address!!

  • Do I need a type of anti virus software for my macbook pro(2012)?

    I'm usually a Windows guy and I just switched to Macs. So I'm not used to Macbooks. Do I need a type of anti software for apple computers? If I do can you recommend me some or tell me how to maintain/prevent my mac from viruses, trojans, etc...

    mende1 is correct: all you need is ClamXav, but here is the longer version:
    There are many forms of ‘Malware’ that can affect a computer system, of which ‘a virus’ is but one type, ‘trojans’ another. Using the strict definition of a computer virus, no viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions. The same is not true of other forms of malware, such as Trojans. Whilst it is a fairly safe bet that your Mac has NOT been infected by a virus, it may have another security-related problem, but more likely a technical problem unrelated to any malware threat.
    You may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful:
    https://discussions.apple.com/docs/DOC-2435
    The User Tip (which you are welcome to print out and retain for future reference) seeks to offer guidance on the main security threats and how to avoid them.
    More useful information can also be found here:
    http://www.reedcorner.net/mmg/

  • Non~Mac types suggest anti-virus,  good idea ?

    _From everything I've ever heard in my short 5 months amongst computers, we of the Macs are much less prey to virus & spamming phishers & the like.
    A good friend w/ a Gateway put the fear in me tho', & I'm sure it's a good idea to protect against even reduced chances !
    Anyone care to recommend the right site or downloads while I'm checking The Missing Manuals and all my other resources ??
    __TIA__ ~~~=Dave

    Dave,
    OS X is not immune to viruses.
    Apple recommends using antivirus in OS X and ships <a href=http://clamav.net/">clamav</a> antivirus as an integral part of <a href="http://www.apple.com/server/macosx/specs.html">OS X Server.
    I recommend clamXav, a GUI version of clamav put out by Mark Allan, because like the price (free / donationrequested -ware), as well as the fact that it sits lightly on the OS, and because clamav tends to send out updates for new threats faster than commercial companies.
    -Wayne

Maybe you are looking for

  • How to extract Attribute Value from a DBC file with LabWindows and NI-XNET library

    Hi all, For my application, i would like to feed my LabWindows CVI Test program with data extracted from *.dbc file (created by another team under Vector CANdb++). These files contains all CAN frame definition and also some extra information added to

  • EBS Payroll Checks Clearing

    Hello: Standard SAP does not clear (marked as cashed) payroll checks.  I have a customized transaction that was recommended by an SAP OSS notes.  It works great in the foreground, it cancelled when I try to run it in the background. Does anyone has b

  • No secuirty settings tab in presets or export

    Hello, I'd like to save /export a pdf in in indesign 5 osx to include security settings to allow markups and comments. However there isnt a security tab in the settings as shown here http://ptgmedia.pearsoncmg.com/images/ch07sec16_032149170X/elementL

  • UTF8 fiasco

    Hi, I am having difficulties with displaying UTF8 characters from the output stream from my servlets and JSPs. Currently running WLS6.1, NT4.0 Sp6a, Oracle 8.1.5 with NLS_LANG set to AMERICAN_AMERICA.UTF8. The following junk characters ????%u2013%u20

  • Configure reports with tomcat

    hi, i wanted to know know how can i integrate apache tomcat 5.0 with oracle reports. so that when i run apache as my http server and type a request for report on the URL it interprets and shows me the report. what steps should i perfrom, kindly elabo