Do i need antivirus in my new iMac?

I just purchase a new Imac and I am asking if I need to get an antivirus software on my new machine>>

1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
If you find this comment too long or too technical, read only sections 5, 6, and 10.
OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
The following caveats apply to XProtect:
It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
It can easily be disabled or overridden by the user.
A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
Why shouldn't you use commercial "anti-virus" products?
Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Similar Messages

  • Do I need antivirus for my new iMac?

    I just bought a new iMa. This is my first Mac and I am not sure if I need antivirus or not??
    If so, which one do you recommend?

    ClamXav : http://www.clamxav.com/ and that's it, unless you plan to install Windows too.  Look over to the right and search the threads under "more like this that ask the same questions.  Also, read this: http://www.reedcorner.net/guides/macvirus/

  • Is AntiVirus protection neededon New iMac

    Bought new iMac,,,Do I need Antivirus program...Best Buy gave me TrendMicro for 6 months but have not installed...also what do u guys think about need for Apple Care????thanks....

    You may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful:
    https://discussions.apple.com/docs/DOC-1848
    Regarding MacScan, First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    Security of OS X generally:
    http://www.apple.com/macosx/security/
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://images.apple.com/server/macosx/docs/Leopard_Security_Config_2nd_Ed.pdf
    This Blog entry is also worth a read:
    http://blog.damballa.com/?p=1055
    UPDATES:
    Another source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace have been found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    How safe is your smartphone?
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area.
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    The company estimates that one in six links posted on Facebook pages are connected to malicious software.
    http://www.bbc.co.uk/news/technology-12967254
    to which Facebook has responded:
    "Facebook and Internet security company Web of Trust (WOT) will provide Facebook users with a feature that protects them against dubious Web links, the companies said this week.
    When a Facebook user clicks on a link that leads to a page with a poor reputation rating given by the WOT community, the user will receive a warning message. Typically, the sites with a poor reputation are known for phishing, untrustworthy content, fraudulent services or other scams."
    http://www.macworld.co.uk/news/index.cfm?olo=email&NewsID=3279603
    Newly discovered malicious software dubbed "MACDefender" takes aim at users of the Mac OS X operating system by automatically downloading a file through JavaScript. But users must also agree to install the software, leaving the potential threat limited.
    The new MACDefender malware was first noted on April 30, 2011 by users of the Apple Support Communities, and was highlighted by antivirus company Intego. If the right settings are enabled in Apple's Safari browser, MACDefender can be downloaded to a system after a user clicks a link while searching the Internet.
    "When a user clicks a link after performing a search on a search engine such as Google, this takes them to a web site whose page contains JavaScript that automatically downloads a file," Intego said. "In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open 'safe' files after downloading in Safari, for example), will open."
    However, users must still agree to install the malware after it downloads. After the ZIP file is extracted, users are presented with the "MACDefender Setup Installer," at which point they must agree to continue and provide an administrator password.
    Because of the fact that users must agree to install the software and provide a password, Intego categorized the threat with MACDefender as "low."
    Users on Apple's support forums advise killing active processes from the application using the Mac OS X Activity Monitor. MACDefender can then be deleted from the Applications folder by dragging it into the trash.
    The malware is not to be confused with MacDefender, the maker of geocaching software including GCStatistic and DTmatrix. The company noted on its site it is not affiliated with the malware.
    Malware spreads through search engines like Google via a method known as "SEO poisoning." The sites are designed to game search engine algorithms and show up when users search for certain topics.
    The latest threat to  the Mac OS is the Weyland-Yutani BOT, which is described as a DIY crimewave kit that supports web injects and form grabbing in Firefox; however both Chrome and Safari will soon follow.  'Form grabbing' is a way of collecting passwords:
    http://www.csis.dk/en/csis/blog/3195/
    Additional reading:
    "Antivirus Software On Your Mac: Yes or No?"
    http://gigaom.com/apple/antivirus-software-on-your-mac-yes-or-no/

  • Need help installing on new iMac

    I am just in the process of getting ready to upgrade my G5 to Leopard, and then back up the drive to a firewire drive. I am also getting a new iMac, which will come with Leopard, Parallels, and Windows, pre-installed. I do not want to have to start putting my software on the new computer disc by disc. How do I transfer what I have on the firewire drive to the new computer? If I copy the drive over, will I lose what is pre-installed on the iMac? I can't copy the G5 drive to the firewire to begin with, and I can't copy it over from there to the iMac using SuperDuper, since I understand it does not work with Leopard, so what do I use? Can someone give this moron step by step instructions? I have had a number of computers over the years, but never copied over a drive - Inever had as much on a computer as I have put on it over the last few years, and I don't want to spend weeks transferring. Thanks for any advice! Leslie

    Hi Leslie Weinberg;
    If I understand you correctly you want to move your applications from a G5 to new iMac. This is know way to cause performance problems on the new iMac. The reason for this is that applications installed on the G5 are set up for PowerPC and the new iMac has an Intel processor.
    The recommended way to do this is to install the application on the new iMac and then you can move the data and settings over afterwards.
    Allan

  • Need help with workflow: New iMac with SSD & HDD and Pegasus Promise

    Hello everyone! I've decided to upgrade my iMac and ordered an i7 with the SSD and HDD drive configuration as well as the Pegasus Promise 12TB drive. I've been researching as to what's the best way to manage both the SSD and HDD drives and I really haven't seen an end-all answer. Now with the purchase of the Pegasus Promise, I'm more confused as to what's the best approach to take. Here are my thoughts:
    1. Use the SSD as the boot and application drive and the HDD for the users folder.
    2. Use the SSD as the boot and application drive, the HDD for the users folder, and photos and pics onto the Pegasus.
    3. Use the SSD as the boot and application drive, the Pegasus for the users folder, and the HDD for ???
    4. Just use the Pegasus drive as the boot drive and use it for everything. (being that it's a RAID drive, then all my files are backed-up already)
    Majority of my space-filling files are my iTunes folder, tons of pictures from using Aperture, and iMovie for videos.
    Thanks in advance for everyone's input and help!

    I'm working on a similar premise.  i7, SSD, HDD, Promise raid, etc.
    I'm nowhere near as savvy as a lot of the people here, but after a lot of research I decided that focusing on how the Pegasus gets configured is the most important for me.  My concerns are for a business in photography, btw.
    I can't budget the 12TB unit so I'm trying to make the most of either the R4-8tb or th R6-6tb.
    I'm planning to launch the applications from the SSD.  I will use the Mac HDD for typical non-photographic files, iTunes (mine's not so big), and standard fair.  This is all backed up via Time Machine to a 3TB Western Digital MyBook for the time being. 
    As for the Pegasus, I believe I've settled on: taking an R6-6tb unit, placing the 6th drive in my firesafe from the moment I get it.  Configuring the remaining 5 drives in a level 5 setup.  Leaves me 4TB to get started and buys me a few succesful quarters to plan on daisy chaining another unit when memory is needed.  This way, I may not have maximum possible drive space, but I've got a replacement drive on the ready should I experience a drive-failure.  Then, I'm not sitting on pins and needles while I await a replacement; they'll simply be shipping me a new "spare".
    I still need to actually speak to someone @ Promise to make sure this will work, as I stated: I"m learning as I go here.  If this is an acceptable Raid setup, you would have 8TB available to you.
    Personally, I am far more comfortable running systems in series and building the size as I go (to a point) than putting so much data in a single array.
    [Edit] The raid bay is mainly for the Lightroom catalog, and I use standard external drives to store redundant backups off-site (1TB at a time).

  • I NEED IDVD IN MY NEW IMAC

    I need to down load IDVD so I can burn IMOVIES. Is this possable?

    Why is there no iDVD on my new Mac? How do I get it and how do I install it?
    https://discussions.apple.com/docs/DOC-3673
    To burn a DVD with iDVD from the latest version of iMovie, you have to export the movie using the Export button and select 480p as the size. Open iDVD and start a new project, then drag that exported movie file into the iDVD menu window, avoiding any drop zones you see.

  • I need to reset my new iMac

    First, I'm not sure if I need PPC or Intel. I just bought my iMac 3 days ago. My original intentions was it would be for my wife as her PC died. Well, 3 days later she just can't get the hang of it. So, I'm giving her my laptop PC and I'm taking the iMac (which may have been in the back of my mind all the time ) Anyway, I need to wipe her stuff off and sync with my iphone. How do I get it back to "out of the box" status? So I can make it mine. It did not come with any recovery disc and I wasn't prompted to create any at the initial startup. I really appreciate any help and am eagerly looking forward to my life with a Mac ... I think.
    Jimmy

    Install or Reinstall Lion from Scratch
    If possible backup your files to an external drive or second internal drive.
    Boot to the Recovery HD:
    Restart the computer and after the chime press and hold down the COMMAND and R keys until the menu screen appears. Alternatively, restart the computer and after the chime press and hold down the OPTION key until the boot manager screen appears. Select the Recovery HD and click on the downward pointing arrow button.
    Erase the hard drive:
    Select Disk Utility from the main menu and click on the Continue button.
    After DU loads select your hard drive (this is the entry with the mfgr.'s ID and size) from the left side list. Note the SMART status of the drive in DU's status area.  If it does not say "Verified" then the drive is failing or has failed and will need replacing.  SMART info will not be reported  on external drives. Otherwise, click on the Erase tab in the DU main window.
    Set the format type to Mac OS Extended (Journaled.) Click on the Erase button and wait until the process has completed.
    Quit DU and return to the main menu.
    Reinstall Lion: Select Reinstall Lion and click on the Install button.

  • Need drivers for my new iMac

    Help! I received my iMac today and it is amazing. Big problem started when I installed Windows 7 and needed to connect an old usb keyboard and mouse. I need to find the drivers necessary to run the wireless keyboard and magic mouse in Windows 7. I called Apple but they told me to call Microsoft. Not the right answer for me!!!! Can anyone point me in the right direction?

    Barbara Daniels1 wrote:
    I don't think Apple would make available drivers for a different OS platform - it would have to be done by Microsoft. And I'd guess that they will not have drivers available to work on the Mac OS.
    Sorry Barbara but you're wrong. Apple does provide drivers for it's peripherals to run under Windows (XP, Vista and 7) via Boot Camp.
    _Boot Camp manual_: http://manuals.info.apple.com/enUS/Boot_Camp_Install-Setup10.6.pdf
    _Boot Camp Win7 FAQ_: http://support.apple.com/kb/HT3986
    I've been doing this for ages, since 2006 to be precise, when Apple made it possible to run Windows XP via Boot Camp on Intel Macs.
    It's Apple hardware so obviously Apple is the one releasing the drivers, not Microsoft, same way Microsoft makes their peripherals' drivers available for Mac OS X, HP does the same for their printers, etc.
    If the peripherals he's talking about (keyboard and mouse) are not Apple branded, then he should follow my first advice.

  • Unable to see my library to sync my iPhone and iPad on my new iMac.

    I've just replaced my iMac and cannot see my library on the sync window.
    I have entered the library location into preferences but it will not see the library at all.
    Hence I am unable to sync music to my iPhone and ipad

    Hi ..
    Syncing your music can be done via iTunes connecting your devices via USB to the iMac.
    This process is not done via preferences.
    You may need to authorize the new iMac.
    Launch iTunes.
    From the iTunes menu bar click Store > Authorize This Computer
    Then sync your music >  Sync your iPhone, iPad and iPod with iTunes using USB - Apple Support

  • Connecting older apple display (2008/09) to new iMac (2012)

    What adapter do I need to connect a new imac to an older Apple 23 inch display?
    thanks
    mark

    <http://store.apple.com/us/product/MB570Z/B/mini-displayport-to-dvi-adapter>

  • Confused about Parallels vs. Partitioning to Run Windows on New iMac

    I need to buy a new iMac for work, where currently its a PC environment.  The only thing I really need to continue to run is Quickbooks, which I must use the PC version as we run payroll in house and want to remain compatible with all our global accountants.
    While I've used Macs exclusively at home, I've never messed with partitioning.  I was under the impression that I would create a partition and install Windows 7 and a copy of our Quickbooks and then would have to sign in and out between partitions to run Quickbooks...effectively signing in and out of 2 different computer systems (as if I had 2 different computers).
    I am confused as to whether I need Parallels (which I have also never worked with).  Is this needed to work in the 2nd PC partition?  or is Parallels something that I can run on my new Mac in the Mac environment and run Windows 7 & Quickbooks without having to log in and out and/or keep rebooting to go back and forth?
    Any insight is appreciated.
    Thanks!

    Parallels is a program like any other. You create virtual hard drives on your current hard drive that it uses to store the Windows installation. It is just like creating a disk image on your hard drive. To the computer, it looks and acts like a hard drive, but it is cut out of space on your hard drive. To your Mac, it is just a single file.
    Search the internet for "virtualization." Or, look on the Parallels/VM Ware websites for how it all works.
    Because the OS sees the Virtual Disk as a single file, if you go into Windows and add a transaction, that whole file changed, not just the single transaction.
    Time Machine* "listens" for changes in files. When it detects that a file changed, it backs up the entire file. It doesn't go in and back up the part of the file that changed.
    If you could break that virtual disk image into tiny slices, then Time Machine would only see one of the tiny slices change instead of the entire virtual disk. Apple uses that concept in what it calls a Sparse Bundle Disk Image. Database systems use the same method. The "slices" are called stripes. So, to be Time Machine-aware, the developers would have to store large amounts of data in a sparse bundle disk image so that Time Machine only sees when one of the stripes changes and just backs up that stripe.
    I don't know whether Parallels or VMWare use Sparse Bundles for their virtual disks. If they do, then you could back them up efficiently with Time Machine. If they don't, it would be better to use something like Carbon Copy Cloner to just back up the Virtual Disk Image periodically (it can be scheduled).
    It is a combination of both. To make Time Machine fast, it doesn't look inside each file to determine what has changed. It just looks to see if the file changed, and then it backs up the whole file. Because of that, software engineers need to take advantage of Sparse Bundles if they intend to store large amounts of data the user might want to back up. I don't know what the tradeoffs are in using a Sparse Bundle vs writing straight to disk.
    *It is actually a process called fsevents (file system events) that watches and logs every change to the file system. Time Machine uses that database to determine what needs to be backed up.
    P.S. You seem fixated on Parallels. There are two other options, VMWare and VirtualBox. For what you need to use Windows for, I would use VirtualBox. It is free and will work just fine. They have done a very good job keeping up with OS X updates and upgrades.
    For any of them, you will need a copy of Windows to install on the Virtual Machine.

  • Mounting the new imac (late 2012)?

    I need to mount the new Imac (prob the 27 inch) on an arm.  I found one reference that said there wasn't going to be a vesa mount.  Does anyone know if it will be possible to mount this thing?  I cannot use the stand.. it has to go on an arm for me.
    Help!!

    I was ready to buy the new iMac 27 inch and found out there isn't a way to remove the stand and use a monitor arm! So I am not buying the new iMac.
    Just FYI.

  • Factory reset/wipe new iMac (2013)

    I need to wipe my new iMac and all data, including passwords, ID's etc.  But how?  I'm giving it to someone and need to ensure everything is clear and not recoverable.
    As there is no CD drive, I do have an external CD drive.
    Software = OS X 10.8.3 (12D78)

    The Installer will reload the rest of the files from Apple's servers. No disks are required or used.
    (81293)

  • How do I migrate from a firewire backup disc to a new iMac?

    The drive on my 27 inch iMac (late 2007 model) has stopped working, so I need to get a new iMac. My old iMac has a bootable backup on an external firewire drive. How do I migrate the backup to the iMac, which has no firewire input?

    Connect it through a FireWire to Thunderbolt adapter.
    (105833)

  • HT2452 i keep entering my serial number but it always seems wrong. I bought a new iMac in November

    I need to register my new imac but I am having difficuty doing so

    As I recall, there are no letter O's in the serial number; all which appear to be such are the number 0. Be careful to not confuse X and K. And all letters are capitals.

Maybe you are looking for

  • Quicktime pro crashes on all three of my computers_Help!

    I produce video using Premiere pro. I just bought QT pro 7 and the mpeg2 plugin. I am trying to export ipod compatible files and other MP4 files. No matter what I try the success rate is extrely limited. I have manged 1 or 2 files to export sucessful

  • Blue Screen Of Death When Unplugging iPhone 4s(7.0.6)/iPod touch 5th Gen (7.0.4) !!

    Now heres a problem i have been facing everytime i try an unplug iphone 4s/ipod touch 5... and heres what i have tried out after searching the net and this forum 1) tried different usb ports 2) tried different cables all genuine apple products if som

  • Error uploading book

    I converted my pdf to epub using calibre and I am getting this error when I try to upload it. Can anyone tell me what I need to do to fix this. Or is there better software to make the pdf to epub conversion for this purpose? [2012-02-28 14:22:40 EST]

  • SSD keeps using all space available

    My new SSD boot drive is 240GB and only has Win7 and Adobe Master Collection, about 90GB but keeps filling the rest of the 240 GB SSD.  Is this a SSD problem with Win7, Adobe?  I use two 3TB HDD's for capture and export, storage etc.  I only keep the

  • Dropped back up library into iPhoto and everything is gone

    I have photos on an old time machine that I needed to download. For some reason I was told I di not have permissions to open photo (I assume because I changed my user nmae and pass on a newer computer) I was able to access the photos and and I dragge