DVDs won't mount after Security Update 2006-004

DVDs won't mount after installing Security Update 2006-004 via the Software Updater in OS 10.3.9. CDs work OK.
I've repaired permissions, reset PRAM, tried booting in OS 9.2.2 but can't get the DVDs to mount/play or be seen by disk utility.
Please help.
iMac 400mhz
Original Matshita DVD-ROM SR-8184
iMac Firmware 4.1.9
Thanks

How recently before installing the Security Update did you use the DVD drive (for DVDs)? If it was not immediately before the update, the two are probably not related. Also, if you restarted in Mac OS 9 and the DVD drive still does not work, it would seem to indicate the problem is hardware, not software.
You can try opening up the iMac and checking the connections to the DVD drive. Also, it is possible that your PRAM battery is dying (unless you have replaced it recently); that can cause unexpected problems.

Similar Messages

  • Problem with CD drive after Security update 2006-004

    I just updated my emac, running 10.3.9 with security update 2006-004. Now, my CD drive will not stay closed when a cd is inserted. If I remove the cd, the drawer will stay close, but when I insert a cd (any kind music, game...) it close momentarily then spit it back out.

    drtom,
    Welcome to the Apple Discussions!
    Did you get the security update via Software Update or as a stand-alone download?
    Does the CD eject itself if you logon to a different user account?

  • Mail (and Safari) won't open after Security Update 2007-004

    I have a PowerBook G4 running 10.3.9. The machine was running fine (I was checking mail, browsing the web) when my weekly scheduled update opened. Per it's suggestion, I installed Security Update 2007-004.
    Upon restart, both Mail and Safari will NOT open. The icon for each on the dock simply "bounces" once when clicked then nothing else. Has anyone else experienced anything similar? Any thoughts on a fix?

    Installing a system update while you continue using the computer as if nothing was going on there is a really bad idea.
    Verify/repair the startup disk (not just permissions), as described here:
    The Repair functions of Disk Utility: what's it all about?
    After having fixed all the filesystem issues, if any, reinstall the Security Update, which may not have been installed properly. It may also be necessary to reinstall the Combo Update for the type of computer and the version of Mac OS X you’re using, unless this is the version of Mac OS X that came with the computer:
    Mac OS X 10.3.9 Combo Update
    Take a look at the following articles for guidelines on how to properly install system updates:
    Troubleshooting installation and software updates
    Installing software updates
    Basically, you should verify/repair the startup disk before installing the update, no applications should be running while installing it, and you may experience unexpected results if you have third-party system software modifications (not normal applications) installed.

  • Mail won't open after Security Update 2012-004

    At some point, Apple started doing this annoying stupid thing with certain app updates (among them QuickTime Player, and iTunes, and Mail) where if those apps do not reside in /Applications they will not be updated properly. In some cases, a new copy is installed in /Applications, and you just have to manually replace your older copy. Annoying, but doesn't break anything. I installed the latest security update today, after which Mail would not launch, with the error message, "You cannon run this version of Mail on this version of MacOS X." There was a new Mail item in /Applicaitons (my unupdated copy lives in /Applications/Communication) with a generic app icon that doesn't launch at all.
    I tried copying the package contents from the new version to the old, but that didn't work. (Maybe if I'd logged out or restarted it would have, but I didn't try that.) I called Apple and they had me download a combo update. That did absolutely nothing except waste my time. I called back, and a Mail Specialist said I would need to archive and install from the original disc that came with my computer.
    Bad support is so much worse than no help at all. If you don't know what you're doing are not skilled and just reading from a horrible, unhelpful script, say so, and don't make bad suggestions. What a waste of time A. to call support, B. to follow their suggestions, C. it would have been to follow the last of their suggestions.
    Actual solution:
    Move unupdated Mail.app (and, if you're like me, QuickTime Player, too) to /Applications
    Download the security update from http://support.apple.com/kb/DL1586 (one-fifth the size of the combo update)
    Run the installer
    That's it. That's what support should have told me to do. Of course, shouldn't have had to do this at all; Software Update should be smart enough to update apps wherever they live.

    At some point, Apple started doing this annoying stupid thing with certain app updates (among them QuickTime Player, and iTunes, and Mail) where if those apps do not reside in /Applications they will not be updated properly.
    Correct. It has always been that way in OS X. Applications, particularly from Apple, belong in the Applications Folder, where update installers can find them and link to associated system files that may be updated as well without you realising it.

  • Won't sleep after "Security Update 2009-004"

    Hi,
    After installing the latest security update via software update on my unibody MacBook Pro, I can't get it to stay in sleep mode. When I close the lid it goes to sleep as usual, but awakens immediately, then sleeps again and the cycle continues. Making sleep mode effectively useless, and I also noticed that it becomes very hot as it goes through the cycle of sleeping and waking. Has anyone else experienced this? If so is there a fix, or will it be a matter of waiting for another update from Apple to fix it?

    And just to mention, I've already tried resetting its PRAM, but it makes no difference.
    Thanks.

  • Rosetta crashes after Security Update 2006-003

    The other day I installed Security Update 2006-003, and now a number of PowerPC applications crash the machine.
    It's a funny crash, the mouse keeps moving and the capslock key goes on and off, but that's it. Nothing on the screen animates or updates. Windows will not move, dock does not do anything. cannot force quit or command-tab. The only option is to do a hard reset or hard shutdown.
    I found this article:
    http://www.macfixit.com/article.php?story=20060517111924138&query=rosetta+crash
    I hope it's fixed soon!
    Matt

    Hello!
    I'm glad I found your post -- a brand new Intel Core Duo 20" iMac is doing the same for me after Security Update 2006-003.
    What I've found on this end so far is that Norton AntiVirus 10 for Macintosh seems to aggravate the problem. I had a system that was running fine (complete with NAV10) before applying the 2006-003 update. At first I thought the problem might be due to user error--maybe NAV wasn't quite ready for Intel Macs, but Symantec says it is after you get version 10.1 from LiveUpdate. (I did.)
    I finally had to erase the hard drive and reinstall the entire operating system from the provided restore discs. After I did that and got the latest software updates, I tried again with NAV. It still caused the same problem...a complete lockup.
    The first time around, only NAV seemed to cause problems. Other PowerPC-native programs running in Rosetta seemed to be OK. This second time around any PowerPC-native app running in Rosetta (after the install of NAV10) would lock the machine up completely, except for the mouse pointer. (I have also noticed that the machine still responds to being pinged over the network, and that Apple Remote Desktop 3 says it is online. So the crash isn't stopping everything from working.)
    So my conclusion is that there is something seriously wrong with Security Update 2006-003 and Rosetta, and it may be made worse by NAV10 for Macintosh. In any case, I'm going to steer clear of this update for now.

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • Can't mount movie DVDs after Security Update 2006-002

    I installed Security Update 2006-002 today after all the preparation recommended by MacFixit. Everything came up fine, EXCEPT:
    Movie DVDs (e.g., as rented from Blockbuster) no longer mount.
    Yesterday, there was no problem.
    Dual G5 2.5 GHz   Mac OS X (10.4.5)  

    The following link describes MacFixit's recommendation for installation of 10.4.6, but it is basically the same recommendation as they have given for quite a while for any significant system update, including security updates:
    http://www.macfixit.com/index.php?date=2006-04-03
    Scroll down until you see "Update process recommendation".
    In my case, I had followed the "more cautious route" of this procedure but still had a problem, and then the problem went away when I did a (presumably extra) pre-binding.
    For system-wide updates (that is, 10.4.x -> 10.4.(x+1)) I've always used combo updaters rather than the supposedly specific-and-therefore-smaller updaters when updating the system. For the security update in question here, I downloaded the updater from the Apple site rather than use Software Update.
    Hope this helps.
    Dual G5 2.5 GHz   Mac OS X (10.4.5)  

  • PPC-iMac: Black screen on restart after Security Update 2006-003

    Did the Security Update 2006-003 this morning. On restart the screen is showing the grey Apple-logo for several seconds. Then it goes black, with the prompt in the upper left corner: "localhost/root:" Vent running in high gear. Entering unix-commands is possible, but no graphic interface coming up. How to fix this? Don't want to reinstall the whole system.
    iMac G5 20" PowerPC iSight   Mac OS X (10.4.6)  

    I'm having basically the same problem with my PowerBook 1Ghz Aluminum 17". After running the latest security update and latest iLife patches using SU, my system boots to the local Darwin consol login. I can see my HD and all it's files, but I can't get the machine to boot back into GUI mode. Safe mode doesn't work.
    This was a newly refreshed system running 10.4.6 and ONLY iLife installed - nothing funky and no 3rd-party apps other than those pre-installed in 10.4.x.
    I've booted with the 10.4 DVD, repaired permissions (again) and repaired the drive (reported not needed). Zapping the PRAM doesn't help.
    Perhaps I have a lemon because I have had problems with this machine in the past, but only when installing major system updates between 10.3-10.4 with non-apple RAM. I don't think this is the culprit this time as the machine has been functioning fine since the last fresh 10.4 install (with some OWC RAM).
    Any ideas? Anyone have tips for what can be done in the console to repair the system?
    ARGH
    PM G5-Quad 2.5GHz | eMac G4 1.25GHz | PM G4 800MHz | PB G4 1GHz 17 | PM G4 400MH   Mac OS X (10.4.5)  

  • System preferences shot after Security Update 2006-008 - no sound any more

    All sorts of strange problems after running the 2006-008 security update, yet only affecting one my two MacMini:
    System Preferences completely "shot", with the Date&Time item/icon looking very odd.
    The little flag for language/keyboard setting and date/time did not show any more in the top menu bar -- basically everything left side of the blue Spotlight magnifying glass icon was gone.
    Also Safari much more prone to quit.
    Managed to delete some prefs and cached stuff and to replace the System Preferences application with the one from the other (working ok) Mac.
    (I wish such components were available on the web!)
    However: Currently I get no sound whatsoever. When I check the option to have the little speaker symbol displayed in the menu bar it shows. But as soon as I click it once, it vanishes from the menu bar.
    In the Sound window, I have Volume set to full, yet everything is greyed out, "Sound off" is checked without my doing, while "Display sound volume in the menu bar" unchecks itself everytime(!)
    And, very odd: While resetting PRAM and the fsck-routine working ok (no problems found) and disk utility claiming to have repaired all permissions, I can not run a reset of Open Firmware/nvram with the O-F-Apple-Alt key combination (I'm using an original Apple USB Keyboard for this, since I'm aware that my 3rd party keyboards from Logitech and Microsoft often refuse to perform such kind of "low level" tasks).
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

    finally found the solution to my problems at
    http://www.macfixit.com/article.php?story=20061229012312895
    Late-Breakers
    Friday, December 29 2006 @ 01:23 AM PST
    Security Update 2006-008 Special Report: General fixes for common issues
    "Re-apply the Mac OS X 10.4.8 combo updater Once again, re-application of the current combination updater (Mac OS X 10.4.8 for PowerPC or Intel) has proven useful in the case of Security Update 2006-008. Doing so overwrites potentially problem-causing files".
    while it is widely known that the folks from redmond do release software before all the bugs are removed, i was not aware before that apple is following the same approach: using their customers as guinea pigs when it comes to updates. there is plenty of reports on MacFixIt about all sorts of troubles with previous apple os updates.
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

  • DVD drive not recognized after Security update

    Hello -
    Well, for whatever reason I decided to apply some Apple software updates today. I repaired permissions, did a back up to an external Firewire drive with SuperDuper and downloaded several packages - iDVD 6.0.2, iMovie 6.0.2, Quicktime 7.1, iPhoto 6.0.3, iWeb 1.1, and Security Update 2006-003. I installed the Security Update and rebooted. I had read about an issue with DVDs, so promptly inserted a DVD-R disc of mine with a movie on it (not a commercial DVD, footage I had shot on my own). It was not recognized. I restarted with the mouse button held, no luck. I repaired permissions, no change.
    I restarted from the backup on the external drive and cloned the backup over to my Powerbook. The problem did not go away, there the DVD sits, unrecognized. Tried to see if DVD player would see the DVD, got a message "There was an initialization error. A valid DVD drive could not be found [-70012]" disc burning in System profiler says no burning device was found. Tried to re-install DVD player via 4.6.1 update, got a message "Compatible DVD hardware was not detected, installation will not proceed".
    Where to next? I haven't booted into open firmware to try to eject the disk that way, but one post on the discussions here somewhere had no luck. I'd really rather not erase and re-install and migrate from my back-up, but if that is all that's left, ok. Thanks for your help.
    BTW, 10.4.6 ona 1.5 GHz Al PowerBook with 2GB RAM, not original RAM but Samsung from OWC. Thanks again.

    Well, one thing I had not tried was to reset PRAM//NVRAM. I combined that step with shutting down, unplugging the power cord and letting it sit for 15 minutes. Reconnected power, restarted while holding cmd-option-P-R through the second start-up chime, and viola, my DVD appears on the desktop, the drive is listing in the system profiler, problem gone. Thanks all for the rapid responses.
    Darth

  • Startup fails after Security Update 2006-007

    My eMac hangs at the initial gray startup screen. All I did was to allow Software Update to install Security Update 2006-007. I have waited as long as 60+ minutes, hoping some process would time out - but this is not the case.
    My particulars: G4 eMac, 512Mb RAM, 40Gb drive with 15Gb free, 10.3.9 OS X Server (only supports a wireless classroom of 20 ibooks).
    Troubleshooting I have done:
    * Booted off of Mac OS X install disc. From Disk Utility, repaired permissions (minor fixes) and repaired hard drive (no errors at all).
    * Booted into command-V mode. Hangs after only 7 lines. The last line: "BSD root: disk0s3, major 14, minor 2"
    Is there any way to undo a Security Update from the Terminal window? I really don't want to do an 'install & archive', with all my user accounts, etc. I have a firewire backup, but as of last week when I got a CCC error it is no longer bootable. I am a high school teacher who knows a bit, but never enough

    I seems I'm not the only one experiencing start up problems after the 2006-2007 security update. G-4 Power PC, 466MHZ running OSX 10.3.9
    My problems are exasperated by the fact that there was a power outage exactly the same time I did the security update. Now my start up screen goes no further than the whitescreem with the blue bar. IT comes to within 1/4" or 1/16" of the end and stops.
    What I've tried:
    booted from OSx 10.3.9 Install disk,used disk utilities, Disk First Aid, no major problems found.
    Still sticks on start.
    Started from Disk Warrior and ran repair no problems. Still sticks on start.
    Tried to Safe Boot, with no success.
    Zapped the PRAM 4 times. No success.
    Tried to start from OSX install disk then bring up my backup disk drive from start up manager. Able to bring up back up, but same problem on start up as built in disk drive. Now I don't know how to unmount the backup disk drive without damage. THIS IS MY MAIN CONCERN AT THIS POINT. IF I LOSE THE BACKUP I'M FRIED!
    Please help, I don't know when we will have another power outage and my UPS backup power seems to be compromised also.
    Thanks
    G-4 466   Mac OS X (10.3.9)  

  • Focus switch to finder after Security Update 2006-001

    Just updated with Security Update 2006-001 on PB G4 running 10.4.5.
    While running Safari or Mail or any App. and not using the app (like when reading a webpage or mail message) the focus of the OS switches to the Finder after about 10 seconds or so. So in the top menubar right from Apple icon the OS switches from Safari or Mail to Finder.
    Moving the mouse does not make any difference. i.e does not prevent or delay the switch.
    Clicking on the application window returns focus to that application (Safari or Mail).
    Anyone?

    thanks for the input. did not resolve the probelm though. finder started to crash every 2 minutes.
    but on the bright side: its a user thing. my guest account was not affected.
    so i trashed most of my prefs. that resolved the finder problem.
    currently working on restoring my prefs & email accounts, oh well

  • After Security update 2006-002, RAM is halved

    Hi,
    Right after applying the Security Update 2006-002, I experienced a freeze upon wake-up from sleep. And a general application slowdown.
    A fleeting look past the About this Mac window surprisingly revealed that the system now identifies the two additional (trusty for 8 months or so) OWC 1GB RAM modules as 512kb only. Startup memory test is reported as failed - But the modules are still listed as OK.)
    I tried putting the modules in another bank. This works, after restart memory is identified correctly and system breezes. Unfortunately, another restart brings things back to the original, 1.5GB state.
    Resetting nvram (reset-nvram, set-defaults, reset-all) in OF also mostly has the same effect: First restart restores things back to normal, second restart brings the problem back.
    Having read about the recent PB problems where a system update aparently disabled one memory slot, something tells me it's not the RAM modules themselves. (Yes, they check out fine in memory tests.)
    Any ideas?
    Best,
    Ben

    Problem disappeared after I caved in and bought new RAM (Kingston Value Ram) as recomended by / from a local dealer. I am inclined to think this in fact was a defect in the RAM modules themselves, OWC has issued a RMA on them and I'm sending them back. Thanks!

  • Menu Bar Icons Disappeared and other issues after Security Update 2006-001

    Hi,
    I was really affraid when i've heard about the Safari vulnerability, so I was really happy to see the Security Update 2006-001.
    But after installing it, I'm having regrets:
    * mouse speed turned to default settings
    * system preferences crashes when i try to access to Mouse & Keyboard
    * all the menu bar icons disappeared: Bluetooth, Airport, Time, EVEN Spotlight
    * Finder is slower...
    I've repaired disk permissions but: nothing happens....
    What should I do please?
    Should I wait?

    How did you fix it? I'm having the same problem
    myself.
    Mandy,
    I'm gonna tell you a secret, just like i said my problem wasn't due to the Security Update but because of Front Row.
    How? Because, I've hacked my iMac (without iSight) to install FrontRow (with an update), and i've installed the Security Update at the same time. Restarted my computer, and thought the problem was due to the Security Update.
    If you did the same thing, here's the trick to remove Front Row:
    Delete Front Row (/System/Library/CoreServices/Front Row.app)
    Install/reinstall the the latest Mac OS X Update Combo.
    This article assumes you haven’t tried installing Front Row before without the use of Enabler. If you have used one of the very early versions of Front Row (ones installed without Enabler):
    Delete Front Row (/System/Library/CoreServices/Front Row.app)
    Delete the preference file (/System/Library/LaunchAgents/com.apple.frontrow.plist)
    Remove any Login Items that launch Front Row (System Preferences >Accounts >User >Login Items)
    Disable any shortcuts managed by third-party applications that launched Front Row.
    Reboot and reinstall.

Maybe you are looking for

  • Return an unboxed / sealed tv after holiday return period

    I purchased a tv on 11/12/14 and still have not get a chance to open and set up yet due to life change. I just missed the holiday return period 01/15/15 by one day. I notice today the same tv is $100 cheaper. Since I never even open the tv, can I ret

  • Error in Purchase Order Workflow

    Hi, I am facing an problem in Purchase Order Workflow. We are working on ECC6.0 Version. I activated the PO workflow WS20000075 (BUS2012) for the PO release strategy. I assigned an user for the task "Release Purchase Order effected" that is step 0001

  • Passing CUF fields from SRM to ECC 6.0 and PO in Held status

    Hi All, We are upgarding from SRM 5.0 to SRM 5.5 ( New system ) and 4.6C to ECC 6.0. We have implemented classic scenario. All the codes (BADIs) have been copied to the new systems. We are facing two issues here 1. CUF fields are not being passed to

  • Finder is very slow, particularly when using network drive

    I have a mid-2011 Macbook Air, OSX 10.9.4, and Finder is extremely slow, particularly when I am navigating my Time Capsule.  First, a little history. I have tried the fixes listed in these three threads: (1) https://discussions.apple.com/thread/33582

  • Alpha Channel with text

    I am trying to have two tracks and "hide" the footage underneath the writing - using "impact" font. Does anyone know how to do this? I did it a couple of times but can't remember. I can only recall using the alpha channel available on right click. Th