Firewall Block incoming connections fails

Whenever I'm on the road or at clients loactions I set my firewall to block all incoming connections.
The explanation of Mac OS X is:
So it shouldn't matter if at the Sharing preferences you have enabled Screen or file sharing, which I have turned on, to be able to transfer files at home.
If "Block all incoming connections" is enabled, nobody should see you have any sharing options enabled. I always understood this is a sort of override.
Alas, this seems not the case. My laptop is actively promoting itself as a VNC enabled computer, while block all incoming connections is checked. Unchecking the screen sharing in the sharing preferences immediately has effect on this and stops VNC braodcasting.
Who knows more about this? Is this a bug or undocumented / wrongly documented feature?
Kind regards,
Roeland

PAHU wrote:
Roerei wrote:
Mac OS X explicitely states that "all sharing services" will be blocked.
And they are blocked. With this setting enabled, you cannot connect to the Mac from a remote computer.
What it does not say is that enabling this setting will stop the Mac from being advertised. If you want this then you will need to turn off File Sharing. This will stop the Mac from being seen on the local network.
So in summary, if you want to stop your Mac from being seen on someone else's network you are connected to, then disable File and Screen Sharing. Or trust that with the "Block all incoming" setting enabled, no other user will be able to connect to your Mac even though they can see it.
This is just stupid. Why advertise a service which is blocked? That is just plain dump and not very security minded. If you block a service, you also should not advertise that service. Especially in the firewall preferences checking that box greys out all other options, which gives you kind of the impression that you are stealth.
So you might be right, but it is just wrong.
Roeland

Similar Messages

  • Block incoming connections to ix2-dl by internal firewall/iptables

    Hi.
    How do I block incoming connection to ix2? I opened rsync and forwarded the port but I need to block all IP except one. How do I do that?
    I tried iptables, but they seem not to be working ("libkmod: ERROR ../libkmod/libkmod.c:505 kmod_lookup_alias_from_builtin_file: could not open builtin file '/lib/modules/2.6.31.8/modules.builtin.bin'").

    The ix2-dl NAS is behind Windows NAT (RASS) and so I cannot apply firewall rules from there.
    I think you should add firewall (e.g. iptables based) in next update.

  • Block incoming connection from ARDAgent?

    Since I installed Snow Leopard, I have a window that pops up and tells me if I want to block incoming connection from ARDAgent(Remote Desktop App) every time I log in or turn on the computer, no matter if I block or allow incoming connections. Can anyone tell me how to stop this?

    The blocking of incoming connections is in System Preferences>Security>Firewall
    I think (not in front of a Mac at the moment). I would have thought that once
    disabled it would remain disabled. Are you running in an admin account?
    Dave

  • FIREWALL / EXPLORER ISSUES (No prompt on blocked incoming connections)

    I've spent a week trying to identify the cause of this, and I've just cleared (deleted) several machines (VHDs), thinking they were exhibiting the symptoms, only to find my clean VHD installs are also ... infected?
    My firewall appears correctly configured (default settings, nothing's changed)
    but it's blocking programs (I think), and not asking me to set rules. I've searched the reg, no references of the exe, I've checked the firewall rules, nothing there. In my configured systems (I've just deleted) I even reverted to factory service settings,
    in case I'd stopped/manualised something that needed to be automated....
    I'd compared registry shots. Nada. And now I can't use my iPhone as a mouse, and god knows what other problems are in there.
    Is this a malware issue? How can I test to see what's blocking 'networked' programs (incoming connections / interactive services)?

    Maybe it's an issue with the setup. rebooted into bad build that doesn't have this issue.. worked
    when it works
    About to retry newly extracted files.. thought I'd try them on this machine.. FAIL. Which means there's an issue with the path (?), or some info is written somewhere about the program when it's  extracted (again, ?).
    when it doesn't work, then does work...
    Ok, my money's on path, and my question is this: if you run an .exe off a usb, for example, will windows firewall prompt and manage that program?
    I'm wondering if the OS (f/w mgr) is not seeing the app, and therefore not prompting for mgmt...
    Moment of truth: rebooting to new build to test (more) 'local' execution of program!

  • Blocking Incoming Connections

    What are CIJScannerRegister.app, kdc and netboisd?
    Should I see them in my Incoming Connections Options?
    What affect does blocking them have?
    I ask this after Apple Support failed to achieve Remote Login connections with me today. A possible factor?
    Would appreciate your input.

    See this post on CIJScannerRegister for more info on what it is and if you actually want to stop it
    How to stop CIJScannerRegister to connect online?
    NetBiosID if necessary if you connect to windows shares, it's part of the MacOS, it's not a threat.
    KCD is to the best of my knowledge a part of the mac file transfer process for various protocols. It does not appear to be malicious, but rather a part of the Mac OS. You may want a second opinion on that one.

  • ARDAgent - Application Firewall: allow incoming connections alert won't stop

    Hello,
    after having updated Remote Desktop Client from 3.8 to 3.8.2, users have to allow (or deny) incoming connections within the Firewall settings
    WHENEVER starting the /System/Library/CoreServices/RemoteManagement/ARDAgent.app, especially when logging in or starting the /Applications/Remote\ Desktop.app (Admin)
    ALTHOUGH
    /System/Library/CoreServices/RemoteManagement/ARDAgent.app is locked in the Firewall Settings AND/or
    "Automatically allow signed Software to receive incoming connections" is checked (enabled)
    When switching to a standard user (not an admin), he also can/must allow or deny - and the Firewall Settings are modified correspondingly.
    My questions are so far:
    Why the existing Firewall Setting does not affect when (re-)starting the ARDagent.app-deamon?
    Is the ARDagent.app (since Version 3.8.2) not a signed software?
    This kind of attitude occurs for OS X 10.10.1 _and_ OS X 10.10.2.
    Many thanks for any approach to overcome the problem and kind regards from Munich (GER).

    I was fighting with this 'till now.
    This is what I did:
    Remove ARDagent.app from /System/Library/CoreServices/RemoteManagement
    Remove it from the list in Firewall preferences.
    Disable Firewall.
    Reboot.
    Install OSX 10.10.2 combo-update.
    Reboot.
    Add manually the ARDagent.app to the Allowed Rules in Firewall from /System/Library/CoreServices/RemoteManagement
    Enable Firewall.
    Update to ARD Client v3.8.2 v1.1 from the App Store.
    Reboot.
    Here, the annoying firewall message has gone. I hope it will work for you too.
    I know it's a bit raw and it can be done in a more sophisticated way... But I have no time to deal with this kind of sh*t!
    Cheers.

  • Logging into home remotely - is Verizon blocking incoming connection requests?

    I'm trying to set up my computer at home so that I can access it from my in-laws, who are also FIOS customers and from my Android device via Sprint's network.   Both of these use SSH as the protocol, and on the theory that port 22 might be blocked, I set up the Actiontec to map an alternate port  (1977) to port 22 on my server.  My first attempt was to use the port forwarding capability in the router, but I have been unsuccessful in establishing a connection from outside my network.
    I've tried configuring  my server as the DMZ for the Actiontec, which makes me nervous, but I was running out of ideas.  I even turned the firewall off on the PPoE connection but that didn't help either.
    From outside my network, I can ping the WAN IP address assigned by Verizon to my router, so inbound ICMP packets are OK, at least as far as getting to the Actiontec
    I can log onto my server while on my local network, but not from outside the network.
    I'm running out of ideas.  Does anyone know of a way to dump packets coming to the Actiontec so that I can tell if the inbound TCP packets make it to my router?
    Does Verizon block inbound TCP requests for residential service?  For all ports?
                                      Thanks for any info,
                                Joe H.
    {edited for privacy}
    Solved!
    Go to Solution.

    I don't have it working yet, but I was able to run a test that forwarded the port to my laptop and I see (via wireshark) the inbound connection.  So, while I can log into my server locally, I must have some sort of firewall rule on that server that's preventing connections from the outside.
    Verizon, I apologize for implying you were blocking.   This looks like a local issue on my end.

  • Firewall in set access mode let "allow incoming connections" without me

    I have set up my firewall to allow incoming connections for a file sharing client under "Set Access for specific services and applications", and I noticed that Skype, iChatagent, and Safari all included themselves to be set under allow as well a week later. I did not enter this in manually. How did this occur?

    I am quite befuddled by the 10.5 firewall. Maybe I'm thinking too much, but I've read all the documents I could get a hold of, and I still find it confusing and often conflicting in the specifics.
    For starters, there is the cryptic remark of ""Mac OS X normally determines which programs are allowed incoming connections. Select this option if you want to allow or block incoming connections for specific program." Presumedly the "option" it is referring to is the "Set access for specific services..." option, which implies that the "normally determines" circumstance refers to the first two options. But, "Allow all incoming connections" supposedly allows everything, and "Allow only essential services" supposedly blocks everything (except for two or three things). Where in either of these cases would OS X be "determining" anything, and if it does, what criteria is it using?
    The next thing I don't understand: when the option is set to "Set access for specific services", which applications does OS X explicitly ask permissions for? It seems that it since the firewall is only blocking incoming connections, it should only ask for applications that look like they want to accept incoming connections (i.e., server applications). But for me, it asks for permission for applications like Cyberduck (ftp app), and Microsoft Word 2004. In addition, the poster above mentioned Safari made it onto the list. To me, neither Cyberduck nor Safari should matter, since they are both purely client applications that only receive incoming data when it is requested by them, no? And what business does Word have in wanting to accept incoming connections? (maybe this is a question for Microsoft, not Apple).
    Well, I have a list of other questions about half a page long, but if anyone can help with those two, it would be a big help.

  • What is the fix for some applications repeatedly asking permission to accept incoming connections?

    What is the fix for some applications repeatedly asking permission to accept incoming connections?
    On every restart, AutoPairs and Epson Event Manager asks me to reject or agree to allow incoming connections. It is very aggravating and time-wasting. I know other Mac users who have the identical problem with other applications on their Macs.
    Isn't there some way to make my Mac understand that "Yes" means "Yes" once and for all?
    I am presently running Yosemite, but this was a problem with prior OS X versions too.
    Respectfully,
    Nate

    This is a comment on why you might, or might not, want to use the built-in Application Firewall.
    The firewall blocks incoming network traffic, regardless of origin, on a per-application basis. By default it's off, and when turned on, it allows applications digitally signed by Apple, and only those applications, to listen on the network. It does not block outgoing traffic, nor can it distinguish between different sources of incoming traffic, nor does it filter traffic by content.
    No matter how it's configured, the firewall is not, as some imagine, a malware filter. If that's what you expect it to do, forget it. All it will do is bombard you with pointless alerts.
    Consider some scenarios in which you may expect the firewall to be useful.
    1. You enable file sharing, and you allow guest access to certain folders. That means you want people on your local network, but not outsiders, to be able to access those shared folders without having to enter a password. In the default configuration, the firewall will allow that to happen. The router prevents outsiders from accessing the shares, whether the application firewall is on or off. But if your computer is portable and you connect it to an untrusted network such as a public hotspot, the firewall will still allow access to anyone, which is not what you want. It does not protect you in this scenario.
    2. You unknowingly install a trojan that steals your data and uploads it to a remote server. The firewall, no matter how it's configured, will not block that outgoing traffic. It does nothing to protect you from that threat.
    3. A more likely scenario: The web browser or the router is compromised by an attacker. The attack redirects all web traffic to a bogus server. The firewall does not protect you from this threat.
    4. You're running a public web server. Your router forwards TCP connection requests on port 80 to your Mac, and the connections are accepted by the built-in web server, which is codesigned by Apple. The application firewall, still configured as above, allows this to happen. An attacker hacks into the system and tries to hijack port 80 and replace the built-in web server with one that he controls. The good news here is that the firewall does protect you; it blocks incoming connections to the malicious server and alerts you. But the bad news is that you've been rooted. The attacker who can do all this can just as easily turn off the firewall, in which case it doesn't protect you after all.
    5. You're running a Minecraft server on the local network. It listens on a high-numbered port. You, as administrator, have reconfigured the firewall to pass this traffic. An attacker is able to log in to a standard account on the server. He figures out how to crash Minecraft, or he just waits for you to quit it, and then he binds his own, malicious, Minecraft server to the same port. The firewall blocks his server, and because he's not an administrator, he can't do anything about it. In this scenario, the security is genuine.
    6. Here is a more realistic scenario in which you might have reason to enable the firewall. Your MacBook has sharing services enabled. You want those services to be available to others on a home or office network. When you're on those networks, the firewall should be off. When you move to an untrusted network, you can either turn off all the services, or enable the firewall with a non-default configuration to block them. Blocking is easier: one click instead of several.

  • Firewall blocks service when started from launchd

    I run lighttpd (installed from MacPorts), and it is binded to port 80. I am trying to make the Leopard Firewall play nice with it.
    The firewall is set to 'Set access for specific services and applications', and the lighttpd binary is on the list of applications set with 'Allow incoming connections'.
    When I start the service manually, it works fine, and the firewall allows outside connections to port 80. However, I use the launchd script shipped with MacPort's lighttpd to run lighttpd on boot.
    The firewall appears to block incoming connections to port 80 when lighttpd is started from the launchd script on booting, but allows incoming connections to port 80 when lighttpd is started manually from the Terminal.
    Any idea how to get the firewall to play nicely with lighttpd when started via launchd?

    Hi Steve,
    Welcome to msdn forum.
    Here are some references:
    Enable keyboard layouts for different languages
    How to change keyboard language in Windows
    How to Change Your Keyboard from American to English
    This forum is to discuss problems of Application Compatibility for Windows Desktop Development . Your question is not related to the topic of this forum.
    Hey, Could ya read this before posting
    to this forum? (plus main support link)
    Hope this helps you.
    Best Regards,
    Eileen
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Confused with Firewall Blocking

    I have my Firewall configured to "set access for specific applications and services". Now, my understanding here is that if I set an application to "Block Incoming Connections", that application should not be able to receive any data from the network or internet. However, when I actually try this, the blocked application seems to have no trouble at all receiving data (for example, checking for updates over the internet). Can anyone explain this feature to me?

    {quote}
    Ok, try this, Another user named Noisyboy2006 posted for me...
    "Apple have dumbed down the terminal to make osx more secure. As you've discovered you can no longer open a port from preferences. You can however use terminal.
    The synatax of the command is:
    sudo ipfw add allow udp or tcp from port to port
    For example to open port 80 for TCP you would type:
    sudo ipfw add allow tcp from 80 to 80
    to see a list of open ports type:
    sudo ipfw list
    you'll see something like this:
    33300 deny icmp from any to me in icmptypes 8
    33400 allow udp from 0.0.0.80 to 0.0.0.80
    33500 allow tcp from 0.0.0.80 to 0.0.0.80
    What a useless tool for the average user. Try to explain this to your Mom or an out of state client, over the phone. Even if they get it right, it doesn't fix or configure the NAT firewall in the router.
    Any program or system that requires Terminal is not for prime time on MacOS. System administrators will eat this up, but end users would and should just tell Apple to fix this mess. The Vista firewall and the 25 page "white page" description is the same mess.
    Just get a good effective firewall like Little Snitch, turn off the Apple firewalls and get some work done. If you're lucky, you will be able to open the required ports in your router and deal with rule based programs with a decent interface and the ability to block out-going ports.

  • 10.6 Server's Firewall Blocks It's Own Internet Connection

    I had this problem about two years ago when I was trying to run 10.6 on my home server (Mac mini) for the first time. Eventually I gave up, reverted the mini back to 10.5, and ram problem-free for years. When 10.7 came out, I tried to upgrade the mini to that. That didn't go well either, but mostly due to Lion missing many many features (suprise!). So I figured that 10.6's problems were fixed by now, and gave it another shot. It went fine and I've been running for about a month problem free (or so I thought). But now it's offline again. I finally found one other person on another forum that had the EXACT same problem as me. And reading this description, I realize that I have been having problems all long, I just assumed they were my ISP's problems, not my own.
    So here's what happens. The firewall in 10.6 server will "freak out". It will be running normally, then suddenly it will go haywire and block everything. And I mean everything. My computer won't even be able to get an IP via DHCP. Everything is blocked. But as soon as you stop the firewall, everything works normally. You can even modify the firewall rules, and set it up so there are NO deny rules, and EVERY connection to and from every host is set to allow. And the firewall still blocks everything. This is the same exact thing that happened 2 years ago when I first tried to run 10.6 Server on my mini. The difference is that back then, this would happen either immediatly, or within a day. This time around, with 10.6.8, it took about a month before suddenly, without any provocation, all internet connections stopped.
    I've had this happen on multiple computers. I don't do anything special, I just set up a basic firewall scheme where everything in the LAN range is allowed, and everything from "any" is allowed only to service ports I'm running. The basic gateway setup. Now I was running 10.6 Server on my laptop (for netbooting) and it would do the same thing. But because my laptop wasn't acting as a gateway, I could just turn the firewall off (you need the firewall for NAT). My mini server IS acting as a gateway, as was another mini I set up for a client of mine (that eventualy I changed over so they were running off an airport, and the mini server was just a client. But I don't want that setup at home, I want my mini to be the router).
    I have verizon Fios internet. 25/25, it's great. The ONT is in my basement, and it's plugged into the same fused outlet as our freezer. From time to time, when the power goes out, it trips that breaker and the outlet goes dead. My itnernet is gone and I have to go reset the outlet. Once I do, my mini won't get an IP from Verizon until I reboot the mini. Not once. Not twice. Usually 5-10 reboots, and suddenly it will get an IP. I always assumed this was a verizon problem. Until I read someone else's post about this same problem. Turns out, that's the firewall blocking DHCP again! If you turn the firewall off, you don't have to keep rebooting, it will grab an IP right away.
    At least I'm not crazy! So what is going on here? Does anyone have any idea what is going on with my firewall, or how I can fix it?
    Lastly, after 4.5 hours of complete inability to get an internet connection with the firewall on, it just started working again. I now have fully functional, normal internet. I find it hard to believe 10.6 has a firewall that is simply broken. I find it even harder to believe I'm imagining things, or that I've had fluke after fluke. Something is going on with 10.6 Server.

    The DNS skapegoat just doesn't make sense.
    Why would "improper" DNS cause OS X's firewall to block all network connections? Even the server's ability to make it's own DHCP connection?
    As far as a router, I don't want to use a cheap unreliable residential router. I have a home file server that, aside from running 10.6, makes a super reliable router. And port mapping aside, OS X Server's DHCP server is great to use. Rock solid. It makes no sense to run a cheap residential router when I have a home server. Then every 6-18 months, I get to deal with that router slowly failing, as my internet connection gets slower and slower. No thanks.
    So back to this firewall issue. I've talked to Apple aobut this before, and they give the same generic "DNS has to be right" answer to basically every problem I've ever had with 10.6 Server (hinting at endless CalDAV problems). But no one has every explained what that specifically means, or how something like wrong DNS (whatever that even means) can cause the firewall to block everything. This just makes no sense to me. And this especially does not explain why, after 10 reboots or so, everything just magically starts running normally.
    I just had an incedent today where I woke up to no internet. I rebooted 3 times. Each time, I either got a self-assigned IP address, or the ethernet interface would toggled between "unplugged" and "no-ip". I could turn the firewall off and the server would INSTANTLY start functioning normally. I'd happily run without a firewall, and just turn all services I'm not using off. However NAT needs the firewall, so without the firewall, the Server is the only Mac on the network that has an internet connection. So I kept rebooting and rebooting, and I think about 8 reboots later, like magic, the server came up, grabbed an IP, and everything started working normally.
    Also my IP through my ISP is dynamic, and that isn't going to change. So yes, I am trying to use OS X Server as my router on a dynamic internet connection. I've been doing this since the days of Mac OS X Server 10.1. Only 10.6 has had any problems at all.
    So really, "10.6 is more picky about DNS" isn't an answer to this problem. Or, at least, it's not a sufficient answer. I need much more information than that.

  • Windows Firewall blocking connections to devices

    Hi
    I hope this is the right place. I am having a few problems with the Windows 7 firewall when connecting to embedded devices.
    I currently have a Windows application that connects to 4 embedded devices via TCP but Windows firewall only seems to allow a connection with 2 of the devices even with exceptions setup on the firewall.
    The devices are connected to their own ethernet adapter in the PC '192.168.1.32'. Each device has it's own IP Address but uses the same port.
    The network comes up as a 'public' network and with the firewall for the public profile enabled only connections to the first 2 devices are established.
    If I turn the firewall off for the public profile connections are made to all devices.
    Also if I give each  controller a different port number connection is again made to all devices.
    I was hoping that someone could tell me if this is expected firewall behaviour or at least be able to give me a clue as to why the firewall affects the connections.
    I know I can get round the problem but I wanted to at least understand why this is happening.

    You can check existing rules using this command (using
    admin command prompt).. 
    netsh advfirewall firewall show rule name=all
    and try to understand what is blocking your ports and try to create exceptions accordingly....
    Expected firewall behaviour is to open necessary ports for a  software by making exceptions in the firewall rules by that software while installing.. For some reason if it fails you may have to manually create exceptions.. rules etc..
    Hetti Arachchige V Aravinda | Network & System Administrator (B.Sc, Microsoft Small Business Specialist, MCP, MCTS, MCSA, MCSE,MCITP, CCNA, CEH, MBCS)

  • Blocked outgoing connection /Firewall?

    So I have application that I blocked before from incoming and outgoing connections. Today when I allow it to communicate by turning on "allow connections" in firewall pref pane it doesnt want to connect to update server, I turned off firewall and the same problem persists. It feels like it stored some files and doesnt let me communicate to its server no matter what.
    - I ersed from preferences com.apple.alf.plist
    - I reinstalled the program
    Im not using any 3rd part firewall blocking apps and it feel like something is blocking connection out of my computer.
    Thanks in advanace for your help.

    Hi Milan,
    You are correct - Cloud Database Service users cannot manage the Oracle Wallet themselves. The Cloud APEX instance is configured with the Oracle Wallet that includes 76 common root Certificate Authority certificates. The "GeoTrust Global CA" certificate is among them (StartSSL is not).
    It seems that you are using the "GeoTrust(R) SSL Trial" certificate, which cannot be validated using the provided Oracle Wallet (perhaps the trial certificate is limited in some way). As an example, I compared the certificate chain used by [https://jquery.org/] and it matches yours exactly (same root CA, same intermediate CA). However, they have "QuickSSL(R)" certificate and it can be successfully validated using the provided Oracle Wallet.
    So, it seems that if you upgrade your trial certificate to the full certificate, you should be able to consume your web service from the Cloud Database Service.
    Thanks,
    Vlad

  • Mac does not appear to be accepting any incoming connections (firewall off)

    Hi, all.
    I've been desperately trying to get my PS3 to talk to my Mac with zero success. I've tried a large range of software, from Twonky to MediaTomb to PS3MediaServer to EyeConnect and to MediaLink. All fail to recognise the PS3, and vice-versa.
    Firewall is turned off, router appears fine (seems to work with other computers on network), but the problem persists.
    The apps listed above are not the only ones which will not receive incoming connections from the LAN: VNC does not appear to work, and Transmission bittorrent client is telling me that my ports are on 'stealth' (though this could be a router issue).
    If you think it may be a router issue, my router is a DG934G router provided by Sky Broadband.
    I've recently re-installed the OS (harddrive failure, replaced), but the problem won't seem to budge.
    Thanks very much in advance. I look forward to hearing your insight and wisdom.

    tbotn wrote:
    nerowolfe wrote:
    William Kucharski wrote:
    You must have a third party application or some startup files in place that specifically enable ipfw on your system, as the firewall in Mac OS X Leopard no longer uses ipfw. (ipfw still exists, but you must configure and start it manually.)
    Could you have set up ipfw in a non-standard way on Tiger and those scripts are still being run now that you're using Leopard? Have you set up ipfw using a third-party app
    Good catch. I suspect that this is the problem.
    Not being extremely familiar with ipfw, would the command
    sudo ipfw disable firewall
    do the trick?
    Or at least verify that it is or is not the issue?
    Hurray! My faith has been restored in all things networked! The command "sudo ipfw disable firewall" seemed to do the trick.
    I've just tested Twonky and VNC, and for the first time ever, they're working! Next is to try streaming to the PS3....
    Thank you all
    Actually the real credit goes to William who discovered the problem from your log report. I merely followed up on his surmise and posted the firewall off command for you to try. However, the important thing is that your system is now working properly, which, after all, is the primary purpose of these forums.
    Enjoy

Maybe you are looking for

  • Mac OS X Lion 10.7.3 (11D50b) CRASHES

    CRASHES CRASHES CRASHES CRASHES

  • Can i export mv file in final cut pro x trial

    I tried to export mv file in final cut pro x trial version, suddenly all my files was gone. What happened? How to retrieve the files back? Thank you!

  • 2 Hour DVD- Final Cut Studio/DVD SP

    Hi all, I am editing a 2 hour play and I was wondering what compression settings to use in order to burn it onto one DVD? Or is that even possible? I tried using DVD setting, it compressed for 17 hours.  Then when I tried to burn it, it said the DVD

  • HT4623 ipad restore error code3

    Hello everyone, I try to restore ipad 4 (3G) to ios 7.1 and (ipad can not be restore,error 3) come up, what is that mean? Now I have a brick ipad. I try to google and found no solution, if anybody know anything about this error code 3 please share it

  • What is syncdefaultsd used for?

    I see it launching occasionally and connecting to the internet. I don't like my systems connecting to things when I didn't specifically ask it to. syncdefau 2698 coryj    8u    IPv4 0x79a15eab7b625b79       0t0     TCP 192.168.74.47:52066->17.110.240