Installation Barrier - OS X4.0

I am installing OS X 4.0 on an Emac using CDs. In the past I have been unable to successfully upgrade Itunes; it always stops loading midway through upload and must be aborted. Otherwise I have updated all software regularly using Software Update.
Now I have begun to instally X 4.0 and am on second disk. The installation has stopped at the installation of Itunes and the symptoms are as with previous Itunes updates. I am asked to retry. So now I cannot recover X 3.9 or proceed with the installation of X 4.0. What am I to do? Richard Dean

Richard:
Welcome to Apple Discussions.
It is probably already too late for this time, but I will ask anyway, Do you have an up-to-date backup of at least your Users Folder?
If the answer is No, next question: What installation option did you choose? (update, Erase and Install, Archive and Install?)
Since the Full Retail Version Tiger shipped on DVD and you are using CDs, are you using Apple CDs from the Media Exchange Program, applerescue CDs, or something else?
Do you have another computer that supports firewire available in case you are able to recover your data?
Please post back with requested information.
Good luck.
cornelius

Similar Messages

  • Who kills your iPod after the installation of iPod updater?

    Hello all,
    First, sorry for my poor English. I am not a professional nor a technician and I could be wrong, so please correct me. There are many problems reported mainly from the PC users that their iPod can't be recognized nor mounted after the installation of the latest iPod updater. Most of them claimed that the iPod updater kills their beloved iPods. Before we jump to a conclusion, we must understand what is iPod, and how does the iPod update work.
    I believe that iPod equals a basic computer and need a OS in order to communicate with the PC. Installation the Updater will format the Hard disk of the iPod and then install the simple OS, so if we open the iPod updater file, it will show a window with two buttons i.e. Restore and Update, an Update is to copy the latest OS over the old version, but the Restore will format the hard disk before it install the OS over it. And importantly, during this process, the iPod needs sufficient of power to complete the upgrade, however, the problem comes just after the format, and the PC's USB (only 2 will work not 1.1) does not supply the stable power,even some cases that iPod does not get charge in the half way of installatin (a proper installation, you will see a running bar showing on the iPod screen just after the format), so you can imagine a hard disk got format but only got an uncompleted OS, of course, the iPod would not get recognized and mounted, and do not manage to communicate with the computer. At this stage the iPod will show a Sad iPod icon, a folder with exclamaiton points or a battery charging icon.
    So, what would you do when it reach at this stage, a Reset would not work, and you would not able to do the Restore as the iPod is totally unrecognized by the computer.
    Therefore, is there anyway to solve this problem, in my opinion and from my past experience, the answer is "yes", the simple way is to put your iPod in Disk Mode, when it plug to the computer, it will show as an external Hard Disk, you must fix it by doing a format (RESTORE would not work at this stage as it still can't recognized and mounted), in Mac we can use "Disk Utility" but the XP would not allow you to do the format in FAT32. After the formatting, replug the iPod with the computer, then it can be mounted and allow you to do the RESTORE.
    In addition, I find an interesting point is, if your iPod formatted with a Mac, you will have better chance to be mounted with a PC, even your iPod does not complete the process of the installation of the iPod updater, and a PC formatted iPod will be likely to be fixed by a Mac as well.
    How should we do before the update of the lastest software, for the XP user please do the following:-
    1. Go to the system restore and create a check point in order to revert back to the previous version of the iPod updater, or do the back up using the 3rd party software such as Ghost or Go Back.
    2. To have a test and make sure the PC's USB works properly. You can use the iPod or a PDA, and just make sure it got charged.
    3. Have your iPod a full charge before the installation of the iPod updater
    So, who is the main killer for the iPod?
    For further infomation please read the following link - which wrote by a groups of great people - thank you guys
    http://discussions.info.apple.com/webx?128@@.68ae8668

    Hello Shanker Ghimire,
    Please try run the following command:" devenv /resetuserdata " to have a test, it will clear all your settings. 
    By the way, have you ever got any error when install that Visual Studio SDK?
    In case there are some unknown errors, I'd like to ask you for some logs. Please use 
    http://aka.ms/vscollect 
    to gather the installation logs. After using it, you will find vslogs.cab from %temp% folder. Please upload the file to
    https://skydrive.live.com/ 
    and share the link here.
    Best regards
    Barry
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • VS2013 Installation failed - The Temp folder is on a drive that is full or is inaccessible

    When I trying to install Visual Studio 2013 Premium either from .ISO or web installer, installation fails on installing Microsoft
    Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 with error:
    The Temp folder is on a drive that is full or is inaccessible. Free up space on the drive or verify that you have write permission on the Temp folder.
    But there are enought free space on system drive (36GB) and current user (local admin) and administrator has full access to C:\Windows\Temp and %USERPROFILE%\AppData\Local\Temp folders. "Run as Administrator" has no effect.
    OS: Windows 8 Enterprise x64
    Part of Log file with error:
    [0F28:0408][2015-03-22T11:44:14]i338: Acquiring package: vcRuntimeMinimum_x64, payload: cab5046A8AB272BF37297BB7928664C9503, download from: bits://go.microsoft.com/fwlink/?LinkId=429684&clcid=0x409
    [13C8:0F18][2015-03-22T11:44:16]i305: Verified acquired payload: cab5046A8AB272BF37297BB7928664C9503 at path: C:\ProgramData\Package Cache\.unverified\cab5046A8AB272BF37297BB7928664C9503, moving to: C:\ProgramData\Package Cache\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}v12.0.21005\packages\vcRuntimeMinimum_amd64\cab1.cab.
    [0F28:0408][2015-03-22T11:44:16]i000: MUX:  Source confirmed
    [0F28:0408][2015-03-22T11:44:16]w343: Prompt for source of package: VCRedistD11x86, payload: VCRedistD11x86, path: D:\Soft\packages\vcRedistD11\1033\vcredist_x86.exe
    [0F28:0408][2015-03-22T11:44:16]i000: MUX:  Next Source: Web, Attempted: 1, Limit:3
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  ExecutePackageBegin PackageId: vcRuntimeMinimum_x64
    [0F28:0408][2015-03-22T11:44:16]i000: MUX:  Source retrieved: Web
    [0F28:0408][2015-03-22T11:44:16]i000: MUX:  Package:VCRedistD11x86, PayloadId:VCRedistD11x86 Url: bits://go.microsoft.com/fwlink/?LinkId=429663&clcid=0x409, Attempting count: 1
    [0F28:0408][2015-03-22T11:44:16]i000: MUX:  Existing last unconfirmed source: Web
    [0F28:0408][2015-03-22T11:44:16]i338: Acquiring package: VCRedistD11x86, payload: VCRedistD11x86, download from: bits://go.microsoft.com/fwlink/?LinkId=429663&clcid=0x409
    [13C8:0C8C][2015-03-22T11:44:16]i301: Applying execute package: vcRuntimeMinimum_x64, action: Install, path: C:\ProgramData\Package Cache\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}v12.0.21005\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi, arguments:
    ' MSIFASTINSTALL="7" NOVSUI="1"'
    [13C8:0C8C][2015-03-22T11:44:16]e000: Error 0x80070660: Failed to install MSI package.
    [13C8:0C8C][2015-03-22T11:44:16]e000: Error 0x80070660: Failed to execute MSI package.
    [0F28:11A4][2015-03-22T11:44:16]e000: Error 0x80070660: Failed to configure per-machine MSI package.
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Installation size in bytes for package: vcRuntimeMinimum_x64 MaxAppDrive: 0  MaxSysDrive: 8192  AppDrive: 0  SysDrive: 8192
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Return Code:0x80070660 Msi Messages:0 Result Detail:0 Restart:None
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Set Result: Return Code=-2147023264 (0x80070660), Error Message=, Result Detail=, Vital=True, Package Action=Install, Package Id=vcRuntimeMinimum_x64
    [0F28:11A4][2015-03-22T11:44:16]i319: Applied execute package: vcRuntimeMinimum_x64, result: 0x80070660, restart: None
    [0F28:11A4][2015-03-22T11:44:16]e000: Error 0x80070660: Failed to execute MSI package.
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  ExecutePackageBegin PackageId: vcRuntimeMinimum_x64
    [13C8:0C8C][2015-03-22T11:44:16]i318: Skipped rollback of package: vcRuntimeMinimum_x64, action: Uninstall, already: Absent
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Installation size in bytes for package: vcRuntimeMinimum_x64 MaxAppDrive: 0  MaxSysDrive: 0  AppDrive: 0  SysDrive: 0
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Return Code:0x0 Msi Messages:0 Result Detail:0 Restart:None
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Reset execution Result
    [0F28:11A4][2015-03-22T11:44:16]i000: MUX:  Reset Result
    [0F28:11A4][2015-03-22T11:44:16]i319: Applied rollback package: vcRuntimeMinimum_x64, result: 0x0, restart: None
    [13C8:0C8C][2015-03-22T11:44:16]i351: Removing cached package: vcRuntimeMinimum_x64, from path: C:\ProgramData\Package Cache\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}v12.0.21005\
    [0F28:162C][2015-03-22T11:44:17]e000: Error 0x80070642: UX aborted on download progress.
    [0F28:162C][2015-03-22T11:44:17]e000: Error 0x80070642: Failed to send progress from BITS job.
    [0F28:162C][2015-03-22T11:44:17]e000: Error 0x80070642: Failure while sending progress during BITS job modification.
    [0F28:0408][2015-03-22T11:44:17]e000: Error 0x80070642: Failed attempt to download URL: 'bits://go.microsoft.com/fwlink/?LinkId=429663&clcid=0x409' to: 'C:\Users\GUK_MI~1.AXM\AppData\Local\Temp\{fec93b6d-17f6-4952-96e1-2af5a525cf5d}\VCRedistD11x86'
    [0F28:0408][2015-03-22T11:44:17]i000: MUX:  Set Result: Return Code=-2147023294 (0x80070642), Error Message=, Result Detail=, Vital=False, Package Action=Download_Bits, Package Id=VCRedistD11x86
    [0F28:0408][2015-03-22T11:44:17]e000: Error 0x80070642: Failed to acquire payload from: 'bits://go.microsoft.com/fwlink/?LinkId=429663&clcid=0x409' to working path: 'C:\Users\GUK_MI~1.AXM\AppData\Local\Temp\{fec93b6d-17f6-4952-96e1-2af5a525cf5d}\VCRedistD11x86'
    [0F28:0408][2015-03-22T11:44:17]e313: Failed to acquire payload: VCRedistD11x86 to working path: C:\Users\GUK_MI~1.AXM\AppData\Local\Temp\{fec93b6d-17f6-4952-96e1-2af5a525cf5d}\VCRedistD11x86, error: 0x80070642.
    [13C8:0C8C][2015-03-22T11:44:17]i372: Session end, registration key: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{fec93b6d-17f6-4952-96e1-2af5a525cf5d}, resume: ARP, restart: None, disable resume: No
    [13C8:0C8C][2015-03-22T11:44:17]i371: Updating session, registration key: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{fec93b6d-17f6-4952-96e1-2af5a525cf5d}, resume: ARP, restart initiated: No, disable resume: No
    [0F28:11A4][2015-03-22T11:44:17]i000: MUX:  Apply Complete: Disk Space Used in bytes for Installation:  MaxAppDrive: 0  MaxSysDrive: 2998272  AppDrive: 0  SysDrive: 1826816
    [0F28:11A4][2015-03-22T11:44:17]i000: MUX:  Free Disk Space after install:  SystemDrive C:\ 37906563072 bytes  AppDrive C:\ 37906563072 bytes
    [0F28:11A4][2015-03-22T11:44:17]i000: MUX:  Go to Finished page.
    [0F28:11A4][2015-03-22T11:44:17]i399: Apply complete, result: 0x80070660, restart: None, ba requested restart:  No

    Hello Barry,
    Thanks for reply.
    Sorry for inaccuracy, I have 36 GB free space on my system drive, its total size is 128GB.
    Subinacl installation failed with error "Internal Error 2755. 1632", here is a part of installer logs, maybe it helps...
     ******* Product: D:\Soft\subinacl.msi
               ******* Action: INSTALL
               ******* CommandLine: **********
    MSI (s) (5C:00) [11:32:19:372]: Machine policy value 'DisableUserInstalls' is 0
    MSI (s) (5C:00) [11:32:19:387]: Note: 1: 2203 2: C:\Windows\Installer\inprogressinstallinfo.ipi 3: -2147287037 
    MSI (s) (5C:00) [11:32:19:387]: Machine policy value 'LimitSystemRestoreCheckpointing' is 0
    MSI (s) (5C:00) [11:32:19:387]: Note: 1: 1715 2: Windows Resource Kit Tools - SubInAcl.exe 
    MSI (s) (5C:00) [11:32:19:387]: Calling SRSetRestorePoint API. dwRestorePtType: 0, dwEventType: 102, llSequenceNumber: 0, szDescription: "Installed Windows Resource Kit Tools - SubInAcl.exe".
    MSI (s) (5C:00) [11:32:19:403]: The call to SRSetRestorePoint API succeeded. Returned status: 0, llSequenceNumber: 345.
    MSI (s) (5C:00) [11:32:19:403]: Note: 1: 1336 2: 3 3: C:\Windows\Installer\ 
    MSI (s) (5C:00) [11:32:19:403]: MainEngineThread is returning 1632
    MSI (s) (5C:40) [11:32:19:403]: Calling SRSetRestorePoint API. dwRestorePtType: 13, dwEventType: 103, llSequenceNumber: 345, szDescription: "".
    MSI (s) (5C:40) [11:32:19:403]: The call to SRSetRestorePoint API succeeded. Returned status: 0.
    MSI (s) (5C:40) [11:32:19:403]: User policy value 'DisableRollback' is 0
    MSI (s) (5C:40) [11:32:19:403]: Machine policy value 'DisableRollback' is 0
    MSI (s) (5C:40) [11:32:19:403]: Incrementing counter to disable shutdown. Counter after increment: 0
    MSI (s) (5C:40) [11:32:19:403]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts 3: 2 
    MSI (s) (5C:40) [11:32:19:403]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts 3: 2 
    MSI (s) (5C:40) [11:32:19:403]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied.  Counter after decrement: -1
    MSI (c) (B4:BC) [11:32:19:403]: Note: 1: 2755 2: 1632 3: D:\Soft\subinacl.msi 
    DEBUG: Error 2755:  Server returned unexpected error 1632 attempting to install package D:\Soft\subinacl.msi.
    Internal Error 2755. 1632, D:\Soft\subinacl.msi
    MSI (c) (B4:BC) [11:32:21:648]: Product: Windows Resource Kit Tools - SubInAcl.exe -- Internal Error 2755. 1632, D:\Soft\subinacl.msi

  • How to add NI VI's in a executable and installer

    I have a working program made in Labview, but I have problems withy creating an executable and installer.
    The first thing I did was create a project, I have the Main program and under the Dependencies I have the Vi's and the VI.lib from labview 8.6 directory.
    I made an executable and after that an Installer. But when I run the installer version it's missing some Vi's.
    These Vi's arer mainly the VI's that come from the vi.lib from the LAbview 8.6 directory. Some how these Vi's aren't taken into the executable and installer.
    What am I doing wrong????
    Kind regards,
    Barry Bomer

    Hi Bomer,
    normally all vi's you need are automatically in the executable. Do you use some dynamic called vi's, maybe the report generation toolkit?
    Mike
    Message Edited by MikeS81 on 01-15-2009 09:27 AM

  • Not able to create a Volume Group in the oracle VM server installation

    Hi,
    I am installing Oracle VM server. In the installtion ( Partition time ), i click on create custom layout and i want to create a / partition as a logical volumn under volume group. But there is no option to create a Volume group actually. So can anybody help how to create a volume group actually and how to create a logical volume under volume group.

    user10274248 wrote:
    So can anybody help how to create a volume group actually and how to create a logical volume under volume group.LVM is not recommended in Dom0, which is why support for LVM has been removed from the installer. LVM is not cluster aware and does not support write barriers, both of which are important for a filesystem that is used for storing file-backed disk images.

  • Errors in installation of SAP XI on MSCS windows server 2003

    We have started installing our XI QAS on a MSCS running windows server 2003.  We've followed the installation guide and loaded the Oracle binaries onto each node and the latest patches, have installed oracle failsafe (3.2.2) - done all the DNS & TCP/IP checks, installed abap and abap DB on central instance, and started configuring MSCS using SAPInst - all this successfully completed....
    The problem we are having are:
    In the Oracle Failsafe Manager, when trying to move <SID>.world from standalone resource to cluster service we get the following errors (after completing all actions on Node A - errors appear to relate to Node B) ....
    FS-10890: Oracle Services for MSCS failed during the add operation
    FS-10778: The database resource provider failed to configure the the cluster resource <DBSID>.world
    FS-10040: Failed to create the database resource <DBSID>.world
    ORA-01078: failiure in processing system parameters...
    The settings are then rolled back......
    I've not had any luck on either the oracle site or sap site finding solutions to these problems.
    We've checked all permissions - all okay, Oracle homes are correct, Ip addresses (public and private) are all correct, and now running out of ideas... 
    Anyone have any ideas??
    I can provide more information is needed....
    Message was edited by: Barry Neaves

    The line in the log right before the error messages reads:
    49  09:07:17   > FS-10427: Creating database instance <DBSID> for TNS service name <DBSID>.WORLD
    I assume it this part that failed.....  It took ten seconds before listing the error messages.....
    Any thoughts??

  • Please advise on security software/anti virus barrier

    Hi there,
    I would just like to know which security software/antivirus woks best with mountain lion?
    cheers

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • We looking for sap xi installation in our office, how to approach with SAP

    we looking for sap xi installation in our office, how to approach with SAP Services.
    What are the uses of SAP Netweaver Platform Integration,can you give me the details of this and , from where  i can  get this one.
    And what are the components i need to buy ,plz any one of you send it to me.
    Thanks & Regards,
    priya reddy

    Hi barry,
    Thank you very much for u r  reply
    Thanks & Regards,
    priya reddy

  • Virus Barrier X4 question and a Top 10 Network/Security question

    I am currently running Norton AV/Mac. It runs fine, no problems, no slow down, am happy! However, I know that there are some very experienced Mac users who are very down on Norton AV as far as causing problems/hogging resources/slowing things down...again, I don't have any problem, but I am still a newbie. I see however that one of the top 10 Network/Security downloads is Virus Barrier X4. If I want to run an AV program, could someone shed some light on wht this would be a better application? Also the number 1 download in this category is Mac Scan. I am confused, Forget virus's, I thought there was no Spyware/Malware? Why would so many people make this such a popular download..Curious! Thanks, Bill

    Bostonfan49,
    Spyware is a self-inflicted injury.
    To prevent drive-bys, remember to uncheck the Open "safe" files after downloading box in the Safari>Preferences>General tab and make sure that you're blocking pop-up windows.
    Configure your firewall correctly (turn off ALL unused services) and stealth it.
    Don't use P2P (Limewire and the like) or visit "dodgy" (unknown, copyright infringing, skanky, pr0n, etc.) Web sites.
    Never, ever install any program or give any installer your admin password unless you are certain that you know and trust the source.
    Create a separate administrator account for installing software and updates and make your normal user account an ordinary, nonadminstrative user.
    OS X is not immune to spyware: The spyware would still have to be coded to run in OS X. Requiring an administrator account and click-the-"Yes"-box user permission to install and run didn't prevent KaZaa (and its bundled nasties) from being downloaded and installed by millions, so this OS X "barrier" to malware is subject to the same vulnerability. That said, I'm not aware of much of anything in the way of spyware for Macs.
    -Wayne

  • Does anyone have LABVIEW 6.1 Installation CDs?

    Does anyone have LABVIEW v6.1 installation CDs? 

    The best option would be to find someone else in Indiana.
    If your sales rep can put you into touch with some long-running customers, they should be able to hunt down some CDs.  The fact that NI doesn't keep the CDs on stock is sometimes annoying but is at least consistent.  I had the same problem here in Switzerland.
    Ask your sales rep just to do youa  favour.  YOu're a paying customer after all, and the licence allows downgrading so there's no legal barrier.
    Just making sure there's no legal barrier is best if you actually go over your sales rep.  He can even contact me if he wants, and I'll pass on CDs to you via your local NI sales rep.
    Cost? 5 Stars 
    Shane.
    Say hello to my little friend.
    RFC 2323 FHE-Compliant

  • HT1222 What's the fix for the Flashback Installer virus?

    I am infected with the fake Flashback Adobe installer. I deleted everything associated with it, ran my Intego Virus Barrier 6, installed the authentic Adobe Flashback and changed my email password in my Mac mail and in the mail program from my ISP but the viral emails keep on coming.
    When will there be a fix for this?

    Helpful Links Regarding Flashback Trojan and Virus Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    A link to a great User Tip about the trojan: Flashback Trojan User Tip.
    To check for the trojan: Anti Flashback Trojan 2.0.4.
    A Google search can reveal a variety of alternatives on how the remove the trojan should your computer get infected. This can get you started. Or the preferred method is to use Apple's protection tool: Flashback Malware Removal Tool 1.0.
    Or, open Software Update. If you do not have the Apple protection software installed it will download and install it via Software Update. If no update appears that means you either already have it installed or it isn't needed for your system. The software is only available for Leopard, Snow Leopard, and Lion versions of OS X.
    Also see Apple's article About Flashback malware.
    For general anti-virus protection I only recommend using ClamXav.

  • I stopped installation, wont work.

    hey, i dont know if this is a common issue or not but i searched for it and couldnt find an answer....so here's what happened. I finally started to install version 10.4.11 from the Software Update. it was taking forever and i had to turn off my installation process. so i Quit (force quit?) Software Update....It was in the final step of isntallation, in fact it was just sitting there at the end (abour 97% finished) for almost 10 minutes.
    A few hours later after i had more time to wait for that stupid installation to finish i open Software Update and it says i don't have any new Update and also it wont open it. I Restarted the computer and opened it again...nothing. i look at the About This Mac and it says i'm currently running 10.4.11 but the wierd thing is, is that i never finished letting it install...AND on top of that, my safari doesnt work...which is the main reason i updated to 10.4.11
    I'm using FireFox and i downloaded 10.4.11 from the apple site. i open it up and when it opens, it automatically quits and says there's an error....
    SO...what i'm asking, is there a way to finish the installation of 10.4.11 after force quiting the Software Updates? or is this version perma-bugged. thanks apple.

    After you have followed Barry's important advice, please bear this in mind:
    There are no guarantees, but following this procedure when installing updates and upgrades on your Mac will go a long way towards avoiding unpleasant after effects and ‘post-update stress disorder’.
    It is also worth noting that it is an extreme rarity for updates to cause upsets to your system, but they may well reveal pre-existing ones, particularly those of which you may have been unaware. If you are actually aware of any glitches, make sure they are fixed before proceeding further.
    So before you do anything else:
    If you can, make a full backup first.
    Turn off sleep mode for both screen and hard disk.
    Disconnect all peripherals except your keyboard and mouse.
    1. Repair Permissions (in Disk Utility)
    2. Verify the state of your hard disk using Disk Utility. If any faults are reported, restart from your install disk (holding down the C key), go to Disk Utility, and repair your startup disk. Restart again to get back to your startup disk.
    At least you can now be reasonably certain that your system does not contain any obvious faults that might cause an update/upgrade to fail.
    3. Download the correct version of the COMBO update from the Apple download site. If your car runs on gasoline you would not want to fill the tank with diesel, so don’t try to install the PPC updater on an Intel Mac!
    If you prefer to download updates via Software Update in the Apple menu (which would ensure that the correct version for your Mac was being downloaded), it is not recommended to allow SU to install major (or even minor) updates automatically. Set Software Update to just download the updater without immediately installing it. There is always the possibility that the combined download and install (which can be a lengthy process) might be interrupted by a power outage or your cat walking across the keyboard, and an interrupted install will almost certainly cause havoc. Once it is downloaded, you can install at a time that suits you. You should make a backup copy of the updater on a CD in case you ever need a reinstall.
    Using the Combo updater ensures that all system files changed since the original 10.4.0 are included, and any that may have been missed out or subsequently damaged will be repaired. The Delta updater, although a temptingly smaller download, only takes you from the previous version to the new one, i.e. for example from 10.4.10 to 10.4.11. Software Update will generally download the Delta updater only. The preferable Combo updater needs to be downloaded from Apple's download site.
    Now proceed as follows:
    4. Close all applications.
    5. Unplug all peripherals except your keyboard and mouse.
    6. Install the update/upgrade. Do not under any circumstances interrupt this procedure. Do not do anything else on your computer while it is installing. Be patient.
    7. When it ask for a restart to complete the installation, click restart. This can take longer than normal, there are probably thousands of files to overwrite and place in the correct location. Do nothing while this is going on.
    8. Once your Mac is awake, repair permissions again, and you should be good to go!
    If your Mac seems slightly sluggish or ‘different’, perform a second restart. It can’t hurt and is sometimes efficacious!
    9. Open a few of your most used applications and check that all is OK. In this connection please remember that not all manufacturers of third party applications and plug-ins, add-ons, haxies etc, will have had time to do any necessary rewrites to their software to make them 10.4.10. compliant. Give them a weeks or two while you regularly check their websites for updates. This applies particularly to plug-ins for Safari 3.
    N.B. Do not attempt to install two different updates at the same time as each may have different routines and requirements. Follow the above recommendations for each update in turn.
    Lastly, Apple's own article on the subject of Software Update may also be useful reading:
    http://docs.info.apple.com/article.html?artnum=106695
    If you are updating to Safari 3.0.4 (or just have):
    Input Managers from third parties can do as much harm as good. They use a security loophole to reach right into your applications' code and change that code as the application starts up. If you have installed 10.4.11 and Safari is crashing, the very first thing to do is clear out your InputManagers folders (both in your own Library and in the top-level /Library), log out and log back in, and try again.
    So, disable all third party add-ons before updating Safari, as they may not have been updated yet for the new version. Add them back one by one. If something goes awry, remove it again and check on the software manufacturer's website for news of an update to match your version of Safari. Remember: Tiger up to 10.4.10 used Safari 2.0.4 or, if you downloaded it, Safari 3.0.3 beta. Safari 10.4.11 uses Safari 3.0.4 which is not a beta. If Safari 3.0.4 on 10.4.11 is not the fastest browser you have ever used, then something is wrong!
    Moreover, trying to revert to Safari 2 when running 10.4.11 can have repercussions, as Safari 3.0.4 uses a completely different webkit on which other applications like iChat, Mail and Dashboard Widgets etc also rely.
    Most errors reported here after an update are due to an unrepaired or undetected inherent fault in the system, and/or a third party ad-on. Two such add-on that have been frequently mentioned here for causing such problems are Piclens and Pithhelmet. If you have them, trash them.
    Additional tips on software installation here:
    http://docs.info.apple.com/article.html?artnum=106692

  • Intego Internet Security Barrier X6 and OS X's firewall

    Hi!
    This may be the wrong place ot ask this question, but I coundn't find any better.
    I'm wondering if the internet security program Intego Internet Security Barrier X6 works well with OS X's built-in firewall...
    I also wonder if it is recommended/neccesarly to use such software on a mac - but I guess there have become a lot of mac-user these days, that means more viruses/threaths.
    And, at last, I also wonder if other products than Intego's are "better"; such software as Norton and Kaspersky.
    Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "archive extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. A separate Java installer is distributed by Apple, and another one by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable any version of Java on a public web page that carries third-party advertising. Use it, if at all, only on well-known, password-protected, secure business or government websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Re-installation advice, please

    Hi all.
    After installing CS4, shortly after its introduction, everything went well, sort of. The GPU feature wouldn't work with my older graphics card, I think. At least it wasn't one of the tested/supported cards.
    Then, my D drive (storage and scratch), started not being seen, intermittently. After alternating the cables and moving the drive, to test it, with help, we determined the mobo might be the culprit. AARRGGHH!!
    Anyway, I decided to do an overhaul, and upgrade my pc.
    With the first re-install of Windows, using a quick format, Windows fought us, and Photoshop took 4, count'em FOUR tries to install.
    After a week processing pictures, and fighting the occasional crash, which had never happened to me before(!!!!!!), and the issues mentioned by others regarding GPU, etc., I decided to do it all again.
    Did a full format of C, re-installed Windows, smooth as a baby's.....well, you know.
    All running smoothly, so far.... fingers crossed, toes crossed, etc, etc.:)
    Before the re-build, I cloned the C drive, as everyone says to do, after de-activating both CS3 & CS4. (BTW, I only installed CS4 on the 'new machine'. Before the 2nd go round and full format, I cloned the C again, to a different folder, both times on the D drive.
    Now I'm ready to re-install PS. My questions:
    Should I do anything with the cloned folder(s) on the D drive beforehand?
    Should I do only CS3 and wait for anticipated patches for CS4? (CS3 always ran smoothly, never crashed, etc.)Or go ahead and install both?
    Are there any elements of CS4 I should NOT choose to install?
    If a clean install of CS4 occurs, with no hiccups, that is, am I likely to have fewer issues than the first time?
    Are there any other issues I should be aware of, or things I should do?
    As you probably can tell, I'm soooo not a computer person.
    BTW, my new system has EVGA 750i SLI mobo, 9800 GTX+ graphics card, Intel core2 quad Q6600 processor, 4 GB OCZ Reaper 1066 memory, 600 w power supply, WinXP pro, 32 bit.
    I appreciate all the help you guys and gals can offer!!
    Barry

    I would forget the clones unless you need data on them. don't try to copy applications from them! you have a smooth running machine. don't mess with that.
    I would run windows update a few times until you have nothing left to update. including optionals, if you have any.
    if you want to install cs3 and cs4, install cs3 first. get everything running. apply all updates. run the adobe updater a couple of times to make sure they all install correctly and nothing is left.
    once that all works move on to 4. i wouldn't leave anything off the installation. let it do it's thing.
    >1066 memory
    might consider bumping that to at least 2 gig...

  • Installer Crash - While installing Lotus Notes 8.5.2

    I'm attempting to install lotusnotes852_macen.dmg and the Installer crashes every time I try. I've deleted all Lotus files, rebooted, and the Installer continues to crash. Below is the beginning of the crash log. I'd greatly appreciate any suggestions...Thanks!
    Process: Installer [528]
    Path: /System/Library/CoreServices/Installer.app/Contents/MacOS/Installer
    Identifier: com.apple.installer
    Version: 4.0 (430.1)
    Build Info: Installer-4300100~2
    Code Type: X86 (Native)
    Parent Process: ??? [1]
    Date/Time: 2010-09-01 19:03:43.405 -0700
    OS Version: Mac OS X 10.6.4 (10F569)
    Report Version: 6
    Interval Since Last Report: 1319018 sec
    Crashes Since Last Report: 37
    Per-App Interval Since Last Report: 8748 sec
    Per-App Crashes Since Last Report: 32
    Anonymous UUID: 2BD548A3-A548-4B74-BDCB-5BEE3E551178
    Exception Type: EXC_BREAKPOINT (SIGTRAP)
    Exception Codes: 0x0000000000000002, 0x0000000000000000
    Crashed Thread: 4
    Application Specific Information:
    * Terminating app due to uncaught exception 'NSUnknownKeyException', reason: '[<AppController 0x396ec0> valueForUndefinedKey:]: this class is not key value coding-compliant for the key children.'
    * Call stack at first throw:
    0 CoreFoundation 0x908fbbba __raiseError + 410
    1 libobjc.A.dylib 0x912c7509 objcexceptionthrow + 56
    2 CoreFoundation 0x909469f1 -[NSException raise] + 17
    3 Foundation 0x920d7594 -[NSObject(NSKeyValueCoding) valueForUndefinedKey:] + 279
    4 Foundation 0x91ff870b _NSGetUsingKeyValueGetter + 68
    5 Foundation 0x91ff7c7a -[NSObject(NSKeyValueCoding) valueForKey:] + 413
    6 Foundation 0x91ffb5a4 -[NSObject(NSKeyValueCoding) valueForKeyPath:] + 204
    7 AppKit 0x97f83bca -[NSBinder _valueForKeyPath:ofObject:mode:raisesForNotApplicableKeys:] + 841
    8 AppKit 0x97f837f5 -[NSBinder valueForBinding:resolveMarkersToPlaceholders:] + 188
    9 AppKit 0x98141e82 -[NSArrayDetailBinder _refreshDetailContentInBackground:] + 430
    10 AppKit 0x97f829ad -[NSBinder _performConnectionEstablishedRefresh] + 85
    11 AppKit 0x97f750b8 -[NSObject(NSKeyValueBindingCreation) bind:toObject:withKeyPath:options:] + 721
    12 AppKit 0x98021003 -[NSNibBindingConnector establishConnection] + 156
    13 AppKit 0x97f503f3 -[NSIBObjectData nibInstantiateWithOwner:topLevelObjects:] + 1249
    14 AppKit 0x97f4e508 loadNib + 257
    15 AppKit 0x97f4db5b +[NSBundle(NSNibLoading) _loadNibFile:nameTable:withZone:ownerBundle:] + 831
    16 AppKit 0x97f4d811 +[NSBundle(NSNibLoading) loadNibFile:externalNameTable:withZone:] + 158
    17 InstallerPlugins 0x00039b07 -[InstallerSection(Private) _loadMainNib] + 701
    18 Installer 0x0001efd9 0x0 + 126937
    19 Foundation 0x91fed8d4 -[NSThread main] + 45
    20 Foundation 0x91fed884 _NSThread__main_ + 1499
    21 libSystem.B.dylib 0x91a1d81d pthreadstart + 345
    22 libSystem.B.dylib 0x91a1d6a2 thread_start + 34
    )

    Hi Barry,
    Actually, Lotus Notes is still used by a lot of companies. By the way, it looks like IBM finally recognized 8.5.2 is a bad installer package and pulled it from their partner site.
    On a side note...as a new mac owner I've realized that OSX is pretty much Linux based. Among other things, I've been involved in building custom Linux systems for the past 10 years.
    I think I'll try to help out here too as I learn more about OSX internals.
    Glenn

Maybe you are looking for