Internet limitations for 10.7 update

For users who have a limited access to internet, will it be possible to have a DVD for OS 10.7 update ?

Try dragging either Pages, Numbers or Keynote to another Mac and see if you can get it to run.
From all accounts in the iWork forum that fails.
All 3 iWork applications are very large, as are those in the iLife suite, which inevitably have to be repurchased when they go up a whole version. The whole issue of multiple large updates aggravates the issue when the update becomes handled through the MAS and not via a transferable updater.
Both iWork and iLife are both delivered on DVDs for a reason. MacOSX will not fit on anything less than a dual density DVD.
XCode for example is now 4.25 Gb and many Apple applications now are not smaller patches but complete reinstalls.
The massive increase in DLs will easily exceed my entire monthly limit if I am forced to use the MAS to update all my Macs. That could leave me disconnected from the very thing Apple wants me to be permanently connected to.
All that ignores just how bad this is for the environment. If it takes off it will be a catastrophe in its own right.

Similar Messages

  • I am unable to get past the first step of Winston Churchill's answer because my phone says "checking for a software update failed because you are not connected to the Internet". Did my WiFi connection also get lost?

    I am unable to get past the first step of Winston Churchill's answer because my phone says "checking for a software update failed because you are not connected to the Internet."  Did my iphone's WiFi connection also get lost with the Contacts, Mail and Text Messages?  When I tried the software update, as recommended by Winston Churchill, the iphone was connected to my desktop which is connected to the Internet.

    You can't use your computers Internet connection to update your phone from the phone itself. If you want to use the computers Internet connection to update your phone you must update it through iTunes.

  • Everytime I want to remote my itunes from my iphone, itunes search for radio-stream updates. I often use remote when I'm not connected to Internet so itunes tell me that I should connect to Internet. This is new since 10.5. Can I turn this off?

    Everytime I want to remote my itunes from my iphone, itunes search for radio-stream updates. I often use remote when I'm not connected to Internet so itunes tell me that I should connect because the radio-stream update can't be made. This is new since 10.5. Can I turn off the search for Radio-Stream or does someone else has an Idea how to fix the problem?

    weird very weird. today i did this again today after already being unsuccessful earlier. exactly the same thing as i have done before, exactly. didn't try to import. didn't say damaged library, copied everything in including date. have tried it about 10 times no luck. today it just worked.
    how weird is that?
    oh well JG - maybe you mixed a magic potion for me?
    anyway, thank you for all the help.
    to anyone else reading this all i can say is keep trying, you never know. follow the above advice. you may feel exasperated and think you have done it already, but keep trying.
    cheers
    P

  • After an update to firefox I keep getting a warning from my Firewall (McAfee) "Program wants internet access". I have permission set at outgoing for firefox and updates checking off, to check that request is valid so what does it need access for

    After an update to firefox I keep getting a warning from my Firewall (McAfee) "Program wants internet access". I have permission set at outgoing for firefox and updates checking off, to check that request is valid so what does it need access for

    This was not a Firefox update, but a piece of malicious software you have inadvertently downloaded from a site called http://ffftp.co.cc/ which is impersonating Firefox. I discovered this as soon as my Zonealarm requested permission for "Golds" to access the internet. Golds??!! However I couldn't find a file with this name installed on my computer.
    You should delete the file you downloaded and certainly do not allow internet access to any suspicious program. If you have already given permission, scan your PC immediately for any virus, malware, etc. Best of luck.

  • Do you need internet to download a software update on itunes for ipod

    okay i've got a new ipod and im downloading iOS 6 on laptop and i know you need internet at the start but im leaving to go somewhere soon and planning to take laptop with me and still continuing the update im just wondering
    do you need internet through the whole process?

    You need an internet connection until the actual update starts. First the computer downloads the update file and then it verifies the files by contacting Apple. Then the update starts and an internet connection is no longer required.
    If you stop after downloading the update file, you will need an internet connection when you resume since iTunes has verify the file right before actually updating/restoring the iPod

  • Is it suggested to use an additional layer of internet security such as ESET Cyber Security Pro - Internet Security for Mac

    I just want to make sure I am as safe as possible with all the internet hacking that has been in the Media. I have a Mac Mini that was purchased in Aug. 2013.  Is it suggested to use an additional layer of internet security such as ESET® Cyber Security Pro - Internet Security for Mac ???

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • How do I use Airport Extreme to limit internet time for my kids?  His computer is hardwired to the modem.

    How do I use Airport Extreme to limit internet time for my kids?  His computer is hardwired to the modem.

    You can set up daily time limits for each computer that connects using wireless, but it is not possible to do this when a computer is connecting directly using a wired Ethernet connection.
    Open Macintosh HD > Applications > Utilities > AirPort Utility on your Mac and click Manual Setup
    Click the Access Control tab below the icons
    Select Timed Access
    For more details on this, click the Help menu at the top of the screen and enter the following phrase into the search box:
    Controlling access to your wireless network
    A more sophisticated approach would be to use a service provided by OpenDNS. From your computer, this would allow you to monitor web sites visited, and block any unsuitable sites. More info is here:
    http://www.opendns.com/landings/familyshield

  • I would like to connect a printer that requires OS 10.6 or newer. My MacBook is currently using OS 10.5.8. In searching for a software update, I am told no updates are needed. How can I upgrade my OS to 10.6 or better?

    I would like to connect a printer that requires OS 10.6 or newer. My MacBook is currently using OS 10.5.8. In searching for a software update, I am told no updates are needed (and am given no option for updating my OS). How can I upgrade my OS to 10.6 or newer?

    You have to understand the difference between an Update and an Upgrade.
    An Update is a free change to add to the base code or as a bug fix within an existing Operating System. Such as the .8 added to OSX 10.5 or the .11 added to OSX 10.4..
    An Upgrade is a complete new Operating System that must be purchased. Such as 10.5 Leopard to 10.6 Snow Leopard.
    10.5 Leopard was written for Power PC Macs with code added to force it to run on Intel processors.
    10.6 Snow Leopard has completely rewritten code and only runs on Intel Macs.
    10.7 Lion ($19.99) used some 32 bit which allows it to run on Late 2006 through Early 2008 MacBooks and a lot of 64 bit code.
    10.8 Mountain Lion ($19.99) is pure 64 bit, which excludes more systems than Lion did. It can only run on the Late 2008 through Mid 2010 MacBooks. It's not something you can add memory to, for example, as it involves the base architecture.
    10.9 Mavericks is pure 64 bit and is a free download from the App store.
    The 10.6 Snow Leopard DVD is in the Apple online store. You can get it for $19.99. http://store.apple.com/us/product/MC573/mac-os-x-106-snow-leopard After you’ve installed that then download the 10.6.8 combo updater to finish it off. http://support.apple.com/kb/DL1399 You will need to be running 10.6.8 to access the App Store to order Lion, Mountain Lion or Mavericks which are downloads only.
    System Requirements for 10.6:
    Mac computer with an Intel processor
    1GB of memory
    5GB of available disk space
    DVD drive for installation
      Some features require a compatible internet service provider: fees may apply.

  • Limitation for CLOB columns? - ORA-01704: string literal too long

    Hello!
    I'm trying to update a CLOB column with more than 35000 characteres, but I get "ORA-01704: string literal too long".
    The code:
    declare
    l_clob clob;
    begin
    update test set test = empty_clob()
    WHERE ID = 1
    returning test into l_clob;
    dbms_lob.write( l_clob, length('A...here 35000xA...A'), 1,'A...here 35000xA...A');
    end;
    Is there any limitation for CLOB columns?
    Thanks for help.
    Daniel

    user605489 wrote:
    32768 characteres :)Actually it's 1 character less than 32K...
    *32767*
    SQL> declare
      2    v_vc varchar2(32768);
      3  begin
      4    null;
      5  end;
      6  /
      v_vc varchar2(32768);
    ERROR at line 2:
    ORA-06550: line 2, column 17:
    PLS-00215: String length constraints must be in range (1 .. 32767)
    SQL>I guess it comes from a legacy thing where signed words (2 bytes) are/were used to represent a value. As the most significant bit of the word is used to represent the sign of the number the range goes from -32768 to 32767.

  • HT3204 Error message : "network connectivity was reset" for trying to update itunes match".

    I followed instructions and did the apple diagnostics test.  all is great.  but still can't connect to store for itunes match update
    test results:
    Microsoft Windows XP Professional Service Pack 3 (Build 2600)
    Dell Inc. OptiPlex 740 Enhanced
    iTunes 10.6.3.25
    QuickTime 7.7.2
    FairPlay 1.14.43
    Apple Application Support 2.1.9
    iPod Updater Library 10.0d2
    CD Driver 2.2.0.1
    CD Driver DLL 2.1.1.1
    Apple Mobile Device 5.2.0.6
    Apple Mobile Device Driver 1.59.0.0
    Bonjour 3.0.0.10 (333.10)
    Gracenote SDK 1.9.6.502
    Gracenote MusicID 1.9.6.115
    Gracenote Submit 1.9.6.143
    Gracenote DSP 1.9.6.45
    iTunes Serial Number 0013A4940C94B410
    Current user is an administrator.
    The current local date and time is 2012-08-31 13:45:04.
    iTunes is not running in safe mode.
    WebKit accelerated compositing is enabled.
    HDCP is not supported.
    Core Media is supported.
    Video Display Information
    NVIDIA Quadro NVS 210S
    **** External Plug-ins Information ****
    No external plug-ins installed.
    Genius ID: b6a928898d4b66af3e0514c8306d304a
    iPodService 10.6.3.25 is currently running.
    iTunesHelper 10.6.3.25 is currently running.
    Apple Mobile Device service 3.3.0.0 is currently running.
    **** Network Connectivity Tests ****
    Network Adapter Information
    Adapter Name:    {9FFBFD41-4DF8-415F-9A43-38F1968B5161}
    Description:    Broadcom NetXtreme 57xx Gigabit Controller - Packet Scheduler Miniport
    IP Address:    192.168.80.151
    Subnet Mask:    255.255.255.0
    Default Gateway:    192.168.80.1
    DHCP Enabled:    Yes
    DHCP Server:    192.168.80.25
    Lease Obtained:    Wed Aug 29 16:31:46 2012
    Lease Expires:    Wed Sep 05 16:31:46 2012
    DNS Servers:    192.168.80.20
    Active Connection:    LAN Connection
    Connected:    Yes
    Online:        Yes
    Using Modem:    No
    Using LAN:    Yes
    Using Proxy:    No
    Firewall Information
    Windows Firewall is on.
    iTunes is enabled in Windows Firewall.
    Connection attempt to Apple web site was successful.
    Connection attempt to browsing iTunes Store was successful.
    Connection attempt to purchasing from iTunes Store was successful.
    Connection attempt to iPhone activation server was successful.
    Connection attempt to firmware update server was successful.
    Connection attempt to Gracenote server was successful.
    Last successful iTunes Store access was 2012-08-31 13:30:55.

    PS: I also went into Internet Explorer...
    Selected Tools, selected Internet options, then selected Advanced Tab
    Then I looked for the security section and made sure that SSL 2.0 was selected.
    I was still unable to access iTunes Store.

  • How to set Internet limits to particular user by gpo ?

    How to set Internet limits to particular user by gpo ?
    Thanks & Regards, Amol . Amol Dhaygude

    Hi,
    >>How to set Internet limits to particular user by gpo ?
    What Internet limits do you want to set for specific users? Group Policy user settings can be configured to apply to specific users, like via security filtering or GPP item-level targeting. The path for Internet Explorer policy settings under User Configuration
    is: User Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer.
    You can also use GPP Internet Settings extension to manage IE settings and use GPP ILT to apply the settings to specific users. However, GPP settings can be edited by standard users after getting applied.
    Regarding GPP Internet Settings extension, the following article can be referred to for more information.
    Internet Settings Extension
    http://technet.microsoft.com/en-us/library/cc754649.aspxBest regards,
    Best regards,
    Frank Shen

  • Export Limits for Multiple Sequences in the Same Sequence File for TS3.0

    Hi,
    I am using TestStand 3.0 to a test application. Because we want to have our limits in a csv-file I have tried to use the Import/Export tools in TS. But this application only supports to export limits for the selected sequence (e.g. main, or subseq1) at a time. This makes it a pretty hard job to export limits from 30 test sequences. What I need is a possibility to export my limits from �all sequences� in my seq-file.
    I have found an article on NI Dev. Zone about �Export Limits for Multiple Sequences in the Same Sequence File (TestStand 1.0.x)�.
    http://sine.ni.com/apps/we/niepd_web_display.DISPLAY_EPD4?p_guid=B45EACE3D9CB56A4E034080020E74861&p_node=DZ52236&p_submitted=N&p_rank=&p_answer=&p_sourc
    e=External
    I have tried to use this code but because it�s for TS 1.0.2 the limits from my multi num test step and my custom steptypes isn�t exported. So that doesn�t fulfill my needs.
    Is there an updated version with �all sequences� added to TS 3.0? Is there other good solutions to my problem out there?
    Best Regards,
    Morten Pedersen
    CIM Industrial Systems A/S
    Denmark

    Hi David Mc,
    Thanks for your reply. I have already considered this solution because the source code is added in the folder described in your reply. But that is not a good solution. It will cost me a lot of time to establish the toolchain, reverse engineer the source code, make the implementations and build a new dll (most off these is already knowledge by NI). And when NI make future releases of TestStand I have some merge work to do every time NI have made some changes in the files I have changed.
    But as I write above: I have hoped that NI already has/or could made a solution like the one to 1.0.2 (see link in root) to me. And then they could include it in the next version.
    I don't think I am the only one in the TestStand world that ne
    ed this feature.
    Best regards,
    Morten Pedersen
    CIM Industrial Systems A/S
    Denmark

  • HT1222 Is it possible for me to update to new version if i have a gevey sim?

    Is it possible for me to update to new version if i have a gevey sim?

    My Airport Card Info. is
    Wireless Card Firmware Version: 9.52
    can you teach me how to connect in a WPA personal security?? Please??
    Because our router only has WPA and WPA2 and neither of the settings, after i put in the password, would connect to the internet... It would only gives me an error message "the wireless network (name of the network) does not support the requested encryption method".
    I am also trying to connect this Ibook into the personal hotspot feature of Iphone 4s but it is still not recoginizing the security settings. It will give me the same error....
    Thanks for the message anyways...
    So what is the next upgrade for OS X 10.4.11??

  • Time limits for time capsule access

    I want to set time limits for individual devices on my Time Capsule network. How do I set this up??

    You will need a hardware address for each wireless device that you want to be able to control. If you do not have the device listed, it will have "default" access to the wireless network, which means that it will have unlimited access at all times.
    If you are having difficulty finding a hardware address for a given device, turn off all the wireless devices that will connect to the network except your Mac. You know the hardware address of your Mac already, correct?
    Turn on one other wireless device and look for the info about that device. Then turn on the next device to get info about that device. You may not see a device name and instead see something like 10.0.1.x for the device name. Click on the 10.0.1.x display to reveal more information about the device, including the hardware address.
    You can set up rules for each device on either the Time Capsule or the AirPort Extreme and the settings will automatically be transferred to the "other" device, so you only have to enter the rules on one device.
    Open Airport Utility again and click on the Time Capsule if that is your "main" base station or router. Otherwise click on the AirPort Extreme if that is the main base station.
    Click Edit
    Click the Network tab at the top of the window
    Look toward the bottom of the next window and make sure that there is a check mark next to Enable Access Control. Later, you will need to make sure that the other router you have is also enabled.
    Click on Timed Access Control
    Here you will see the "default' rule for the network of Unlimited Access. This means that any device that has not been assigned a specific rule will be able to connect to the network at any time. Leave this rule alone.
    Click on the + (plus) button at the bottom of the Wireless Clients box
    Type in a device name next to Description.....example.....iPad
    Type in the hardware address of the device next to MAC Address
    You probably want to have the rule in effect Everyday, so leave that box the same. If you click on the box, you will see that you are able to have the rule in effect with a number of other options.
    Click on the All Day box and change that to Between
    Double click on each time display to edit the start time and end time for the device each day. For example, the device might be able to connect Everyday, Between 9 AM and 10 PM. It is possible to have multiple rules for the same device by clicking the + button in this area to add another time slot.
    Click Save
    Click Timed Access Control again and repeat the process for the next device, etc until entries for all wireless devices that you want to control are complete
    Click Update to save all of the settings and the Time Capsule will restart in 30 seconds.
    Be sure to enter a check mark on the other router that you have to Enable Timed Access and Update to save the setting.  This will transfer the stored settings from the Time Capsule to the AirPort Extreme or vice versa.
    Good luck.

  • Unstable Wifi-Internet will affect iOS 8 update?

    Is Unstable Wifi-Internet will affect iOS 8 update?

    Hey neil_aaron,
    Thanks for the question. After reviewing your post, it sounds like you have a question about internet connectivity and updating to iOS 8. I would recommend that you read this article, it may be able to help you resolve or isolate the issue.
    Update your iPhone, iPad, or iPod touch iOS software
    If you can’t update wirelessly, or if you want to update with iTunes, follow the steps below.
    Install the latest version of iTunes on your computer.
    Plug in your device to your computer.
    In iTunes, select your device.
    In the Summary pane, click "Check for Update."
    Click "Download and Update."
    Thanks for using Apple Support Communities.
    Have a nice day,
    Mario

Maybe you are looking for