Is it possible to get a box shadow in at least IE 8?

I hope this isn't a stupid or redundant question, but is check out this one page site. 
www.juliaawebb.com 
I'm not worried about IE 7, and some of you might shoot me, but is there a way to make the box shadows work in IE 8 for my top 2 middle boxes (one with phone number and the other with her name) AND the little Contact box?  In modern browsers they work great.  Is it just that the box shadow in my CSS is using RGB?  Like maybe the box shadow needs to be hex...?
Any help would be super!   Thanks in advance...

You must use IE conditional comments and filters.
http://alt-web.com/DEMOS/CSS-Shadows.shtml
Nancy O.

Similar Messages

  • Is it possible to get the user logged on (at least for Windows and IE)

    Hi,
    Does anyone know if its possible to get the OS user through apex? Essentially I want to pre populate a text field with a user id. . .
    Darryl

    Ow, right, I was wrong then. Looked fine for me since my APEX user name is the same as my Windows log in name :(
    Maybe this (not so recent) document can help you:
    http://www.greenit.li/website/content/OracleApplicationExpressProofOfConceptNTLM.doc
    I never tried this myself, but it explains how you can configure Apache for NTLM authentication which allows you to return the authenticated user name to APEX. But this will probably only work with Internet Explorer.
    HTH
    Matthias Hoys
    Edited by: mhoys on Apr 20, 2009 10:19 AM

  • Is it possible to edit multiple box-shadows inside the Dreamweaver Properties Panel ?

    Is it ?

    Nopes , Only the first one is editable .
    I would suggest you to log a request to us at https://www.adobe.com/cfusion/mmform/index.cfm?name=wishform
    This would help putting this item on our to do list and depending on number of such requests we will consider them for implementation

  • Hi my iphone was stolen, and i need to retrieve my serial number, i dont have a box is it possible to get it through i tunes?

    hi my iphone was stolen, and i need to retrieve my serial number, i dont have a box is it possible to get it through i tunes?

    well my laptop was formatted and all data along as well, so is there any other way as i only have my login with purchased items on Itunes. Would apple be able t help me out?

  • Is it possible to add and adjust css3 box-shadow and its effects... color and transparency with mucow?

    Does this make sense on how to apply it?
    #{param_itemUID} .rect{
      background-color:{param_backgroundColor};
      width:{param_width}px;
      height:{param_height}px;
      -pie-box-shadow:{param_xshadow}px; {param_yshadow}px; {param_shadowblur}px; {param_ShadowColor};
      box-shadow:{param_xshadow}px;{param_yshadow}px;{param_shadowblur}px;rgba({param_ShadowCol or},{param_opacity});
    Thanks!

    You should be able to do those things with a mucow.
    If it's not working, could you share more of your mucow - maybe just send me the whole thing so I can take a look (lbushore (at) adobe.com)

  • I just installed Lion to my iMac. Every thing works like before except for iTunes. When I clicked on it, it said the iTunes file could not be found, and that there was a new version of iTunes. I said to install it, but then I get a box saying it is waitin

    I just installed Lion  and everything works fine except for iTunes. It says it cannot find my iTunes file, then asks if I want the latest version of iTunes. I clck yes, then get a box saying it is waiting for other downloads to complete. That box just sits there as I have no other downloads waiting. How do I get my music back? Actually it is all my wives', and I want to get it back for her. Any help will be appreciated.

    This "original file cannot be found" thing happens if the file is no longer where iTunes expects to find it. Possible causes are that you or some third party tool has moved, renamed or deleted the file, or that the drive it lives on has had a change of drive letter. It is also possible that iTunes has changed from expecting the files to be in the pre-iTunes 9 layout to post-iTunes 9 layout,or vice-versa, and so is looking in slightly the wrong place.
    Select a track with an exclamation mark, use Ctrl-I to get info, then cancel when asked to try to locate the track. Look on the summary tab for the location that iTunes thinks the file should be. Now take a look around your hard drive(s). Hopefully you can locate the track in question. If a section of your library has simply been moved, or a drive letter has changed, it should be possible to reverse the actions.
    Alternatively, as long as you can find a location holding the missing files, then you should be able to use my FindTracks script to reconnect them to iTunes .
    tt2

  • Why do I get a colored shadow behind shadow and feather transparency areas when printing?

    Hello,
    I've been pulling my hair out over this and finally went to my printer to ask if they had insight as to why this is happening. I'll include his reply here but would like to hear your expert opinions too!
    When laying out a file in InDesign, I do a lot of overlapping, feather and some drop shadow and always get a colored shadow behind the transparency area when printing out from a pdf. These files are being designed for print, which is what I thought InDesign was created for - as an updated alternative to Quark and Pagemaker? Here is what the printer says:
    "Ive taken a look at the file in question and the issues this lady is experiencing can not be resolved in InDesign. What she needs to do is build the background image with color overlays all in Photoshop as a Layered PSD. Then flatten it and pull it in to InDesign as a Tiff. Then she can place her text over the top of it. She needs to use image masks on the color overlays - for the areas she does not what the color to violate.
    What it comes down to is these fancy design effects out of InDesign and Illustrator should never be used for printing. They can be used for web design. Reason is, they cause RIP problems. Things fall off the file and transparent areas go away just to name a few. This happens all the time."
    I would appreciate any other viewpoints here. Can I really NOT use the shadow and feather functions in InDesign for print? Are there any other ways to approach this problem other than what is being advised here. It is SO much easier to produce the entire file in InDesign.
    Here is a link to the pdf. If someone would like to see the original indd file, I can post it somewhere.
    http://displaysunlimitedinc.com/test/panel_3_text.pdf
    There is a 1 inch blur drop shadow on the black and white temple image; a 1 inch feather on the black and white screened back image behind the main text box; and no drop shadow or feather on the map at top right, yet I get a colored shadow behind all 3 of these areas when I export the indd file to pdf and print that out. The fact that I get a shadow behind the map puzzles me.
    Thank you very much in advance.

    Horgycat,
    The CMYK/RGB question is actually pretty complex, and depends to a great extent on how the final output is going to be produced.
    If the files are destined for a printing press, all RGB elements must be converted to CMYK prior to printing. You have the option of doing that before placing in ID, or during export to PDF, and there are pros and cons to both methods, but if you don't know until the last minute what the print conditions will be, the convert on export path is more flexible.
    Spot colors are a different matter. As far as I'm concerned, you should NEVER specify a spot color unless you are actually using spot ink on a press. A lot of inkjet and laser devices claim to be Pantone certified, but the reality is that even with expanded gamuts available using more than four inks, I'd estimate that better than half the Pantone solids are not reproducible as simulations that would satisfy me or my clients. The convert spot to process route should only be used, in my opinion, when you've designed a job properly to be printed using spot colors, and suddenly you have an output change or an added image that forces you to move to a process output. The last time I tried it, by the way, I had issues at the printer (the regular prepress guy was out of town, so I'm not sure what went wrong) and I ended up re-building the file with real process colors to get the transparency to work.
    But you mentioned that you are doing exhibition panels, which implies to me that they are probably NOT going on a press -- you need to do hundreds, or sometimes even thousands, of copies to make a press cost-effective compared to digital printing. I used to work in a large-format output bureau doing just this kind of work, and we used large inkjet plotters. In this case, mixed RGB and CMYK files are less of an issue since most plotters will handle either, and depending on if they have an internal or external RIP or none at all, you may actually get better color fidelity using RGB as CMYK colors may get converted in the RIP to the RGB values that the plotter understands, and then get converted back a second time to CMYK (CMYKOG or whatever ink combination is used) internally before the ink is sprayed. Only the print provider would be in a position to tell you the correct color space for the equipment.
    Which of course puts you at a bit of a disadvantage working with a client out of state who isn't supplying you with such necessary information as the correct output profiles for the job. It will be a miracle if the color is close.
    A final word about looking funky on screen. Just as many spot colors can't be well simulated in CMYK, many also cannot be displayed adequately on a monitor. The ONLY way to choose spot colors is with a swatch book, and that's what the press operator will be using to verify his work. Clients need to be educated about the differences in technology and the limitations of soft proofs.

  • Is it possible to get a mac virus?

    Hey,
    I was using a pc and I decided to get a mac, because you can do lots of creative work with it and I was sick of viruses. I was able to clean my pc up after I had a virus and I know how to reprogram it. And I still don't know why I always had a computer virus, because I had a fire wall/anti virus programs and surfed on safe intenet sites.
    Now, after buying a mac book I never feel safe, because I was used to have computer viruses
    Is it possible to get one on my mac?
    (I never download any suspicious stuff from the internet ex.:songs, videos etc I only use my mac for my writing at university, editing pictures and making music)
    Thank you

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Hello, i have youtube videos on my iweb site.  but i would like to know if it is possible to get a 'pop-up' affect when you click on a small photo of the video, to open and play the video in a popup?

    hello, i have youtube videos on my iweb site.  but i would like to know if it is possible to get a 'pop-up' affect when you click on a small photo of the video, to open and play the video in a popup?
    we have tried using video light box, but this doesnt seem to work.

    There's an example of one at the buttom of ths page...
    http://www.iwebformusicians.com/Website-Movie-Video/YouTube.html
    Rather than link to the file, the movie is on a separate web page and uses the code shown on this page...
    http://www.iwebformusicians.com/Website-Photos/Image-New-Window.html
    "I may receive some form of compensation, financial or otherwise, from my recommendation or link."

  • Data recovery, possible to get the file structure back as well?

    Hi Apple Smarties,
    I closed my laptop lid on my external LaCie drive without ejecting the drive first (smart one!). After that the external drive wouldn't mount. I've used Data Rescue 3 to recover all the files from the drive... however it's just lumping all the files into one big batch :-( ...anybody know if it's possible to get the files into the correct files structure they were at before the drive got corrupted?
    Assistance would be HUGELY appreciated.
    Many thanks
    Kind regards
    Doug

    Thank you Barry. Yes, Comcast is my mail provider. It is a POP account.
    Now, if you could point me in the right direction to do that re-build, I would be ever so grateful. I did use the "rebuild" button on the Mail tool bar for that box and it did not help. Perhaps there is something else I could do?
    As I mentioned, I am very new to the Mac world, and I get a little lost. Well, at age 73, I guess that's not hard to do! Been on Windows forever so lots of the terminology in Apple is quite different for me.
    Message was edited by: JanJones

  • Is it possible to get iPhone audio (telephone calls) from Lightning connection? Music works, but calls switch to internal or extenral speakers, not lightning (for e.g. docking station, car...)!

    Is it possible to get iPhone audio (telephone calls) from Lightning connection? Music works, but calls switch to internal or extenral speakers, not lightning (for e.g. docking station, car...)!
    I want to get the audio out of the lightning connection (the way you get audio when you connect it to a dock). It works properly with music, but when making a telephone call, it switches to the internal speraker. You can change to the external spekers, but you cannot select another audio out. It's also possible to get the telephone audio from the analogue connection, but that's not what I want. I want telephone audio from lightning...
    Would be so great if anybody has an idea

    I must also say that the second update ruined my Lumia's battery life.
    With the first (out-of-the-box) update the phone usually had 30 percent of battery after a quite hard day (e.g. more than an hour of talking via bluetooth handsfree, more than two hours of listening to the music via bluetooth, more than an hour of browsing via wifi, and reading hundreds of e-mails via two mail accounts). I never managed to discharge it after one day (e.g. 14-16 hours) of continous use, no matter how much I talked, listened and browsed.
    Now, with the secod update, it discharges to 20% after 12 hours of laying still almost without use (30 mins of music, less than 15 mins of talking and nothing more), and discharges completely with the usage pattern described above.
    Did the second update contain some Android code?

  • Photos from the Internet will not load correctly. I get white boxes with blue question marks inside. This has only been happening for the past 3 weeks so I'm not sure why it is happening.

    Photos from the Internet will not load correctly. I get white boxes with blue question marks inside. This has only been happening for the past 3 weeks so I'm not sure why it is happening.

    Yes - email & text work fine but when I use something like Google Images or search a blog with imbedded photos I get the empty white boxes with question marks.  If I click the question mark it opens the photo but I can't possibly do that for EVERY image on EVERY page I search!?!?!  I've rebooted the iPad & my wireless card several times but neither action helped.  Have any clue what I should do now?

  • Is is possible to get a new iPhone 5c for free when I've bought a defective iPhone 5c?

    Is is possible to get a new iPhone 5c for free when I've bought a defective one on September the 30th?

    If you purchased your phone directly from Apple, in the US, you have 30 days from the date of purchase to return it for a no questions asked refund. 14 days in the rest of the world. If you make an appointment at the genius bar, & the genius bar determines your phone is defective, they will replace it on the spot. Whether the replacement phone is new or refurbished cannot be determined, as all replacement phones come in a white box. However, given how new the iPhone 5C is, most likely the replacement will be new, & not refurbished. Those are your options.

  • It is Possible to get Preflight information using javascript...?

    Hi EveryOne!!!
    I'm new baby to Acrobat using javascript .Please Help me?
    It is Possible to get Preflight information(trim size, colorspace and fonts) using javascript...?
    Thanks in Advance.
    -yajiv

    As Bernd says you can collect the page boxes via JS but nothing about the color spaces, graphic objects or fonts.
    For example to see the dimensions of the media box, use this in the JS console:
    var aRect = this.getPageBox("Media");
    var width = aRect[2] - aRect[0];
    var height = aRect[1] - aRect[3];
    console.println("Page 1 has a width of " + width + " and a height of " + height);
    The valid PageBox names are Art, Bleed, BBox, Crop (default) and Trim. The results are reported in Points (1/72 inch).
    You can find the total number of pages in a document using this.numPages and the current page with this.pageNum

  • Is it possible to get the active directory user name of the person

    Is it possible to get the active directory user name of the person who is logged onto a windows computer, when they are using your coldfusion site, the same way asp pages can do that?

    SECOND TRY TO POST THIS REPLY
    You have to turn on "Windows Integrated Security" and turn off anonymous login in the IIS web server, once that condition is met the cgi.AUTH_USER variable will be popluated with the domain/username of the user logged into the cient computer.
    If the user is using a windows browser on a windows client computer this will be done silently in the background.  Otherwise they will normally be presented with a login dialog box by the browser.

Maybe you are looking for

  • MacBook starts up to blue screen only....

    Hope someone can help. My MacBook will startup with the chime, present the grey Apple logo, then go to the blue screen where it remains, every 10 seconds or so it blinks to a different shade of blue, then back again. I've tried mounting it to an olde

  • Error in ESS Szenario leave request after rejecting leave

    Hi folks, we getting an error in the ESS leave request application with using the workflow (WS12300111). We have EP7 SP11 wit ESS/MSS 600 SP7 (for ERP2005) . All ESS/MSS services/webdynpros are deployed without errors. If an employee takes holiday wi

  • Problem using oai SDK to develop a browser class for iStudio

    I was trying to develop a new browser class fo iStudio using the example Browser SDK Tutorial codes. The package name is defined as: "oracle.oai.tools.iStudio.browsersdk.USIBrowser" In iStudio's "browsers.init" I appended this line: "FileBrowser;orac

  • GRC AC ARA v10 SP13 - Org Rule Org Level Missing

    Hi Experts! Testing ARA Organization Rules soon and have noticed that one of my key Org Levels, $BUKRS, is missing. I have not yet used this functionality on this system. I am already doing the following: running the authorization sync job daily (we

  • Import 1080p h.264 mov to editi with premiere pro?

    i am a nikon d800 user , and i like to use adobe premiere pro to edit the 1080p video clips for sharing with my friends, but the compressed H.264 MOV videos from D800 can not be playbacked or edited smoothly on many editing softwares such as Adobe Pr