Is .Mac necessary for screensharing?

i have .mac and i have successfully screenshared with another user that has .mac.
it wasnt successful with someone that only has the .mac trial...
any one have any experiences with the issue?

we are both in japan, about an hour and a half away from each other by train. we are both on leopard of course, 10.5.1. he has a new macbook and i have a Powerbook G4.
i have tried to send him an invite to share my screen and to share his screen.
he has tried to send me an invite to share his screen and to share my screen. all attempts have failed.
i dont think it is a port issue because we successfully use video chatting with ichat.
could it be a setting that i need to change? i have noticed posts about the sharing panel, and i made sure that he and i have the same things checked, but screensharing still didnt work...
one variable that i just now considered is that i have chax 2 installed and he does not. i may have to have him install it or uninstall mine so see if that is a variable....
my afore mentioned friend that i have had success with is also in japan about the same distance and he also has chax 2 installed... he has an intel imac (white not aluminum).
thanks for elimnating that one variable.
i wonder if it is the fact that both people have to have the same .Mac status... to clarify, neither you or your friends use .Mac?
i am marking this as solved because my question was answered, but i still cannot yet connect with my friend. i will post again when i make connection....

Similar Messages

  • Least Mac necessary for capturing HD

    Am needing a second Mac for capturing the HDMI input of a second camera, so am wanting an older, cheaper one.
    Apple says that FCP needs a 1 GHz cpu for HD and 1 GB memory. Does that mean that I should be able to put a HDMI card into a 1 GHz G4 with 1.5 GB and have enough computer to capture video as DVCPRO HD?
    Or, does that scenario require more?
    B) how might I best use that second computer in the post-production of a feature length film?

    Apple says on their FCS system requirements page "HD features require 1GHz or faster single or dual processors (authoring HD DVDs requires a PowerPC G5, Intel Core Duo processor, or Intel Xeon processor)" So the question is do you want new or used? It looks like dual processor G4 towers are going for about $500 on ebay. If you want new, you could buy the lowest end mac mini, that's definately powerful enough, excpt that the memory for it ***** cause it's integrated graphics and system memory. If you want to use the 2nd computer's processor and HDDs, the tower may be a better option, but if you would rathr have faster, I think the core duo mini blows it away.
    -Brian

  • I currently use an iPhone, an iPad, and a Mac computer for business.  The three devices have Contacts Managers that sync with each other through both Google and through Mobile Me.  Currently, this has created a mess of duplicate contacts.  Please researc

    I currently use an iPhone, an iPad, and a Mac computer for business.  The three devices have Contacts Managers that sync with each other through both Google and through Mobile Me.  Currently, this has created a mess of duplicate contacts.  Please advise me on the steps necessary for removing these duplicates and establishing a syncing solution that doesn't regenerate the duplicates.  There are several applications available that remove duplicates, but I am not sure which ones work or don't work.  I want information on this, but most importantly I want to understand how to fix this problem permanently.  Also, I read somewhere that Mac's new operating system, Lion, can help deal with duplicates.  I don't have Lion, but I would be willing to get it, if this would fix the problem.

    Had the same problem with 4 devices (two computers, an iPhone and an iPod). The solution is simple: open the Address Book application in your mac, ask it to locate duplicate entries (under one of the top menu items, "edit" I think), and then ask it to consolidate them: it took me all of three seconds after I figured it out: worked like a charm! PS: if you have more than one mac with unconected Address Books, repeating the operation in the second one may be a good idea.
    Message was edited by: mfduran

  • New Mac Pro for photography (raw edition).

    Hi,
    I want to buy the new Mac Pro in december for use as my main works station. I work mainly with Photoshop CS6 and Capture one, editing/retouching big amounts of  RAW and TIFF files from Nikon and Hasselblad.
    Im thinking in buy the 6 cores version with 16Gb or 32Gb if I get the money, (I think the 16Gb is the basic configuration for the six core and looks really good). Like this is a big investment for me, I was wondering if this will be the right configuration for my work. I am a photographer and an advanced retoucher. But I'm not sure if the 6 cores are really necessary for what I do (serious photo edition, fashion and publicity.). Maybe the 4 cores with 32Gb (or more) of Ram is just enough or... Maybe, its the 8 cores the right option.
    This machine should last at least five years.
    Any advice is welcome.
    By the way, anyone knows how to solve the Eizo Colornavigator 6 compatibility with the OS X Mavericks issue?.
    Thanks a lot!.
    Cristóbal.

    Hi FatMac and The hatter,
    Thanks for yours suggestions, it's been very helpful!.
    i'm using a MacBook Pro (6.2) 2.8GHz i7 8Gb Ram (not upgradable) and 500Gb SSD connected to an Eizo monitor. It does his job but lately having heavy overheating and slow down its performance in a notorius way. Its a good machine but is not made for serious editing.
    Before  that, I was using an imac 27 quad core 16Gb ram that I sold for get some money for the new Mac Pro.
    This should be a notorious improvement for me.
    Based on what you saying I think with the 6 cores at 32 Gb ram I will be ok. Im thinking on upgrade the Ram in the future. Probably the 8 cores will be too expensive for my budget and don't make a significant improvement for my work compared to the 6 cores.
    Thank you very much for your advice and links!!.
    Best,
    C.

  • HT3231 What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air

    What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air

    As I posted "it is an Unknown", at least to me, what type FW port is on the OPs older Mac.
    LowLuster
    HT3231 Re: What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air 
    Dec 26, 2013 8:04 PM (in response to OGELTHORPE)
    But the newest Mac notebooks do not have a firewire port.
    So he may need a TB to FW adapter, $29, a FW 400 or 800 cable, $??, and then a FW 400 to 800 cable/port adapter (If the old Mac only has a FW 400 port), $??.
    It is unknown if the old Mac has a FW 400 or 800 port.

  • HT1338 Is anti virus necessary for iMac? if so, what is the best software?

    Is anti virus necessary for iMac? if so, what is the best software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • HT202159 My purchased download get to around 25% download then mac asks for user password and download fails and I have to start again

    I am currently downloading a purchased application from apple store, the application starts downloading then at some stage through the download the Mac asks for my user password to make changes, once I enter the password the download just disappears and I need to start again. I have tried using a different user and the same thing happens. I have also noticed that in purchases the application says to install but in the application page it says it is downloaded. I have spoken with apple support and they seem to be stunned and not sure what is going on! Help does anyone else have any suggestions, its an expensive app and I hope apple is prepared to refund if I cant download it.

    When you're having problems with multiple user accounts, it can be an indication that the startup disk needs repairing or there's not enough free space on the disk to install apps.
    Launch Disk Utility located in HD > Applications > Utilities
    Select the startup disk on the left then select the First Aid tab.
    Click:  Verify Disk
    If the repairs are necessary, instructions here >  Using Disk Utility to verify or repair disks
    For disk space. Look at the bottom of the Disk Utility window. You'll see Capacity and Available
    Make sure there's at least 15% free space.

  • Process speed necessary for real time livetype & Motion

    Does anybody remember the minimum processor speed necessary to
    run LIVETYPE and MOTION from WITHIN FCP5...not as seperate apps?
    The online spec sheets indicate the speeds necessary for running as seperate apps,
    but not for real time from withing FCP5...at least, not the ones I can find.
    Thanks.

    Where did you encounter the promise of real time in FCP?
    Can't be done AFAIK.
    Even if possible, you'd only get a few misleading preview frames.
    We've got our new biga$$ Macs arriving in a few weeks. I'll let ya know if anything happens real time in FCP.
    bogiesan

  • I have an iMac running Yosemite 10.10.1 & Outlook 2011 for Mac.  For a while, sent emails went to a sent folder on the iMac so I have a collection of sent emails there.  How can I move them to a sent box on my server so I can see them on other devices?

    I have an iMac 3.2 GHz Intel Core i5 with 16 GB memory and 1.12 TB storage running Yosemite 10.10.1 & Outlook 2011 for Mac.  For a while, sent emails went to a sent folder on the iMac so I have a collection of sent emails there.  I have attempted to move those sent emails from the iMac to my email server (IMAP), but without success.  Is there a way to move them to a sent box on my server so I can see them on other devices?  Many thanks for any help you can provide.

    Go to: Apple > System Preferences > Universal Access and in the Seeing tab make sure that the Display Enhance contrast: is set to Normal.
    Alternatly, try holding the  ⌃⌥⌘ (control command alt) keys and then pressing the , (comma) key a few times.

  • I need to change the MAC Address for Airport on MacBook

    I have a specific need to change my son's Airport MAC address as his school requires the use of USB network cards that aren't compatible with MACs. These cards are needed because the school's router uses MAC address filtering.
    Before we upgraded his Mac to Snow Leopard, we were able to change the MAC address to the MAC address of the useless dongal the school supplied. We basically created an AppleScript program that ran the "sudo ifconfig en1 ether xx:xx:xx:xx:xx:xx" and all was good.
    This command no longer works for changing the MAC address. We tried it as root user as well and by typing it into the terminal window as root. After running the command, we can run "ifconfig en1" and it does display the new mac address but when we turn the airport on and try to connect, it just hangs and won't connect.
    Our other non-Snow Leopard still works fine after running the commands so I'm guessing Apple disabled this functionality. It's hardly a security issue by being able to change your mac addres.
    Is there a new way to accomplish this? I've searched everywhere.
    Thanks!

    Would an easier solution be to provide the school's IT admin with your mac address and have it added? If they can add a block of mac addresses for the usb dongles, they can add more for machines that cannot use the dongle.
    Also: "It's hardly a security issue by being able to change your mac address."
    While it may not be a security issue for your machine, it is a security for the school network who is using mac address filtering as hopefully only one part of their wireless security.
    That being said, have you read this?
    http://osxdaily.com/2008/01/17/how-to-spoof-your-mac-address-in-mac-os-x/

  • I have created a new partition on the Mac HD for Lion as I would like to dual boot. Do I need to install Snow Leopard on that partition before installing Lion? If so, can I use one of my Time Machine backups to do this?

    I have created a new partition on the Mac HD for Lion as I would like to dual boot. Do I need to install Snow Leopard on that partition before installing Lion? If so, can I use one of my Time Machine backups to do this?

    zoominnana wrote:
    Can I set up 2 different time capsule backups? one for the lion partition and one for the snow leopard partition?
    No, you can't partition a Time Capsule's internal HD.  Both partitions will back up to the same sparse bundle. keeping the backups for each partition separate.
    Time Machine will not take the two OSX partitions as two different computers, but for best results, exclude the Snow Leopard drive from backups on the Lion partition, and exclude the Lion partition from backups on the Snow Leopard partition.
    There may be some files on the Lion partition that Time Machine on Snow Leopard won't like, among other things.  See #10 in  Time Machine - Frequently Asked Questions for details.

  • I want to use Mac Mail for my work email address, which containts multiple outbound options (i.e. hr@, me@ etc). Is there a way to set up Mac Mail to have an account with multiple outbound addresses rather than adding in multiple accounts?

    I want to use Mac Mail for my work email address, which containts multiple outbound options (i.e. hr@, me@ etc). Is there a way to set up Mac Mail to have an account with multiple outbound addresses rather than adding in multiple accounts?

    This sounds like the age old problem with keychain & Safari. I don't know of a way to solve it without using something like 1Password.
    The iOS app has it's own built in browser, so it has more control over what gets autofilled. Safari on OS X has an 1Password extension that handles account selection & autofill etc.
    Keychain is great in principle, but it quickly falls down when you need tight integration with many ID's & different use cases (work, home etc).
    I'd suggest you submit feedback to Apple about your thoughts. I did so years ago about this issue & this is how far we have come (back to the point where me.com synced passwords) :^)
    http://apple.com/feedback/macosx.html
    Other tools like lastpass or keypassx may also help if you want to truly segregate password storage, but that doesn't fix autofill, the way around that issue is to dedicate one browser for work.

  • Using a Mac Mini for DSP

    Hello!
    I am wondering how many users are there out there using a Mac Mini for DSP to allow for more processing power.
    wondering what types of experiences people have had out there/how well the machines work together. and if you would or would not recommend doing so
    i would assume that it would help out with all of the processing and makes things sound better in the end?

    I don't do it on a regular basis, but I tested out using an intel mini as a node on a G5, and it worked fine. Probably added about an additional 25% of what the quad could do (so if the quad did 100 of a plugin, the mini added 25 more).

  • I am thinking of using a Mac pro for share trading. Can anyone share their experience and suggest specs for 30 -40 monitors etc

    Hi
    I am thinking of using a Mac Pro for share trading.
    I am proposing to start small but want to be able to expand up to 30+ monitors.
    It must be super quick.
    Any help with hardware would be appreciated.
    Software is secondary at this point , but open to advice.
    I have an iphone and ipad so feel it will better intergrate usung Apple
    regards
    David

    There is no desktop machine that I know of that will support 30+ monitors as is.
    Fill the 3 or 4 PCIe slots of any logic board with three port graphics cards and you have the physical cap without additional hardware.
    Software is secondary at this point
    No, without software, how can you control more than the monitor limit of the OS?
    How can you set up the monitors to display the various programs that you will wish to use simultaneously?
    Software is a major consideration.
    Matrox (and others) have solutions for additional monitors beyond the physical capabilities of generally offered graphics cards.
    The caveat here, however, is support software is typically reserved for Windows and Linux systems.
    Matrox has a single 8 display card:
    http://www.matrox.com/graphics/en/products/graphics_cards/m_series/m9188pciex16/
    Matrox has solutions specifically targeting the finance market:
    http://www.matrox.com/graphics/en/solutions/trading_analyst/
    Though the Mac Pro has more than adequate processing power, I think that you will find (through research) that building a solid machine capable of using several multi monitor cards is going to be what you will need to support more than 8-10 monitors with conventionally offered hardware.
    Fun stuff:
    http://www.digitaltigers.com/zenview.asp

  • How can I import an project .imoviemobile file to imovie 10.0.6 on my mac book for further processing

    How can I import an project .imoviemobile file to imovie 10.0.6 on my mac book for further processing?

    You can't.  (http://www.macworld.com/article/2057972/imovie-for-ios-projects-no-longer-work-o n-the-mac.html)
    Geoff.

Maybe you are looking for

  • How to embed SWT to swings

    I have found information regarding how to embed Swings in SWT. But i have to embed Swt browser in swings Please see the links for examples: http://www.java2s.com/Code/Java/SWT-JFace-Eclipse/Bringupabrowser.htm http://www.java2s.com/Code/Java/SWT-JFac

  • Error with Excel 2007 display.

    We have recently upgraded to MS office 2007 and using BW 3.5 bex .When i ran workbook in Excel-07 , i am getting symbol £ instead of $ for a curreny column .Value for that cell is correct in dollars but the symbol is showing worng .if anyone encounte

  • Hotmail / MSN email continuously sends me the same email after deleting

    I have an iPhone4 and I have several email account. Only account I have issues with is my MSN email account. I can get new messages just fine however if I delete the email about 2 minutes later I get a "new" email indicator and it happens to be the e

  • BC4J - update bug

    Hi, I have the following view query : SELECT Citiri.ID, Citiri.LOCM_ID, Citiri.PERD_ID, TO_CHAR(PerioadeDecontare.data_inceput, 'dd.mm.yyyy') || ' - ' || TO_CHAR(PerioadeDecontare.data_sfirsit, 'dd.mm.yyyy')|| ' anterior ' || TO_CHAR(v.data_inceput,

  • Replace each third comma with ||

    Hi All, My Requirement is like this: In a column i need to replace every third comma(,) with || symbol. eg: 1,Animesh,1234,2,Tripathi,4321,3,Oracle,2345.....(and so on) Desired output: 1,Animesh,1234||2,Tripathi,4321||3,Oracle,2345....Please help me