Is Mac OS x still secure?

More and more security companies advise us to switch to Apple. They claim that it's more secure which is a contradiction itself.
Why should security companies want me to be secure?
So you can conclude that Macs could have several big security issues of which we are completely unaware?
What about the recent kernel-bugs and proof of concept viruses - Windows Vista will habe more security techniques than Tiger has actually?
To sum it up - is there something which we don't know about security on macs but the companies do??
Please explain it to me; I'm absolutely unsure what to do.
Should I buy a Mac or a Windows machine.
  Mac OS X (10.4.8)  

More and more security companies advise us to switch
to Apple. They claim that it's more secure which is a
contradiction itself.
Why should security companies want me to be secure?
So you can conclude that Macs could have several big
security issues of which we are completely unaware?
No, that's a bit of an unsupported leap of reasoning. I'm not sure which security companies you say are advising a switch to Macs, but I doubt that they are doing so in an attempt to fool you so they can sell you services. Macs are inherently more secure against viruses and spyware -- which is not to say they're immune (though, at this point in time, there are no real viruses or spyware), but you're definitely safer with a Mac than with a Windows machine.
That said, this should not necessarily be your primary concern when buying a new machine. What do you need to do? With whom do you need to work most of the time? Do you need to use any special apps that are not available on the Mac or on Windows? If there is no particular reason to choose one over the other, then Macs are easier and safer to use, so that's what I'd pick, personally.

Similar Messages

  • Now I can start my Mac Pro only in "secure mode." I'm still appears on all monitors a series of bands such as seen in the attached file. Someone can give me a diagnosis? Thank you.

    Now I can start my Mac Pro only in "secure mode."
    I'm still appears on all monitors a series of bands such as seen in the attached file.
    Someone can give me a diagnosis?
    Thank you.

    The attached file is not showing.
    In Safe/Secure Mode many Drivers are not loaded. When your computer works in Safe Mode, but not regular mode, two types of problems are implicated:
    1) Third-party kernel extensions. a conflict with some part of Mac OS X means that when those extensions load, your Mac can not run.
    2) Failed graphics card. Since the Driver for the display is not loaded, the display in Safe Mode uses a very simple built-in Driver. In regular mode, once the driver is loaded, all parts of the graphics card must be working, or you could get bands of color on the display (which is just what you reported).
    Which Model Mac Pro Tower or MacBook Pro is this?

  • Mac OS 9 still good for the year 2006?

    Hi, I was just wondering if Mac OS 9 would be good OS to keep up with today`s computer demands...
    I am buying the PowerBook Pismo but I dont think it will run very well on OS X...
    does anyone know if Mac OS 9 is still good?

    Hi, iBTO. Mac OS 9 still does everything it did in 2000-2001, just as well as it did then. All the software you might have wanted to run in OS 9 back then, you can run in OS 9 now. What you can't do in OS 9 is run software that's been written since then to run in OS X, or view web sites that require support for newer security features, newer multimedia browser plug-ins, or newer browser versions.
    The Pismo, especially the 500MHz version, will run Panther (OS X 10.3.x) or Tiger (10.4.x) quite acceptably — much better than your iBook would — if it has at least 512MB of RAM and a big, fast hard drive installed. The original 4200 RPM 6,10, and 12GB hard drives that shipped in most Pismos are too small to be very practical for use with Panther or Tiger; the 6GB drive is really out of the question. The 20GB 4200 RPM drive that some later Pismos shipped with is the minimum adequate drive for Panther or Tiger use by anyone who expects to save any significant amount of digital music, video or photos; most OS X users will soon outgrow a 20GB drive. If the Pismo you're buying has a 6, 10 or 12 GB drive now, and you'd like to be able to use iTunes, iPhoto, iMovie or any combination thereof, get yourself a 5400 RPM 60GB or 80GB hard drive and at least one 512MB RAM module for it, and you'll probably be pretty happy running OS X on it for a year or two, for a comparatively small initial investment. Or for a really minimal investment, you can keep running your five-year-old software indefinitely on it, in OS 9.

  • Where is my Mac App. I purchased a MacBook Pro about two years ago while in Okinawa.  I recently moved to St Louis.  When using the "find my Mac" app, it still says my Mac is located in Okinawa.  How do I get it to recognize that it is now in St. Louis?

    I purchased my MacBook Pro 2 years ago in Okinawa.  I recently moved to St Louis.  When using the "find my Mac" App, it still says my Mac is in Okinawa.  How do I get it to accurately show my Mac is now in St Louis?

    Open System Preferences using the menu item " > System Preferences" then select the "Security & Privacy" pane.  selec the "Location Services" on the left and enable using the checkbox:
    Just noticed you details show you are running OS X 10.7.5 so I am not sure this is exactly correct.

  • MAC filter for wireless security????

    I have hooked up my wireless router and had trouble with the security part.  I am now set up with the wireless security disabled but the MAC filter enabled and my wireless computers mac number entered and all is working.  will the MAC filter work as security for my wireless network.  thanks tdm

    MAC address filtering is considered a very low level of security.  It will keep honest people from accidentally logging into your network, but that is about it.  MAC addresses are transmitted wirelessly when you use your router.  Anyone can monitor your transmissions, so it is easy to learn a working MAC address.  They can then fake the MAC address and loggin to your network whenever you are not connected.
    Also, when your transmissions are not encrypted, anyone within range can monitor your wireless transmissions, even without logging into your network.  With a good antenna, your transmissions can probably be picked up for at least half a mile from your home.  So someone could monitor the web sites you visit, your email, etc., and in some cases, your passwords.
    You really should setup wireless security on your network.
    Here are my tips for setting up wireless security:
    To set up wireless security, you must use a computer that is wired to the router.
    Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" section of the router's setup pages, located at 192.168.1.1
    First, give your router a unique SSID. Don't use "linksys".
    Make sure "SSID Broadcast" is set to "enabled".
    Next, leave the router at its default settings (except for the unique SSID), and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
    To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
    Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
    WEP - poor (see note below)
    WPA (sometimes called PSK, or WPA with TKIP) - good
    WPA2 (sometimes called PSK2, or WPA with AES) - best
    WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
    The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
    Retest your system and verify that your wireless Internet connection is still working correctly.
    And don't forget to give your router a new login password.
    Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers, but no spaces. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 24 characters. Note: Your key, password, or passphrase must not have any spaces in it.
    Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
    One additional issue is that Windows XP requires a patch to run WPA2. Go to Microsoft Knowledge base, article ID=917021 and it will direct you to the patch.
    Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
    Note:
    WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.
    Message Edited by toomanydonuts on 01-16-2008 03:38 AM

  • Avast Antivirus for mac or Eset Cyber Security 6

    Considering many threats nowadays on the Internet, including malware related to false pages, phishing pages, Java threats, I consider important to count on a security solution.
    There are 2 of them I personally consider the best ones on the moment: Avast Antivirus for Mac and Eset Cyber Security 6.
    Well, considering two important aspects - detection (higher scores it's better) and performance (lower system usage resources - like processors usage - it's better).
    What is your opinion about them considering your experience?
    Which one would you choose?
    Thanks in advance!

    "Avast" is perhaps the worst of the whole wretched lot of commercial "security" products for the Mac. It's worse than the imaginary "viruses" you're worried about. Not only does it fail to protect you, it destabilizes and slows down your computer, and it sometimes or always corrupts the network settings and the permissions of files in your home folder. Removing it may not repair all the damage, and neither will Disk Utility or even reinstalling OS X.
    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click anything reflexively.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I am having trouble removing songs from my iPhone.  i have unchecked songs in the library on my mac, but they still show up on phone after syncing.  how do I remove them?

    I am having trouble removing songs from my iPhone.  i have unchecked songs in the library on my mac, but they still show up on phone after syncing.  how do I remove them?

    Hi asims01,
    Welcome to the Support Communities!
    The information below may be able to answer your questions about how to delete songs from your iPhone:
    Deleting songs downloaded to your device
    Tap the Music app.
    Tap More > Songs at the bottom.
    Scroll or search for the song you would like to delete from your device.
    Swipe right to left on the song, and then tap Delete.
    Note: You must be in Artists, Songs, or Albums view to delete songs from your device. Deleting from a playlist won't remove a song from your iOS device.
    Also, this information can be found on page 64 of the iPhone User Guide for iOS 7
    http://manuals.info.apple.com/MANUALS/1000/MA1565/en_US/iphone_user_guide.pdf
    Remove a song from iPhone. Tap Songs, swipe the song, then tap Delete. The song is deleted from iPhone, but not from your iTunes library on your Mac or PC, or from iCloud.
    If you have iOS 7, this will delete the song from local storage, but the song will still appear with a cloud symbol in the Music app, as you've noticed. To hide the iTunes in the Cloud purchases, navigate to Settings > iTunes & App Store, and disable "Show All: Music”
    There may be a few orphaned songs on your iPhone that were partially downloaded or corrupted in some way. If that is the case, you can erase all of the music from your phone.  Follow the instructions below and select the Music app under Usage:
    iPhone, iPad, and iPod: Understanding capacity
    http://support.apple.com/kb/ht1867
    I hope this information helps ....
    - Judy

  • I keep getting error message, "can't open application PACE because PowerPC applications are no longer supported." I've run Clean My Mac and I still get the error.

    I keep getting error message, "can't open application PACE because PowerPC applications are no longer supported." I've run Clean My Mac and I still get the error.

    Use the Finder "Go" menu while holding down the option key to expose your User / Library folder.
    Look in the Application Support folder for PACE items and delete them.

  • I want to share Microsoft word from my desktop mac to my laptop but every timeIi try and do it, it says that it can't open because it is not supported by the software. I have tried several times and updated it on the mac but its still not working.

    I want to share Microsoft word from my desktop mac to my laptop but every timeIi try and do it, it says that it can't open because it is not supported by the software. I have tried several times and updated it on the mac but its still not working. Any ideas?

    You need to install Office on the computer from the installer DVD or disc image you purchased.

  • HT3819 For home sharing do you have to use one apple ID? Im trying to make my own new account for all my devices (iphone, ipad, mac) , but i still want the music from my dads account.

    For home sharing do you have to use one apple ID? Im trying to make my own new account for all my devices (iphone, ipad, mac) , but i still want the music from my dads account.

    For home sharing do you have to use one apple ID? Im trying to make my own new account for all my devices (iphone, ipad, mac) , but i still want the music from my dads account.

  • My iMessages no longer work on my iPad or mac. They still work on my iPhone. It says all my contacts are no longer registered with iMessage.

    My iMessages no longer work on my iPad or mac. They still work on my iPhone. It says all my contacts are no longer registered with iMessage.

    Hi,
    There have been no updates recently.
    You would also know if the computer had stopped for an Update.
    On the Mac in the Contacts App in the Contacts Menu > Accounts is it shown to be using iCloud to Sync the info between all devices ?
    8:47 pm      Tuesday; August 26, 2014
    ​  iMac 2.5Ghz i5 2011 (Mavericks 10.9)
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb (Snow Leopard 10.6.8)
     Mac OS X (10.6.8),
     Couple of iPhones and an iPad

  • Since update of my MAC my Notes no longer appear on my Mac but are still available through iCloud on my iPhone and iPad. How do I get my MAC to sync with the other devices as e'thing else has synced on my MAC through iCloud.

    Since update of my Mac Book Pro my previously drafted Notes no longer appear on my Mac but are still available through iCloud on my iPhone and iPad. How do I get my Mac to sync with the other devices as e'thing else has synced on my MAC through iCloud. Also since the update Notes no longer appear as a folder in "Mail" but are now a distinct programme-is there any way of returning Notes to the Mail programme?

    Thanks, but I've been on the phone with AppleCare US (where I am and live) and AppleCare UK. They continue bouncing me back and forth without helping resolve the problem.
    Perhaps someones knows how to further escalate the issue at Apple?

  • I synced my iphone 5 with my computer and save all the photos to my phone through itunes. i restored my mac and lost all my photos on the mac but i still have them on my phone. how do i get them on my new mac now?

    i synced my iphone 5 with my computer and save all the photos to my phone through itunes. i restored my mac and lost all my photos on the mac but i still have them on my phone. how do i get them on my new mac now?

    how do i get them on my new mac now?
    Be careful, when you connect the iPhone to your mac, unless you have saved the photos. Synced photos may easily  be accidentally deleted by syncing again. And do not enable iCloud Photo  Library (Beta), that will erase synced photos as well.  Synced Photos are not included in the device backups.
    Set your iTunes Preferences to "Devices > Prevent iPos, iPhones, iPads from syncing automatically".  Otherwise iTunes may launch and sync your iPhone with an empty iPhoto library the moment you connect it.
    Unfortunately, it is not possible to sync the synced photos back. Apple recommends to mail them back, but that would be a lot of clicking (iTunes: Syncing photos - Apple Support). You could also share them to a Shared Album, but a third party app like TD recommended, will be better.

  • I restored my mac and all my music wiped from my mac and is still on my phone. how do i get the music from my phone to my mac i really need it!

    i restored my mac and all my music wiped from my mac and is still on my phone. how do i get the music from my phone to my mac i really need it!

    Did you not have a Time Machine backup of your Macbook Pro or a clone backup on an external HD?
    To copy music from the iPhone to your Mac -- except purchases from the Apple Store -- you need third-party software.
    Check this thread: https://discussions.apple.com/thread/5811515?searchText=music%20from%20iPhone%20 to%20mac

  • My iPhoto videos are not showing up in iMovie? I have quit, shut down my Mac and they still are not showing up? What can I do to resolve this?

    My iPhoto videos are not showing up in iMovie? I have quit, shut down my Mac and they still are not showing up? What can I do to resolve this?

    It is also posible to go back to the imovie you had before, it is still on your computer - you go to Finder and it is in a folder in your programs. Many others have gone back to the old program, and perhaps I am also going to do that too.
    In the new imovie it does not come up the question "do you want to download these videos ...."
    You shall in imovie open your iphotolibrary in top on the left side,( it is standing under libraries) and  you can see all the events you have in iphoto, then you can open the event, you shall use and drag the movies and pictures from the events in iphoto to an events in imovie. If you can,t see your libraries, you can click on a show button on top of the left side.
    On the picture you see here iphoto is market on the top of the left side and the pictures to the left is my iphoto-events - and there I can open the one I shall use, and find my movies.
    I

Maybe you are looking for

  • [Java and all else] How do you document DB design?

    Hello, Although most of the technical choices are explicit in SQL (UniqueKey & ForeignKey constraints, indexes,...), the semantics of the data columns and their constraints seem better served as plain human-readable comments ("ID column: identifies t

  • Why does my iPhone 5 keep telling me that storage is almost full?

    Since I upgraded my iPhone 5 to iOS 7 it has been acting strange. I keep getting messages telling me that the storage is almost full yet when I check there is over 358mb of free space. I have tried restoring my iPhone but I still keep getting these e

  • F-44 - Clearing of more than 999 line items

    Hi, I am using transaction code F-44 for clearing vendor line items but vendor line items are more than 999 (In fact they are well above 65000) SAP does not allow postings in a single doc of more than 999 line items. can someone suggest methe procedu

  • Multiple iPads, need to be able to Push apps from home office

    We have sent iPads out to all of our external sales reps and regional sales directors (about 17 total).  Each one has a different Apple ID because we forward our exchange e-mail to their Apple ID's,and we do not give out the password to their Apple I

  • FTP to IDOC : multiple source files

    Hi experts, I finished designing my File-FTP to idoc scenario. I still have one question left, I did tests with my FTP by putting one file in the directory called test.xml In the case I would have multiple source files (i.e. test2.xml, test3.xml, ...