Major AI disruption - malware? misconfiguration?

I have a serious usage problemthat manifests itself this way: a few minutes (5? 30?) after starting the computer and AICS5, I can select any tool from the toolbar, but the only tool I get on the screen is the Hand tool. As if I were leaning on the space bar (I'm not).
Similarly, yesterday, drawing a rectangle resulted in a hundred rectangles along my path (which I remember is an AI feature somewhere).
Sunday, when I double-clicked a .psd document, PS opened but the document did not open. Nothing solved that but a reboot.
Thirty seconds ago, after typing that last sentence, I popped over to illustrator and it was working fine (or I was able to draw a bunch of random shapes). Now, I'm stuck on the Hand tool again.
I haven't seen evidence of misbehavior in Windows or any other applications.
This seems malicious to me (because it's such a nuisance), but I don't get any results from AVG, Malware Bytes, or MS Security Essentials, or from a couple of rootkit investigators.(They found a couple of trojans in email archives from 5 years ago.)
This morning I uninstalled CS5 withouth deleting prefs and reinstalled it - no change. Now I'm going to uninstall including prefs and reinstall again (and will post here if that makes a difference).
I will say this: the only strange thing I've done in the last week was download a file using an installer from download.com. I though Cnet was a trustworthy source, but after installing this FLAC converter, I found that they'd installed toolbars in all my browsers and in fact in my system. I'm wondering if that was also a vehicle for whatever this is - or if I caused some sort of harm in the process of uninstalling that.

Ouch that is not good.
Sounds like some process gets started after you reboot and that is conflicting with Illustrator. Bring up your task manager (Ctrl Shift ESC if my memory is right - on a mac during the day), and either watch processes that get laoded, and kill them one by one until you find what is messing up your computer.
Keep a look out if you don't boot anything else but Illustrator if the computer works fine, this can be triggered by either an app/action, or something in the background which is trolling your computer.

Similar Messages

  • Will Apple cover me if updating to iOS5 on ipod Touch 3rd gen ruins/bricks it?

    I have heard stories of some people's apple products not working/bricked after attempting to upgrade to iOS5.
    I have a 1.5 year old ipod Touch 3rd gen. No warranty on it from Apple (tho I do have one from Square Trade for ADH, but I called them and they said if it is a software issue, they don't cover it.)
    I am very concerned about d/ling the ios5 upgrade and it ruining my ipod touch.  In effect, I will take a device that could fetch almost $200 on ebay (which I could then use to upgrade to a Touch 5gen), and turn it into a worthless piece of junk if I upgrade and it ruins it.
    Also, I know that they have released 5.0.1 (beta I believe?) for update.   I still read stories on here from people waiting until now (Nov, a month after it was first released when so many people tried to d/l it and had terrible problems), but now are still getting network timed out error msgs, etc.
    So is there ANY protection from Apple if their update should screw my ipod touch??
    Should I just wait longer for a final, stable version  of ios 5? (like v5.1)  Or just totally skip the iOS 5 upgrade and stay safe with iOS 4?  I don't know that it is really worth the $200 loss risk to upgrade to iOS5.  (i.e. 3rd gen doesn't have the ability to find and lock/wipe my lost touch, etc.)
    I do know that I should:
    1) install itunes 10.5 anew on my laptop  (itunes and syncing WAS done on my tower, until I just got it back from being serviced for some Major problems/virues/malware/etc.  I'm not comfortable using it, as the problems on it included not being able to start Local Services, connect to the internet, no audio services, etc.  The guy says it is booting up and services are working now, but you never know....But i digress...)
    2) be on AC and not battery on my laptop
    3) be hardwired (ethernet) to the internet and not use my wireless connection
    4) turn off Windows 7 Firewall, and disable my PC Tools Spyware Docter with Antivirus.
    So, what do you all think? should I wait until later to upgrade to say os 5.1?  Should I even RISK upgrading to iOS5 on a touch 3gen and lose almost $200 cash?  And will Apple give me ANY protection should it ruin my touch?  (I seriously doubt it.)
    Thanks for input.
    Dave
    Kentucky

    Before proceeding with the update, it wouldn't hurt to manually back up the iPod in iTunes by right->clicking on it from under the Devices section and choosing Backup.    See this article for more information on what is stored in the backup.
    http://support.apple.com/kb/HT4946
    Also make sure that any content you may have synced to the device from iTunes, such as Music, movies, TV Shows, podcasts, etc. are all stored on your computer and in iTunes before updating the iPod's version of iOS.
    Otherwise, I would go ahead with the upgrade.  I didn't have any issues with it on my iPhone.
    B-rock

  • Safari app is gone from my mac and it wont reinstall!my daughter put frostwire and I think i uninstalled it but safari is gone now i cant open any emails that have links to the!help!

    I have Lost my safari app from my my, my daughter downloaded frostwire toolbar, and safari icon wouldnt respond , so i uninstalled frostwire and still could not get safari to respond, then i reset safari and lost everything, i tried to ininstall it from apple , it says successful, then i click on it and it asks me do i want to install, but thats it it never installs... I have all my busniness bookmarks and study bookmarks, arghhhh! also when i click on my email and try to open a link it clisks on a blank safari page then shuts down with an error sign?

    Frostwire is a version of the now defunct Limewire, built as a not-for-profit project, and its developers claim it will never support DRM or any type of advertising. With the threatening cloud of lawsuits gobbling up P2P clients one at a time and forcing them to go legit, Frostwire’s future is in the balance.
    In other words, like Limewire and other bit-torrent clients, it is software for illegal file sharing and/or downloads of pirated or even doctored software, and like other P2P probably a major source of malware.
    There is a tutorial here:
    http://www.dhnet.ufl.edu/getconnected/tutorials/p2premoval/frostwire_osx/
    on uninstalling Frostwire, that may help.
    Then repair permissions and restart your Mac.

  • MDS - 515 A database error has occurred: Please contact your system administrator

    OS: Server 2008 R2
    SQL: 2012 SP1 cu4 - 11.0.3368
    We are experiencing this error when attempting to view on-going batch jobs in the web UI (Integration management)
    This error was first experienced while running SQL 2012 RTM cu5, we have since updated and this is persisting.
    It has also been noted that batch jobs submitted to the staging tables are not processing to the leaf member level, and stage status is not being updated nor returning an error.
    This error is on a core production system and is causing major business disruption. Any suggestions anybody has would be very welcomed.
    Thanks.

    I had the same error this morning and by using SQL Profiler I was able to determine the stored procedure causing the error. The stored procedure mdm.udpEntityStagingAllBatchesByModelGet returned the following error:
    Msg 515, Level 16, State 2, Procedure udpEntityStagingAllBatchesByModelGet, Line 87
    Cannot insert the value NULL into column 'BatchTag', table '@results'; column does not allow nulls. INSERT fails.
    The statement has been terminated.
    Once the stored procedure altered everything worked as before.
    Replace the following line in the store procedure:
            BatchTag            NVARCHAR(50)            NOT NULL,  
    by:
            BatchTag            NVARCHAR(50)            NULL, 
    Kind regards,
    Rudi Tourlousse

  • What does Apple plan to do about the JAVA issue?

    I was out of town on business last week and took my brand new MacBook Pro with me to stay connected to my work VPN.  However, I was unable to connect to the VPN the entire time I was away.  I found out from out IT department today that it is due to Apple not allowing any programs that require JAVA.  Is anyone else dealing with this issue?  What is being done about it?  If I cannot use my laptop to connect to my work VPN then it is useless to me.  If Apple does not come up with a solution quickly, I will be returning my brand new MacBook Pro for a windows based laptop that allows me to function at work.  This is a shame because I was very excited to have an apple laptop....very disappointing!

    There was a major vulnerability in Java that was being actively exploited to drop malware on both Windows and Mac OS X. Oracle, who is responsible for Java, was slow to get a fix out, so Apple blocked the vulnerable versions of Java in the web browser. (Mozilla did the same with their Firefox browser.) Updates are now available for Java that work in Mac OS X again.
    Java has been a repeat source of major vulnerabilities and malware over the last couple years. It is EXTREMELY insecure. If your business is relying on web-based Java applets for secure communications, your business' IT department is collectively insane.

  • Can a nook be used with os7

    Can a Nook be used with Apple products?  I don't want network or virus problems.

    Android is the most malware-prone, insecure platform there is - but millions of users seem to survive without dropping like flies!
    I can't answer Q.1 but as for Q2:
    How safe is your smartphone? (Android is the top malware collector)
    A major source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace were initially found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:
    http://www.bbc.co.uk/news/uk-15600697
    Android: it's getting worse: Juniper found a 400% increase in Android malware from 2009 to the summer of 2010.  We have since seen exponential grow in Android malware over the last several months. The Juniper Global Threat Center found that the months of October and November are shaping up to see the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.
    July 2012: Smartphones running Google's Android software have been hijacked by an illegal botnet, according to a Microsoft researcher.
    Botnets are large illegal networks of infected machines - usually desktop or laptop computers - typically used to send out masses of spam email.
    Researcher Terry Zink said there was evidence of spam being sent from Yahoo mail servers by Android devices:  http://www.bbc.co.uk/news/technology-18720565
    One question Juniper always get when discussing our research is if Apple’s iOS is more or less secure than Android? Maybe, but it’s not necessarily because of the security or lack of vulnerabilities in the platforms themselves. The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware. There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught.
    http://globalthreatcenter.com/?p=2492
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    (Apple closed out 2011 with a commanding 52.1 percent share of mobile devices tracked browsing the Web, while Google's Android had just 16.2 percent.)
    And most recently this:
    Millions of people are using Android apps that can be tricked into revealing personal data, research indicates.
    Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins.
    These apps failed to implement standard scrambling systems, allowing "man-in-the-middle" attacks to reveal data that passes back and forth when devices communicate with websites.
    http://www.bbc.co.uk/news/technology-20025973
    And this:
    Freezing an Android phone can help reveal its confidential contents, German security researchers have found.
    The team froze phones for an hour as a way to get around the encryption system that protects the data on a phone by scrambling it.
    Google introduced the data scrambling system with the latest version of Android called Ice Cream Sandwich.
    The attack allowed the researchers to get at contact lists, browsing histories and photos.
    http://www.bbc.co.uk/news/technology-21697704
    Update from May 2013:
    Malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the only platform being actively targeted is Google's Android, which researchers now say is resembling Windows on the desktop PC.
    http://appleinsider.com/articles/13/05/14/mobile-malware-exploding-but-only-for- android
    And in early June 2013 a highly toxic trojan began attacking the Android platform:
    According to reports:
    Obad.a exploits previously unknown Android bugs, uses Bluetooth and Wi-Fi connections to spread to near-by handsets, and allows attackers to issue malicious commands using standard SMS text messages.
    By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges," Unuchek said. "As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges."
    More information here:
    http://arstechnica.com/security/2013/06/behold-the-worlds-most-sophisticated-and roid-trojan
    A recent study on smartphone malware has found that 92 percent of nefarious mobile software is targeted at Google's Android platform, and the amount of attacks are growing:
    The latest data released in June 2013 by Juniper Networks reveals that Android malware has grown at a "staggering rate" over the last three years. In 2010, it accounted for just 24 percent of all mobile malware, while as of this March the platform accounts for nearly all of it.
    In the last year alone, the total number of malicious apps has grown 614 percent to 276,259. The annual Mobile Threats support also identified more than 500 third-party Android application stores worldwide that are known to host mobile malware.
    http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats -continue-ram-nyse-jnpr-1029552
    The far reaching vulnerability, discovered by San Francisco's Bluebox Security, involves "discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature."
    Android apps (packaged as an "APK") are signed with an encryption key (just like iOS apps) to prevent a malicious party from changing the code. Signed apps are expressly designed to enable the system to detect any tampering or modification.
    However, due to the newly discovered Android flaw, a rogue developer can trick the system into thinking that a compromised app is still legitimate, giving it system wide access to do virtually anything.
    "A device affected by this exploit could do anything in the realm of computer malice, including become a part of a botnet, eavesdrop with the microphone, export your data to a third party, encrypt your data and hold it hostage, use your device as a stepping stone to another network, attack your connected PC, send premium SMS messages, perform a DDoS attack against a target, or wipe your device," a representative of the company wrote AppleInsider:
    http://appleinsider.com/articles/13/07/03/security-flaw-opens-all-modern-android -devices-to-zombie-botnet-takeover
    The problem (with Android) is: that committee design has failed to make Android a good platform for either users or for developers. By not making any hard choices and giving people what they said they wanted, Google simply abandoned the future to cling tenaciously to the past.
    Rather than conceptualizing and engineering really new solutions to historical computing problems as Apple did with iOS, Google has only attempted to wrest control away from iOS via volume shipments and has effectively sent mobile computing back in time into the 1990s, resulting in the same malware, spyware, viruses and usability issues of Windows.
    http://appleinsider.com/articles/13/07/14/editorial-googles-android-haunted-by-s teve-jobs-warnings-on-app-signing-security
    The Department of Homeland Security considers the malware threat from Android so serious that they issued a public warning on July 23, 2013:
    http://info.publicintelligence.net/DHS-FBI-AndroidThreats.pdf

  • Get rid of Adobe Reader FOREVER & still read all PDFs online?

    I have this problem. I hate ADOBE ACROBAT READER. I install it when I have to, and more and more it seems that if I want to look at a PDF online, Preview doesn't get the chance because the Adobe Reader butts in and reports that it can't find an Adobe Reader compatible program.
    Or that I must have Adobe Acrobat Reader to read the PDF and do I want to download Adobe Acrobat Reader?
    Or something similar.
    Is there any SIMPLE way to get rid of Adobe Acrobat Reader altogether once and for all, so that I never have to see it, or use it, or think about it again?
    If there is, I would MUCH appreciate a HOW TO because it's making me ill.
    PREVIEW is great for what I need, and if I could just get PREVIEW to take over all PDF duties, I'd be fine.
    Alternatively, if there's another PDF reader/writer etc. for Mac, I'd pay real money for it if necessary.

    It may be necessary to go to Adobe's website to find an uninstaller.
    Preview should automatically take over the job.
    I don't have Acrobat and have no problems so far.
    I removed it about six months ago when it's major vulnerabilities to malware were pointed out.
    Never follow links from pop-ups that say you need a new version of Acrobat, Flash or other software (video codecs are a favourite) as they stand a high chance of being re-directs to malware sites.
    Always check the latest versions from your own bookmarks to the vendor sites.

  • IPhone 5 or sgs4

    I have had an iPhone 4 for 2 years, and now my contract is up, I need a new phone very soon because my iphone4 is barely working. I don't know whether to get the iPhone 5 or the sgs4. I have all my music and apps in iTunes, and I know my way around iOS, but the iPhone 5's specs are way lower than that of the sgs4, I also have never used android, and I don't love the fact that the sgs4 is plastic and that it only has 16 gigabytes for music and apps. I am torn between which phone to get, the Samsung has a 1080p screen and a quad core 1.9 ghz processor, or the iPhone 5's 640x1136 screen, and a dual core 1.2 ghz processor. Please offer advice to me, because I don't know what to do.

    Be sure to purchase/use antivirus software with the Android if you get it. In regards to security or severe lack thereof, Android is the Windows of the mobile smartphone/tablet world.
    http://macdailynews.com/2013/04/15/mobile-malware-android-is-a-bad-apple/
    “McAfee’s report details a number of different backdoors, exploits, and spyware that allow attackers to access personal files on smartphones,” Knapp writes. “From there, the attackers have a wide range of actions they can take, from harvesting sensitive data to controlling the device entirely. This is not the kind of thing a user wants to happen, especially as devices are quite expensive and the data stored on them is increasing every year — even banking data is growing on smart devices, which would be dangerous in the wrong hands.”
    Knapp writes, “This all is especially bad news for Google because the vast majority of the malware that McAfee found was on the Android operating system. Android was followed by Nokia’s Symbian, other mobile operating systems, and then Java ME. According to McAfee, Android made up ’97 percent of total mobile malware.’ This is a perfect case of ‘what’s bad for Google is good for Apple,’ because the McAfees results don’t even mention the word ‘Apple’ once, and there are no allusions to worms.”

  • Safari reseting prefs, home page, and bookmarks

    upon startup when i load safari my preferences, tool bar, home page, and recently my bookmarks have been reseting. any web page will not load until i reset safari, and delete cache, and restart safari. if I change the prefs to mine the next time I startup it happens again.

    Limewire is a major source of malware for computers, even Macs.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications and download torrents) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
    Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as in pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    Also, there is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1

  • How do I reinstall Photoshop CC after I had to reinstall Windows 7?

    I had major virus and malware in my Sony VAIO PC with WIN 7 PROF and had Sony re install the OS. I bought the license for Photoshop CC several months ago. How do I download and install it w/o having to get a new license?

    Hi Ensetaro,
    You can follow the article: Creative Cloud Help | Install, update, or uninstall apps which will help you to install the applications.
    Let me know if it works or you face any issues while working on it.
    Thanks,
    Ratandeep Arora

  • Photoshop CS4 Snow Leopard Bugs: Cursor Position & Grains

    Currently running OSX Snow Leopard (10.6.1), and just installed the latest Adobe updates this morning (9.22.09).
    There are two bugs in Ps CS4 I've encountered, one minor but aesthetically unpleasant, and the other major and disrupting:
    The first bug occurs at random when Ps is extended to "Full Screen Mode with Menu Ba." As seen in the image at the following link, graininess occurs in Ps's canvas background, and wont disappear until the screen mode is toggled (pressing the "F" key three times): http://img.skitch.com/20090922-tyxk4dfrak4dtf2f4rg7fgyn59.jpg Again, not a major bug, but simply annoying to look at.
    The second, more annoying bug, has to do with the cursor and selection tools. I could not determine when exactly this happens and how it goes away, but a few times throughout the day the selection cursor is a few pixels off. When either the lasso, magic wand, marquee or other similar tools are selected, the actual area from which Ps begins to select is about 10-15 pixels below the cursor position, see image in link for clarification: http://img.skitch.com/20090922-1jyqdtj34xw99ysq4gjxhxx57c.jpg
    I hope this notice gets the bugs fixed. If you're experiencing similar Snow Leopard side-effects and can detect how and when they occur, please let me know. The canvas background pixelation, I can live with...but the cursor selection bug makes my day twice as difficult and slows my workflow down to a snail's pace.

    Not sure about the graininess as I have never seen it but it seems to be the same fix as for the curser being off by 10 pixels. cycle though the screen modes with the F key. this has nothing to do with Snow Leopard as it is present in both Tiger and Leopard as well.
    This bug is only present when you create a new doc in full screen mode. If you are a new convert to Mac from Windows you might want to use the application frame, this will give you the gray background without those two annoyances. You can find the application frame at the bottom of the Window menu. this is a new feature on the Mac version with CS4.

  • NetBoot and Multiple DHCP Servers

    Hey everyone,
    We have a NetBoot machine running here at my school (where I work). It was working like a champ until a couple of weeks ago when our network got upgraded and there are now 2 DHCP servers on our network. That, for some reason, is totally screwing up our NetBooting process.
    Here's what I think is happening, and maybe someone can tell me if I right or wrong. NetBoot (or BSDP protocol) is a "broadcast" protocol. (That means it's always just floating around out there on the network. ) NetBoot (BSDP) protocol gets injected into the DHCP stream, and any machine that gets DHCP can get BSDP, and essentially NetBoot.
    The problem is with BSDP. BSDP protocol wants to have all of it's "broadcasts" come from the same server. So when we had 1 DHCP server, everything was fine, because client machines would get their whole NetBoot process from one machine... all of the BSDP broadcasts were coming from our 1 DHCP server.
    Now, we have 2 DHCP servers. What happens is, a client will get some of it's BSDP broadcasts from one DHCP server, and some from another... which it does not like at all.
    I recently read somewhere that it is possible to somehow make one of our DHCP servers the "authoritative" server, to which all of the clients will go to get their NetBooting info.
    Does this sound in any way right? Are we on the right track ? Has anyone seen this before? Any help would be greatly appreciated. Thanks a million.
    Mike

    Now, we have 2 DHCP servers. What happens is, a
    a client will get some of it's BSDP broadcasts from
    one DHCP server, and some from another... which it
    does not like at all.
    Not unless your new DHCP server is also a NetBoot server and is set to provide NetBoot services. BSDP and DHCP are not the same thing. If what you were saying were true, it wouldn't be possible to have DHCP and NetBoot offered by different servers.
    It IS possible, however, that the two DHCP servers are causing problems by both servicing DHCP requests for the same clients. If you've got multiple DHCP servers on the same subnet (or your router's configured to pass DHCP requests between subnets), you should make sure that only one of the DHCP servers answers requests from any given client. In our world, our Novell server is the default DHCP server on our subnet, but I keep a list of excluded MAC addresses on that server so that my Macintosh clients don't get addresses from it. On the Mac OS X server, I'm careful to limit my address ranges only to those machines which have static address maps in NetInfo. That way, our servers coexist, but they don't overlap.
    It's not clear from your message whether your previously solitary DHCP server was your Mac OS X server, or whether one of the two DHCP servers is that box. But whatever the servers are, it might be helpful to turn off one of them to see if the same problem occurs (assuming you can, without major network disruptions). If that's not possible, can you talk to your network admins to see if there's some way to isolate your clients and one of the servers--in other words, see if there's some way to keep DHCP servers from responding to the same requests.
    There may be any number of other reasons why this problem has cropped up. You may need to dust off a hub and a copy of Ethereal or EtherPeek to sniff what's happening on the network. You might also try NetBooting in verbose mode, to see where the process craps out. IIRC, there'a decent guide for this kind of troubleshooting over at Bombich's site (www.bombich.com).
    Good luck.
    David Walton

  • Photoshop, Retina screen and designing for Android

    I'm struggling to understand how to design a mobile interface for Android on Photoshop. I know the screen resolution should be at 160dpi - but how do I then work out actual pixel size to ensure accurate layout and size of elements on my retina screen?

    I used to recommend Sophos, but after dealing with a few Machines that got infected with Malware I wrote to Sophos.  They claimed that they do not scan for Trojans and adware.
    That is absolutely incorrect. Sophos certainly does scan for and detect trojans as well as at least some adware. The vast majority of Mac malware is in the form of trojans, and in my testing it performs quite admirably in detecting those. As for adware, I know for a fact that it detects things like FkCodec, ClickAgent, Yontoo and Genieo - all adware.
    Unlike what others have said in here, avast has never reported a false positive.
    Perhaps you haven't seen it, but that doesn't mean it doesn't happen. Take for example the bootroot.loader file, which is on every Mac and which Avast has been sporadically identifying as a "decompression bomb" for years.
    https://discussions.apple.com/search.jspa?resultTypes=&dateRange=all&peopleEnabl ed=true&q=bootroot.loader+avast&containerType=&container=&containerName=&usernam e=&rankBy=date&numResults=15
    I've seen other reports from time to time as well, both here and via private e-mail.
    It may not happen for everyone - evidently, it doesn't, or everyone would be complaining. However, the consequences of a false positive can be very bad for the few who do encounter it.

  • Read *.acsm pdfs online

    Reading Digital Editions docs online
    Adobe claim Digital Editions docs can be read both online and offline http://www.adobe.com/products/digital-editions.html
    I'm trying to read a *.acsm pdf i've purchased online (e.g., so I can log onto an online Adobe Digital Editions account at work and read my texts without having to install new software on a work computer).
    I've read around and found no support on this topic.
    Does anyone know how?
    thanks, Carl

    It may be necessary to go to Adobe's website to find an uninstaller.
    Preview should automatically take over the job.
    I don't have Acrobat and have no problems so far.
    I removed it about six months ago when it's major vulnerabilities to malware were pointed out.
    Never follow links from pop-ups that say you need a new version of Acrobat, Flash or other software (video codecs are a favourite) as they stand a high chance of being re-directs to malware sites.
    Always check the latest versions from your own bookmarks to the vendor sites.

  • Bit Torrent vs P2P?

    What is the difference between bit torrent and P2P? EG Acqlite and FrostWire are P2P apps, while Tomato Torrent and Transmission are bit torrent apps.
    Do these apps work with iTunes?
    I'm just totally ignorant about these things.
    Thx!

    Practically speaking, how do they differ?
    OK, let's try this again. There is no "difference" between BitTorrent and P2P. It's like you're asking what the difference is between a Corvette and a car. The former is an example of the latter. BitTorrent is P2P; it's one of many P2P networks. And you access them via an appropriate P2P client, one that accesses that particular network, be it BitTorrent, Kazaa, Gnutella, Limewire, etc.
    If you're asking how BitTorrent, Limewire, Kazaa et al differ, that's really not an appropriate subject for this forum which is for questions about iTunes, and would take a major article to really get into.
    If they can't be used with iTunes or QT, how does one use them?
    All such P2P systems are just file sharing networks; those files may be software, pictures, music, videos, text documents, or other types of files. So the network has nothing directly to do with iTunes, QuickTime or any other application, per se, though the content you download may open in such an application.
    As to how you find files, that's not easy. A P2P application may have a search built in, or you may need to find a "tracker" site. Any legitimate provider of content that is distributing via any P2P network (very rare) should tell you how to download their content. The vast majority of content, particularly media (music, videos, movies) on P2P networks is pirated. Plus P2P networks are a major vector for malware writers to distribute their attacks. Note as well that by default, many P2P applications also set up a file share on your own computer, making your computer a download source to others which can impact the security and performance of your system as well as having possible implications for any data transfer limits that might be imposed by your Internet service provider. So use any P2P network application with great caution, understanding that you're doing so at your own risk.
    I hope this clears things up.

Maybe you are looking for

  • How to extend MobileIconItemRenderer to display multiple lines of text?

    Hi, I am using Flex hero which has the added Mobile APIs. Has anyone been able to extend the MobileIconItemRenderer to display multiple lines of text. The current version of the MobileIconItemRenderer only displays 4 things: an image on the left, a l

  • How to convert  columns into rows

    present result Mat_num        comp_code   disc          amount      800000     SG01      SAPLF005                    0.00 800000     SG01      SAPLF005               31,500.00 6300001    SPM       SAPLF005                    0.00 6300001    SPM      

  • Can I useADF Faces 10.1.3.05 skin used in Jdeveloper 10.1.3.4?

    Hello, I am using JDev 10.1.3 and would like to change skin in my adf application. Help -> Check for updates -> Open Source and Partners -> Additional Skins for ADF Faces _10.1.3.*05*_ I am using JDeveloper 10.1.3.4. IS THIS OK? or is it that I canno

  • Anyone with the same problem? My macbook pro is freezing on start up and I get the follin

    My macbook pro is freezing on startup lately! It is wierd because I think the computer is still working, I can turn the volume up and down, and change the light in the keyboard and so on... But it still doesnt work.. I took a photo with my iphone? My

  • How do I uninstall OS 10.7?

    How do I, is it possible, to uninstall Lion, !0.7? lcreel44