Major Flaw in Android Software allowing easy security breach - when will update be available?

Which Samsung phones are vulnerable? Is the Galaxy S6 included? Thanks,

I spent more than an hour this morning speaking with tech support, tech support manager, network support, inquiring about a fix.  They say they have to go through a convoluted series of step the get a patch out.  "We get the patch from Android after it has been tested in my case by Motorola." then we can push it to you."  Asked whether AT&T has requested a patch from Motorola, the network support person asseted that he has no knowledge one way wr the other. (note: I did not record the conversation so this may not be an exact quotation, it is the jist of what I heard.)  I am now address the question with Motorola, and will have to check out CyanogenMod to see what they are doing.,

Similar Messages

  • There is no generic Android app for Digital Editions. When will this be available?

    I cant install this on my SGSII phone or SGNote 10.1 tablet!
    Seems quite pointless if I have to sit at my computer to read an ebook!
    Is this in the works? and if so, when would it be released.
    cheers

    Moving this discussion to the Adobe Digital Editions forum.
    Thekazido please see View e-books | iOS, Android devices - http://helpx.adobe.com/digital-editions/kb/view-e-books-ios-android.html which discusses this topic.

  • When will it be available for "lg optimus S" android phone?

    I have an android lg optimus s phone...I love firefox and id really love to use it as a browser for my phone.....when will it be available for my model cellphone?

    Firefox requires an cpu that supports ARMv7. The LG Optimus S supports ARMv6. Unfortunately our tests on ARMv6 have shown that the cpu is just too slow to support Firefox.

  • When will firefox be available for Asus Transformer? its 16G running Android 3.2.

    simple question. no further details.

    You can find Firefox mobile in the Android market. If you want our tablet specific UI try the Aurora channel http://www.mozilla.org/en-US/firefox/channel/ if you allow the installation of non-market apps.

  • When will Firefox be available for an HTC Wildfire (Android 2.1)

    Unable to load mobile version - Android 2.1 HTC Wildfire not in list of tested phones.

    It is in the list at https://wiki.mozilla.org/Mobile/Platforms/Android#System_Requirements as being not supported due to using a ARMv6 chip.

  • I was importing photos from my iphone to iphoto and updating the phone software at the same time, when the update completed the photos were gone from the phone and iphoto said the photos were not imported for unexpected reason.

    if anyone can help me with this i would be so greatful, my son is one month old and my wife is heart broken the first month of his life has disappeared from her phone.

    I would post in the iPhone forum. While iPhoto was importing basically this is an iPhone question
    And in the future you probably never want to update and import at the same time. Basically nothing good can come from that
    LN

  • TA24326 How to tell if Software Update for Windows is working correctly when no updates are available  --- the link is not working correctly.

    The link in the article does not go to the answer. It goes to a generic apple site.

    Well, the article is archived meaning it is no longer valid for the current version of iTunes.
    If you want the current version of iTunes... go to apple.com/itunes/download.

  • Popup with the text "Security Breach" in Safari

    My son told me he saw a popup with the text "Security Breach" when visiting a website. He is concerned that his phone may be compromized. He is using Safari, iOS 6.0.1 on a iPhone 4S. The was a n OK button on the popup. He pressed it and the popup disappeared. Is there serious danger here?

    This may be caused by a problem with an add-on. Try the procedure in the [[Troubleshooting extensions and themes]] article.

  • K1 questions - arabic software compatibility, game compatibility, status of ICS update?

    1 ironiclly k1 have arabic systems in menues . And not comptile with arabic softwre market. Office apps -words are not comected
    2 decie specs is no difference than xoom . And games are incpotiale unless i root and change to xoom!
    3 i dont want to root since ICS is soon .. As MEEP in lenovo News about third world region wil get the update.

    I believe usnsws means:
    1. Why does the K1 have an Arabic language setting, yet it is not compatible with Arabic language apps? (I think this is a complaint about the rendering of Arabic fonts in some apps)
    2. The specs are similar to the Motorola Xoom, but some games can't be played unless the device is rooted and the build.prop is edited so apps think the K1 is a Xoom.
    3. When will ICS be available?
    And my thoughts on these questions:
    1. I believe Arabic rendering was fixed properly in Android ICS - this would explain why it's not perfect on the K1, but will hopefully be fixed with the ICS update.
    2. I'd tentatively suggest that if a game doesn't work until build.prop is edited to change the device name, it's probably the fault of the game. Can anyone confirm this is true? (could be the case with Gameloft games?)
    3. Keep an eye on the K1 ICS thread.

  • When will Adobe Reader support annotating pdf documents on a microSD card in lollipop android?

    I really like Adobe Reader for annotation of pdf files on an external microSD cards in phones and tablets. Android Kitkat took access away. Android Lollipop gave it back.
    When will Adobe Reader support annotating files on external micoSD cards in Lollipop?

    Thanks for your request. We have noted it down for consideration.
    Thanks,
    Adobe Reader Team

  • Major flaws of Windows Phone 8

    Leuven, UTC+1, Nokia Lumia 920, Amber + GDR3.
    I have been a consumer and professional iPhone user for many years and still do with a 4S containing about 200 apps. However in April 2013 I decided to try an alternative OS and bought the Nokia Lumia 920  (GDR 3 in the meantime) which I now have been using for about 8 months together with my iPhone. Thus I can compare both builts and OS's.
    I should like to summarize my conclusions about the OS and the Lumia as follows after using the phone quite intensively and installing more than 150 apps:
    The design is one of the best and most original I have seen.
    The hardware is extremely shock resistant (it fell one day from 3m high on cobble stones!)  and allows wireless charging, unlike the competition. 
    Nokia does a great job in offering own apps with regular updates however some major apps are still missing : such as Flipboard and others. Also apps on WP8 are missing a lot of features of same apps on IOS. Trust this will be a matter of time..
    The display is a delight to work with, definitely white on black with gloves.
    WP8 overall and live tiles are a refreshing element compared to IOS and Android.( definetely when you pin Google contacts on your home screen!)
    However although I love the device and might even buy an upgrade to Lumia 1020 at a later stage, since I love the above par camera and related apps,  I am getting seriously frustrated by a lot of unacceptable flaws in the present state of the OS which I feel are completely unacceptable and a shame for Microsoft.
    Processor speed is below par or the OS is not optimizing it and as a result starting up apps and browsing photo's takes to long compared to GS4 and iPhone 4/5S. Resuming, loading.....
    Downloading of mail attachments takes to long and one can not see the progress ! 
    One has to repeat clicking for downloading pictures in mails. 
    No sound confirming sending of mails !
    The built-in Calendar app is below par and has a major flaw since the change to Caldav : when adding attendees to an appointment the calendar does not sync anymore with the Google calendar which is still way better than the outlook.com calendar who is missing many features which I am using in Google. (colors, more details, locations, etc..) No solution found yet even after trying 4 alternative Calendar apps !
    Another problem which I solved by roaming the internet is the fact that when using automatic date+time setting  the appointments in the Google calendar showed up one hour earlier due to a bug in the Caldav procedure of Microsoft which ignores the DST. I solved it by using West Central African UTC +1 timezone which does not use DST !!
    It is impossible to add photos to the outlook persons tab in outook.com which forces me to continue to use the Google contacts syncing.
    No notification or control center..
    Obviously professional users won't have to suffer a big part of these bugs since using Exchange servers, Outlook and Office 365, but the millions of consumers in the street will suffer the same frustrations, definitely if they find out that their new Outlook account is not on par with Gmail and IOS. 
    Steve, do me a favor before you leave, solve these problems if you want WP8 to conquer the world of smartphones.
    Cheers

    Leuven, UTC+1, Nokia Lumia 920, Amber + GDR3.
    I have been a consumer and professional iPhone user for many years and still do with a 4S containing about 200 apps. However in April 2013 I decided to try an alternative OS and bought the Nokia Lumia 920  (GDR 3 in the meantime) which I now have been using for about 8 months together with my iPhone. Thus I can compare both builts and OS's.
    I should like to summarize my conclusions about the OS and the Lumia as follows after using the phone quite intensively and installing more than 150 apps:
    The design is one of the best and most original I have seen.
    The hardware is extremely shock resistant (it fell one day from 3m high on cobble stones!)  and allows wireless charging, unlike the competition. 
    Nokia does a great job in offering own apps with regular updates however some major apps are still missing : such as Flipboard and others. Also apps on WP8 are missing a lot of features of same apps on IOS. Trust this will be a matter of time..
    The display is a delight to work with, definitely white on black with gloves.
    WP8 overall and live tiles are a refreshing element compared to IOS and Android.( definetely when you pin Google contacts on your home screen!)
    However although I love the device and might even buy an upgrade to Lumia 1020 at a later stage, since I love the above par camera and related apps,  I am getting seriously frustrated by a lot of unacceptable flaws in the present state of the OS which I feel are completely unacceptable and a shame for Microsoft.
    Processor speed is below par or the OS is not optimizing it and as a result starting up apps and browsing photo's takes to long compared to GS4 and iPhone 4/5S. Resuming, loading.....
    Downloading of mail attachments takes to long and one can not see the progress ! 
    One has to repeat clicking for downloading pictures in mails. 
    No sound confirming sending of mails !
    The built-in Calendar app is below par and has a major flaw since the change to Caldav : when adding attendees to an appointment the calendar does not sync anymore with the Google calendar which is still way better than the outlook.com calendar who is missing many features which I am using in Google. (colors, more details, locations, etc..) No solution found yet even after trying 4 alternative Calendar apps !
    Another problem which I solved by roaming the internet is the fact that when using automatic date+time setting  the appointments in the Google calendar showed up one hour earlier due to a bug in the Caldav procedure of Microsoft which ignores the DST. I solved it by using West Central African UTC +1 timezone which does not use DST !!
    It is impossible to add photos to the outlook persons tab in outook.com which forces me to continue to use the Google contacts syncing.
    No notification or control center..
    Obviously professional users won't have to suffer a big part of these bugs since using Exchange servers, Outlook and Office 365, but the millions of consumers in the street will suffer the same frustrations, definitely if they find out that their new Outlook account is not on par with Gmail and IOS. 
    Steve, do me a favor before you leave, solve these problems if you want WP8 to conquer the world of smartphones.
    Cheers

  • Major flaw in Identity Firewall?

    Hi!
    I have just configured identity firewall on our ASA 5510.
    I have 3 nodes that authenticates against Active Directory, using the Windows Server 2008 R2 builtin Network Policy Server:
    A laptop, a stationary PC, and a Android Phone. All 3 nodes are authenticated using the same user/password.
    Now, in ASDM -> Monitoring -> Properties -> Identity -> Users, I can see two of the nodes with my user name attached to it, namely the laptop and the stationary PC.
    But not the Android phone.
    Then it dawned on me. To set up the ADAgent properly, you have to apply 2 group policy entries. Unfortunately, those 2 entries are applied to the Computer Configuraton part of the Group Policy!!
    This means that your COMPUTER has to be a member of your domain for USER IDENTITY to work.
    Err. hello?
    So my Android phone and other nodes not a member of the AD Machine Store will never be detected by identity rules, and can roam the network free.
    If this isn't a major flaw, I don't know what is.
    Unless, of course, there is something I have completely misunderstood.
    Please tell me that I have.

    Hello,
    For devices that are not joined to the AD domain, the IDFW feature supports learning username to IP mappings via VPN or cut-through proxy authentication. The configuration guide describes this type of deployment:
    http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_idfw.html#wp1372180
    -Mike

  • Should I turn of Mac firewall to allow Cyber Security firewall to work without interference ?

    Recently purchased Cyber Security Pro and that company said I need to turn off Mac firewall so it won't interfere with their firewall. Is that the right decision ?

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Is there a major flaw with Iphoto in regards to organizing and backing up?

    Is there a major flaw with Iphoto in regards to organizing and backing up? And how should I proceed??
    Here is my story. I have moved roughly 15,000 photos from 7 computers (4 PCs and 3 Macs - basically everyone's computer in the family) onto one external hard drive. The photos were taken by many different digital cameras, are sparsely labeled, and have the most random names and folders. There are a LOT of duplicates. MY MISSION - label and back them up.
    The way I normally deal with photos/DATA is this: I plug my camera into my Mac and immediately think about organizing and backing them up. With "Preview" I look at photos (and decide which one I like), create a folder called "where-ever I took these photos" and drag them into that folder. The problem with Iphoto is that you have no ability to control folders, unlike many other applications.
    For example, in Itunes you can rename an artist, or even an album, and it will automatically appear in an updated folder. If you alter a photo in Photoshop, it makes you save it is a new file. In Iphoto you cannot make the same "root level" changes without making duplicates. From what I understand, you can place photos into an Album and then export that album (which makes duplicates). Iphoto will rename each duplicate file and then place it in the correct folder. The problem here is I have no idea where the original is to delete it.
    Basically I want to create folders called "Trip to Italy 2003" or "Rachel's Wedding" and place all the photos associated with that event in those folders. The problem I run into is that I have a bunch of duplicates. I have heard of a program called Duplicate Annihilator which has gotten favorable reviews. If I import them into Iphoto all the photos are placed in random named folders. I say random because some of the photos were taken on cameras that didn't have the date set correctly. Hence some of my photos will appear in a labyrinth of folders called "Modified / 2001 / Roll 17 / DCM482 / Image25874654.jpg"
    I am totally willing to wipe my Iphoto library clean and start again if there is a way to organize the photos as described above. Eventually I will take these folders and save them on a data DVD.
    Thanks to anyone who can help.
    Gary

    You do not need to delve into the folders within the iPhoto Library via the finder to access any photo. That is all done within iPhoto itself. If you need a photo for use outside of iPhoto read Terence Devlin's treatise on file access. iPhoto is a DAM application - Digital Asset Management, not a folder manager. There's a big difference. You can use keywords, album and smart albums to organize your photos.
    If you still have the original files you might consider what I do. I rename each file with the date it was taken using the international date format: YYYY-MM-DD-001.jpg. You can download the demo version ofMedia Expression and automatically rename each folder of photos with the EXIF date and a sequential number. This makes chronological searching and sorting much easier both in iPhoto and the Finder.
    If you want to not only manage the photos but the folders then Expression Media will let you do both. It will let you rename files after being imported into a catalog, move them between folders, add ITPC metadata to the files, create virtual albums called Supplemental categories, and much, much more. I use it as my primary DAM and iPhoto for special projects like books, slideshows, calendars, etc.

  • Dreamweaver cs5 MAJOR flaw

    Dreamweaver cs5 has a major flaw
    When 'related files' is turned on (a feature we are paying for!) and a webpage has code similar to the following in the header
    <script type="text/javascript" src="http://code.jquery.com/jquery-1.4.2.min.js"></script>
    At first launch after quitting, it takes dreamweaver between 1 and 2 minutes or more to open one web page.
    This is EXTREMELY annoying and unacceptable for software which costs so much money.
    Many designers use jquery now and may of us link directly to the latest file or jquery library.
    What's the point in having a related files facility if we have to turn it off in order to use Dreamweaver with jquery or any other external files!!!!!?
    Adobe?

    If you download a copy of the JQuery file and put it in the local site that should stop that issue.
    What operating system are you using?
    Where are your local files kept (what folders)?
    Ken Ford

Maybe you are looking for

  • T60p with Win 7 32: blue screen

    I installed Win 7 32 bit on a T60p. The problem is that randomly I get a blue screen, and I'm not able to read the cause of the crash (too fast). I downloaded and installed all the Win 7 drivers available on the Lenovo site; I downloades and installe

  • Column Header Text not displaying for multi-set column block

    Hello, I have assigned a key figure set to a column block in a report writer report in ECC 6 using table FAGLFLEXT with both additional text functionality use and without use of additional text. I can't get the column headings text for these key figu

  • Lion-Windows users cannot see attachments

    I just upgraded to Lion, and now some Windows users cannot see/find attachments. I did all that was advised (clicking on the "Windows user friendly" list), but to no avail. I sent to several Windows users and no one can see attachments with the new M

  • Create Activity from Account

    Hi, we are using CRM 5.0 PCUI. The Activity Application works fine but the Tabpage Activities in Account Application (Event: ACC_ACTIVITIES, Toolbargroup: ACC_ACT01) not working correctly. If we try to Create an Activity with the "Add Entry" button n

  • To view this content, you need the latest version of Adobe Flash Player...

    since upgrading to Windows 8.1 i keep getting this when trying to view video - live stream from CBC Sports.  i have the latest version, Shockwave Flash Object enabled, ActiveX filter disabled... nothing. what am i doing wrong?