Need professional advice on what product would suit my needs best!

I own a mid size business and we are venturing out into producing our own large multi-page brochures.  Final size of brochures after fold will be around 10 x 13 around 8 pages.  (So the center catalog layout page will be 20 x 26). I need a program that is simple yet can produce something that looks award winning, any suggestions?

I'm not sure about "simple" (there would be a learning curve for sure) but it sounds like Adobe InDesign would be the application for you.
Also, if your final goal is a print ready PDF, with InDesign there is no need to purchase Acrobat as well since it will directly export to PDF.
http://www.adobe.com/products/indesign/

Similar Messages

  • I want to paint my motorcycle different colors what product would i need?

    I want to paint my motorcycle different colors what product would i need?

    Do you mean that you downloaded Photoshop to your computer, or that you are using Photoshop.com? In the second case, the correct forum is the following: http://forums.adobe.com/community/photoshopdotcom/photoshopdotcom_general

  • What language would suit someone who hates anything that isn't PHP?

    Psst. Yes, this message is long, but so are my requirements. Please take the extra few seconds to read it
    First it was QBasic, then QuickBasic, then, of all things, Visual Basic... version 1.0. On Win98. Then XP.
    I made a lot of stuff with VB. 500 doesn't give a very good indication of how many things I made with VB 1.0, but I remember having more items than that in my c:\vbwin folder. VB might not look all that great visually, but it had a few things I've not found in any other language/environment, namely simplicity, freedom of use, speed, flexibility, hackability, and speed. Definately speed. It wasn't great on memory usage however - after my projects started creating 80KB binaries, VB would start to get crashy.
    But VB had simplicity because it didn't use the 2873598734-options 997341234-properties 897592873562874353469582743-functions mantra of VB 6.0 nor the 9-billion-of-everything mantra of .net. I could whip up an application in that environment within seconds - indeed, I became quite a master at configuring some defaults I liked for forms and adding a hidden button that responded to the ESC key in about 7 seconds. It had freedom of use because... I could do anything with it. I could, because I was just that patient enough, use 234 perfectly aligned pictureboxes to create "the Win95 look" in a program designed to work on Windows 3.1 (yes, VB 1.0 is 16-bit ), and VB had speed because those 234 pictureboxes appeared on my running program's form when I hit F5 faster than I could blink. It had flexibility because I could shove 12MB of BMPs into my EXE and it'd run fine. It had hackability because I could import the Win16 API and work around issues in the language itself to make my applications what I wanted them to be. Did I mention the speed? Well, it was copyrighted in 1991, so was written in the good old days of the 16MHz 486!
    However, all that fun was, sadly, from a while ago. Like, 8 months ago or so, probably more.
    What marked the end of that period was a conversation on IRC one day: someone gave me a 5-or-so line snippet of code in PHP. It wasn't very complicated, but it showed a clean solution to something I needed to do with web development, which I was just getting into at the time - I can't really remember what the actual issue was, but I do remember that my choices were either to use the code snippet, or go through some looong complex process to complete whatever it was I wanted to do manually.
    The code didn't look too scary, so I installed PHP and gave it a whirl. And I've liked, used, and abused PHP for many months following that initial "well maybe this isn't so bad". I don't mind PHP's use of 14 functions or more/less to do the same thing, or the fact that PHP isn't multithreaded. I probably wouldn't take advantage of multithreading in my code for a long time anyway, and PHP does have pcntl_fork() if I want to do two things at once in a controlled way.
    However... I'm starting to outgrow PHP, and I'm a bit homesick of VB's visual ease of use as well. I want an environment that lets me drag'n'drop a picturebox onto a form, shove a pile of pictureboxes inside of it, then programmatically manage them all. Yes, that's exactly the kind of thing I'd do with VB 1.0, and what do you know, I created something good from it - a simple but very usable media center-ish user interface complete with animation and it all ran fast on the PC I was using, a Pentium 3 clocked at 450MHz, with only 128MB RAM.
    Yes, PHP-GTK, PHP-QT and PHP-TK do exist, and they've all failed on my system at various points: PHP-GTK compiles and works absolutely fine, but breaks PHP-CGI. PHP-QT won't compile on my system, and its compile process is just too hard to tweak so I can't try gcc-3.4 on it. And anything involving PHP-TK that doesn't amount to creating a single, empty, lifeless window titled "PHP/TK" produces warnings or segfaults.
    So I'm looking for a programming language that gives me something comparable or equal to what VB 1.0 had - a visual drag'n'drop development environment that didn't visually overwhelm, compilation, and speed, and what PHP has - simplicity, readability, and bindings to/for everything that isn't desktop application development, without the VB syntax format. I'm past VB, and about to surpass PHP.
    Possible candidates for a new language are pretty much anything that includes both a compiler and interpreter, looks and feels like PHP, has nothing PHP doesn't have, but offers more power by using more functions, not weird, non-C-like ASCII character soup. So, if you were to take the PHP parsing engine and couple that with a bunch of libraries that adds sane stuff like native window support, the ability to manage boxes and squares in code, and so on. OR anything equivalent. So if something had ability XYZ which I couldn't figure out how to use, but also let me complete goal ABC while *not* using XYZ, it meets my requirements. And if something has just an compiler, you'll have a bit of a hard time convincing me to like it, but if it only has an interpreter, you'll really need to sell it to me, since I'm starting to get the compilation bug again, just like I did 7-8 years ago when I gazed at the wonder that was the EXE and wanted so badly to create my own.
    Also, before you list Perl, let me stop you: Perl has too many unreadabilities. "test ? abc : def" is about as far as I'm prepared to go; I far prefer English text over regular expressions, Awk and the like. Also, C is just too much. It is, probably unsurprisingly considering what you've just read, too cool for my artistic brain. I don't want a language that can do everything: I get inspired by difficulty, not being able to do whatever I want. Yes, that's how my brain works, and I need to go with the flow, not against it, so simply because C can do absolutely anything and everything, I can't use it.
    I will, however, note that I also like the Bash language, and the way it works, if only it wasn't so slow!
    So, to sum up, the best things I've written include a media center user interface in a language that's 17 years old (same age as me! ), a telnet server using PHP (I wrote the RFC-compliant telnet parser myself, from scratch), and lastly a textual taskbar, an IRC client, and some animations using Bash.
    I want a language that is readable and doesn't try to extend or expound on its own using syntax but lets me do the thinking my own way, so I have nothing stopping me from using it for what it wasn't used for. Because isn't that what we all do with programming languages anyway?
    -dav7

    As promised...
    A little simple at the moment, but it's the result of a dream... to create The Perfect Language. I just may end up calling it TPL if it works out.
    ; dav7's view of what The Perfect Language is
    ; Licensed under the Nonexistant Public License (NPL) - "do w/e you want w/ it, just give me a bit of credit."
    ; 30-sep-08 - ?-oct-08
    ; <[email protected]>
    ; /me invents comment blocks so he doesn't have to keep typing ;s
    There. :D
    Now, the problem with most common programming languages (I'm looking at you, C) is that they
    - are rather unreadable
    - are really hard to work with for the unknowledgable
    - impose a 32768-second wait on the impatient, ADHD-infused programmer as the code file(s) compile for the
    247th time
    - involve a lot of typing, some of it needing to be a specific case (CAPS or lowercase)
    - requires a lot of input to get something basic functional, and has a very high initial code to output
    ratio: at the beginning of a project a high percentage of code is required to get a reasonable amount of
    output, and only after there is a fairly decent amount of code present will the code / output ratio
    decrease so that only a relatively small amount of code is needed to produce the application-specific
    output desired
    - is not natively very image-oriented - to display an image in a window without 5GB of libraries, I need to
    know Xlib, how to decode PNGs and how to manage double-buffering
    So, I want to create a language that
    - is both readable AND easy to type. No, I'm not going to do a survey of what word groups are the easiest
    for the eye to pick up on, or go anywhere near that extreme; rather, my language will have two "modes".
    One is amazingly quick to type, and the other, while relatively minimalistic, actually uses ASCII characters
    to denote function, data and flow, and my compiler/interpreter combo will have a converter that will pass
    through and convert a code file from one "syntax mode" to the other.
    - can be both interpreted or emitted, depending on the situation ("emitted" here means that instead of working on
    something that can generate native code for 784598754 platforms myself, I'll just output C-- code or something)
    - has bindings for X
    - makes it very easy to debug a program
    From a result-, goal- or solution-based person like myself, I don't see language design the way most others would.
    I don't value a language based on its algorithmic efficiency, I value it based on ease of use. I don't see things
    from a procedural perspective, but rather a tokenized object oriented tree of constructs that I must feed to the
    computter to achieve the result I want. This language adheres to that principle.
    So, let's get started with this new language. As I go along, I explain points of interest / trivia about whatever
    I'm referring to.
    ; The ubiquitous "Hello World". To print something, you encase it with single or double quotes and don't assign
    ; any meaning to it by telling the language to set the string to a variable or test it against something. A
    newline is automatically added at the end of a line of such output produced by quoting.
    "Hello world!"
    ; variable assignment by usage. There's no "true" or "false" here. Everything uses plain, un-expounded (in that 0
    won't mean false or 1 true) integers to represent state or status.
    x = 1
    ; if/then - the '? var : abc : def' construct compares 'var', and if 'var' is 1, it executes 'abc', otherwise it
    ; executes 'def'. This'll print "x = 1!". This construct could be used to do anything - I'd want it to operate
    ; as much like the C preprocessor as possible.
    ? x = 1: "x = 1!" : "x = 0!"
    ; the previous line could also be written as:
    ? x: "x = 1!" : "x = 0!"
    ; or even:
    "'x' is equal to $x, which would equal"; ? x: "TRUE" : "FALSE"; "in a lot of other programming languages."
    ; calling a procedure. See the procedure declaration below for more info.
    test x
    ; a loop. Loops start with a '[' and end with a ']'. This language doesn't have any for or while loops - you
    ; construct those on your own.
    [ ;; this demos both nested comment blocks, and the fact that I stole C's add-1 method -> ;; x++
    ; the ! operator breaks out of a loop. I might change this.
    ? x > 5: !
    ; Print the current index, up to 5. Using a $ next to a known variable name in a quoted string will
    ; print that variable's contents.
    "$x"
    ; Now for a for-esque loop - very similar to the previous example. Note that at the beginning of the block, a
    ; semicolon isn't required to denote its seperation of the pre- or proceeding code behind and in front of it.
    z = 0 [ z++; ? z > 10: !
    "$z"
    ; procedure start. No definition of the function or parameters is required - variables are accessible inside
    ; the function as 'a', 'b', 'c', etc. When 'z' is reached the next variable is indexed as 'aa', then the next
    ; as 'ab', etc. Also, functions can be defined after they're called - the parser will have the entire program
    ; in memory before it executes a single line of it, and the compiler will likewise parse the entire program
    ; before outputting any C.
    test:
    ; Yes, it looks like I have the quotes wrong, but I don't. This language allows for Bash-style
    ; variable-string combination ;)
    "ohai from teh procedure! You passed "$a"!"
    ; procedure end. Note that I start with "proc:" and end with ":proc" - this makes it very easy to see
    ; what function I might be seeing the end of if it's long and I can see any function starts.
    :test
    ; Now for everything demoed here as a one-liner.
    "Hello world!"; x = 1; ? x: "x = 1!" : "x = 0!"; "'x' is equal to $x, which would equal"; ? x: "TRUE" : "FALSE"; "in a lot of other programming languages."; test; [ ? x > 5: !; "$x" ] z = 0 [ z++; ? z > 10: !; "$z" ] test: "ohai from teh procedure!" :test
    ; And now for everything in its slightly more readable form...
    "Hello world!"
    x = 1
    if x = 1 then "x = 1!" else "x = 0!"
    if x then "x = 1!" else "x = 0!"
    "'x' is equal to $x, which would equal"; if x then "TRUE" else "FALSE"; "in a lot of other programming languages."
    test
    [ x++
    if x is greater than 5 then break
    ; OR
    ; if x > 5 then break
    "$x"
    z = 0 [ z++; if z > 10 then !
    "$z"
    test:
    "ohai from teh procedure!"
    :test
    ; And now for this version as its oneliner:
    "Hello world!"; x = 1; if x then "x = 1!" else "x = 0!"; "'x' is equal to $x, which would equal"; ? x: "TRUE" : "FALSE"; "in a lot of other programming languages."; test; [ if x is greather than 5 then break; "$x" ] z = 0 [ z++; if z > 10 then break; "$z" ] test: "ohai from teh procedure!" :test
    That's about it.
    What do you think?
    What language has the closest syntax as mine?
    Is this language viable? Could it survive actually being developed?
    Please do let me know your opinions/comments/suggestions/flames.
    -dav7

  • What product is suited for covering largest distance outdoor?

    Hi there,
    One of my customers requires wirelss connectiviy between 11 locations located in an area with a diameter of 8 miles. Does anyone have any experience with any Cisco product which can cover this range? I assume this needs some type of wireless bridge. What is the maximum distance a Cisco Wireless bridge can cover?
    Thanks,
    rdianat

    Cisco Aironet Antennas and Accessories Reference Guide
    http://www.cisco.com/en/US/prod/collateral/wireless/ps7183/ps469/product_data_sheet09186a008008883b.html
    Cisco Aironet 2.4 GHz and 5 GHz Antennas and Accessories
    http://www.cisco.com/en/US/prod/collateral/wireless/ps7183/ps469/product_data_sheet09186a008022b11b.html

  • What settings would get you the best sound quality?

    Okay, so I don't really know too much about audio, but I do care abou tsound quality.
    I was poking around in the built in MIDI controller and I was looking at the settings for my MacBook Pro Retina 15" and the options under format where "44100Hz, 48000Hz, 88200Hz, and 96000Hz." I am wandering which of these would be the highest quality sound? I am not sure and don't want to mess anytihing up by setting it wrong.
    Also, the other option in the channels. Which is better: 2ch-24 bit integer, 2ch-16 bit integer, or 2ch-32 bit float?
    I'm not sure if these are dumb questions, but thanks in advanced!

    Have a look at this article, you'll get an extensive comparison of the AAC and MP3 formats and bit rates benchmarked against CD format: Planet of Sound - Quality of AAC audio and MP3
    Of the various options iTunes gives, AAC and MP3 are compressed formats so you lose some quality but gain space. AIFF (CD) and WAV are uncompressed so you gain quality at the expense of space. Apple Lossless falls somewhere in between, doesn't compress as much as AAC and MP3 so you gain some space but not as much, however it is claimed to give a quality which is the equal to CD. Of the compressed formats AAC is less widely used at present, if you have a non Apple music player or a newer in-car CD player then MP3 would be the most compatible compressed format: iTunes Encoding Strategies

  • What Macbook would be perfect for me? What would best suit my activity/needs?

    I currently have a Toshiba L650 Satellite.
    I'm an 18 year old female, and I want to buy my very first macbook.
    As Macbooks are expensive, I want to get the perfect one for me.
    I use my laptop for:
    -Photoshop (I edit a lot of pictures/gifs/etc)
    -Photo's (lots of photos I take on my camera I store on my computer, this also means I want an SD card slot)
    -USB plug ins.
    -Music (So I want to be able to put discs in my computer)
    -Storing videos. (Average amount, not lots, just average amount of videos)
    -Word documents I use often.
    -Internet (I spend A LOT of time on the internet - facebook, youtube, social networking, browsing, etc. My laptops main use is the internet and photos)
    -I watch some TV shows on it, like Vampire Diaries, etc sometimes.
    -I'm not really a gamer. I do, however, play the sims 3 ocassionally and I'm thinking about buying Skyrim, but don't know about this one, maybe not.
    -I webcam a lot too. Via Facebook generally. But sometimes Skype too.
    & I think that's about it.
    What would be the better Macbook for me?
    I was looking at either the Macbook pro 13" or the Macbook air 13" - but don't know which one or if neither of these would suit me.
    I like my computers to run fast and I like as much memory as possible. However, on my current laptop I've only used 83gb I think. It says total space is 583gb and there's 500gb remaining so I think that means I used 83gb?
    On my new laptop, I want to store a bit more stuff than that though. So what is best for me?? What MAC is best for me??
    I don't know a lot about computers so you may need to explain thoroughly for me to understand better.

    Most of your list could be supported by either MacBook you listed. I think if you are a heavy user of Photoshop that you will find the MacBook Pro to be the better solution.
    You version of Photoshop that you have on your Toshiba will not run  on the Mac and will have to be replaced with the Mac version. Adobe may make you a deal on the Mac version. Call an ask their sales staff what they can do for you if you want to stay with PS.
    Seeing as how you are planning on switching platform, you may want to check out two applications from Apple before you switch which are iPhoto and Aperture.
    The first iPhoto will come with you Mac and is a way of storing photos and doing simple editing on them. It is very well integrated with the rest of the software on the Mac.
    The other is Aperture. This is an extra cost item that is for the more serious user. It is capable of much more powerful edits on your photos.
    Allan

  • I need some advice on what kind of virus protection program to buy.I am new to using a Mac,the promotional one is expired .I need to decide soon

    I need advice about what security program to buy the promotional one is expired. To keep the Webfoot program is expensive.Is there another less costly one recommended ?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • HT5312 i forgot the answer to my security question which was required by apple to purches an app.. i would appricate any advice on what i should do.   thank you

    i forgot the answer to my security question which was required by apple to purches an app.. i would appricate any advice on what i should do.
    thank you.
    Mosab azdein

    Hi Mva,
    If you set up a Rescue email address:
    Go into Manage Your AppleID, https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/, select Password and Security, and click the first option (see below), and you will be able to proceed from there..... (I HOPE the first button is showing for you!)
    Reset your password
    You can change or reset the password for your Apple ID account by providing some information.
    Select your authentication method.
    Email authentication: To access your information, we will send an email to the rescue email address on file for you.
      Answer security questions: To access your information, you will need to answer the security question(s) provided when you originally created your Apple ID.
    If you did not set up a Rescue email address:
    1. Go to Express Lane  and select 'iTunes' from the list of 'products' in the middle of the screen.
       Then select 'iTunes Store', and on the next screen select 'Account Management'
       Next choose 'Apple ID Account Security' and fill in that you'd like your security   
       questions/answers reset.
    You should get an email reply within about 24 hours (and check your Spam folder as well as your Inbox)
    2. Once your questions have been reset, and you set up new ones, also set up a RESCUE EMAIL ADDRESS, so if you forget them again, you won't have to go through all of this.....
    Hope this helps!
    Cheers,
    GB

  • HT5312 i forgot the answer to my security question which was required by apple to purches an app.. i would appricate any advice on what i should do.  

    i forgot the answer to my security question which was required by apple to purches an app.. i would appricate any advice on what i should do.

    Hi Oms3ad,
    If you set up a Rescue email address:
    Go into Manage Your AppleID, https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/, select Password and Security, and click the first option (see below), and you will be able to proceed from there..... (I HOPE the first button is showing for you!)
    Reset your password
    You can change or reset the password for your Apple ID account by providing some information.
    Select your authentication method.
    Email authentication: To access your information, we will send an email to the rescue email address on file for you.
      Answer security questions: To access your information, you will need to answer the security question(s) provided when you originally created your Apple ID.
    If you did not set up a Rescue email address:
    1. Go to Express Lane  and select 'iTunes' from the list of 'products' in the middle of the screen.
       Then select 'iTunes Store', and on the next screen select 'Account Management'
       Next choose 'Forgotten Security Questions' and fill in that you'd like your security   
       questions/answers reset.
    You should get an email reply within about 24 hours (and check your Spam folder as well as your Inbox)
    2. Once your questions have been reset, and you set up new ones, also set up a RESCUE EMAIL ADDRESS, so if you forget them again, you won't have to go through all of this.....

  • I need to crop image in TIFF format. what product i need to buy

    i need to crop image in TIFF format. what product i need to buy

    Photoshop should be able to handle cropping your TIFF file, possibly Photoshop Elements as well which would cost less.  You should get the trial version to make sure rather than buying before trying.
    You might also want to check if you already have something on your machine that can do it.  On a PC you should be able to right click the image and choose "Open With" whereby a menu of programs should appear with programs that can open the file.  You can check to see if any of those listed provide the cropping tool.
    If you have further questions you should try posting in the Photoshop forum instead of here (http://forums.adobe.com/community/photoshop?view=discussions).  This forum is primarly for questions about downloading and installing Adobe applications.

  • Help! No idea what products we need...

    Ok, I've got an online IP forum which also sells forum based workshops. We are now including video in our online workshops and would like to find a solution to embed the videos in those areas to the forum where the user has paid for access.
    We would also like to display 'how to' type videos where anyone can see in forum posts.
    We would like it to have the option to expand into full screen.
    None of these videos are 'live' so they are all prerecorded. I'm also thinking that it would be nice to 'host' the videos elsewhere if possible as they likely take up alot of space. We have machighway hosting which isn't a huge amount of space and they state that they don't allow 'quicktime streaming' which makes me wonder if they will block us from any other type of streaming.
    I was directed to adobes server products but I am completely lost at what I would need or what they are even. I'd like a really simple plug/play solution in a perfect world but the more I look around the less likely this seems possible
    Thanks for any help or insight!

    Designing a client side requirement like full screen video, video embedding all sort of things are not part of FMS. Though a good webdesigner or flash expert can do all this for you..
    FMS solves other part of your problem, for example pre-recorded video streaming. You may either use RTMP (stick to flash player as client) or HTTP ( can be used for viweing on iOS, Flash based devices)..
    I recommend you first try the developer edition of the FMS to get the feel how it can streaming your videos on RTMP or HTTP.. This is free edition with some restricted access on number of clients or viewing time.. Just video streaming will work out of box for you..
    1. Jjust install FMS.
    2. Keep you videos inside Applications/vod/media for RTMP or webroot/vod for HTTP
    3. You may use the video player that comes with FMS (within sample/videoplayer) to play these videos..
    You may then think of developing some client application/website like sample video player which can play your videos..

  • What products do I need?

    My company is planning to upgrade from MS Access to Oracle 8 to deliver database integrated sites over the Internet. Please could anybody advise me as to what products I would need to do this: -
    e.g. What do I need on our NT/IIS server, what do I need on the desktop PC's and do I need an Internet license?
    Cheers
    David Rhodes

    You have asked a true "sales" question. This group is focused on Sales applications such as Telesales, Sales Online, Incentive Compensation. Wrong place.
    Try this:
    http://www.oracle.com/ip/deploy/database/index.html?content.html
    Sean
    null

  • Video blog - need some advice on what to charge

    hi, i have been asked to put together a price proposal for producing a monthly video "magazine" for a major company in austria and could sure use some input from the video producer community on what i should charge for such a thing. i am not new to video and work as a veejay and produce other forms of videos. i am working on my own feature documentary. but this is for someone else, and i don't have much experience pricing such a job.
    i am the creative designer and director, and would
    a) shoot the subject on a DVX100 myself (2-4 hrs on location)
    b) transfer and edit the footage in FCP
    c) add sound fx and possibly music that i have composed
    c) export for the web and deliver a finished 3-5 minute episode once a month.
    can any of you more experienced producers offer me some pricing guides? i figured per episode 1000 for creative direction plus 1000 for the shoot plus edit. is that too low? too high? i just want to get paid what is worthy for such a job. they bought my skills based on what they have seen from my existing work.
    many thx!
    iMac G5, 20, 1.8Ghz, 2GB Ram   Mac OS X (10.4.3)   power user of pro apps

    I VJ and don't use audio engineers or gaffers. If I needed to, I would hire crew in ad hoc, but for most simple productions I get by through pure one-man-band videojournalism. And let's face it, a production for a company intranet/internet site is not the equivalent of filming the next Chanel TVC.
    It's always very difficult working out a freelance price. One method is to work out how many hours or days it would take you. Decide what you would expect to be earning if you did that job as a full-time employee. Calcuate the value of your job at that rate, then double it.
    I work in the Middle East, where rates are different (and probably much lower). Cameramen here charge US$1,000 a day for shooting. Editing varies wildly. VNRs are usually budgeted at no less than US$1,000/minute (including the basics: production, filming, writing, editing - extra for translations, voice overs, animation). Bear in mind these prices are for western expat crews, in this place you can literally knock off a zero and hire regional workers, given there are no unions and no minimum wage laws here.
    For what you are doing, maybe consider at least US$2,000/month, more likely US$3,000 and upwards. I have no clue if these prices are absurdly high or absurdly low in Austria though.

  • I would like to know what 'Product 031-11255' is.

    Hellow~
    I've got an error when downloading Mac OS X Update Combined 10.6.8 var.
    There is a install.log error message:
    Product 031-11255: no package found for identifier a
    I would like to know what 'Product 031-11255' is.
    PLeasekindly inform me as soon as possible.
    Waiting your rely~ !

    Thanks Kappy~
    I've never used Airport network for surfing to the internet on iMac.
    I don't want to use Airport network, Ethernet is enough.
    Is that all to turn it off on iMac computer .... anything else?
    Still... i couldn't update next version.
    I've got some error message when downloading Mac OS X Update Combined 10.6.8 var.
    install.log message on console below :
    Package Authoring: my.result.title and my.result.message not defined or empty
    Product 031-11255: distribution references package AirPortUtility.pkg not matched in catalog.
    Product 031-11255: no package found for identifier a
    What should i do ...resolve that message?
    Please inform me in detail if you know ~
    I'm waiting your reply as soon as possible. ~ ~

  • Is it possible to connect my 2008 black macbook, to my new 2014 macbook pro retina display screen to make a dual monitor. If this is possible what cables would I need to buy?

    Is it possible to connect my 2008 black macbook, to my new 2014 macbook pro retina display screen to make a dual monitor. If this is possible what cables would I need to buy?

    You can try using Screen Sharing in the Sharing preferences. Or try a third-party utility such as ScreenRecycler.

Maybe you are looking for

  • How to integrate an entreprise logo on a ipad?

    please help me.... i hope yours solutions will be "simple"

  • Structure for Receiver Jdbc adapter for multiple tables

    Hi, For Receiver JDBC adapter,Standard structure structure as Statement    Tablename(TABLE1)         Action         Access Can i make a structure like Statement      Tablename(TABLE1)         Action         Access             fields....      Tablenam

  • Jar file dependency

    * I'm using OC4J 9.0.3 production version. * I have a question about class visibility. * I have the manifest file in my App-ejb.jar point to another jar (common.jar) file. * My App-ejb.jar file is packaged along with my App-web.war file into an ear f

  • Cluster table help

    hi,    i am finding how many transaction does users has executed on particular client, i tried figure out from SAPWL_WORKLOAD_GET_STATISTIC and also with STAT but could't get any information,so can any one tell me where do i will get this information

  • Alter IP address of SQL Server AlwaysOn Failover clustering Iistener

    Hi, Is there a possibility to change the IP address of SQL Server AlwaysOn Failover clustering Listener IP address without deleting the exiting one and also retaining the same DNS name. NOTE: Only the IP address needs to be altered rest all (DNS, por