Newbie needs help aligning music to pictures ....

I want to specify to move to a new picture at a specific poin
t in a song ... there must be an easy way to do this .... but, I can't seem to get things aligned .... please help!

Photoshop Elements  is not very good at doing the alignment of music to the photos. Its slide show functions are very basic.
If you post which version of Photoshop Elements you are using, it might be possible to help you.

Similar Messages

  • NEWBIE: Need Help Sending Music Files

    Everytime I try to send even a small music file (300 KB)... I get a "Message content exceeds size limit"
    Do I need to change my settings someplace?
    Any help would be appreciated
    Thanks
    MJ

    Unfortunately Patsfan, You cannot do anything to change this setting!
    This is a limitation that was set by your phone services provider network!
    MMS message are to only be allow to be sent over their network if the size is "LESS" than 300kb, you might be able to get away with "300kb exactly" but still it has to be within that size!
    If you notice when you are in video mode on your phone and go to options it gives you two "video formats" to choose from
    1 = normal mode
    2 = mms mode
    If you choose the first mode, you can record videos for as long as you want, granted you have a memory card that has the available space. But you most likely wont be able to send those videos using mms because they probably have gone over the 300kb size limitation for sending via MMS.
    If you choose the second mode, the videos that you record will stop at about 40-50 seconds or before the video size goes over 300kb.  And thats just the way it is.  This mode assures that all your videos will be under 300kb, and in a format that can be sent by mms GUARUNTEED.
    The only work around for this are mainly two things:
    1 - Send the video by email and not MMS.
    or
    2 - find some third party software that will allow you to work around these size limitations.
    Sorry I dont know any off hand. 
    But I hope this helps out!
    Message Edited by bigbain on 01-19-2009 05:03 PM
    Big Bain

  • MacBook - Newbie: Need help on printing wirelessly to XP shared printer

    MacBook - Newbie: Need help on printing to XP shared printer
    Bear with me please. I read tons of articles on this but somehow as a newbie to MAC (girlfriends sick daughter), I am missing something. 10.5.2
    Currently, she can print directly if we plug in the HP Deskjet printer directly via USB to the MACBook. No problem.
    When we first got the MACBOOK I tried setting up the MACBOOK wirelessly to recognize the workgroup where the printer was attached via USB to the Windows XP PC. However it printed out garbage since I did not know there was a difference between XP printing and MAC (Gutenberg/gimp printing/drivers).
    Now I know there is a difference.
    But in reading various instructions, I no longer can find how to connect the MAC to the Windows workgroup. Note we do have a printer set up currently as USB-HP Deskjet on the Macbook (not sure I need to delete it yet).
    I went to System Preferences on MACBOOK and clicked on printers, more printers. In the drop down box was CANON, APPLETALK, IP HP printing and Firewire. There was no WINDOWS selection as I saw in other online web instructions.
    So not sure how to proceed to find a way to:
    1. Connect to Windows workgroup (click on what exactly), step by step please!!
    2. Add correct HP Deskjet 5490 printer (perhaps there is one with Gutenberg or perhaps I need Gutenprint-really not sure what I am talking about)
    Thanks so much in advance. Fiancé's kid has had her cancer recur in a different place and someone was nice enough to buy her a MACBOOK as a gift.
    Sincerely
    Peter

    ccarbery wrote:
    OK...I figured it out...no need to reply.  I noticed that there was another Protocol to use to set up the printer on the Mac, I was using LPD, so I switched it to HP Jet Direct-socket, and it prints fine...thanks.  I am curious as to why LPD wouldn't work; if anyone has that answer I would like to know...thanks
    Any chance of posting the Protocol you used to connect to your printer with your laptop?  I'm have the exact same problem printing from my MB.  Same error message "..is busy".

  • *** Need help recovering music on iPod/iTunes ***

    * Need help recovering music on iPod/iTunes *
    I bought my iPod 30G when it first came out back in the day. With the protective case it looks like a Walkman, if you know what that is. The new ones are half the thickness of my old skool one. lol!
    Anyway, years ago I accidently uploaded a virus in both my PC and laptop. Yeah, real *******. Well, the person who restored my computers couldn't save my music. I still have the iPod but my library on iTunes is gone. If I try to update my iPod in either computer it will erase every song I have on it and only upload the songs/album I'm trying to add. I'm told that this is something Apple did to prevent file sharing, blah, blah, blah...
    Does anyone know a way around it? I keep buying CDs just not able to load them into my iPod thru iTunes.

    Hello yourantihero,
    And welcome to Apple Discussions!
    There are several ways you can pull the music off your iPod and onto iTunes. The first link below provides step-by-step instructions for the direct method if you have a PC as well as a few third party applications (for both the Mac and PC) if you choose to go that route instead. You can also do a simple Google search for "copy music from iPod to computer" and you should receive a number of sites that can help you out.
    Just make sure that when you have your iPod plugged into your computer, that you don't hit "Erase and Sync" before completing the task of copying your music over.
    Also, if you have any purchased music, you will probably have to re-authorize your computer by heading to the Store drop down menu and choosing "Authorize computer."
    [5 Ways to Copy Music OFF your iPod and onto iTunes|http://www.metaphoriclabs.com/articles/5-ways-to-copy-music-off-your-ipo d-windows-mac-os-x>
    Here are a few more helpful sites.
    [Copying Content from your iPod to your Computer - The Definitive Guide|http://www.ilounge.com/index.php/articles/comments/copying-music-from-ipo d-to-computer]
    Or
    [How to copy songs your iPod to your PC|http://lifehacker.com/software/ipod/how-to-copy-songs-from-your-ipod-to-your -pc-105256.php]
    Also, here is an article for the direct method that is for both Windows Vista and XP.
    http://ipodtips-tricks.blogspot.com/2008/10/howto-transfer-music-from-ipodto-itu nes.html
    Hope this helps.
    B-rock

  • Need help with batch processing picture packages

    Hi, I am having trouble batch processing picture packages is CS2.  (Windows).
    I have hundreds of images that need to be processed into picture packages and would love to find a speedier way to do this.
    I know how to create an action.  I know how to batch process from this action.  I also know how to create picture packages, but I cannot get the final result I am after - please read on....
    I have seperated all the images into their seperate folders for each style of picture package required.
    I can create an action for the picture package required and then do a batch process on the particular folder, but this leaves all the picture packages open on the desktop - as when you chose the close and save in the batch process - this only closes and saves the original image - the picture package has been created as a new document and is on the desktop still open - named Picture Package 1, Picture Package 2 - etc etc.
    I hope I am making some kind of sense here... (??!!)
    What I would like to happen is that the picture package will be saved over the original file (or to a new folder) with the original file name of the original image or maybe even with an adjustment to file name (e.g - orignal file name sc1234.jpeg - new file name sc1234packA.jpeg)
    So is this possible to do??  I'm thinking there must be a way.... i'm sure there are many group photographers out there who come across this everyday??
    Otherwise I have to save each picture package manually to original file name (via searching though files to match the original image to the picture package....) Very time consuming.
    Thanks for your help (in anticipation)...
    Jodie

    hmm - thanks for that - sounds like I will have to try and find some info and assistance regarding the scripting - it may be something I need to look into at a later time in the future....
    At the moment though I will have to plod along with this method I guess!
    Thanks for your assistance...
    Jodie

  • Newbie needs help with Flex app

    Hi there. I am very new to Flex and also fairly new to
    programming although I do have a little experience.
    I am trying to create an app which stores code snippets or
    common text I tend to use every day in my documents and emails.
    So basically I need help on a design level. I can refer to
    the developer's manual for exact instructions for commands, but I
    need to know what to code first.
    The app will consist of:
    -a tree directory structure where I can create groups.
    -There will be a basic text editor where I input all my data,
    basic text formatting options (font, bullets etc) would be a bonus.
    -A search function
    -Finally it will ideally allow multiple client apps write to
    a central database file over a network
    Can anyone suggest how I should approach such a project?
    Or are there any tutorials / source files which demonstrate
    each bullet point?
    thanks.

    Hey jono,
    I'm new too. But I think I might know the right components.
    If you google any of these + flex 3 you should get some
    decent documentation
    tree - advanced dataGrid component
    basic text editor - rich text editor component
    search function - well, you're gonna need to read up on
    arrays, and arraycollection. Once you get that stuff working, you
    can write up a function to search for a string in an array.
    network functionality - HTTPService, you can dump the
    datagrid into a database, and have it load the database when you
    open up the application.
    Give these things a shot, tutorials / sources will come with
    the google searches.

  • Newbie needs help comprehending CSS Password Manager functions

    Hello All:
    I own a TP W500 4062-27U running Windows 7 Ultimate.  The computer is trouble-free.
    I am seeking a solution to the following need:  An application that will securely remember my passwords for various websites, etc. and enable me to log in using the fingerprint reader or similar.
    I am aware that Lenovo provides both Fingerprint Reader software and Client Security Solution software, but I don't know whether or not either one (or both) of these applications will provide the functionality I am seeking.  I have spent a fair bit of time looking around the Lenovo website, but cannot find a document that describes (in a general, overview manner) the functionality that CSS provides.
    I don't need to log into VPNs, or company networks, or anything really fancy like that - I just need something that will enable me to log into about 20 different websites, using a different password for each website.  Right now, I'm generally using the same password for every website (that way, I can remember what it is), and as I think you will agree, that is probably not a very good practice so far as security is concerned.
    If anyone could point me towards a document that explains how I can get CSS to do what I want it to do, I would be very grateful.  If CSS does not have the functionality I am seeking, I would very much appreciate a recommendation of software - possibly non-Lenovo - that does provide the functionality I am seeking.
    Thanks very much for your assistance.
    Michael

    Hi PanEuropean2,
    Welcome to Lenovo Forum!
    In regard to your question, Client Security Solution (CSS) should be the right fit for you.
    I have a T410 with Win 7, and have several passwords to remember which is really killing me. However, by using CSS, Fingerprint software and Password Manager, I need to enter all the passwords only once when access a website or a tool, and let it saved in CSS.
    The next time i turn on the machine and open up a website which needs user ID and password, I just need to swipe the fingerprint that I've enrolled, then viola!
    Just take note that after the first swipe of fingerprint, tools or website that are to be accessed later will automatically show the password in the box directly without having to swipe fingerprint again. You just need to click to log in. I"m not sure if this is the experience you're looking for, however, no harm to give it a try.
    Here's the user guide for CSS. It has
    Client Security Solution components
    Client Security Solution installation considerations
    Client Security Solution features
    Hope this helps
    Cheers,
    Cleo
    WW Social Media
    T61, T410, x240, Z500, Flex 14
    Important Note: If you need help, post your question in the forum, and include your system type, model number and OS. Do not post your serial number.
    Did someone help you today? Press the star on the left to thank them with a Kudo!
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"!
    Follow @LenovoForums on Twitter!
    How to send a private message? --> Check out this article.
    English Community   Deutsche Community   Comunidad en Español   Русскоязычное Сообщество

  • DVD Studio Pro Newbie Needs Help!

    I have a presentation deadline approaching and I need help desperately. I created my presentation using Keynote 3 (800*600 slides) and exported it to a Quicktime movie using H.264 compression at 29.97 fps (high quality settings). I then proceeded to use iDVD 6 and imported the Quicktime movie and created a simple menu using the templates provided.
    I saved the entire project as a disk image and used the DVD player to check the disk image file. The quality of the DVD disk image file looked nothing like the original Quicktime movie. The images and text looked blurry and unprofessional.
    I've spend quite some time on the iDVD and Keynote discussion forums and can't find a solution to my problem. The conclusion I've come is that the mpeg-2 encoder that iDVD 6 uses is problematic.
    I don't want to start using DVD Studio Pro but I will in order to preserve the quality of my original Keynote presentation. So here are my questions...thank you in advance for your help guys....I really need it:
    - I plan on playing the DVD on a 42" Plasma display at a sales office and also distributing it to potential buyers. Are my Keynote export settings optimal for iDVD use? Should I be using H.264 @ 29.97?
    - If I must use DVDSP then what export/compression settings should I use in Keynote to preserve the quality? Keynote doesn't give me an option to use mpeg-2. I have ffmpegX so I can encode different formats...just need to know the correct one.
    - Keynote exports separate audio and video files. I combined them using Quicktime. Is it possible to use the combined file in DVDSP or do they need to be separate.
    Thanks for taking the time to read this post. Any help would be greatly appreciated. Also, if you have any reading material pertaining to this matter please provide link.
    ~Eddie~
    PowerBook G4   Mac OS X (10.4.5)  

    You can use a mov file that contains both audio and video. DVD Studio Pro will compress the mov itself. I am not overly familiar with the codec H.264 but either way its a codec that compresses the video, and if I am right that codec is used for compressing video to web based file sizes, which means heavy compression. When I create DVD material I use M2V format which is what DVD SP wants anyways so it cuts time and drive space in half. If you export an mov and import it into DVD SP, DVD SP compresses the file again which is M2V. Now you have two files, with twice the compression time. When creating M2V the only thing that you need o be aware of is the bit rate, which needs to be adjusted pending the duration of the video. Use 29.97 if you are NTSC and full frame rate, which you should be.
    If you can not create an M2V file with associated aiff audio file, than export your QT file as uncompressed or as a QT Movie. The file itself will be huge but DVD SP will compress it properly.
    I hope this helps

  • I need help recovering a blackberry picture that I had hidden

    Please will someone help me recover a picture on my blackberry storm that I had hidden.  Thank you

    Try disabling the option.  The steps are below.
    From the Home screen, select Messages then press in on the trackwheel / trackball.
    Select any e-mail message or the current date then press in on the trackwheel / Menu button.
    Select Options then press in on the trackwheel / trackball.
    Select General Options then press in on the trackwheel / trackball.
    Select Hide Filed Messages: (Yes / No) field then press in on the trackwheel / trackball.
    If prompted, select Change Option then press in on the trackwheel / trackball.
    Select the desired option then press in on the trackwheel / trackball.
    Yes
    No
    Press in on the trackwheel / Menu button, select Save then press in on the trackwheel / trackball.
    HTH

  • Newbie needs help with browser compatibility

    Ok, so I'm new at this, so this may be something really
    simple, but browser compatibility? I made a site in DW;html and it
    shows up perfect in safari but internet explorer and firefox not so
    much. I did a browser compatibility test in DW and it says nothing
    is wrong with my pages, but obviously something must be!!
    On my home page, the image of a house that I have next to the
    company name shows up fine in safari but not any other browsers.
    And my page layout, everything is moved over funny in other
    browsers. Also there are link boxes around the table I created with
    different brands of products. On safari the boxes do not show, but
    all the other browsers it does!! I'm new at this and frustrated!!!
    Need help!!
    The link is holmeshifi.com and I posted code from the home
    page!

    OK thanks Ned sorry to soo dumb I'm on a learning curve here!  what 
    I'm trying to do is go to the URLs of web galleries of images from my 
    main site
    so I would presumably have to rename them on my server? i.e. does that 
    mean adding the code ", "_blank");
    to the files on the server?
    At the moment I have to use the back button on my browser window which
    takes me back to the main site which then has to reload (tediously!)

  • Newbie Needs Help - Moving to CD

    I'm running winXP and have downloaded the latest CS 5.5 version of Dreamweaver - I've created a small series of interlinking web pages with the 'main site' being a folder on my Desktop called Testsite.  As far as I'm aware all the relevant pages/documets/images are contaned within my Desktop folder and everything runs from index.html which sits within my testsite folder.   Ultimately, I would like to be able put a CD in a drive and automatically launch a browser that would open my home page (i.e. index.html).  I need help on all this but I will googe for the auto launch bit - at the moment I would appreciate any advice on burnng my site to a CD.  Because I have created the site on my PC I'm assuming all my dreamweaver internals/links are in the form C:\Documents and Settings\username\Desktop\Testsite - so I'm guessing if I just copy my Desktop Testsite folder to a CD and run index.html on another PC my little web site is not going to work.  I have googled but keep getting pages about running the actual Dreamweaver applicaton from a CD and installing it on a PC - not the way I want to do it.  I'm not interested in moving Dreamweaver to a CD - just the site/pages I have created.  Any advice apprecited.

    All long as all of your files are linked with relative links (eg: /path/to/file.jpg and not http://www.domain.com/path/to/file.jpg) you should be fine.  Auto-starting can be an issue because there are some operating systems that don't auto start discs.  So you should maybe include instructions with your disc in case the autorun does not work.

  • Storm user newbie needs help with appcenter

    hi everyone. i need help regarding my blackbeery storm 9500. i bought from a friend but he only gave the charger and the the phone. there is no app center. is there anyway i could get the appcenter so that i can get the bbmessenger?

    You can download BBMessenger from your Blackberry browser at www.blackberry.com/bbm
    AppWorld: www.blackberry.com/appword
    You must have the BlackBerry Data Plan on your device to use either of those services.
    1. If any post helps you please click the below the post(s) that helped you.
    2. Please resolve your thread by marking the post "Solution?" which solved it for you!
    3. Install free BlackBerry Protect today for backups of contacts and data.
    4. Guide to Unlocking your BlackBerry & Unlock Codes
    Join our BBM Channels (Beta)
    BlackBerry Support Forums Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • Any Updates Made to the T540 ready to ship? Newbie Needs Help.

    Total newbie with Lenovo.  Lenovo is offering the T540p ready to ship for  about $650.  Is this the same track pad that got all the negative reviews or have any improvements been made?  I'm new to the forum and not a power user.  I maintain a website for a herding dog rescue and edit and move pictures and or video around a couple times a week.  If I use a mouse will this computer work for this?  

    Hi Venkat,
    I suggest to remove Gantt Chart view and Entry table from Eglobal. These are default views from client and it is highly recommended to not use them in Enterprise Global.
    Whatever a user ist doing on a view or table which is included in Enterprise Global will be reset on next open - therefore you receive this message.
    If you need some server wide defined views and tables, create them. But remove Gantt Chart and Entry.
    Does that help?
    Regards
    Barbara
    To increase the value of this forum, please mark the replies that helped to solve your issue as answer. If you find answers to questions from other forum participants to be helpful, please mark them as helpful. Your participation will help others to find
    an appropriate solution faster. Thanks for your support!

  • ..I Need Help Putting Music On My iPod..

    ok.. For Some Reason.. All Of A Sudden When I Connect My iPod To My Computer To Put Songs On It.. A Message Comes Up Sayin..
    "Songs On The iPod "my name iPod" Cannot Be Synced Because All Of The Playlists For Syncing No Longer Exist"..
    I Have NOOOO Idea What That Means But Its Took All The Songs Off My iPod.. But There Still On iTunes But Wont Go On The iPod Cussa That Reason ^^..
    Help Please

    You get this problem when the option 'Sync Music - Selected playlists' is being used to sync your iPod and then the playlist it has been updating from is deleted. Most people use this setting when the iPod is smaller than the iTunes library. If your library is larger than the capacity of your iPod, iTunes by default makes a new playlist called something along the lines of "Owner's iPod". If you for any reason delete it, you will not be able to sync your iPod.
    Open iTunes and create a playlist to update your iPod from, call it -iPod to make it the first playlist in Sources. You can make this a normal playlist and drag whatever you want to it or you can make it a random Smart playlist. If you are making a smart playlist limit it to just less than the size of your iPod (for example 3700MB for a 4G iPod Nano). Now connect your iPod and when it appears in the Source list click on the iPod icon to bring up the preference tabs in the main pane. Go to the Music tab and choose Sync Music and the Selected playlists radio button. Choose the playlist you just made from the selection and click Apply. You can also sync from any existing playlists by choosing the same setting, you just need to make sure that the size of the playlists don't exceed the capacity of your iPod:
    iTunes: Creating playlists of your favorite songs
    How to create a Smart Playlist with iTunes
    To make a random playlist go to File>New Smart Playlist.
    Uncheck "Match the following rule"
    Check "Limit to" put "3700" in the number box, choose "MB" from the first list box, choose "Random" from the next list box. Check "Live Updating"
    When you want to change the selection in the playlist just delete everything in it and it will add a new selection

  • My Mac keeps crashing--a newbie needs help

    Lately, my Mac keeps crashing.  It's an iMac, with the most recent updates of Yosemite.
    I'll be working, I might have several things open, and then suddenly the screen will go black and I'll have the notification that it shut down and push to restart.
    It has happened more than several times now, and I can't remember if it started doing it before Yosemite or not.
    Not sure how to search out the problems, it's my first Mac.  Are to many things open?  There's no crash report when I restart.
    thanks!

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for