Question About Password Safety
I've been told that if I feel my passwords have been compromised, I should change them. But how does a person gain access to a password in the first place? And if I don't know how it's happening, what's to prevent it from happening again? Sorry if the question is a bit vague. Perhaps someone can help me fine tune it a bit.
Using an "obvious" password like a name, birthday, etc.
Using a simple password that's easy to decode such as passwords with fewer than 7 or 8 characters.
Giving your password to someone who in turn passes it on to someone else.
Giving others access to your computer.
Using the same password for all accesses.
Not changing your password regularly.
The above is not all inclusive. Also, see OS X Mountain Lion: Understand passwords.
Similar Messages
-
Dumb question about Thread Safety in Servlets
Hi all
I wrote this Client API for sending requests and receiving responses to / from a multivalue database. The API is called by my Servlet. Now it seems my API is not thread safe because when several people open up the servlet at the same time, the API gets totally confused. When the API calls are inside a synchronized(){} it works just fine, but obviously at a big performance hit. Is that the wrong way of doing it??
However when I was doing the ACID test locally on my machine, by opening two command prompts and excuting the same java program (with the same code in it as the servlet, but standalone) my API worked just fine. How come?
Any insights appreciated as I am just learning about thread safety now (the hard way :-( )
cheers
DejanDoes this help
Are you using one connection to the database shared by all instances
of your servlet
And is this connection create in the init method of the servlet and stored
in the servlet context.
Problem 4 people try and use your servlet at the same time, each servlet trys to
create a connection to the database and then store it in the servlet context and
this causes a problem.
Solution create a listener to create the connection and store it in the servlet context
when the servlet is created.
If this is your problem it is not advisable to use only one connection to the db
try using db pooling -
Good afternoon,
In the 2 Day DBA document it states:
>
When you invoke DBCA as part of the Oracle Database installation process, DBCA
creates a password file with one entry: the SYS user.
>
I created the database using DBCA and, it must have created a password file for me since I am able to log in remotely to the database.
The question is: I cannot locate the password file DBCA created, I don't know what its name is. Can someone provide me with the name DBCA uses for the password file ?
Thank you very much for helping,
John.Hello SB,
>
post proof
>
I don't know if this qualifies as "proof" but... from the 2 Day DBA document distributed by Oracle, page 6-9:
>
When you invoke DBCA as part of the Oracle Database installation process, DBCA
creates a password file with one entry: the SYS user. Granting SYSDBA to a user adds
that user to the password file automatically.
>
I have no reason to doubt that statement. ;)
>
for some/many/most Oracle versions which you decided we did not need to know yours the file resides in
$ORACLE_HOME/dbs
>
I didn't decide you didn't need to know. I forgot to mention I am using Windows. As far as the Oracle version, since I used to constantly forget, I made the version part of my user name 11gR2, I can see how that can be easily overlooked.
Thank you for your help,
John. -
Urgent question about Thread-safety
Hi all,
the new tiger release provides an "isReachable()" method for the "InetAddress" object.
I've found, this method is not thread-safe (see the source and output below).
It returns true for all threads, when multiple threads using this method with different adresses are running at a time and one of the addresses is reachable. This happens only on WinXp. Running on Linux, the output is like expected.
I've tried to report this as a bug. But the gurus answered, taking care of thread safety would be a "programmers task".
My question is, what can I do, to be thread-safe in my case?
W.U.
import java.util.*;
import java.net.*;
public class IsReachableTest_1 extends Thread{
static volatile int inst=1;
static final String NET_ADDR="192.168.111.";
int instance=inst++;
public void run(){
for(int i=19;i<23;i++){
try{
long start=System.nanoTime();
if(InetAddress.getByName(NET_ADDR+i).isReachable(1000))
System.out.println(""+instance+"--host found at:"+NET_ADDR+i+"--time:"+(System.nanoTime()-start)/1000000);
else
System.out.println(""+instance+"--no host at:"+NET_ADDR+i);
}catch(Exception e){System.out.println(""+instance+"--ERROR "+e.toString());}
System.out.println(""+instance+"--done.");
public static void main(String[] args) {
System.out.println(
System.getProperty("java.vendor")+" "+
System.getProperty("java.version")+" running on "+
System.getProperty("os.name")+" "+
System.getProperty("os.version"));
Vector v=new Vector();
System.out.println("\nTest 1: One after another:");
for(int i=0;i<10;i++){
IsReachableTest_1 t;
t=new IsReachableTest_1();
t.start();
try{
t.join();
}catch(Exception e){System.out.println("MAIN1: "+e.toString());}
System.out.println("\nTest 2: All together:");
inst=1;
for(int i=0;i<10;i++){
IsReachableTest_1 t;
t=new IsReachableTest_1();
t.start();
v.addElement(t);
for(Iterator i=v.iterator();i.hasNext();)
try{
((IsReachableTest_1)i.next()).join();
}catch(Exception e){System.out.println("MAIN2: "+e.toString());}
System.out.println("\nALL DONE");
And here is the output, when running on WinXp:
Sun Microsystems Inc. 1.5.0-beta running on Windows XP 5.1
Test 1: One after another:
1--no host at:192.168.111.19
1--no host at:192.168.111.20
1--host found at:192.168.111.21--time:2
1--no host at:192.168.111.22
1--done.
2--no host at:192.168.111.19
2--no host at:192.168.111.20
2--host found at:192.168.111.21--time:4
2--no host at:192.168.111.22
2--done.
3--no host at:192.168.111.19
3--no host at:192.168.111.20
3--host found at:192.168.111.21--time:1
3--no host at:192.168.111.22
3--done.
4--no host at:192.168.111.19
4--no host at:192.168.111.20
4--host found at:192.168.111.21--time:1
4--no host at:192.168.111.22
4--done.
5--no host at:192.168.111.19
5--no host at:192.168.111.20
5--host found at:192.168.111.21--time:3
5--no host at:192.168.111.22
5--done.
6--no host at:192.168.111.19
6--no host at:192.168.111.20
6--host found at:192.168.111.21--time:1
6--no host at:192.168.111.22
6--done.
7--no host at:192.168.111.19
7--no host at:192.168.111.20
7--host found at:192.168.111.21--time:1
7--no host at:192.168.111.22
7--done.
8--no host at:192.168.111.19
8--no host at:192.168.111.20
8--host found at:192.168.111.21--time:1
8--no host at:192.168.111.22
8--done.
9--no host at:192.168.111.19
9--no host at:192.168.111.20
9--host found at:192.168.111.21--time:1
9--no host at:192.168.111.22
9--done.
10--no host at:192.168.111.19
10--no host at:192.168.111.20
10--host found at:192.168.111.21--time:1
10--no host at:192.168.111.22
10--done.
Test 2: All together:
1--no host at:192.168.111.19
2--no host at:192.168.111.19
3--no host at:192.168.111.19
4--no host at:192.168.111.19
5--no host at:192.168.111.19
6--no host at:192.168.111.19
7--no host at:192.168.111.19
8--no host at:192.168.111.19
9--no host at:192.168.111.19
10--no host at:192.168.111.19
2--no host at:192.168.111.20
3--no host at:192.168.111.20
6--host found at:192.168.111.20--time:924 <----- this host does not exist!!
5--host found at:192.168.111.20--time:961 <----- this host does not exist!!
10--host found at:192.168.111.20--time:778 <----- this host does not exist!!
9--host found at:192.168.111.20--time:815 <----- this host does not exist!!
2--host found at:192.168.111.21--time:37
7--host found at:192.168.111.20--time:888 <----- this host does not exist!!
8--host found at:192.168.111.20--time:852 <----- this host does not exist!!
4--host found at:192.168.111.20--time:997 <----- this host does not exist!!
1--host found at:192.168.111.20--time:1107 <----- this host does not exist!!
3--host found at:192.168.111.21--time:38
6--host found at:192.168.111.21--time:1
5--host found at:192.168.111.21--time:1
10--host found at:192.168.111.21--time:2
2--host found at:192.168.111.22--time:3 <----- this host does not exist!!
9--host found at:192.168.111.21--time:2
7--host found at:192.168.111.21--time:1
4--host found at:192.168.111.21--time:3
1--host found at:192.168.111.21--time:39
2--done.
1--host found at:192.168.111.22--time:5 <----- this host does not exist!!
1--done.
10--host found at:192.168.111.22--time:40 <----- this host does not exist!!
3--host found at:192.168.111.22--time:192 <----- this host does not exist!!
6--host found at:192.168.111.22--time:75 <----- this host does not exist!!
8--host found at:192.168.111.21--time:230
5--host found at:192.168.111.22--time:155 <----- this host does not exist!!
4--host found at:192.168.111.22--time:78 <----- this host does not exist!!
9--host found at:192.168.111.22--time:77 <----- this host does not exist!!
7--host found at:192.168.111.22--time:76 <----- this host does not exist!!
10--done.
6--done.
4--done.
5--done.
3--done.
7--done.
9--done.
8--no host at:192.168.111.22
8--done.
ALL DONEI created this test (it's basically the same as your class):
import java.util.*;
import java.net.*;
public class IsReachableTest_2 implements Runnable {
private final String[] addresses = new String[] {
"www.sun.com",
"129.42.16.99" // www.ibm.com which is not reachable
public void run(){
try {
for (int i = 0; i < addresses.length; i++) {
final long start = System.nanoTime();
final String address = addresses;
if (InetAddress.getByName(address).isReachable(5000)) {
System.out.println(Thread.currentThread().getName() + ": Host found at: " + address +
" --time: " + (System.nanoTime() - start) / 1000);
} else System.out.println("no host at: " + address);
} catch(Exception e){
e.printStackTrace();
System.out.println("Thread " + Thread.currentThread().getName() + " DONE");
public static void main(String[] args) {
System.out.println(
System.getProperty("java.vendor") +
" " +
System.getProperty("java.version") +
" running on " +
System.getProperty("os.name") +
" " +
System.getProperty("os.version")
for (int i = 0; i < 10; i++) {
final Thread t = new Thread(new IsReachableTest_2(), "THREAD " + (i+1));
t.start();
And I get:
Sun Microsystems Inc. 1.5.0-beta running on Windows 2000 5.0
THREAD 1: Host found at: www.sun.com --time: 217653
THREAD 3: Host found at: www.sun.com --time: 214404
THREAD 6: Host found at: www.sun.com --time: 214900
THREAD 4: Host found at: www.sun.com --time: 215901
THREAD 5: Host found at: www.sun.com --time: 216666
THREAD 10: Host found at: www.sun.com --time: 216620
THREAD 9: Host found at: www.sun.com --time: 217405
THREAD 2: Host found at: www.sun.com --time: 220705
THREAD 7: Host found at: www.sun.com --time: 220845
THREAD 8: Host found at: www.sun.com --time: 221384
no host at: 129.42.16.99
Thread THREAD 4 DONE
no host at: 129.42.16.99
Thread THREAD 6 DONE
no host at: 129.42.16.99
no host at: 129.42.16.99
no host at: 129.42.16.99
no host at: 129.42.16.99
no host at: 129.42.16.99
no host at: 129.42.16.99
no host at: 129.42.16.99
no host at: 129.42.16.99
Thread THREAD 5 DONE
Thread THREAD 10 DONE
Thread THREAD 9 DONE
Thread THREAD 7 DONE
Thread THREAD 3 DONE
Thread THREAD 1 DONE
Thread THREAD 2 DONE
Thread THREAD 8 DONE
HOWEVER: I was getting some strange results every so often. Results like:
Sun Microsystems Inc. 1.5.0-beta running on Windows 2000 5.0
THREAD 3: Host found at: www.sun.com --time: 261132
THREAD 9: Host found at: www.sun.com --time: 264183
THREAD 2: Host found at: www.sun.com --time: 266447
THREAD 6: Host found at: www.sun.com --time: 266596
THREAD 8: Host found at: www.sun.com --time: 267192
THREAD 5: Host found at: www.sun.com --time: 268610
THREAD 4: Host found at: www.sun.com --time: 269849
THREAD 1: Host found at: www.sun.com --time: 280978
THREAD 7: Host found at: www.sun.com --time: 272589
THREAD 10: Host found at: www.sun.com --time: 273162
THREAD 3: Host found at: 129.42.16.99 --time: 13657
Thread THREAD 3 DONE
THREAD 4: Host found at: 129.42.16.99 --time: 4123
THREAD 2: Host found at: 129.42.16.99 --time: 9439
THREAD 5: Host found at: 129.42.16.99 --time: 6681
THREAD 8: Host found at: 129.42.16.99 --time: 7655
THREAD 6: Host found at: 129.42.16.99 --time: 8627
THREAD 9: Host found at: 129.42.16.99 --time: 10586
Thread THREAD 4 DONE
Thread THREAD 2 DONE
Thread THREAD 5 DONE
Thread THREAD 8 DONE
Thread THREAD 6 DONE
Thread THREAD 9 DONE
no host at: 129.42.16.99
Thread THREAD 7 DONE
no host at: 129.42.16.99
no host at: 129.42.16.99
Thread THREAD 10 DONE
Thread THREAD 1 DONE
Usually the first run after I had compiled the class (!?) This isn't a thread safety problem. -
A question about thread safety and the Acrobat SDK
Hi All,
On page 12 of this FAQ: http://www.adobe.com/devnet/acrobat/pdfs/Acrobat_SDK_developer_faq.pdf
It says that Use of any Acrobat product in a multithreaded way is technically impossible.
I'm currently writing a command line application to perform some basic data gathering on a PDF file. The Application only makes use of a PDDoc object, and never calls on any other kind of object (i.e. AVDoc).
The application itself is not multithreaded. All of the logic runs in a single thread.
However, the application will be called (via the command line) from another application that /is/ multithreaded. I think that this might be fine, but I wasn't sure. In this case, would this count as a single thread, but spread across multiple processes? And if that is the case, would that be OK with the SDK?
Or would having multiple invocations/calls into the Acrobat DLLs cause the same issue as a multi-threaded application?
Unfortunately, I haven't done a lot of work with threads before. This might be a very silly question.The application would be called from a perl script that is used to automate several tasks. The app is a console application, written in C# w/ the Acrobat COM components, and Visual Studio 2005.
The console application uses the Acrobat SDK to instantiate a PDDoc object, open a PDF, and get information about the document. It then returns results back to the console.
So, the perl script just calls: "C:\pdfinfo.exe -f=myPdf.pdf" and pipes the result to a log file.
In this case, it never creates a new instance of the Acrobat application, but it does use the SDK.
The reason that I was concerned was that the perl script is multi-threaded. I wasn't sure if acrobat was just sensitive to multiple threads inside a single process, or if it was unable to handle multiple processes as well.
PDL's answer suggests that I should be fine as long as a new process is started each time. This is good to hear. -
Hope someone can help. I have my user [administrator?] passord all set up but is it possible to have a separate password that controls who gets to see my folders? Someone else who uses my computer is snooping through my personal stuff… if someone could advise and maybe provide a ‘stoopid’ person’s step-by-step guide to setting it up I’d sure be grateful!
Hi pain..., Welcome to Apple's Users Help Users Forums.
The folders in question need to be in your home folder and not in shared just in case you somehow put them in the wrong place.
Also check permissions and cmd i on the folders and make sure they are what you want. -
How can I change the value of getPasword() method from char[] to String?
By overriding, if possible? Or creating a wrapper method:
private String getPasswordAsString() {
char[] password = getPassword();
return new String(password);
} -
Question about Password Keeper
Hello All,
This is my first forum post. Does anyone know if it is possible to retrieve password keeper information from the blackberry desktop manager? I did a backup and restore on my old phone, which had a broken screen, and am trying to retrieve the passwords to put on my new phone. The at&t rep did not know if the desktop manager kept this information or not. When I did a restore on my new phone, the passwords did not transfer. I appreciate any advice. Thanks.
ToddHello ToddStoner and welcome to the BlackBerry Support Community Forums.
The password keep should have backed up the data. If you go to do an advanced restore (as shown in KB23680 for Desktop Manager 6.0 or KB03953 for all other versions) you should see the Password Keeper database.
When you access the Password Keeper on your BlackBerry, did it ask for the existing password or create a new one?
-HMthePirate
Come follow your BlackBerry Technical Team on twitter! @BlackBerryHelp
Be sure to click Kudos! for those who have helped you.Click Solution? for posts that have solved your issue(s)! -
Urgent: Question about password for user 'anonymous'
Hi, Expert,
My apex run well until I 'alter user anonymous account unlock', 'alter user anonymous identified by oracle'.
After I change the password, I got the '500 Internal Server Error' when I access http://host:port/apex
How can I fix the problem? What should be the Password for 'anonymous'?
Thanks in advance for any kind help!!
Sharon.Ni
Edited by: user536764 on Apr 30, 2011 9:07 AMThe following is output of the epgstat
SQL> @epgstat
| XDB protocol ports: |
| XDB is listening for the protocol |
| when the protocol port is non-zero. |
HTTP Port FTP Port
8080 0
1 row selected.
| DAD virtual-path mappings |
Virtual Path DAD Name
/apex/* APEX
1 row selected.
| DAD attributes |
DAD Name DAD Param DAD Value
APEX database-username ANONYMOUS
default-page apex
document-table-name wwv_flow_file_objects$
request-validation-funct wwv_flow_epg_include_modules.authorize
ion
document-procedure wwv_flow_file_mgr.process_download
nls-language american_america.al32utf8
document-path docs
7 rows selected.
| DAD authorization: |
| To use static authentication of a user in a DAD, |
| the DAD must be authorized for the user. |
no rows selected
| DAD authentication schemes |
DAD Name User Name Auth Scheme
APEX ANONYMOUS Anonymous
1 row selected.
| ANONYMOUS user status: |
| To use static or anonymous authentication in any DAD, |
| the ANONYMOUS account must be unlocked. |
Database User Status
ANONYMOUS OPEN
1 row selected.
| ANONYMOUS access to XDB repository: |
| To allow public access to XDB repository without authentication, |
| ANONYMOUS access to the repository must be allowed. |
Allow repository anonymous access?
false
1 row selected. -
Question about passwords please
I just set up Airport Express, and it works great in providing Internet access. However, I unplugged the Airport Express when I wasn't using it and then plugged it back in last night. I expected to have toenter the password for the Airport Express but the computer did not ask me for it and I was automatically able to click on the Internet. Is this normal? Ånd, is there a way for me to require the computer to ask me for a password each time I want to use the Internet after the router is unplugged?
Many thanks.Donna42, Welcome to the discussion area!
I expected to have toenter the password for the Airport Express but the computer did not ask me for it and I was automatically able to click on the Internet. Is this normal?
Yes that is normal. OS X records the password in the keychain when you first enter it. That makes it easier for you so that you don't have to reenter it every time that you reconnect to the network.
Ånd, is there a way for me to require the computer to ask me for a password each time I want to use the Internet after the router is unplugged?
Yes. You can remove the current entry from the keychain. The next time that you connect to the network and enter your password, uncheck the box asking if you want the password saved to the keychain. -
Questions about password recovery IDSM-2
Hi, I want to know what is the procedure for password recovery IDSM-2 and if this procedure needs to restart switch core or only module. I have been reading and I have understood that is necesary download an image WS-SVC-IDSM2-K9-a-6.0-password-recovery.bin.gz and perform upgrade but for me it is not clear what commands are needed to perform update of this image.
Thanks for your help
Ana Mariahave you checked this link:
http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_password_recovery09186a0080094e83.shtml#p10 -
Hi, I have answered no to the question about saving password for one spesific site. I have changed my mind and would like Firefox to save the password. How do I reactivate the password saver for one spesific site?
Check exception list of your Firefox password Manager and check if your site is there or not?
* http://kb.mozillazine.org/User_name_and_password_not_remembered#Password_Manager_settings -
Hi guys, 2 quick questions about the SmartWare utility. I have searched for previous answers, but couldn't find any. Might be that I uses the wrong search terms though, so sorry in advance if this had been asked (and aswered) before. When I create a backup, it is being stored file-by-file in the "SmartWare" folder on the NAS. Since the SmartWare folder is public, all users with access to the drive can access this folder. Ultimately this means that ALL users of the drive can access the backup files of ANY user. If someone performs a full backup, this means that anyone has access to ALL the data of that person. I could't find any option in SmartWare to password-protect backups or something. From a security point of view, I would consider this as a worst-case scenario. Even worse is that there is no mentioning of this in the user's manual. Am I missing something here? Is there a way to protect backups against access by any other user? If this is really not possible, I would consider this application to be pretty much useless, to say the least. "Dangerous" would be a better description... My 2nd question is only relevant if there's a solution for the first one, because else I would't use this tool anyway: Does it automatically resume a backup if the machine is put to standby or hibernation mode during a backup operation, or will it restart from the start, or will the backup be interrupted (and thus useless)? Many thanks in advance!
One can create a Private Share on the WD My Cloud, configure it so only one user has access (password protected), then one can configure the SmartWare software to backup to that private share folder. One changes the backup location in the SmartWare program by selecting the dropdown selector box below the "WD My Cloud" on the Smartware "Home" screen. The Smartware User Manual explains this process under Chapter 5, Backing up Files, step 2, substep c. Smartware should resume the backup when ever it is interrupted. Here is how it is explained in the Smartware User Manual:Note: Backup protection is automatic for as long as the backup source and target devices are connected to your computer. Then, whenever you disconnect and reconnect either device, the WD SmartWare software rescans the backup source device for new or changed files and resumes automatic backup protection.
-
Basic question about storage and safety in iMovie '11
A very basic question about storage and safety:
I want to keep a backup of my raw footage on my external hard drive prior to begin working on the movie in iMovie. I want to do this:
1. Upload the digital files from my camcorder to my Desktop *(as opposed to iMovie)*
2. Duplicate that footage/clips.
3. Put the duplicate clips/footage into a folder labeled with the name of that footage (like "Fun At the Dentist" or "Jimmy Learns How to Yodel").
4. Drag the folder with the footage/clips into my external hard drive into a pre-existing folder titled "Backups/duplicates of all of my raw footage/clips." This big granddaddy folder will house all of the child folders of different movies.
5 Then, open up iMovie '11 and import the raw footage/clips from my Desktop rather than from my camcorder.
6. Then I want to make a duplicate of my finished movie and put it in my external hard drive in a "Finished Movies" folder.
I know that the original raw unedited footage will always be in iMovies '11 but I want the original to also exist immediately accessible in my external hard drive.
QUESTION:
Is this viable? Is it wise? (I know it goes an extra unnecessary step, but aside from that.)
*Do you have any precautionary advice?* Should I do something in my iMovies '11 preferences? What?
In earlier years with iMovie '04 or '06 (cannot recall) I made many novice errors and ended up losing audio to my finished movie. I also lost footage.
This time around with iMovie '11 I don't to make such novice, ignorant errors.
Thanks so much for any comments to this question.
-LYes I'm sure it will work great for you.
The iFrame format is something Apple has come up with. The reason for its existence is unknown to me so I can only speculate. But it seems to me that Apple "invented" this format in order to have devices such as Ipod/Ipad/Iphone/Ixxx create clips that are editable on consumer hardware such as already mentioned devices but also standard Mac computers, without the need for format conversion.
iMovie converts most input formats during import, which takes a lot of time, and this need for conversion often comes as a surprise to most people new to home video editing.
iFrame has a resolution of 960x540 which is long way from the common standards of 1920x1080 and 1280x720. If your end target is YouTube however, this may not be too bad though. However if you intend to go with YouTube HD, you may find iFrame footage to look wrong since they are effectively upscaled to a higher resolution.
Technically iFrame uses the H.264 algorithm, a smaller frame size (960x540) and a rather low compression scheme. This will result in large files, but the plus side is that the files are ready for editing without the need for any conversion and iMovie will natively edit the files. -
Question about using passwords on Visio
I have another question about the Vision:M. I was curious if you're able to password protect certain folders so that in order to access them, you have to put in a password. I know you can password protect files so it can't be messed with or whatever, but it doesn't stop the files from being viewed. Is there any way to do this?
jessevsm wrote:
I have another question about the Vision:M. I was curious if you're able to password protect certain folders so that in order to access them, you have to put in a password. I know you can password protect files so it can't be messed with or whatever, but it doesn't stop the files from being viewed. Is there any way to do this?
there is an option somewhere in the settings menu to hide protected files, so you can't see them or edit them till the password is entered.
Maybe you are looking for
-
How can I learn to use my new Mac Air?
How can I learn to use my new Mac (I am a long time user of Windows), without having to go to Apple Store. Ours is 50 mi. away. Is there such a remote service? (Apple's or otherwise)
-
Image capture 10.4 worse than 10.3
As a professional photographer I'm a heavy user of Image Capture. It really is a god send. but since 10.4 it has become a real pain to use. (almost like a windoze program!) First it never remembers my window size and thumbnail size settings as it did
-
Hi, I was watching a normal .mp4 video in quicktime and I wanted to stop playback and stop Quicktime, so I clicked the red X to close the window. When I did that, Quicktime crashed and didn't respond for about 5 seconds, quit, and I got a crash repor
-
Photos edited in external editor are huge..
If I edit a photo in an external editor (Photoshop CS5), the file is saved as an PSD file. This one is about 50 times bigger than the original. Is it possible to convert the file to a JPG after editing so it will use less disk space?
-
A new question regarding installing part 2 on a Mac...
I've been reading posts here to see if I can find out why Part 2 of BrowserLab won't install on my Mac (running OS10.6.2) without any luck. I have installed and confirmed Extension Manager 2.1.115. There is no version number under 'get info' for the