Saving test results for retrieval later.

I have a program that works for testing semiconductors using GPIB control of some HP equipment. The problem is that although it looks like it saves properly (lets me choose directory and name the file), I cannot retrieve any files. When I try to retrieve, the program automatically brings up the last test saved. I am using Open/Create/Replace File, Write File, Close File and Read File. I have an event structure loop that has the options: Run Test, Save Test, Recall Data and Quit. As soon as I hit the recall button the last test saved appears on my graph and output array indicator, then the window comes up asking me for file name etc. I am using LabVIEW 7.0. Any ideas?

I believe I am closing the refnum by using the FileClose VI. I have attached a simpler version of my program that is doing the same thing. I used local variables to create the data types for saving and recalling the files. Do I need to add the file extension when I name the file I am saving? Thank you for looking at this.
Attachments:
File_I-O_trial.vi ‏216 KB

Similar Messages

  • Unable to download web test results for failed Availability Monitor request - HTTP 500

    When attempting to download the Web Test results for a failed request in my availability monitor, the server returns HTTP 500.
    The full URL attempting to be accessed is https://stamp2.app.insightsportal.visualstudio.com/api/WebTestResult?fileName=eProd Dx1 Api_2015-02-25T16:58:00.000Z.webtestresult&subscriptionId=REMOVEDFORSECURITYPURPOSES&resourceGroup=eprod-dx1webapi&webTestId=eprod
    dx1 api-eprod-dx1webapi&location=us-ca-sjc-azr&timestamp=1424883480
    I can provide the sub ID as needed.

    Thinking this is an Azure Portal issue. Please move.

  • Saving validation results for later processing

    Greetings!  I'm trying to come up w/ a way to save validation results (found server side in this.Details.ValidationResults) to an attached entity so that they can be worked by a user at a later time.
    Has anyone implemented such a pattern?  I can't seem to find any examples...
    Thanks in advance!

    @sharpLj - thanks for the reply and article link.
    What I'm looking for is a pattern to SAVE the results of validation rules.  For example, take a simple application that allows users to bulk import (by way of csv upload to server) hundreds of CarManufacturers and CarColors.
    So, you might have a csv that looks like this....
    CarManufacturers,CarColors
    BMW,Green
    Audi,Blue
    Ford,Yellow
    Audi,Silver
    These values get uploaded to a simple table w/ two properties (CarManufacturer & CarColor)...
    I also have two other tables for "CarColorValidation" (Manufacturer 1toMany Colors)..
    Say that those tables are loaded like this:
    BMW -> Green,Blue,Red
    Audi -> Green,Black,Blue
    Ford -> Yellow,Green
    Now, to pull this all together...
    Cars and colors are uploaded, again, in bulk.
    I have validation rules wired up that will look at the uploaded CarManufacturer and its CarColor and make sure that the CarColor is valid (found in the CarColorValidation tables) for the given CarManufacturer. If it is NOT found (in my example the Audi
    that is Silver) then i set a validation WARNING (so i dont block the save process).
    What I want to do is SAVE that validation warning (perhaps to an related table) so that a user can come back later and correct the invalid car color.
    thanks again for any ideas!

  • Speed Tests Results for 802.11ac Wireless Connections

    Using the new Apple MacBook Air with 802.11ac wireless, I tested copying a file and a folder to both the new 802.11ac AirPort Extreme router housing a USB-connected hard disk and the less recent 802.11n Apple AirPort Extreme router housing a similar USB-connected hard disk.
    The results of the tests are summarized in the table below. The movie file was ripped from a DVD movie, and the Microsoft folder is simply the Microsoft Office 2011 folder in my Applications folder containing 14,231 items.
    The MacBook Air computer was located 6–8 feet away from each router with no intervening obstructions. While this was not a scientific test, it demonstrated to me that 802.11ac wireless is clearly superior to 802.11n in a real world setting. I assume that the lower relative performance of 802.11ac versus 802.11n for the large folder containing many files is due to overhead in copying and writing files from and to the hard disks. Ditto for the Gigabit Ethernet test.

    Great resource for speedtesting: www.speedtest.net
    Will show you ping speed, upload/download speeds for your connection. Try for each then post results.

  • Test results for PrintService example needed

    I have just added a demo of the PrintService to
    the web start examples at physci.
    http://www.physci.org/jws/#prs
    Slight hitch in testing, though - there is no printer
    attached to this development box.
    Would anybody with a printer, care to open one
    or two short documents, fire off a test print, and
    report back?
    Does it work at all?
    Does the print work well?
    The code is sandboxed, & an archive of the
    source (*.java, *.jnlp & build.xml) is also
    available at the link.

    I am guessing this isn't the entire problem, but I don't see that memcpy is a supported Windows Store API:
    http://msdn.microsoft.com/en-us/library/windows/apps/dn424765.aspx
    Do you see anywhere else that says it is supported?
    Matt Small - Microsoft Escalation Engineer - Forum Moderator
    If my reply answers your question, please mark this post as answered.
    NOTE: If I ask for code, please provide something that I can drop directly into a project and run (including XAML), or an actual application project. I'm trying to help a lot of people, so I don't have time to figure out weird snippets with undefined
    objects and unknown namespaces.

  • Web test result for a URL which needs a client certificate to authenticate

    Hi,
    we want to check URL response of a .asmx URL which needs a client certificate for authenticating.
    I got the cert object and then passed it to invoke-webrequest cmdlet, but no matter what i try I always get this error
    “The underlying connection was closed”.
    code1
    $WebClient = New-Object System.Net.WebClient
    [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
    $WebClient.DownloadString(“https://server1/mywebservices/myser.asmx”)
    code2
    $url=”https://server1/mywebservices/myser.asmx”
    $cert=(Get-ChildItem cert: -Recurse | where {$_.Thumbprint -eq “abcdefgh3333…..something”}| Select -First 1)
    [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
    #load my client certificate defined by thumbprint
    $HTTP_Request = [System.Net.WebRequest]::Create($url)
    $HTTP_Request.ClientCertificates.Add($cert )
    # We then get a response from the site.
    $HTTP_Response = $HTTP_Request.GetResponse()
    Can someone please help me.
    Thanks
    Manish

    Hi Anna
    Thanks for the reply.
    I used the function referred earlier in my script, as below.
    It is still throwing error. However it does work in powershell v2.
    Is there any specific change required in the script to make it work with V3. I tried invoke-webrequest and it failed too.
    function Ignore-SSLCertificates
        $Provider = New-Object Microsoft.CSharp.CSharpCodeProvider
        $Compiler = $Provider.CreateCompiler()
        $Params = New-Object System.CodeDom.Compiler.CompilerParameters
        $Params.GenerateExecutable = $false
        $Params.GenerateInMemory = $true
        $Params.IncludeDebugInformation = $false
        $Params.ReferencedAssemblies.Add("System.DLL") > $null
        $TASource=@'
            namespace Local.ToolkitExtensions.Net.CertificatePolicy
                public class TrustAll : System.Net.ICertificatePolicy
                    public bool CheckValidationResult(System.Net.ServicePoint sp,System.Security.Cryptography.X509Certificates.X509Certificate cert, System.Net.WebRequest req, int problem)
                        return true;
        $TAResults=$Provider.CompileAssemblyFromSource($Params,$TASource)
        $TAAssembly=$TAResults.CompiledAssembly
        ## We create an instance of TrustAll and attach it to the ServicePointManager
        $TrustAll = $TAAssembly.CreateInstance("Local.ToolkitExtensions.Net.CertificatePolicy.TrustAll")
        [System.Net.ServicePointManager]::CertificatePolicy = $TrustAll
    $url="https://server1/mywebservices/myser.asmx"
    $certs = Get-ChildItem Cert:\CurrentUser\My | where {
    $_.Thumbprint -eq “abcdefgh3333…..something”} 
    $HTTP_Request = [System.Net.WebRequest]::Create($url)
    Ignore-SSLCertificates
    try
        $HTTP_Request.ClientCertificates.Add($certs )
        # We then get a response from the site.
        $HTTP_Response = $HTTP_Request.GetResponse()
    catch [System.exception]
        Write-Error $error[0].Exception
    $HTTP_Status = [int]$HTTP_Response.StatusCode
    Manish

  • Load Test Results - time series request data for by URL in VS2013

    I am trying to figure out how to export and then analyze the results of a load test, but after the test is over it seems I cannot find the data for each individual request by url. This data shows during the load test itself, but after it is over it seems
    as if that data is no longer accessible and all I can find are totals. The data that I want is under the "Page response time" graph on the graphs window during the test. I know this is not the response time for every single request and is probably
    averaged, but that would suffice for the calculations I want to make. 
    I have looked in the database on my local machine (LoadTest2010, where all of the summary data is stored) and I cannot find the data I'm looking for. 
    My goal is to plot (probably in excel) each request url against the user load and analyze the slope of the response time averages to determine which requests scale the worst (and best). During the load test I can see this data and get a visual idea but when
    it ends I cannot seem to find it to export. 
    A) Can this data be exported from within visual studio? Is there a setting required to make VS persist this data to the database? I have, from under Run Settings, the "Results" section "Timing Details Storage" set to "All individual
    details" and the Storage Type set to "Database". 
    B) If this data isn't available from within VS, is it in any of the tables in the LoadTest2010 database where all of the summary data is stored?
    Thanks
    Luke

    Hi Luke,
    Since the load test is used to
    simulate many users accessing a server at the same time, it is mainly verify a wev server load stress.
    As you said that you want to find the data
    for each individual request by url, I know that generally we can analyze the url request from the Summary like the following screen shot.
    >>I
    have looked in the database on my local machine (LoadTest2010, where all of the summary data is stored) and I cannot find the data I'm looking for. 
    I suggest you can try to add the
    SQL Tracing Connect String in the Run Setting properties to trace the data.
    Reference:
    https://social.msdn.microsoft.com/Forums/en-US/74ff1c3e-cdc5-403a-b82f-66fbd36b1cc2/sql-server-tracing-in-visual-studio-load-test?forum=vstest
    In addition, you can try to create an excel to analyze the load test result, for more information:
    http://msdn.microsoft.com/en-us/library/dd997707.aspx
    Hope it help you!
    Best Regards,
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Apple Hardware Test software for late '07 Macbook?

    Where do I get the Apple Hardware Test software for a late '07 Macbook?  Original disk is long lost and it doesn't appear Apple has this up for download.
    The battery is not taking any charge, totally dead after 772 cycles.  But don't know if its the battery or the Macbook's internal battery charging hardware.

    Using How to identify MacBook models your Macbook is a Macbook 3,1. At this link https://github.com/upekkha/AppleHardwareTest click on Macbook3,1 link which will download the AHT software. Here is the direct link - MacBook3,1 Mac-F22788C8.

  • Analyze test result from txt file

    I need some suggestions from experts. I saved test result in txt file with following format(See attachment). With this test result, I need draw waveform of 'DNBr' based on different OPmode(ADSL2P, VDSL2-8a...). The X-axis will be the value from 'DLS'.  I can creat a complicate VI to do that. But I want to if Labview has any subvi can do this job easier.
    Attachments:
    AW All in One_485847_102744SAV 5T 2h15 PM.txt ‏10 KB

    Hi Tambrook,
    read 3 (header) lines, then read the remaining data lines using "Read spreadsheet file".
    Now you have to select rows by your OPmode as there's no subVI made for your data...
    Best regards,
    GerdW
    CLAD, using 2009SP1 + LV2011SP1 + LV2014SP1 on WinXP+Win7+cRIO
    Kudos are welcome

  • AVK test results

    I am new to Using AVK for my JSP web Application.
    My Environment:
    jdk1.4
    Struts 1.2
    hibernate3
    OC4J 10g (9.0.4)
    SQL server2000
    LDAP
    Plum tree portal.
    I am new to using AVK.
    I need to generate AVK test results for my Customer requirement.
    Where Can i get information ?
    What are jars i need to download ?
    Raghu

    Ideally, I'd like to find a test plan and/or results from the test plan. I've found reference in the Java platform specification indicating that it
    "satisfies all testing requirements available from Sun relating to the most recently published version of the Specification six (6) months prior to any release of the clean room implementation or upgrade thereto..."
    but I have not found what the testing requirements are that have been satisfied. Any ideas?
    Many Thanks,
    -E

  • SCOM 2012 - Visual Studio Web Test - Cannot retrieve downloaded test results / share not configured

    Hello-
    I am trying to get my Visual Studio web test to work in SCOM 2012. I have configured the run-as account, and set the correct overrides for the Alert attachment file share discovery. I followed this guide to the T: http://technet.microsoft.com/en-us/library/jj899889.aspx
    When I Select the site that I want to download the test result file for, The results pane shows the following error:
    "The share does not seem to be configured in the Alert Attachment Management Pack"
    When I attempt to download the result file without manually entering creds, it fails. When I do enter creds, in the "task history" it shows as succeeded, but I get no results. All subsequent automatic "Retrieve previously..." fail. In
    the "task history", the "Run As" column is blank (unless I manually enter the credentials, which doesn't do me any good, anyway)
    My "Alert Attachment" MP is inside another MP I created, along with the "System Center Global Service Monitor VS Web Test" MP and two other System Center MPs. This created MP is the one that my Alert Attachment Overrides are attached
    to.
    My Run-As account has the needed permissions to the file share, so I am lost as to why this isn't working. Any help would be greatly appreciated.

    Have you followed the steps here to configure the share location http://technet.microsoft.com/en-us/library/jj899889.aspx ?

  • Found 0 results for While browsing eBay, when I watch or bid on an item, and later view it again, many inches of white space appears before item appears. If I delete the clear recent history box, the pages will come up as they should for several times, th

    While browsing eBay, when I watch or bid on an item, and later view it again, many inches of white space appears before item appears. If I delete the clear recent history box, the pages will come up as they should for several times, then go back to a lot of extra white space. How can I prevent this? Thank you, Rick in English
    == This happened ==
    Every time Firefox opened
    == About a month ago

    As stated in 1.:
    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem.
    Obviously, it will not harm your computer provided you follow the instructions. However, if you don't post your results in the thread where you were given those instructions, then the person helping you cannot help you further. As he asks at the end, "please post the test results on Pastebin, then post a link here to the page you created."

  • In an eMail message, when I attempt to save two photos by clicking the 'Save 2 Images' link, not the 'Save Image' link, the images are not saved. (I use I I apologize for the late notice, butOS7 on IPhone5). Is this feature broken?

    In an eMail message, when I attempt to save two photos by clicking the 'Save 2 Images' link, not the 'Save Image' link, the images are not saved. (I use I I apologize for the late notice, butOS7 on IPhone5). Is this feature broken?

    Please don't post the same question multiple times!

  • How to summarize all the DUT test results such as Serialnumber, high limit, test result,low limit ,pass or fail to save to one excel table file? So i just open the excel file to see all the DUT report.For your help! any example.

    RT

    Here is an example of a sequence opening an excel document and creating a table. You have to slightly modify it, to save Serialnumber, high limit, test result etc. But this will be a good start.
    Hope this helps
    SijinK
    National Instruments
    Attachments:
    Write_Table_to_XL_and_Create_Chart.zip ‏9 KB

  • Are there any viruses for iMac late 2013?

    I bought an iMac 27 late 2013.  My first apple anything.  I was told by the B/B sales person that I needed webroot for anti-virus protection. I got it and now I am not sure if I need it. I have read a few articles and watched some you tube vids from 2010. What they all claim is there were no viruses at that time and that buying a program to prevent a virus was a waste of money since there was nothing at that point. I can't find any thing on a virus for the iMac 27. Any one heard different ?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • Ios5 wifi problems please help

    I have a ipod 3rd generation and i update into ios5 and the wifi conection start to fail and safari is very slow please help thanks

  • Accessing Contents & Index online Help

    I'm trying to figure out what needs to be included with the software product when I've created a project in WebHelp using RoboHelp HTML X5.0.1. However, I can't always get to RoboHelp's online help by clicking Contents and Index. Is there something I

  • Actionscript 3 rookie

    Hi, i´m totally new to actionscript 3 and definitely confused by all the new terms and the whole OOP itself. As for myself, i´m more into design and was quite happy with some of my rudimentary as1-skills. But now I really feel the need to enhance my

  • U410 touchpad Driver stops working

    I bought a new U410--  i7--- windows 8. The touchpad stops working after some time .. then I have to reboot the system to again get it up & running. then it again works fine for some time ... And again goes off..!!! If I open the mouse properties fro

  • Lion Server fetchmailconfig Error

    Hello I have a Problem with the Lion Server. There is the same Problem on each Lion Server installation. When I start fetchmailconfig on Lion Server I become an error messages. Error: /usr/bin/python: can't open file '/fetchmailconf.py': [Errno 2] No