Searched for a clear answer on Mac to Windows Itunes file transfer

Trying to send my Mac iTunes music to my Windows laptop over a network. Windows sees the songs and can play them in iTunes, but is there an easy (or not so easy) way to just drag and drop the songs to the Windows computer?
Thanks for any help!
S

I use Windows and prefer to stay away from MACs these days. So quick question, are you able to move the music from your iPod to your MAC, then from the MAC to flashdrive to Windows PC?

Similar Messages

  • How do you search for a song in the latest version of ITunes??

    How do you search for a song in the latest version of ITunes??
    Yes this might be the stupidest question ever, but leave it to Apple to make the simplest thing hard.
    In EVERY version of Itunes, up until 11, you used to be able to type an artists name, song name, or album into the search field and it would narrow it down so that you can see what you are looking for (in the list below).  Now, Itunes tells you that you have music by said artist, yet doesn't list them whatsoever. Furthermore, when you click on the results it doesn't list them for you either.
    I'm sure it is some weird setting, but cannot for the life of me find.  I cannot name one application that doesn't show a list when you type in the search field.  Augh!
    Please help.
    G

    You can choose what it searches and where

  • Adobe Air SDK for IOS, i'm searching for a week  to get the certificate and provisioning files

    Adobe Air SDK for IOS, I'm searching for a week  to get the certificate and provisioning files!!
    Please help me to get the certificate and provisioning files and I should pay to have these files.
    Thanks

    Apple doesn't provide support for third-party development tools.
    You need to post in the Adobe forums.
    You need a paid developer account to install apps on an iOS device.

  • HT5071 Why isn't my newly published book coming up when I search for it by title and by author on iTunes and iBooks?

    Why isn't my newly published book coming up when I search for it by title and by author on iTunes and iBooks?

    Thanks, but it turns out iTunes just needed another 24 hours. Now when I search in iTunes by my name or book title, it comes up!
    Do you happen to know why it doesn't list my name on itunes? It shows the title and then By (blank). Grr.
    bit.ly/1aveWcg

  • I cant search for shared libraries on my mac

    okay, so i just got a macbook pro and im trying to move my music from my pc to my mac. I've turned on home sharing on both computers but when i try to search for my pc's library on my mac there isn't an option to look for other libraries on my macs sharing tab. helpp!!

    it's now a checkbox in preferences > general

  • What antivirus is better for those who work with mac and windows?

    In my home I use an iMac, but in college I use Windows, and more than once I found an infected file. I know not affect iMac, but I prefer that viruses are removed. Right now I use ClamXv, but I don't know if it is effective.
    Am I to continue using ClamXv? or, do I use another?
    If there are others better AV for mac, what is most recommended?
    **I have also used Sophos, but it makes the iMac go very slow.
    Thanks for your attention.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders," for example, are outside the safe harbor, though not all are malware.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    There is an increasing tendency for rogue websites such as "Softonic" and "CNET Download" to distribute free applications that have been packaged in a superfluous installer that also installs malware or something else that you don't want. Never visit those sites, and get all freeware directly from the developer's own site whenever possible.
    Software attached to email that you didn't request is unsafe, even if it comes (or seems to come) from someone you trust.
    Software advertised by means of spam is unsafe.
    Unknown "free" software that a stranger on the Internet is eager for you to download is unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    I don't say that leaving the safe harbor just once will inevitably result in disaster, but making a habit of it will weaken your defenses against malware attack. Doing any of the things alluded to above should make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Search for a wod in java classes in windows 7

    Hello,
    How to search for a specific word in a list of java classes in my windows directory? I know we can search in .java files but not sure how to do the search in .class files. Any help is really appreciated.
    Thank You
    -KK

    Hi,
    For searching in .class files, you need to decompile those using some decompiler.
    1) You can use JAD (Java Decompiler) and decomplie using these commmands:
    jad *.class
    rename *.jad *.java
    2) There is another decomplier, CAVAJ which is very user friendly. You just need to drag the class file onto this and it will show the java code for that class file.
    --Sushant                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

  • Converter for video that works on Mac and Windows

    Which converter is best to use for Mac and Windows?

    Here I recommend a powerful yet easy to use 6 in 1 Video Converter Ultimate – The Combination of Video Converter, Youtube Downloader, Video Editor, Video Player, DVD Ripper & DVD Creator.
    You can use it to: Download Youtube & Other Online Videos With One Click; Convert Video & Audio to Any Format You Want; Edit Videos With Built-in Advanced Video Editor; The Ultimate DVD Toolkit; Transfer Video Without USB Cable

  • Re: Itunes 10.3 for windows  I had problems  whereas when I searched for a song I kept getting message "Accessing Itunes Store" when I was already in it I uninstalled and reinstalled latest version  Still having problems

    I had following problem: When I tried to search for a song in the Itunes Store I kept getting message "Accessing Itunes Store" (even though it appeared I was already in the store) Everytime I typed a character in the Search box the Accessing Itunes Store message would pop up
    I was told to uninstall Itunes and Quick time programs and reinstall latest versions, which I have done and now have Itunes 10.3
    I still got same messages so I tried a few things and when I went to my itunes account profile I got message "Requested Resouce not found"
    Don't know where to go from this point.  HELP

    I have the same issue.  I took it the genius bar and called talked to tier 2 phone support. They have standard thing where you uninstall all apple software in a certain order and then reinstall 64bit itunes.  That did nothing (tried it 4 times).
    I've gotten two clues so far.
    One is that at the store if I plug someone else's iphone 4 in then itunes acts the same way. So it is not the phone. Two is tier 2 phone support told me to try syncing it with a fresh user account (an admin one). I did that and itunes was just fine, it did not freeze.
    So there appears to be some conflict with the software, music files, whatever that is on my current user account (also an admin account).  I ran virus and malware detectors and found nothing.  Now I'm going to try putting my music, movies, apps, etc in the new user account and see if the phone will sync then.
    I know its not much but thats where I'm at. I hope it helps.

  • Windows could not search for new updates after applied June 2014 Windows Updates - Error code 80244004

    After applied June 2014 Windows Updates from Microsoft (Not using WSUS server to obtain WU), our Windows Server 2012 R2 and Windows Server 2008 now getting this error message when we perform the "Check for Updates":
    Windows could not search for new updates.  Error code 80244004. 
    Richard

    Hi Richard,
    Just addition, please refer to following KB to reset Windows Update components and monitor the result.
    How do I reset Windows Update components?
    If didn’t use ESET security software, please also refer to following thread and check if can help you.
    Latest
    version of Windows Update causing error 80244004
    Hope this helps.
    Best regards,
    Justin Gu

  • Lost the Search For "All Movies" icon from the Finder window.

    When I used to GO to Applications there was a "search for" option on the bottom left where I could click on "All Images"or "All Documents" or "All Movies". My son went to drag "All Movies into the main body and it literally went "pooof" and is no longer there. And I can't find a bunch of movies that was previously there. How do I get that option back? (it was next to a little purple box with a cog in it) or is there another way to see all movies on the computer . Thanks.

    Hi,
    click on the Desktop, then
    Finder Menu >Preferences>Sidebar tab
    recheck the "All Movies" box

  • Copying files from Mac to Windows-invalid file names

    Unfortunately, my boss likes Windows more than Macs, so we have puchased some new Dell computers to replace older G4 Macs.
    I'm having trouble copying existing files from a Mac (OS 10.4)to the shared drive on the Windows XP computer. I'm getting an error message:
    "You can't copy the item 'filename' because the name is too long or includes characters that the disk can't display." Sometimes it doesn't give a filename, it gives a similar message "Some items couldn't be copied..."
    I assume the person has used some "illegal" file names such as "Meeting minutes 10/7/07" Or maybe we have too many folders inside of folders.
    QUESTION: Is there a correct/better way to copy large quantites of files/folders from Mac to Windows? Or is there a program that will look at the Mac files and alert me to wrong or too long files names?
    Other ideas to copy these files?
    thanks,
    Bill

    You can use a freeware utility like Renamer4Mac or BatchRename'em both of which have built-in filters that will rename files for Windows compatibility.
    Thank you... This sounded to me like it would fix the problem, so I downloaded both and looked at them. However, the manual/help file is very sparse, so I don't know if it will do what I want to and how it would do it.
    1. I couldn't find any option in either program to: Look at all files in selected folder, and list any invalid file names for Windows.
    2. There doesn't seem to be an option to "rename files without bad Windows characters" or "Remove invalid for Windows characters"
    I just couldn't find any explanation of how it was offering to rename the files. I can't rename all files to sequential names, that would make it hard to find a file later.
    Thank you,
    Bill

  • Sync library with mac and Windows, iTunes 12

    Hi everyone,
    I recently got my iPhone 6, running iOS 8.1.2. I have a mac and a Windows computer and I want to sync libraries on both without having to erase them. The fixes I found on the internet are either for those who have two of the same platform, either mac or Windows, or are for the older versions of iTunes. Third party sync apps didn't work. I don't know where in the new iTunes files the library ID is saved so I can make duplicates. I'm pretty hopeless. Any suggestions?

    Supposedly there is a hidden library ID that is used when syncing but if you change the ID on a second library to match the first one it won't make it the same library.  If you really want the same library on both computers there are a number of ways to do it, but not the brainless Star-Trek computer type solution where you just wish it and it just appears.
    The only true way to achieve this is to use exactly the same library with both computers. This might be achieved through using a common external hard drive or network drive.  Oh, I guess you could keep on copying it back and forth between the two computers too.
    I have never needed to do any of this so I can only make suggestions.  You could create a library and then copy it to the other computer.  It may establish with the same ID.  The only thing is if you then start modifying the library and the two drift apart in content, playlists, ratings, etc.  They may still both sync but obviously things won't match any longer and if you add one new song to your library one one computer it may end up doing major syncing with the phone.

  • ITunes for two users on one Mac. Will iTunes 7 compute?

    iTunes experts!
    I am at it again with iTunes on the same topic I had back in June of 2006 (see thread link below). It would appear that upgrading to iTunes 7 snuffed my neat little set up, though everything still works with iPhoto.
    I've had iTunes 7 for a while now, but am just now trying to get the problem fixed. I reset the permissions to my iTunes library which I have in a shared folder (harddisk/users/shared/iTunes/iTunes Library). I toggled back and forth on my two accounts (mine and my girlfriends) to see that it was working again and it was! ... for about a minute, then it cut and read me the same message on her log on:
    "The iTunes library file is locked, on a locked disk, or you do not have write permission for this file."
    http://discussions.apple.com/message.jspa?messageID=2538271#2538271
    Isn't there a way that two users on a Mac can have access to the same iTunes library on iTunes 7. Please help!
    Gryphen

    ... okay, this was weird, but I half figured it out, and it half corrected itself... I think.
    I went back into the second user account and accessed the iTunes library alias I had put in the account (linked to the main library in the shared folder). It came up just fine. ... now everthing works fine.
    Before, I was just openning iTunes from the dock icon.
    I don't know if my verbage helped anyone understand anything, but hey, I have the same music, shopping cart, and playlists on both user accounts accessible without a need for syncing. I am happy.
    Adios!

  • Requirements Gateway - Searching for requirements in table rows in a Adobe PDF file

    In my quest for creating a good understanding of the coverage of requirements of my test cases I download the NIRG (NI Requirements Gateway) and started out importing my SRS (System Requirement Specifications) documents and some of the test cases. There are many different types of sources which can be imported (Word, Excel, Visio, Access, PDF, ...) and NIRG uses REGEX (Regular Expressions) for extracting the requirement and coverage information of the sources. NI have defined some standardized REGEX formats but they (NI) have also made it possible for tweaking these to fit your purpose. 
    Instead of adding/changing the SRS documents to fit these standardized REGEX formats, I dived into how to create REGEX for my purpose. 
    Check out 
    - http://www.regular-expressions.info/ 
    - http://opencompany.org/download/regex-cheatsheet.pdf 
    NI Requirements Gateway Coupling Series 
    (http://zone.ni.com/devzone/cda/tut/p/id/8414)
    NI Requirements Gateway for Test, Measurement, and Control Applications 
    (http://zone.ni.com/devzone/cda/tut/p/id/3721)
    Is there anyone who have any experience on using NIRG on a PDF document to get information from the rows in a table?
    Best Regards,
    Marcus
    Marcus Törndahl
    Senior Software Designer @ Prevas AB

    Hi Manooch_H,
    Here is the example document and thank you for taking the time and helping me out .
    The columns which I would like to import into NIRG are actually all of them. The UC, Verification, Priority and Responsible columns should be imported as attributes to the requirement. The ID and Requirement columns should be imported as the Requirement and Text respectivaly.
    Best regards,
    Marcus
    Marcus Törndahl
    Senior Software Designer @ Prevas AB
    Attachments:
    SRS.pdf ‏212 KB

Maybe you are looking for

  • All 3d party applications stopped working

    Hi, After updating to 2.1, All applications that are not part of the default installation stopped working (again). I tried resetting, resyncing, nothing seems to help, except deleting and reinstalling all applications (sigh). are other people experie

  • Class & Characteristics in variant configuration

    Hi PP guru's Pl  explain me in detail all the configuration path ,  spro , tcode for the above said . thanx in advance Regards, Vimalbalaji

  • My iPad front camera is fuzzy I tried wiping it but still nothing help please.

    I tried everything to make it not fuzzy but it doesn't work please help.

  • Default Browser change?

    I want to change my default browser from Safari to Opera. I've tried googling this for hours, but no websites have been able to help me, so I decided to come here, to the place where I should be able to get help. So...Is there a way to change the def

  • IMac won't wake up - Screen slowly fades to white

    Dear everyone, I love my iMac g4, it just has this one stupid little problem: The computer will go to sleep just fine, but when I wake it up, the screen is colored all weird, full of lines, and the whole thing slowly fades into a lovely white. Then I